Open systems interconnection, Basic Computer Science

Open Systems Interconnection (OS1):

As there are many different protocols for LANs and WANs, communication between two different systems can be difficult. The International Standards Organisation. (ISO) has attempted with some success to solve the problem by the introduction of Open 'Systems Interconnection (OSI). OSI defines a set of procedures and standards grouped into seven layers, for the exchange of information between terminals and computers. 

In theory all systems which conform to OSI specifications should be able to interconnect, but the definitions are vague in certain areas and incompatibilities do arise. To overcome this, some countries have developed their own more detailed standards. 

Anyone involved in the purchase of equipment which is to be linked to a network should find out whether there are any industry specific GOSIPS (Government OSI Profiles) to which they must conform.  

Posted Date: 10/25/2012 12:59:53 AM | Location : United States







Related Discussions:- Open systems interconnection, Assignment Help, Ask Question on Open systems interconnection, Get Answer, Expert's Help, Open systems interconnection Discussions

Write discussion on Open systems interconnection
Your posts are moderated
Related Questions
Ask questioMost part of power consumption in data centers comes from computation processing, disk storage, network and cooling systems. Nowadays, there are new technologies and met

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

what is input and output device? explain meaning of input and output devices

ASCII code:  An alphanumeric code has to represent 10 decimal digits, 26 alphabets and certain other symbols such as punctuation marks and special characters. Therefore, a min


Compiled Language:   An additional program called a compiler translates a program written in a programming language; into a new file that does not require any other program to

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o


note on high level language and low level language

1. (40 points) Add a course drop method to the system that you implemented in Problem Set 1. Modularize your new implementation properly. For any new methods that you introduce: 1.