1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
9

Mary is troubleshooting her company's LAN network. She finds out that data segments that the client is encoding are resulting in

errors in the encoding. Which OSI model layer is creating the erroneous segments?
Computers and Technology
1 answer:
kicyunya [14]3 years ago
6 0

Answer:

Data link layer of OSI model is creating the erroneous segments

Explanation:

The Open System Interconnection (OSI) model is a conceptual framework about how communication occurs between devices over the Internet. It has seven layers, (Physical, Data, Network, Transport, Session, Presentation and Application layer). The purpose of this hierarchical layer system is to understand the structure of communication between devices and do troubleshooting easily if a fault occurs. As in this question, Marry is troubleshooting her company LAN network. She finds out that data segments that the client is encoding are resulting in errors in the encoding. Now the question arises, how she found the cause of the error. The OSI model helps her in understanding the problem.

As you know, the data link layer of the OSI model is responsible for the encoding and decoding of data segments. This layer ensures the reliability of the physical layer, and responsible to provide error-free transfer of data from one node to another on a network. It is also responsible for frame synchronization and flow control. The data link layer is divided into sub-layers:

1. Media Access Control Layer: this layer controls how a computer on the network gains access to the data and transmission permission.

2. Logical Link Control Layer: This layer controls frame synchronization, error checking and flow control.

Therefore, Marry founds data link layer of the OSI model is creating the erroneous segments in encoding.

You might be interested in
You are a networking consultant who has been asked to penetration test the network of a small business. you located a target wir
cluponka [151]
<span> In a network that uses WPA2-PSK encryption you can bypass the encryption by using the weakness in the WPA2-PSK system and that is the following:the encrypted password is shared in what is known as the 4-way handshake. </span> When a client authenticates to the access point, the client and the AP go through a 4-step process of authentication.
8 0
3 years ago
Which three major objects are built into the JavaScript language?
Marizza181 [45]

Answer:

jddjjddjdjdjjsjsjejejejjejejejjdjdjeje

3 0
2 years ago
Read 2 more answers
Var name = prompt("Enter the name to print on your tee-shirt");
Vinil7 [7]

Willy Shakespeare has 17 characters. It's higher than 12,so the output will be Too long. Enter a name with fewer than 12 characters.

Letter a.

3 0
3 years ago
Write a C program that will load entries from a file containing details of books and prints them.
Sladkaya [172]

Answer:

........

Explanation:

3 0
3 years ago
Tony purchases virtual machines from microsoft azure and uses them exclusively for use by his organization. what model of cloud
ioda

Tony buys virtual machines from Microsoft azure and uses them solely for use by his community. A model of cloud computing is the public cloud

<h3>What is the public cloud?</h3>

A public cloud is a shadow deployment model where computing resources are owned and managed by a provider and shared across multiple tenants via the Internet.

These providers deliver their uses over the internet or through saved connections, and they use a whole pay-per-use approach. Each provider delivers a range of products oriented toward additional workloads and business needs.

To learn more about public cloud, refer to:

brainly.com/question/19057393

#SPJ4

4 0
1 year ago
Other questions:
  • Plz tell me a storage device that should be used for this and why
    11·1 answer
  • What is TCP/IP's Transport layer's primary duty?
    8·1 answer
  • Which extensions can help drive installs of your mobile app?
    12·1 answer
  • Fax machines, voice mail, electronic mail, and electronic conferencing are all examples of _________.
    15·2 answers
  • The shortest compressed format of the ipv6 address 2001:0db8:0000:1470:0000:0000:0000:0200 is
    6·1 answer
  • What is renewable energy
    13·2 answers
  • Choose a project with a relatively simple description (building a LAN, designing a web page, inventing a new communication devic
    6·1 answer
  • The function of anOR gate can best be described as a gate which provides an output of 1 only when
    10·1 answer
  • A total stranger is trolling Jack online. He’s offended and annoyed. How can Jack stop the troll in his or her tracks? (5 points
    10·2 answers
  • Write a program to find all integer solutions to the equation 4x + 3y -9z = 5 for values of x, y, and z between 0 to 100.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!