1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
3 years ago
5

What changes should be made in OSI model(Open System Interconnection).

Computers and Technology
2 answers:
saveliy_v [14]3 years ago
4 0

Answer:

Explanation:

When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven layers of Hell, courtesy of Dante’s Inferno (there are nine). For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, a conceptual framework that describes the functions of a networking or telecommunication system.

The model uses layers to help give a visual description of what is going on with a particular networking system. This can help network managers narrow down problems (Is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.

Layer 7 - Application

To further our bean dip analogy, the Application Layer is the one at the top--it’s what most users see. In the OSI model, this is the layer that is the “closest to the end user”. It receives information directly from users and displays incoming data it to the user. Oddly enough, applications themselves do not reside at the application layer. Instead the layer facilitates communication through lower layers in order to establish connections with applications at the other end. Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications  that rely  on Layer 7.

Layer 6 - Presentation

The Presentation Layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer “presents” data for the application or the network. A good example of this is encryption and decryption of data for secure transmission - this happens at Layer 6.

gulaghasi [49]3 years ago
3 0

Answer:

go darlin

Explanation:

You might be interested in
Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network dec
valentina_108 [34]

Answer:

The answer is True.

Explanation:

In a Network data transfer, it is essential for the security purpose that data should be in encrypted form which an unreadable form and it will be decrypted when it reaches the destination system.

It is important for the organization to encrypt data to make it safe from hackers and cryptographic technology is used in data Sequence encryption.

There is a key that is used to decrypt data in the network system and encryption and decryption is a sequential process for the data starting from the initial system and ending in the destination system.

3 0
3 years ago
write a simple assembly code using 8088 microprocessor instruction set to add two numbers ? please help me if you know :(​
Kay [80]

Answer:

sexxxxx chaaaaat insta id abhilash0351

3 0
3 years ago
What is the size of the program counter for an avr that has a 1 kbyte rom capacity?
horsena [70]

Answer:

9 bits

Explanation:

 We all recognize 1 K bytes as =1024 bytes.  

And the storage medium used for program instructions are the non-volatile flash memories. The MCUs are always 8 bits, and a piece of the instructions revenues two or one 16-bit words. Besides we know program memory magnitude through the device name, and as an instance, the ATmega64x line emanates with 64KB of flash, and the ATmega32x line emanates with 32 KB. And there is nobody like off-chip program memory, and all of the codes that are being implemented by the AVR essentially be on the on-chip flash. However, this restraint is not ever applied to the AT94 FPSLIC AVR/FPGA chips. Also, you must know that AVR is a family of microcontrollers established by ATEL in 1996. It is a Harvard architecture type single-chip 8-bit RISC microcontroller. And it is supposed to be the first microcontroller which applied flash memory for storing the program They are heavily used in embedded systems.  

1k byte = 1024 bytes, However, if the program instruction takes 16 bits.  

And hence it only wishes 512.  

Here and now 512 = 10^9, and henceforth you necessitate 9 bits at minimum.  

excluding you can somehow paginate that (such as through one-bit pagination, you will be necessitating only 8 bits and so on.)  

Therefore the answer here = 9 bits.

5 0
4 years ago
Aika has several labeled folders for different parts of his research. What is the MOST likely reason he does this? He wants to m
kobusy [5.1K]

Answer:

<u>He wants to easily and quickly find specific bits of research that cover certain topics.</u>

<u>Explanation:</u>

Remember, a research work typically has these 6 (six) components:

  • The Abstract.
  • Introduction
  • Methodology
  • Results
  • Discussion
  • References.

Thus, Aika's decision to label several folders for different parts of his research would make it easier and quicker for him to find specific bits of research that cover certain topics, instead of spending time looking for topics.

4 0
3 years ago
On a timeline, a milestone 11 years in the future will be to the
aniked [119]

Answer:

D. Left,left

11 is less than 20 as well as it is less than 25 years. And we move from left to right on the timeline. Thus 11 is left of 20 and it is left of 25 years as well. And timeline is the core of a project management software. The Gantt and Pert chart are totally based on the timeline. Software like Microsoft project use the timeline quite a lot, and you cannot survive without the knowledge  of the timeline in software project management.

Explanation:

Timeline knowledge is a must for a software professional, and the above answer does not require explanation.

6 0
4 years ago
Other questions:
  • A user has a new web email account and asks a technician for help with setting up email on a tablet. The user would like for the
    11·1 answer
  • ________ viruses are often transmitted by a flash drive left in a usb port.
    8·1 answer
  • The program has a compilation error because s is not initialized, but it is referenced in the println statement. The program has
    8·1 answer
  • Micheal has increased the contrast of the given picture. Which feature or menu option of a word processing program did he use? A
    15·1 answer
  • What will save you the most money when trying to reduce the cost of college
    5·2 answers
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • Consider an unpipelined or single-stage processor design like the one discussed in slide 6 of lecture 17. At the start of a cycl
    10·1 answer
  • What can a Word user do with the Customize Ribbon dialog box? Check all that apply.
    7·1 answer
  • What are the best ways to conduct research for a presentation? Check all that apply.
    7·2 answers
  • The local Driver's License Office has asked you to write
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!