The osi model and tcp-ip

Assignment Help Basic Computer Science
Reference no: EM133048011

The Reference Model is a conceptual framework for understanding how computers communicate. The OSI model defines seven different layers of communication rules. Each layer of the OSI model has its own means of communication or protocol. The OSI model is used as a reference when explaining how data passed over the network moves through each layer. Each of the seven layers has specific responsibilities and logically interfaces to the layer above or below it. Each layer in the OSI model provides a different service needed for communication across an IP network and physical media. The top three layers often are called the "upper layers" since they deal primarily with application data. The lower layers deal primarily with getting packets to their destination. Many refer to these layers as infrastructure.

Questions:

1. For this discussion, compare and contrast two layers of the Open Systems Interconnection (OSI) Reference Model, including the protocols that run on each layer.

2. What was the reason that IPv6 was introduced? Why do you think many organizations are not upgrading their network solely to IPv6 and run that protocol instead of running IPv4?

3. What is the purpose of subnetting when using IPv4 addressing? What role does subnet mask play in subnetting of IPv4?

Reference no: EM133048011

Questions Cloud

Information security compliance : Why are Governance and Compliance Important? Define the Certification and Accreditation Process and briefly discuss the phases of C&A.
Legal environmental of business class : 1) Mercedes has just begun work at Photobook.com. What a great place to work! Although the salary is not high, the company has fabulous perks.
Will the mixed bundling increase profits : Your marginal cost per customer across both tours is $4800. Given the preferences distribution, will the mixed bundling increase profits
Discuss the broad area approach : There are many Approach or Methodologies to Credit Appraisal and Presentation of appraisal Reports to the appropriate approval authorities. Examples are : Analy
The osi model and tcp-ip : Compare and contrast two layers of the Open Systems Interconnection (OSI) Reference Model, including the protocols that run on each layer.
Discuss how environmental constraints affect management : Discuss how environmental constraints affect management. Why is environmental awareness important to management at all levels?
Describe the malware : Who does the malware typically target? What types of mechanisms or exploits do the attackers use to gain access?
Tactics for becoming an empowering leader : What are some tactics for becoming an empowering leader?
Determine which equipment should the company purchase : ash outflows for equipment X are $15,000 in year 0 and $5000 in year 1. Determine which equipment should the company purchase

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Change the code to allow capturing this information

Change the code to allow capturing this information.

  Uml use case diagram

Produce a UML Use Case diagram for this system. Keep the use case diagram simple, but you should have around 10 use cases and 3 actors

  Screen design and test plan

Write integrated reports, using appropriate models, providing detailed analysis of given textual scenarios and Develop models using professional CASE tool

  Create national security culture

what would you do to help create a national "security culture," in which everyone is more knowledgeable and proactive about threats to information security?

  Ideas you learnt on interpretation

Input: The input to the program shall be a text file containing binary encoding of some x86 code. Here is a sample input file ("sampleinput.txt"): 8d 4c 24 04 83 e4 f0 50 c1 f8 02 34 2e 89 e5 45 83 ec 04 80 7c 24 04 81 5d This is for the following..

  Contrast hash function-keyed hash function

Is it possible to encrypt an AES key with a shared secret? Justify your answer

  Find the power input to the compressor

The compression process follows the law Pv1.3 = constant and heat rejected to the cooling water amounts to 35 kW/kg of air. Assuming a mass flow of 2 kg/s and neglecting kinetic and potential energy change, determine the power input to the compres..

  What does cissp stand for

What does CISSP stand for? Using the internet, find out what continuing education is required for the holder of a CISSP t remain current and in good standing.

  Evaluate online tutorials and online communities

Evaluate online tutorials and online communities in regard to helping users. Create an argument for the approach you find to be most effective and explain why.

  Full economic price under a price ceiling

In a competitive market, the market demand is Qd= 60- 6P and the market supply is the Qs= 4P the full economic price under a price ceiling of $3 is:?

  Exercise clause of the first amendment

Did the State's denial of unemployment benefits to Thomas violate the free exercise clause of the First Amendment?

  Elements ot the priority queue

Write pseudocode or actual Java code for insert operation that takes a list of random integers. Your priority queue starts from an empty priority queue with size 0, and you should add given elements ot the priority queue. The insert operation for ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd