if we r having OSI model they why nowadays we r using TCP?IP
model??
Answers were Sorted based on User's Feedback
Answer / abhishek
OSI 7 layer model involves complexity to implements when
compared to tcp/ip 4 layer model
| Is This Answer Correct ? | 2 Yes | 2 No |
Answer / m.saravanakumar
OSI model is a structured model and each layer is interconnected with its upper and lower layer which is the basement of networking.each layer is working with different protocol which it can support.
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / abhijeet awade,vikas arade
TCP/IP is used for Connectionless Services only, and now a day
the most user uses wireless services because its cost is less as compaired to wired connection, So we are using TCP/IP Model.
| Is This Answer Correct ? | 1 Yes | 1 No |
Answer / vara prasad m s
TCP/IP Stands for Transmission Control Protocol and
Internet Protocol, it's a Connection oriented communication
protocol, This suite has define rules and regulations which
are necessary to communicate between systems
| Is This Answer Correct ? | 0 Yes | 1 No |
Answer / madhan
We all know that OSI has 7 layers and TCP/IP suite has 5
layers. why? In TCP, we can achieve the functions of
Session and Presentation layers in Application layer
itself.This makes the TCP/IP protocol suite as a 5 layered.
The functions of Session and Presentation layer are
achieved in the Application layer with the help of
libraries.
| Is This Answer Correct ? | 8 Yes | 10 No |
Slip supports which of the following WAN encapsulation services?
Can two people use the same ip address?
Is there any training institute for network protocol testing / communication protocol testing / data-com protocol testing?
How can I tell if my isp is blocking ports?
What is IP address range?
What is smb used for?
Can ip addresses be shared?
Explain how is ip carried on a network?
Explain what is a firewall?
IPv6 uses ________ bit address, whereas IPv4 uses ________ bit address
what is fraud network. What are its cteristics? and How to break Bank Account Passwords?
How a process can be terminated?