123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

Use Group Policy Objects Within Active Directory To Specify

Profile Picture
By Author: jack jone
Total Articles: 82
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The OSI model splits communication tasks into smaller pieces called subtasks. Protocol implementations are computer processes that handle these subtasks. Specific protocols fulfill subtasks at specific layers of the OSI model. When these protocols are grouped together to complete a whole task, the assemblage of code is called a protocol stack. The stack is just a group of protocols, arranged in layers, that implements mcsa certification an entire communication process. Each layer of the OSI model has a different protocol associated with it. When more than one protocol is needed to complete a communication process, the protocols are grouped together in a stack. An example of a protocol stack is TCP/IP, which is widely used by Unix and the Internet—the TCP and IP protocols are implemented at different OSI layers.

Windows Server 2008 and Windows Vista include the Next Generation TCP/IP protocol stack, which is for both version 4 (IPv4) and version 6 (IPv6) of the Internet Protocol.

Why You Should Care about Protocol Stacks

It may not be incredibly clear right now why ...
... you should care about protocol stacks and the OSI model. However, the OSI model and the protocol stacks for Internet communication are the basis upon which the 70-642 exam is built. All things about today’s modern network stem from either the OSI or IP model.

Knowing the layers of both models is essential to sound troubleshooting, and though it may not be obvious as you trudge through this background material, knowing the OSI model will help when managing a Windows network. You’ll see additional examples of how knowing the OSI model helps when troubleshooting throughout this chapter.

Each layer in the protocol stack receives services from the layer below it and provides ser- vices to the layer above it. It can be better explained like this: layer N uses the services of the layer below it (layer N – 1) and provides services Mcitp to the layer above it (layer N + 1). For two computers to communicate, the same protocol stacks must be running on each computer. Each layer on both computers’ stacks must use compatible protocols in order for the machines to communicate with each other. The computers can have different operating systems and still be able to communicate if they are running the same protocol stacks. For example, a DOS machine running IP can communicate with a Macintosh machine running IP (see Figure 1.1).

Total Views: 181Word Count: 399See All articles From Author

Add Comment

Business Articles

1. Lucintel Forecasts The Global Wall-mounted Ac Ev Charger Market To Grow With A Cagr Of 22.4% From 2025 To 2031
Author: Lucintel LLC

2. Technology Landscape, Trends And Opportunities In Global 3d Printing Photopolymer Market
Author: Lucintel LLC

3. Lucintel Forecasts The Global Smart Home Market To Reach $372 Billion By 2030
Author: Lucintel LLC

4. Second Marriage Matrimonial – Verified Matches & Free Registration
Author: Truelymarry

5. Core: Leading The Way In Managed It Services For Businesses Across London
Author: IT Management

6. The Role And Function Of A Collection Agency
Author: Bennett Carter

7. Understanding Debt Collection Agencies: What They Do And How They Affect Consumers
Author: Bennett Carter

8. How To Use An Smm Panel Effectively For Fast Social Media Growth
Author: Smm Panel

9. Essential Tips For Beginners And The Power Of Professional Editing
Author: Sam

10. How To Improve Field Staff Efficiency With Geolocation Tools
Author: TrackHr App

11. Building An Effective Energy Management System
Author: Jane

12. Internal Auditor Training: The Key To Effective Risk Management And Compliance
Author: Sqccertification

13. Why Accurate Accounting In Property Management Is The Key To Higher Roi
Author: Harsh Vardhan

14. Kaal Sarp Puja In Trimbakeshwar – Benefits, Process & Trusted Pandit Contact
Author: Pandit Milind Guruji

15. Data Entry Vs. Data Processing: What’s The Difference And Why It Matters
Author: Allianze BPO

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: