1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
3 years ago
5

What changes should be made in OSI model(Open System Interconnection).

Computers and Technology
2 answers:
saveliy_v [14]3 years ago
4 0

Answer:

Explanation:

When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven layers of Hell, courtesy of Dante’s Inferno (there are nine). For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, a conceptual framework that describes the functions of a networking or telecommunication system.

The model uses layers to help give a visual description of what is going on with a particular networking system. This can help network managers narrow down problems (Is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.

Layer 7 - Application

To further our bean dip analogy, the Application Layer is the one at the top--it’s what most users see. In the OSI model, this is the layer that is the “closest to the end user”. It receives information directly from users and displays incoming data it to the user. Oddly enough, applications themselves do not reside at the application layer. Instead the layer facilitates communication through lower layers in order to establish connections with applications at the other end. Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications  that rely  on Layer 7.

Layer 6 - Presentation

The Presentation Layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer “presents” data for the application or the network. A good example of this is encryption and decryption of data for secure transmission - this happens at Layer 6.

gulaghasi [49]3 years ago
3 0

Answer:

go darlin

Explanation:

You might be interested in
State 10 differences between video conferencing and teleconferencing​
mr_godi [17]
Answer:
Teleconferencing is voice-only or audio and video communication, while video conferencing supports the conference by providing both video and voice, so you can fully see the person when you are listening to the communicator,

Teleconferencing is capable of transmitting the data during the conference, either using traditional PBX systems or VoIP, while video conferencing offers VoIP services. The formal requires less bandwidth, while the latter is highly dependent on network bandwidth.


6 0
3 years ago
HELP ASAP
CaHeK987 [17]
The answer is B, e commerce. Have a good day
3 0
3 years ago
An anchor tag can be coded using which two attributes?
IceJOKER [234]

Answer:

21212122121221212211212121212212121Explanation:

4 0
2 years ago
Human-centered technology often recommends _______ao
lidiya [134]

Answer:

Creating objects which people are going to interact with, designers have to be aware of those traits and take them into account in the process. ... Continuing the theme, user-centered design is more focused and concise version of human-centered design with deeper analysis of target audience.The user interacts directly with hardware for the human input and output such as displays, e.g. through a graphical user interface. The user interacts with the computer over this software interface using the given input and output (I/O) hardware.Human-centered design is a creative approach to problem solving and the backbone of our work at IDEO.org. It's a process that starts with the people you're designing for and ends with new solutions that are tailor made to suit their needs. ... Human-centered design consists of three phases.

Explanation:

3 0
3 years ago
Read 2 more answers
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
NNADVOKAT [17]

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
3 0
3 years ago
Other questions:
  • Most engines will contain how many cylinders in order to maintain a proper balance of weight and forces?
    12·2 answers
  • Nina is 12 years old. She has just changed her password and wants to make sure she has it in case of
    15·2 answers
  • Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single i
    15·1 answer
  • Write a program that dynamically allocates an array large enough to hold a user-defined number of test scores. Once all the scor
    5·1 answer
  • A particular problem is currently not able to be practically solved by using an algorithm. Which of the following statements abo
    13·2 answers
  • Create a list with 5 numbers and find the smallest and largest number in the list and also the sum and product of the numbers in
    9·1 answer
  • True or false Encryption prevents hackers from hacking data?
    8·1 answer
  • Rick is teaching a photographic worship about sun color and image. He shows the students a few images to teach them about contra
    12·1 answer
  • Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after t
    13·1 answer
  • What device senses short circuits and stops electrical flow when ground faults occur?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!