1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
2 years ago
5

What changes should be made in OSI model(Open System Interconnection).

Computers and Technology
2 answers:
saveliy_v [14]2 years ago
4 0

Answer:

Explanation:

When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven layers of Hell, courtesy of Dante’s Inferno (there are nine). For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, a conceptual framework that describes the functions of a networking or telecommunication system.

The model uses layers to help give a visual description of what is going on with a particular networking system. This can help network managers narrow down problems (Is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.

Layer 7 - Application

To further our bean dip analogy, the Application Layer is the one at the top--it’s what most users see. In the OSI model, this is the layer that is the “closest to the end user”. It receives information directly from users and displays incoming data it to the user. Oddly enough, applications themselves do not reside at the application layer. Instead the layer facilitates communication through lower layers in order to establish connections with applications at the other end. Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications  that rely  on Layer 7.

Layer 6 - Presentation

The Presentation Layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer “presents” data for the application or the network. A good example of this is encryption and decryption of data for secure transmission - this happens at Layer 6.

gulaghasi [49]2 years ago
3 0

Answer:

go darlin

Explanation:

You might be interested in
Write an SQL statement to display for every restaurant the name of the restaurant (where the name of the restaurant consists of
Rainbow [258]

Using the knowledge in computational language in SQL it is possible to write the code that display for every restaurant the name of the restaurant  and for every category of menu item its description.

<h3>Writting the code:</h3>

<em>INSERT INTO Dish </em><em>Values</em><em>(13, 'Spring Rolls', 'ap');</em>

<em>INSERT INTO Dish Values(15, 'Pad Thai', 'en'); </em>

<em>INSERT INTO Dish Values(16, 'Pot Stickers', 'ap');    </em>

<em>INSERT INTO Dish Values(22, 'Masaman Curry', 'en');   </em>

<em>INSERT INTO Dish Values(10, 'Custard', 'ds');   </em>

<em>INSERT INTO Dish Values(12, 'Garlic Bread', 'ap');    </em>

<em>INSERT INTO Dish Values(44, 'Salad', 'ap');    </em>

<em>INSERT INTO Dish Values(07, 'Cheese Pizza', 'en');   </em>

<em>INSERT INTO Dish Values(19, 'Pepperoni Pizza', 'en');    </em>

<em>INSERT INTO Dish Values(77, 'Veggie Supreme Pizza', 'en');</em>

<em />

<em>INSERT </em><em>INTO MenuItem Values(0, 0, 13, 8.00);</em>

<em>INSERT INTO </em><em>MenuItem </em><em>Values(1, 0, 16, 9.00);</em>

<em>INSERT INTO MenuItem Values(2, 0, 44, 10.00);</em>

<em>INSERT INTO MenuItem Values(3, 0, 15, 19.00);</em>

<em>INSERT INTO MenuItem Values(4, 0, 22, 19.00);</em>

<em>INSERT INTO MenuItem Values(5, 3, 44, 6.25);</em>

<em>INSERT INTO MenuItem Values(6, 3, 12, 5.50);</em>

<em>INSERT INTO MenuItem Values(7, 3, 07, 12.50);</em>

<em>INSERT INTO MenuItem Values(8, 3, 19, 13.50);</em>

<em>INSERT INTO MenuItem Values(9, 5, 13, 6.00);</em>

<em>INSERT INTO MenuItem Values(10, 5, 15, 15.00);</em>

<em>INSERT INTO MenuItem Values(11, 5, 22, 14.00);</em>

See more about SQL atbrainly.com/question/13068613

#SPJ1

4 0
1 year ago
Which of the following defines guidelines that specify the way computers access the medium to which they are attached, the type(
Tatiana [17]

Answer:

(D) Network Standard.

Explanation:

Networking standards ensures the ability of networking technologies by defining the guidelines of communication that specify way computer access the medium they are attached.Network standards also defines which type of transmission transmission to use wireless or wired,which media to use etc.

5 0
3 years ago
If you would like to compare information on two different Web pages, you should _____.
Gekata [30.6K]

Answer:

Use Tabs

Explanation:

I had this lesson on odyessy ware and this was right the other guy is wrong

4 0
2 years ago
Read 2 more answers
What's your opinion on Pokemon​ and pixeldip
faust18 [17]

Answer:

Its a good game but an amazing show. 10/10

Explanation:

7 0
2 years ago
If ADD = 81, BAD = 49, and CAD = 64, then what is the value of ACA?
Digiron [165]

Answer:

its 72

Explanation:

i know it because i did it and thats how i know it

6 0
2 years ago
Other questions:
  • Dinah is using an I.D.E to write, modify, and save code. Which tool should she use?
    8·2 answers
  • HELP PLEASE
    5·1 answer
  • Write the sql command to show which tutor needs to be reminded to turn in reports.
    13·1 answer
  • A sentinel value ________ and signals that there are no more values to be entered:____
    14·1 answer
  • What do you call a set of programs?
    7·1 answer
  • Where is a 3D modeler most likely to work?
    6·1 answer
  • If I wished to insert a hyperlink from text in my document to my company website, what type of link would I insert?
    9·1 answer
  • Write a program that reads a file called 'test.txt' and prints out the contents on the screen after removing all spaces and newl
    7·1 answer
  • Which type of protocol allows for a secure data transmission using encryption methods?
    7·1 answer
  • Avi does not want to save his internet browsing details on his computer. What should he do?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!