Recent questions tagged osi-model

1 votes
0 answers
1
True or False:The application layer (layer 7) is responsible for all the services that the internet will provide.(if it is not the application layer then which layer?)
0 votes
1 answer
4
what is baud rate exactly? and what does it signifies?
0 votes
1 answer
5
Except reliability and connection oriented what are the other functionalities which are produced by TCP but not by UDP?
0 votes
1 answer
6
What is the difference between host to host network connection and end to end network connection? Why host to host connection for network layer and end to end connect...
1 votes
2 answers
7
Encode / Decode data for physical transmission is done by which layer of OSI reference model?
3 votes
3 answers
8
Do all the TCP segments travel through same path once the connection is established ?
2 votes
0 answers
10
What is meant by the statement "ICMP works at Network Layer"? In general, what is meant by the statement, "x protocol works at y layer"?
1 votes
0 answers
11
1 votes
2 answers
13
Bridge is the part of which layer?A. Data link layerB. Transport layerC.Both A And B
0 votes
1 answer
14
Which of the following layer of OSI Reference model is also called end-to-end layer ?Network layerDatalink layerSession layerTransport layer
0 votes
2 answers
15
0 votes
1 answer
19
Match the following :$\begin{array}{clcl} & \textbf{List-I} && \textbf{List-II} \\ \text{a.} & \text{Session layer} & \text{i.} & \text{Virtual terminal software} \\ ...
1 votes
2 answers
20
2 votes
2 answers
21
1 votes
2 answers
23
1 votes
1 answer
24
1 votes
1 answer
25
Match the following $:$$\begin{array} {} \text{a.} & \text{Data link Layer} & \text{i.} & \text{Flow Control} \\ \text{b.} & \text{Network Layer} & \text{ii.} & \text{N...
1 votes
2 answers
27
Data Encryption Techniques are particularly used for _____protecting data in Data Communication Systemreduce Storage Space Requirementenhances Data Integritydecreases Dat...
To see more, click for the full list of questions or popular tags.