answersLogoWhite

0

The sixth OSI model layer is called the presentation layer. Protocols at this layer take care of manipulation tasks that transform data from one representation to another, such as translation, compression and encryption. In many cases, no such functions are required in a particular networking stack; if so, there may not be any protocol active at layer six.

http://www.tcpipguide.com/free/t_PresentationLayerLayer6.htm

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What NTFS feature is incompatible with EFS encryption?

Compression


Is compression a form of encryption?

No, it's not but some compressed files can be encrypted.


Is it most encryption programs compress files?

No. Encryption is not compression. Compression occurs before (and possibly again after) encryption when outgoing, and reversed when incoming. In all probability, the encrypted file is likely to be a few byes larger than the original source data, but since compression is applied first, the overall transmission is likely to be smaller than the source.


How are compression and encryption similar?

· Compression allows a user to compress files and folders and increase available storage on a hard disk. Encryption makes sure that your documents stay confidential. They are mutually exclusive. You cannot encrypt a compressed file and vice versa.


When a folder's encryption attibute is configured which of the following cannot be configured at the same time?

D. Compression


What encryption is Agent to Server Communication for the McAfee Agent using?

McAfee Agent to Server Communication uses SSL encryption to secure the data transmitted between the agent and the server. This helps in protecting sensitive information and maintaining the integrity of the communication channel.


What name is given to encryption that is applied and reapplied at each end of each link in communication path?

Link LayerEnd-to-end encryption is an encryption technique that ensures all data coming from your computer to the destination is completely encrypted.


What name is given to encryption that is applied and reapplied at each end of each link in a communication path?

Link LayerEnd-to-end encryption is an encryption technique that ensures all data coming from your computer to the destination is completely encrypted.


What is the difference between link and end-to-end encryption?

There is a difference between link encryption and end-to-end encryption in that link encryption encrypts and decrypts all traffic at each end of a communication line whereas with end-to-end encryption the message is encrypted by the sender at the point of origin and only decrypted by the intended reader


What is the difference in data encryption and data compression?

Even though both data compression and encryption are methods that transform data in to a different format, the golas tried to achieve by them are different. Data compression is done with the intension of decreasing the size of data, while encryption is done to keep the data secret from third parties. Encrypted data cannot be decrypted easily. It requires the possession of a special piece of information called a key. Uncompressing compressed data do not require such special knowledge (such as a key), but it might require some special hardware depending on the data type.


Which layer of the the osi model handles data translation code formatting and data encryption?

Presentation


At which OSI layer does data compression take places?

A network consists of multiple computers communicating with one another over a shared network medium. Topology refers to the shape of a network, or the network's layout. In this unit, you have learnt about the various topologies and its structure. The OSI model is a seven-layer model for communications and computer network protocol design. In this unit, you have learnt about the OSI model and the functions of the various layers.