Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
In the OSI model what range is considered as host layers
+1
vote
108
views
asked
Feb 28
in
Computer Networks
by
(user.guest)
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
1
Answer
+1
vote
answered
Feb 28
by
(user.guest)
selected
Mar 5
by
(user.guest)
Best answer
The layers in the OSI model considered as host layers are:
The Application layer
Presentation layer
Session layer
Transport layer
Your comment on this answer:
Improve the existing answer with your comment.
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please
log in
or
register
.
Related questions
+1
vote
1
answer
115
views
In relation to network bridges what layers of the OSI model are considered media layers
asked
Feb 28
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
219
views
What is Internet Protocols Addressing. Illustrate the figure of internet protocols span the range of OSI model Layers?
asked
Aug 26, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
155
views
The OSI model is made up of what layers?
asked
Feb 14
in
Computer Networks
by
(user.guest)
0
votes
1
answer
71
views
What are the Layers of OSI Model
asked
May 3
in
Computer Networks
by
(user.guest)
–1
vote
1
answer
485
views
Duplicate: Explain the 7 Layers of the OSI model
asked
Apr 8, 2021
in
Computer Networks
by
anonymous
+2
votes
1
answer
4.5k
views
Match the following to one or more layers of the OSI model:
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+3
votes
2
answers
15.9k
views
Match the following to one or more layers of the OSI model:
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
2.1k
views
Match the following to one or more layers of the OSI model: a) Provides independence from differences in representation b) HTTP, FTP and SMTP. c) Bellman Ford Algorithm. d) Reliable end to end Process. e) Interface to transmission media.
asked
Jun 16, 2021
in
Computer Architecture
by
anonymous
0
votes
0
answers
383
views
What would be the valid IP range of 8th subnet of 192.169.10.0/28. The zero subnet should be considered valid for this question.
asked
Dec 18, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
255
views
What would be the valid IP range of 8th subnet of 192.169.10.0/28. The zero subnet should be considered valid for this question.
asked
Dec 18, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
1.8k
views
Which layers in the Internet protocol stack does a router process? Which layers does a link-layer switch process? Which layers does a host process?
asked
Jun 19, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
7.4k
views
Which layers in the Internet protocol stack does a router process? Which layers does a link-layer switch process? Which layers does a host process?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
64
views
What does the OSI model refer to
asked
Mar 25
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.7k
views
What are the following functions are performed by data link layer of OSI model?
asked
Sep 7, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
8.8k
views
Consider the GBN protocol with a sender window size of 4 and a sequence number range of 1,024. Suppose that at time t, the next in-order packet that the receiver is expecting has a sequence number of k
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
136
views
Explain the functions of the three sublayers for an SDN controller in the ITU-T model? What is the purpose of the service abstraction layer in the OpenDaylight SDN controller?
asked
Feb 16
in
Computer Networks
by
anonymous
+1
vote
1
answer
564
views
What's the difference between TCP/IP and OSI Model
asked
Mar 10, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
1.5k
views
We said that a network layer's service model "defines the characteristics of end-to-end transport of packets between sending and receiving hosts."
asked
Oct 1, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
230
views
Given a total bandwidth for cellular operator as 12.5 MHz. If each voice channel needs a bandwidth of 30 kHz, what is the total number of simplex channels per cluster and per cell in a 7-cell cluster?
asked
Nov 29, 2021
in
Computer Networks
by
(user.guest)
0
votes
1
answer
42
views
What are the design issues for the Layers in networking?
asked
May 14
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.3k
views
What are the design issues for layers in networks?
asked
Aug 26, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
11.7k
views
What are the five layers in the Internet protocol stack? What are the principal responsibilities of each of these layers?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.7k
views
Explain why deploying software as a service can reduce the IT support costs for a company. What additional costs might arise if this deployment model is used?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
259
views
While user requirements are expressed as user stories, with each story written on a card. This approach is used in which model?
asked
Dec 16, 2020
in
Software Engineering
by
anonymous
0
votes
1
answer
395
views
What does a model in a software engineering can be defined as an abstraction of a system that has no longer exists, an existing system and future system to be built means?
asked
Mar 30, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
2.4k
views
Dial-up modems, HFC, DSL and FTTH are all used for residential access. For each of these access technologies, provide a range of transmission rates and comment on whether the transmission rate is shared or dedicated.
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
9.0k
views
Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent connections, and is currently receiving requests from two different Hosts, A and B.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
151
views
What are some characteristics of information as an asset in the world of cyber security
asked
Feb 27
in
Computer Networks
by
(user.guest)
0
votes
1
answer
718
views
In what way does a hash provide a better message integrity check than a checksum (such as the Internet checksum)?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
422
views
What would be the valid IP range of 8th subnet of 192.169.10.0/28.
asked
Dec 18, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
10.5k
views
Consider sending a packet from a source host to a destination host over a fixed route. List the delay components in the end-to-end delay. Which of these delays are constant and which are variable?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
–1
vote
1
answer
696
views
Duplicate: Explain why incremental development is considered as an effective approach for developing business software systems
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
112
views
What is the role of access control as it relates to cyber security
asked
Feb 27
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
175
views
What is known as the axiom of augmentation in functional dependency
asked
Nov 17, 2021
in
Database Management Systems
by
(user.guest)
+2
votes
1
answer
1.4k
views
What is the difference between DRAM and SRAM in terms of characteristics such as speed, size, and cost?
asked
Dec 29, 2019
in
Computer Architecture
by
anonymous
–1
vote
1
answer
1.8k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
507
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 131.107.256.80
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
797
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid:
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
2.9k
views
Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid
asked
Nov 22, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
8.8k
views
Host Aand B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sending to Host B an enormous file over this connection.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
845
views
What are the layers of the internet protocol stack
asked
Oct 31, 2019
in
Computer Networks
by
anonymous
0
votes
1
answer
1.8k
views
What two types of ICMP messages are received at the sending host executing the Traceroute program?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
1.6k
views
What are the delay components that may occur while sending a packet from a source host to a destination host over a fixed route
asked
Oct 31, 2019
in
Computer Networks
by
anonymous
+1
vote
1
answer
321
views
What are the different logical layers in an application with a distributed client server architecture
asked
Nov 23, 2021
in
Software Engineering
by
anonymous
0
votes
1
answer
549
views
Why is a packet that is received after its scheduled playout time considered lost?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.3k
views
Describe the difficulties that may arise when building a system from its components. What particular problems might occur when a system is built on a host computer for some target machine?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
3.6k
views
Consider the integration and configuration process model in the figure shown below. Explain why it is essential to repeat the requirements engineering activity in the process.
asked
Sep 23, 2020
in
Software Engineering
by
anonymous
0
votes
0
answers
489
views
Explain why prototyping model is an adaptable model that can support both change avoidance and change tolerance activities. How does it differ from spiral model which in practice has not been widely used. Suggest why this might the case.
asked
Jun 17, 2020
in
Software Engineering
by
anonymous
0
votes
1
answer
5.4k
views
Why are different inter-AS and intra-AS protocols used in the Internet?
asked
Oct 9, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.4k
views
Explain why security is considered a more challenging problem than safety in a system.
asked
May 13, 2020
in
Software Engineering
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...