Osi reference model, Computer Networking

Assignment Help:

- The model was developed by the ISO (International Organisation for Standardisation) in 1984. It is currently considered the primary Architectural model for inter-computer communications.

- The OSI (Open Systems Interconnection) reference model is a descriptive network scheme. It makes sure greater compatibility and interoperability between various types of network technologies.

- The OSI model describes how information or data makes its way from application programmes (such like spread sheets) through a network medium (such like wire) to another application programme located on another network.

- The OSI reference model divides the difficulty of moving information between computers over a network medium into SEVEN smaller and more manageable problems.

- This separation into lesser more manageable functions is known as layering.


Related Discussions:- Osi reference model

Distinguish between udp and tcp, Question: (a) Distinguish between UDP ...

Question: (a) Distinguish between UDP and TCP. (b) You have been asked to design and implement a chat application for a university. Which protocol could you used TCP or UDP

Agent management system, QUESTION (a) Figure 3 below shows a reference ...

QUESTION (a) Figure 3 below shows a reference model of the Foundations of Intelligent Physical Agents (FIPA). Explain the roles of the following components (i) Agent platfor

What are the two broad classes of middleware, Two broad classes of middlewa...

Two broad classes of middleware are a) General middleware b) Service-specific middleware.

Metrics for performance evaluation, Metrics For Performance Evaluation ...

Metrics For Performance Evaluation In this section, we would highlight different kinds of metrics involved for analyzing the performance of parallel algorithms for parallel co

What are triggers and rules, What are Triggers and Rules? Triggers are...

What are Triggers and Rules? Triggers are special user defined actions generally in the form of stored processes that are automatically invoked by the server based on data rel

What is meant by transparency, Transparency really means adumbrating the ne...

Transparency really means adumbrating the network and its servers from the users and even the application programmers.

Give some examples of private network addresses, Give some examples of priv...

Give some examples of private network addresses. 10.0.0.0 with a subnet mask of 255.0.0.0 172.16.0.0 with subnet mask of 255.240.0.0 192.168.0.0 with subnet mask of 255.2

What is bens network, Q. What is Bens Network? It's a non-blocking netw...

Q. What is Bens Network? It's a non-blocking network. It's a special type of Clos network where first and last stage consists of  2×2 switches (for n input  and m output networ

Encryption authentication - point to point , Encryption Authentication ...

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd