Why OSI layers having 7 layers instead of one layer.
Answers were Sorted based on User's Feedback
Answer / jitemdera ( cisco systems,us)
why we need OSI Layer
When the computer system come in in world every manufacture
uses there own model to process the data
in this case the computer of one Vendor can not communicate
with another Vendor
So to make it Standard we use OSI Model
Why the OSI model have 7 layer not One this is Bullshit
Question and i guess interviewer want to show hie knowledge
There are several reason let guess if we have only one
layer capable of holding all process of All seven layer
So what algo they will use
is it FIFO or what then think about CPU utilization for a
system ( You have change yours RAM and Processors in each
second)
This is Bullshit question and you have to replay in tcp we
have 5 layer only right
Every layer have there own function and while processing the
data every layer tags there signature on the data and the
process to next layer
as per example if in a bus a driver will do the duty of
Driver ,Ticket checker the Bus will delay like any thing
So is a Bullshit question ...
Is This Answer Correct ? | 16 Yes | 2 No |
Answer / santosh
* Standardizes the N/W components to allow multiple vendor development & support.
* By breaking into 7 Layers to make learning easier.
Is This Answer Correct ? | 4 Yes | 1 No |
Answer / sagar
OSI model has 7 layers.
each layer has its own use , depending on the layers devices
are their say switch for layer 2 router for layer 3 , hence
depending on the issue the troubleshooting can be made easily
Is This Answer Correct ? | 1 Yes | 1 No |
Answer / santhoshreddy katam
OSI layers having 7 layers because of all protocols handled
by one layer is not efficiently.the category of 7 layers
handled the proocols is very simple.in this we divide the
protocols based on their purpose.for example highlevel
protocols are included in appliction layer and tcp,udp in
ranspor layer.
Is This Answer Correct ? | 1 Yes | 1 No |
Answer / samyak
I will ease our configuration and troubleshooting steps
.Like if telnet is not working then we easily find out the
problem of application layer we don't have to check everything .
Is This Answer Correct ? | 1 Yes | 1 No |
Answer / prasad
sorry for my answer, why do you have two organs in the body
why shouldnt you only one hand, ear, eye,leg? just like
this only for efficiency and performance they have 7
layers. please dont mind.
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / amit dey
Troubleshooting issues will get very difficult and complex If Only one layer is used bcoz
If all layers are used Isolating the problem is related to which layer becomes easy
Is This Answer Correct ? | 0 Yes | 0 No |
Define topology?
Can you explain the basic of encryption in VPN?
Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward
The "ipx delay number" command will allow an administrator to change the default settings. What are the default settings? A. For LAN interfaces, one tick; for WAN interfaces, six ticks B. For LAN interfaces, six ticks; for WAN interfaces, one tick C. For LAN interfaces, zero ticks; for WAN interfaces, five ticks D. For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
What is a characteristic of Store and Forward switches? A.) They forward the frame before it is completely read. B.) They work at wire speed. C.) They are the same a Cut-Through switching. D.) They read the entire frame and check CRC before forwarding. E.) They decrease latency.
If there is only 2 host in bus topology is that possible collision accord?
Port selection is done at which layer of OSI reference model?????
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process
what does the clock rate do?
Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10.1.1.1 B.) 10.1.1.66 C.) 10.1.1.130 D.) 10.1.1.127
Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router