Encryption is attained at what layer of the osi model?

Show

    Home

    Subjects

    Expert solutions

    Create

    Log in

    Sign up

    Upgrade to remove ads

    Only ₩37,125/year

    1. Science
    2. Computer Science

    • Flashcards

    • Learn

    • Test

    • Match

    • Flashcards

    • Learn

    • Test

    • Match

    Updated OSI Model

    Terms in this set (7)

    Layer 7

    Application Layer - Human interaction layer, where applications can access the network services - Details: Protocols: HTTP, SMTP

    Layer 6

    Presentation Layer - Ensures that data is in a usable format and is where data encryption occurs. Details: The presentation layer is responsible for translation, encryption, and compression of data.

    Layer 5

    Session Layer - Maintains connections and is responsible for controlling ports and sessions. Details: The session layer ensures that the session stays open long enough to transfer all the data being exchanged, and then promptly closes the session in order to avoid wasting resources.

    Layer 4

    Transport Layer - Transmits data using transmission protocols including TCP and UDP. Details: The transport layer on the receiving device is responsible for reassembling the segments into data the session layer can consume.

    Layer 3

    Network Layer - Decides which physical path the data will take. Details: The network layer also finds the best physical path for the data to reach its destination; this is known as routing.

    Layer 2

    Datalink Layer - Defines the format of data on the network. Details: Like the network layer, the data link layer is also responsible for flow control and error control in intra-network communication

    Layer 1

    Physical Layer - Transmits raw bit stream over the physical medium. Details: The physical layer of both devices must also agree on a signal convention so that the 1s can be distinguished from the 0s on both devices.

    Sets with similar terms

    CCNA Chapter 1 Written Lab

    19 terms

    Bharat_Windham

    Written Lab 1.1: OSI Questions

    20 terms

    Gera_Z

    Chapter 1 - Written Labs 1.1 OSI Questions

    20 terms

    Tony_Borchers

    MnHIT OSI Model

    21 terms

    Debbiealbertson

    Other sets by this creator

    Leadership Principles

    15 terms

    glardoin

    Intrusion Detection (ITSY-2330-30CN1)

    266 terms

    glardoin

    RSE v6 Chapter 3 - Dynamic Routing

    38 terms

    glardoin

    Chapter 10 ImpSec - Study Notes

    21 terms

    glardoin

    Verified questions

    COMPUTER SCIENCE

    Assuming that a Random object called generator has been created, what is the range of the result of each of the following expressions? a. generator.nextInt(20), b. generator.nextlnt(8)+1, c. generator.nextlnt(45)+10, d. generator.nextlnt(100)-50.

    Verified answer

    COMPUTER SCIENCE

    in some programming languages, ___________ are implemented as arrays whose elements are characters.

    Verified answer

    COMPUTER SCIENCE

    Using the variable-length code shown, the internal coding of the following Hawaiian words along with the amount of savings over the standard fixed-length 4-bit representation: a. KAl b. MAUl C. MOLOKAl Explain the problem that occurred with Part c. $$ \begin{array} {l} \text{Letter} & \text{4-bit Encoding} & \text{Variable Length Encoding}\\ \text{$A $} & \text{0000} & \text{00}\\ \text{$I$} & \text{0001} & \text{10}\\ \text{$H $} & \text{0010} & \text{010}\\ \text{$W $} & \text{0011} & \text{110}\\ \text{$E $} & \text{0100} & \text{0110}\\ \text{$O $} & \text{0101} & \text{0111}\\ \text{$M $} & \text{0110} & \text{11100}\\ \text{$K $} & \text{0111} & \text{11101}\\ \text{$U $} & \text{1000} & \text{11110}\\ \text{$N $} & \text{1001} & \text{111110}\\ \text{$P $} & \text{1010} & \text{1111110}\\ \text{$L $} & \text{1011} & \text{1111111}\\ & \text{$(\mathrm{a})$} & \text{$(\mathrm{b})$}\\ \end{array} $$

    Verified answer

    COMPUTER SCIENCE

    Show that the following linear program is unbounded: maximize $$ x_1 - x_2 $$ , subject to $$ -2x_1 + x_2 ≤ -1, -x_1 - 2x_2 ≤ -2, x_1, x_2 ≥ 0 $$

    Verified answer

    Recommended textbook solutions

    Encryption is attained at what layer of the osi model?

    Information Technology Project Management: Providing Measurable Organizational Value

    5th EditionJack T. Marchewka

    346 solutions

    Encryption is attained at what layer of the osi model?

    Information Technology Project Management: Providing Measurable Organizational Value

    5th EditionJack T. Marchewka

    346 solutions

    Encryption is attained at what layer of the osi model?

    Computer Organization and Design MIPS Edition: The Hardware/Software Interface

    5th EditionDavid A. Patterson, John L. Hennessy

    220 solutions

    Encryption is attained at what layer of the osi model?

    Operating System Concepts

    9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

    489 solutions

    Other Quizlet sets

    Special procedures 1

    23 terms

    lg12387

    In Class Notes

    41 terms

    mallory_milstead

    Finance 322 Exam 3 FINAL

    25 terms

    greseth27

    CM #24

    25 terms

    bigcowboyduck

    Related questions

    QUESTION

    What are the risks of using OSS over commercial software? Understand how the lack of an active development community for an OSS product affects its users.

    2 answers

    QUESTION

    The capability of current devices to use earlier standards is known as backward compatibility.

    12 answers

    QUESTION

    DESV (Designated Entity Supplemental Validation) requires a merchant to perform BAU reviews how frequently?

    2 answers

    QUESTION

    ImageX automatically saves all changes you make to a mounted image. True or False?

    7 answers