Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
The diagram below offers an overall view on the methods use by both the OSI and TCP/IP model.
ISO Approach
- Occasionally called Horizontal Approach
- OSI asserts that distributed applications function over a strict hierarchy of layers and are constructed from a common tool kit of standardized application service elements.
- In OSI each distributed application service selects functions from a large common -toolbox? of application service element (ASEs) and complements these with application service elements that perform functions specific to given end-user service.
TCP/IP Approach
- Occasionally called Vertical Approach
- In TCP/IP every application entity is composed of whatever set of function it needs beyond end to end transport to support a distributed communications service.
- Most of these application processes builds on what it requirements and assumes only that an underlying transport mechanism (datagram or connection) will be provided.
Q. Categories of Encryption - Decryption ? Categories of Encryption/Decryption - Symmetric-key - encryption key (Ke) and the decryption key (Kd) are the same and secret
Distance vector-based routing algorithms (also called as Bellman-Ford algorithms) pass periodic copies of a routing table from router to router. Regular updates among routers commu
Q. Diffrence between Network vs Internet Layers? - Similar to all the other OSI Layers the network layer provides both connectionless and connection-oriented services. From th
In spite of the incompatibilities among networks, researchers have devised a function that gives universal service among heterogeneous networks known 'internetworking'. It uses bot
Define Co-axial cable. A solid central conductor surrounded by insulating material and then by a cylindrical shield woven from fine wires is called as co-axial cable. The shie
The relationship between dotted decimal notation and classes is shown as follows. In class A the three octets managed to a host suffix. In class B the last most two octets ar
Assume a network as depicted below with a home agent (HA), a foreign agent (FA), a mobile host (MH), and a remote host (RH). The dotted box is the home location of MH. Assume MH's
Linear Array: This is a most basic interconnection pattern. Processors are connected in a linear one-dimensional array. The first as well as last processors are attached with one a
What is the concept of successor in EIGRP?
Hypercube Network The hypercube architecture has played a vital role in the development of parallel processing and is still not much popular and influential. The highly symmetr
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd