Summary of osi model, Computer Networking

Assignment Help:

Q. Summary of osi model?

- There was no standard for networks in the early period and as a result it was difficult for networks to communicate with each other.

- The ISO (International Organisation for Standardisation) recognised this. And researched various network schemes in addition to in 1984 introduced the Open Systems Interconnection (OSI) reference model.

- The Open Systems Interconnection (OSI) reference model has standards which ensure vendors greater compatibility and interoperability between various types of network technologies.

- The Open Systems Interconnection (OSI) reference model organizes network functions into seven numbered layers.

- Every layer provides a service to the layer above it in the protocol specification and communicates with the same layer's software or hardware on other computers.

- Layers 1-4 are apprehensive with the flow of data from end to end through the network and Layers 5-7 are concerned with services to the applications.


Related Discussions:- Summary of osi model

Determine the objectives of computer security, Determine the Objectives of ...

Determine the Objectives of computer security Though computerisation helps a lot in proper organisation of experience, it also opens a Pandora's Box simultaneously. On one

Ipv6 - network layer and routing , IPv6 The  internet  engineering task...

IPv6 The  internet  engineering task force begin  the effort to develop a successor  protocols  to IPv4 in the early  1990 is an internet  layer protocols  for packet  switched

What are reasons behind using layered protocols, What are reasons behind us...

What are reasons behind using layered protocols  Reasons for using layered protocols, using them leads to breaking up design problem into smaller more manageable pieces and lay

Calculate the peak-to-peak voltage of the signal, A multimeter is used to m...

A multimeter is used to measure a sinusoidal signal and reads 2V RMS; what is the peak-to-peak voltage of the signal? A mark will be deducted if you do not quote your answer to 2 s

Ports, It is an additional 16-bit number which uniquely identifies the spec...

It is an additional 16-bit number which uniquely identifies the specific service on any given machine on the Internet. Port numbers are 16 bit wide, so each of the computers on the

Explain about line coding, Q. Explain about line coding? Line Coding ...

Q. Explain about line coding? Line Coding  Procedure of converting binary data to a digital signal DC Components  Residual dc (direct-current) components or

Challenge handshake authentication protocols (chap), Challenge Handshake Au...

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

Programming with pvm, The Common method for writing a program with PVM is a...

The Common method for writing a program with PVM is as follows: A user writes one or more sequential programs in C, C++, or Fortran 77 having embedded PVM function (or subroutin

How to Assign switch ports to VLAN, Assign switch ports to VLANs. Refe...

Assign switch ports to VLANs. Refer to the port assignment table at the starting of the lab to assign ports to the VLANs. Use the interface range command to make simpler this

Define interconnection network, Interconnection Network An interconnect...

Interconnection Network An interconnection network is designed for transferring data between two processors in a Multi-stage network. Memory bottleneck is a fundamental limitat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd