1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
3 years ago
15

Which of the following matching is true concerning the Protocol Data Unit (PDU) and its corresponding OSI layer location?

Computers and Technology
1 answer:
Gnoma [55]3 years ago
8 0

Answer:

None

Explanation:

The OSI model is one of two network models ( with TCP/IP as the second), it has seven layers and they are mostly ranked from the PDU entry point. PDU is the data format of a layer as encryption information of the layer is added to it.

Starting from the last or seventh layer;

- Application layer: In this layer, data is created and manipulated by a user. At this point, the PDU is just data as it is where creation of data to be sent and receiving of data to manipulated is done.

- Presentation layer: Encryption of the data takes place here and is dependent on the application layer.

- Session layer: the session between the communicating computers occurs here.

-Transport layer: the data to be transferred is for a specific application in the computer, so a transport header which contains a port number to identify the application is given. The PDU of the combined transport header and data is called a "segment".

- Network layer: The segment moves to this layer and a network header containing an IP address and subnet mask is added. This new pdu is called a "packet".

- Data-link layer:Here, a header and trailer is added containing the MAC address and error checking information and this new pdu is called "Frame".

_ physical layer: this layer is responsible for delivering and accepting PDUs from the medium (wired or wireless). The frame is encoded to the PDU called bits and are sent to the other computer through a wired medium.

Summary: PDU

( Application to session) - Data

Transport. - Segment

Network. -. Packet

Data-link. -. Frame

Physical. -. Bit

You might be interested in
PLEASE HELP
Zinaida [17]

Answer:

B from you search question carefully and identify the key word

Explanation:

3 0
3 years ago
Read 2 more answers
¿Cuales son las empresas mas exitosas que aún usan hoja de cálculo? porfa es urgentee
dem82 [27]

Answer:excel

Explanation:

6 0
2 years ago
How do you create a logo on Adobe illustrator
artcher [175]
Idk idk idk idk if dub
7 0
3 years ago
The blank contains the computer's brain the central processing unit CPU
Mila [183]

The Motherboard contains the computer's brain which is the Central Processing Unit (CPU).  It is the main circuit board for the computer, containing both soldered, non removable components along with sockets or slots for components that can be removed. The motherboard holds the CPU, RAM and ROM chips, etc.

7 0
2 years ago
Which two settings must you configure when fortigate is being deployed as a root fortigate in a security fabric topology?
Goryan [66]

The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices.
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

<h3>What is security fabric settings?</h3>

The term Security Fabric is known to be a tool that aids one or allows one's network to be able to automatically see and also dynamically isolate any kinds of affected devices.

Note that is one that can also partition network segments, update rules, and they can bring out new policies, and delete malware.

Hence, The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

See full question below

Which two Security Fabric features are on FortiManager? (Choose two.)

Select one or more:

A. Enables you to view the logical and physical topology of Security Fabric devices

B. Enables you to run security rating on FortiGate devices

C. Enables you to view the security ratings of FortiGate Security Fabric groups

D. Enables you to view and renew Security Fabric licenses for FortiGate devices

Learn more about security from

brainly.com/question/25720881

#SPJ1

8 0
2 years ago
Other questions:
  • You want to deploy software using group policy. what is necessary before deciding to assign the software to your user accounts?
    11·1 answer
  • Web pages with personal or biograpic information are called ​
    10·1 answer
  • When you respond to an email from your bank that asks you to verify your account information, you may become a victim of a _____
    14·1 answer
  • You recently discovered that Marketing1 can connect to Admin1, and Admin1 can connect to Marketing1, but neither of these comput
    11·1 answer
  • What is the main characteristic of a Peer-to-Peer (P2P) network?
    8·1 answer
  • Tom is very curious as to whether terrorism is truly linked to levels of religiosity around the world. As such, he gathers data
    15·1 answer
  • Select the correct text in the passage,
    10·1 answer
  • The term integration mean?
    7·2 answers
  • Write a program that inputs numbers and keeps a running sum. When the sum is greater than 100, output the sum as well as the cou
    13·1 answer
  • Do you need a separate password for each slack channel
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!