1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex17521 [72]
3 years ago
11

The OSI model is a useful tool in troubleshooting a network because it enables you to isolate a problem to a particular software

module or piece of hardware. In this project, after reading the description of a problem, identify the OSI model layer or layers that are most likely involved
Computers and Technology
1 answer:
lutik1710 [3]3 years ago
7 0

Answer:

1)  Layer 4, transport

2) Layer 2, datalink

3) Layer 5, session

4) Layer 7, application

Description of Problems are as below:

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Explanation:

OSI Model is a reference model to determine how applications communicate over a network. OSI consists of seven layers, and each layer performs a particular network function. The seven layers are:

   Layer 7 - Application.

   Layer 6 - Presentation.

   Layer 5 - Session.

   Layer 4 - Transport.

   Layer 3 - Network.

   Layer 2 - Data Link.

   Layer 1 - Physical.

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

Layer 4, transport

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

Layer 2, Data Link

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

Layer 5, session

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Layer 7, application

You might be interested in
How to simplify???? 2(-3x^2+6x+1)-2(4x^2-3x+1)<br><br>​
bazaltina [42]

Distribute:

=(2)(−3x2)+(2)(6x)+(2)(1)+(−2)(4x2)+(−2)(−3x)+(−2)(1)

=−6x2+12x+2+−8x2+6x+−2

Combine Like Terms:

=−6x2+12x+2+−8x2+6x+−2

=(−6x2+−8x2)+(12x+6x)+(2+−2)

=−14x2+18x

Answer:

=−14x2+18x

8 0
3 years ago
Blank includes websites that encourage interaction and connection among people ,business and organizations
Ira Lisetskai [31]
The answer would be social media
6 0
3 years ago
Which key removes all data from an active cell with one click? A. Esc B. Delete C. Tab D. F2
bija089 [108]
The answer is B. Delete
6 0
2 years ago
Read 2 more answers
A smart phone is always a _____.<br> client<br> server<br> network<br> process
kogti [31]
A smart phone should always be a client due to the fact that it gathers information from a server.
3 0
3 years ago
Name the three basic storage device of a computer​
grigory [225]
Hard disk Drive, random access memory, USB flash memory
7 0
3 years ago
Read 2 more answers
Other questions:
  • Constructors ________. initialize instance variables when overloaded, can have identical argument lists when overloaded, are sel
    11·1 answer
  • Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that u
    13·1 answer
  • What is Mars internal composition
    7·1 answer
  • You recently upgraded your computer and added an extra 512 MB of RAM. Consequently, you want to increase your swap space by addi
    10·1 answer
  • he degree of operating leverage is equal to: Group of answer choices FC / OCF. VC / OCF. 1 FC / OCF. 1 VC / OCF. 1 Picture FC /
    9·1 answer
  • Which of the following is an algorithm?
    15·2 answers
  • which of the following devices and and receive information from other device? a parallel port B serial port C video port d both
    8·1 answer
  • Current flow is the same through all the elements of a series circuit.<br><br> true or false?
    15·1 answer
  • Question 1 of 10
    12·1 answer
  • The internet is controlled by ______
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!