Name the presentation layer standards, Computer Networking

Assignment Help:

A.) JPEG and PICT

B.) MPEG and MIDI

C.) ASCII and EBCDIC

For example, the Presentation layer would be liable for changing from EDCDIC to ASCII. Data compression, decompression, encryption, and decryption are presentation layer. Presentation layer standards include MPEG, MIDI, PICT, TIFF, JPEG, ASCII, and EBCDIC.

 


Related Discussions:- Name the presentation layer standards

What is usage of sequence number in reliable transmission, What is usage of...

What is usage of Sequence Number in Reliable Transmission? The protocol specifies that frames need to be numbered. This is done by using sequence numbers. A field is added to t

What does the user datagram protocol (udp) , UDP is connectionless, and doe...

UDP is connectionless, and does not give error checking. But remember, error checking can happen at other layers too.

What is the virtual channel, A logical circuit that is created by Virtual c...

A logical circuit that is created by Virtual channel links. It carries data among two endpoints in a network. The one more name for Virtual Channel is Virtual Circuit.

IPV6, is DVMRP multicast prtocol supports IPV6?

is DVMRP multicast prtocol supports IPV6?

What is client and server, What is Client/Server? Clients and Servers a...

What is Client/Server? Clients and Servers are part logical entities that work together over a network to accomplish a task. Lots of systems with very dissimilar architectures

What do you use the aux port for, The auxiliary port is used to link a mode...

The auxiliary port is used to link a modem to for dial backups.

What is a protocol, What is a protocol? The term protocol refers to a s...

What is a protocol? The term protocol refers to a set of rules and process that govern the transmission of messages over a physical networking medium. The most common network p

State token ring implementation, Token Ring Implementation Sequence...

Token Ring Implementation Sequence of 150-ohm shielded twisted-pairs sections Output port on every station connected to input port on the next Frame is passed to

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

Give the description of security tools, Give the Description of security to...

Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd