Osi reference model - fundamentals of networks, Computer Networking

OSI Reference  Model

The cost  reference  model was developed by  the ISO for  international  standardization of  protocols  used at various layers. The model  uses well defined descriptive layers  that specify what happens  at each stages of data processing  during  transmission. It does not specify  the exact  services  and protocols that will be sued in each layer.

The  OSI model  has seven  layers. Each  of the layers is described next.

One  of the main  objective of OSI RM is to define develop protocols to perform the  functions  of each layer and implementation detail of the services it is providing.

Open systems interconnection Reference Models (OSI RM)

OSI RM Architecture of network is shown in figure shown below.

 

 

2148_OSI Reference  Model.gif

                                                        figure OSI reference Model

Posted Date: 3/2/2013 6:25:52 AM | Location : United States







Related Discussions:- Osi reference model - fundamentals of networks, Assignment Help, Ask Question on Osi reference model - fundamentals of networks, Get Answer, Expert's Help, Osi reference model - fundamentals of networks Discussions

Write discussion on Osi reference model - fundamentals of networks
Your posts are moderated
Related Questions
Question: a) List three characteristics and two potential problems of a peer-to-peer environment. b) List three characteristics and two potential problems of a client/

Recognize the command to configure a explanation on an interface Ans) Router(config-if)# explanation Finance department

Q. Network performance measured by delay and throughput ? delay versus load Delay is composed of? Throughput v/s network load


Define Retransmission? Retransmission is a process in which the receiver detects the occurrence of an error and asks the sender to resend the message. Resending is repeated unt


Question The operational amplifier in the peak detector circuit shown in the figure below is powered from plus and minus 15 V. If Vout is at 1V and Vin is at 0.5V, at approxima

Question: Wireless Access points have been known to have various security vulnerabilities that can lead to breach of Secured wired networks. IEEE 802.11 standards have identifi

working of belmen ford algorithm

Q. Show the Use of flow control? Flow control denotes to a set of procedures used to restrict the amount of data that the sender can send before waiting for Error Control