Explain each layer of osi model-how it associates to network

Assignment Help Computer Networking
Reference no: EM1388195

Explain each layer of OSI model and how it associates to network in 200 to 300 words. Your response should include answers to the following:

o On which layers of OSI model do WAN protocols operate?
o Write down some of these protocols?
o On which OSI layers do switches and routers operate?
o If routers reside at more than one layer, write down the difference between those OSI layers?

Reference no: EM1388195

Questions Cloud

Compute mad and made for management''s technique : Compute MAD and MADE for management's technique, Do management's results outperform (ex have smaller MAD and MAPE than) a naive forecast?
Description of cause of disorder : Determine the blood disorder each of the three patients are at risk for. Base your identifications upon symptoms, lifestyle, or family history.
Data screening activity : Write a sample result section, discussing your data screening activity (this section should be in APA format).
Possible procedure to conduct chart audits : Mention a possible procedure to conduct chart audits. Discuss the quality-improvement model that is to be followed. Discuss how this new procedure will benefit the office and its patients.
Explain each layer of osi model-how it associates to network : Explain each layer of OSI model and how it associates to network in 200 to 300 words. Your response should include answers to the following:o On which layers of OSI model do WAN protocols operate?
Descriptions of common pathological disruptoons : Discuss how the cardiac AP orginates and the pathway by which it spreads through the heart. Include descriptions of common pathological disruptoons of the spread of this AP
Descriple the most likely impediments to health care : Descriple the most likely impediments to health care information access in 2030 and make at least two recommendations to avert those impediment that can be implemented now.
Calculate the current in the output of the source : Calculate the current in the output of the source before and after the installation of the new device and The temperature sensor output is a voltage which is equal to the temperature sensed by the sensor. Design an electric circuit which can get th..
Estimating election polling : An election coming up next week promises to be very close. In fact, assume that 50% are in favor and 50% are against. Suppose you conduct a poll of 791 randomly selected likey votes. Approx. how different will the percent in favor (from the poll) ..

Reviews

Write a Review

Computer Networking Questions & Answers

  Disadvantages of several different web technologies

Describe the advantages and disadvantages of several different Web 2.0 technologies. How could these technologies be used for good? What types of problems might these technologies cause?

  Give hypothetical situation for signal type used in wan

Give a hypothetical situation for each signal type which illustrates how it could be, or is being, used in WAN. In what circumstance, for example, would a company choose to use a satellite signal?

  Ipsec gives security at network layer

If IPSec gives security at network layer, why is it that security mechanisms are still require at layers above IP?

  Significant means for assessing health of existing network

Explain some of the most significant means for assessing health of existing network. Which do you believe is most significant, and explain why?

  Describe ah tunnel between gateways-using esp-transport mode

Packets based on packet header. Describe the rationale for having AH tunnel between gateways and using ESP in transport mode between two hosts.

  Intercepting the message in conversation

Provided that Alice and Bob both suppose that they have the correct public keys for the other party, and supposing that Eve may intercept any messages passed between Alice and Bob, Describe the steps Alice could take in order to ensure that the pub..

  Write authentication factor used by authenticating server

Write authentication factor which is being used by the authenticating server which responds to login request by generating a random number or code.

  Create state transition diagram that explains patient states

Create a state transition diagram that describes typical patient states and how they change based on specific actions and events.

  Determine time take to send file between two hosts

Assume two hosts, A and B, are separated by 10,000 kilometers and are connected by direct link of R =1 Mbps. Assume propagation speed over link is 2.5?108 meters/sec .How long does it take to send file, suppose it is sent continuously?

  Kind of network crimes may use p to p networks

What kind of network crimes may use P2P networks? Find the most challenging crimes that could be based on P2P networks and write a report on how to do forensic investigations on these crimes.

  Write steps for computer in company browse site using url

Personel.mycompany.com in URL address box to browse this Web site. Write down steps do you take so that each computer in company can browse the site using URL?

  Document risk event-impact-probability and impact

Identify the top three risks in this situation. For each risk, document its risk event, impact, probability, impact rating/risk exposure, and mitigation strategy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd