the session.Session traffic control: Provides session traffic control and cross-session functions.Addressing: Use a remote address to establish a session connection. LError Control: logically speaking, the Session Layer is mainly responsible for establishing, maintaining, and terminating data exchanges. However, the actual work is to receive data from the transport layer and correct errors. Both session co
less reliable "non-connected" data transfer services, error control and flow control. When providing a "connection-oriented" service, data transmitted through this layer will be confirmed by the target device and the data will be re-sent if no acknowledgement has been received within the specified time.** Monitor Service quality.Session LayerThe session layer, the 5th
and the data will be re-sent if no acknowledgement has been received within the specified time.Monitor Service quality.Session LayerThe session layer, the 5th layer of the OSI model, is the interface between the user application and the network, and the main task is to prov
duration of the session.Session traffic control: Provides session traffic control and cross-session functions.Addressing: Use a remote address to establish a session connection. LError Control: logically speaking, the Session Layer is mainly responsible for establishing, maintaining, and terminating data exchanges. However, the actual work is to receive data from the transport layer and correct errors. Bot
duration of the session.Session traffic control: Provides session traffic control and cross-session functions.Addressing: Use a remote address to establish a session connection. LError Control: logically speaking, the Session Layer is mainly responsible for establishing, maintaining, and terminating data exchanges. However, the actual work is to receive data from the transport layer and correct errors. Bot
Source: Network
Copyright: www.networkdictionary.com
The OSI Open System Interconnection model is a reference model proposed by the International Organization for Standardization (ISO) in 1984. As a conceptual standard framework for network communication, this model makes it possible to conduct communication on network
Tag:httpioosarsp Data divon code The Http://baike.baidu.com/view/69334.htmMAC (Media Access Control) address, or MAC location, is used to define the locations of network devices. In the OSI model, the third layer of the network layer is responsible for the NBSP;IP address, while the second
In the Iso/osi reference Model, the main function of the network layer is () the correct answer: a your answer: a(correct)Route selection, congestion control and network interconnectionProvides a reliable end-one service that transparently transmits messagesData format transformation, data encryption and decryption, data compression and recovery
Add note
data. Typical protocol representatives: RPC, SQL, NFS, NetBIOS, SCP, ASP, SSH, Winsock, BSD sockets
presentation Layer (Presentation) : Transforms the upper data or information to ensure that one host application layer information can be understood by another host's application. The data transformation of the presen
data. Typical protocol representatives: RPC, SQL, NFS, NetBIOS, SCP, ASP, SSH, Winsock, BSD sockets
presentation Layer (Presentation) : Transforms the upper data or information to ensure that one host application layer information can be understood by another host's application. The data transformation of the presen
devices.
. A method that ensures that network transmissions are received correctly.
. How network devices maintain a constant rate of data flow.
. How the electronic data is represented on the network media.
The OSI model consists of 7 layers of layers: physical layer, Data link layer, network
1.UDP protocolUDP is a connectionless transport layer protocol in the OSI Reference Model, which is mainly used for transport that does not require packet order arrival, and the packet transmission sequence is completed by the application layer [2], providing a simple and un
Interchange Code (EBCDIC) and the other uses the U.S. Information Interchange Standard Code (ASCII) to represent the same characters. If necessary, the presentation layer enables conversion between multiple data formats by using a pass-through format.7. Application layer: The OSI
The OSI Layer-7 model is complex due to the entire network connection process, including the interconnection between hardware, software data packets, and applications. If you want to write a program that concatenates all functions of the Internet, you must rewrite the entire program when a problem occurs in a small link. Therefore, we divide the entire network in
takes 0 and a positive integer)2.2 Root port of the non-root switch is elected.1. Select a small cost (the larger the bandwidth, the smaller the overhead), the closer the root switch is.2. Neighbor Bridge ID is small.3. Port ID (port number) (upstream ports) Select a small2.3 Designated Port of the electoral segment0. This network segment refers to the data link segment, such as the connection between switch B and C is the network segment.1. Select a small cost (the larger the bandwidth, the sm
Introduction to the OSI Layer-7 Model
OSI is an open reference model for System Interconnection. It is a well-defined protocol specification. The OSI model has a
The OSI Reference Model: The ISO/IEC 7498 standard defines a 7-tier architecture model for network interconnection, the Open Systems Interconnect Reference Model.The OSI Reference Model defines the hierarchical structure of open systems, the interrelationships between hierar
to make a mistake. This layer specifies the topology and provides hardware addressing;Layer 1th Physical layer: At the very bottom of the OSI reference Model. The primary function of the physical layer is to use physical transpor
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.