Name the various layers of the osi model, Computer Network Security


(a) Name the various layers of the OSI model.

(b) Show, by means of a diagram, how  the TCP/IP  reference model  is different from the OSI-7 reference model? Why is the TCP/IP model widely used? 

(c) Two popular Mail Access Protocols used nowadays are POP3 and IMAP.

(i) What is the function of a Mail Access Protocol?

(ii) Describe briefly the two download modes of POP3.

(iii) From an ISP's point of view,  POP3  and  IMAP  differ in an important way. Imagine that you were called in to advise an ISP on which protocol it should support. What considerations would you bring up?

Posted Date: 10/18/2013 1:01:25 AM | Location : United States

Related Discussions:- Name the various layers of the osi model, Assignment Help, Ask Question on Name the various layers of the osi model, Get Answer, Expert's Help, Name the various layers of the osi model Discussions

Write discussion on Name the various layers of the osi model
Your posts are moderated
Related Questions
QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b

Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of

Let me know the details of protocol tcp/ip

types of firewall and backup

Question: (a) Which of the following is not a goal of security: i) detection ii) prevention iii) recovery iv) prosecution (b) You are an honest student. One day you

how can you enter the ASVAB practice test on line?

on LAN,where are IP datagrams transported?

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta