1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
9

Mary is troubleshooting her company's LAN network. She finds out that data segments that the client is encoding are resulting in

errors in the encoding. Which OSI model layer is creating the erroneous segments?
Computers and Technology
1 answer:
kicyunya [14]3 years ago
6 0

Answer:

Data link layer of OSI model is creating the erroneous segments

Explanation:

The Open System Interconnection (OSI) model is a conceptual framework about how communication occurs between devices over the Internet. It has seven layers, (Physical, Data, Network, Transport, Session, Presentation and Application layer). The purpose of this hierarchical layer system is to understand the structure of communication between devices and do troubleshooting easily if a fault occurs. As in this question, Marry is troubleshooting her company LAN network. She finds out that data segments that the client is encoding are resulting in errors in the encoding. Now the question arises, how she found the cause of the error. The OSI model helps her in understanding the problem.

As you know, the data link layer of the OSI model is responsible for the encoding and decoding of data segments. This layer ensures the reliability of the physical layer, and responsible to provide error-free transfer of data from one node to another on a network. It is also responsible for frame synchronization and flow control. The data link layer is divided into sub-layers:

1. Media Access Control Layer: this layer controls how a computer on the network gains access to the data and transmission permission.

2. Logical Link Control Layer: This layer controls frame synchronization, error checking and flow control.

Therefore, Marry founds data link layer of the OSI model is creating the erroneous segments in encoding.

You might be interested in
2 The software needed to send an email is:
Alexxx [7]

Answer:

C communication software

Explanation:

C communication software IS THE ANSWER

8 0
3 years ago
Los elementos de la comunicación técnica son el medio, el código y el contenido, ¿Esta información es falsa o verdadera?
LenaWriter [7]

la respuesta es verdadera

Explanation:

V

7 0
3 years ago
A web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardwa
andrezito [222]

Answer:

False

Explanation:

A web-based application encounters connectivity and compatibility relate to data server. It does not belong to any hardware environments.

A web based application is accessed over network.They run inside a web browser. Small of program is download to user's desktop, but this processing is done over internet.

6 0
3 years ago
Amanda is negotiating a new applicant tracking service for her department with a software vendor. She intends to make the first
maria [59]
Idk the answer but my name is Amanda so I felt like I should comment. Good luck tho
8 0
3 years ago
The principal object of a hash function is __________ .
abruzzese [7]

Answer:

a. data integrity

Explanation:

In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.

Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.

Some of the properties of a hash function are;

1. <em><u>Pre-image resistance</u></em>: this makes it practically impossible to reverse a fixed-size hash values to its initial arbitrary size. This property helps to maintain and enhance data integrity by making it difficult or impossible for an attacker to find the input data from a hash value.

2. <em><u>Second pre-image resistance</u></em>: this property makes it near impossible or very difficult to determine or decode another input data from a given set of input and hash values. Also, this helps to enhance data integrity.

3. <em><u>Collision resistance</u></em>: this is to make possible for all hash values to have a unique value. This simply means that, with this property it would be difficult for different input data to have the same hash value. Thus, it helps to create integrity in data management.

<em>Hence, with the aforementioned properties, the principal object of a hash function is data integrity.</em>

Hash functions in the computer world includes;

1. Message Digest (MD): it is a 128 bit hash function and comprises of the following; MD2, MD4, MD5, and MD6.

2. Secure Hash Function (SHA): it comprises of the following; SHA-0, SHA-1,SHA-2, and SHA-3.

3. Whirlpool: it comprises of the following; Whirlpool-0, Whirlpool-T, and Whirlpool. It is primarily a 512 bit hash function.

4. RACE Integrity Primitives Evaluation Message Digest (RIPEMD): it comprises of the following versions; RIPEMD, RIPEMD-128, and RIPEMD-160.

8 0
3 years ago
Other questions:
  • How to use javascript libraries in javascript code?
    9·1 answer
  • Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles
    10·1 answer
  • .All of the following are true with the respect to implicitinvocation except:
    8·1 answer
  • This term is also called live, or hot, which means that a voltage is present and it can cause an electrical current. Any time an
    12·1 answer
  • When you collaborate or meet with a person or group online, it is called
    12·2 answers
  • A research team is studying parallel computing. They want to run parallel process without having to use multiple processors. How
    7·1 answer
  • Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or
    8·2 answers
  • The do-while loop is a __________ loop that is ideal in situations where you always want
    6·1 answer
  • A computer understand..............codes.<br>​
    10·1 answer
  • Can you help me with Computer issues graphic organizer?<br> Will give out brainly
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!