1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
3 years ago
15

Which of the following matching is true concerning the Protocol Data Unit (PDU) and its corresponding OSI layer location?

Computers and Technology
1 answer:
Gnoma [55]3 years ago
8 0

Answer:

None

Explanation:

The OSI model is one of two network models ( with TCP/IP as the second), it has seven layers and they are mostly ranked from the PDU entry point. PDU is the data format of a layer as encryption information of the layer is added to it.

Starting from the last or seventh layer;

- Application layer: In this layer, data is created and manipulated by a user. At this point, the PDU is just data as it is where creation of data to be sent and receiving of data to manipulated is done.

- Presentation layer: Encryption of the data takes place here and is dependent on the application layer.

- Session layer: the session between the communicating computers occurs here.

-Transport layer: the data to be transferred is for a specific application in the computer, so a transport header which contains a port number to identify the application is given. The PDU of the combined transport header and data is called a "segment".

- Network layer: The segment moves to this layer and a network header containing an IP address and subnet mask is added. This new pdu is called a "packet".

- Data-link layer:Here, a header and trailer is added containing the MAC address and error checking information and this new pdu is called "Frame".

_ physical layer: this layer is responsible for delivering and accepting PDUs from the medium (wired or wireless). The frame is encoded to the PDU called bits and are sent to the other computer through a wired medium.

Summary: PDU

( Application to session) - Data

Transport. - Segment

Network. -. Packet

Data-link. -. Frame

Physical. -. Bit

You might be interested in
A disk drive has 2000 cylinders, numbered 0 to 1999. The drive is currently servicing a request at cylinder 783, with the previo
Ket [755]

Answer:

Suppose that a disk drive has 5000 cylinders, numbered 0 to 4999. The drive is currently serving a request at cylinder 143, and the previous request was at cylinder 125. The queue of pending requests, in FIFO order, is

Explanation:

5 0
3 years ago
Give two examples of desktop publishing software
soldier1979 [14.2K]
There are quite a lot of desktop publishing software as of today.
I'll give you the names of some of it.
- Adobe inDesign - one of the most popular
- Corel Draw
- Microsoft Publisher
- Serif
- Ultra Xml
And more.
There are actually a lot if you are just about to check in the internet.
7 0
4 years ago
Because we allow everyone full control, how do you make sure that the shared files are secure?
alina1380 [7]
Make private accounts on defiant servers
4 0
4 years ago
In Fantasy Football, participants compete against one another by choosing certain players from different NFL teams that they thi
PolarNik [594]

This process that would be considered in the above scenario is Data mining.

<h3>What is data mining?</h3>

Data mining is known to be the act or method of knowing more about data via;

  • Leaning raw data.
  • Finding patterns.
  • Forming models.
  • Testing those models.

Note that  It is a method that uses statistics, machine learning, and database systems and it will be good tool to be used in the scenario above.

Learn more about Data mining from

brainly.com/question/14776357

4 0
2 years ago
The seven basic parts of a computer are
True [87]
Monitor, keyboard, CPU, mouse, and I believe the USB drive , DVD drive and hardware system
4 0
3 years ago
Read 2 more answers
Other questions:
  • Cyberterrorism is the use of terrorism to attack (Points : 1) public libraries. computer based networks. government spy networks
    15·1 answer
  • When a user runs an application, what transfers from a storage device to memory?
    8·1 answer
  • Describe the positive and negative effects of Internet​
    6·2 answers
  • . Write a toString method for this class. The method should return a string containing the base, height and area of the triangle
    10·1 answer
  • You attempt to telnet to system 192.168.1.240. You receive the following message: "Connecting To 192.168.1.240...Could not open
    5·1 answer
  • Guess The Song:
    9·1 answer
  • Users who are connecting to an NLB cluster have been complaining that after using the site for a few minutes they are prompted t
    15·1 answer
  • What is another term used for next generation firewalls
    12·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
  • to provide for ecmascript compatibility in older browsers, you can use group of answer choices javascript shivs javascript shims
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!