Across
- 5. the application layer includes protocols that implement or facilitate end-to-end distributed applications over the network
- 7. transport protocols establish end-to-end communication between end system over the network defined by layer 3 protocols.
- 9. a device for making and breaking the connection in an electric circuit
- 13. direct memory access, a method allowing a peripheral device to transfer data to or from the memory of a computer system using operations not under the control of the central processor
- 14. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- 15. this layer enables and manages sessions for complete data exchange between end nodes
- 17. these protocols employ methods for bit transmission over physical media
- 19. systems that switch data among stacks at the network layer
- 20. systems that switch data among stacks at the DLC layer
Down
- 1. its protocols establish point to point communication over physical or logical link
- 2. this layer is responsible for presentation of exchanged data in formats that can be consumed by the application layer
- 3. systems that switch data among stacks at the transport layer
- 4. facts and statistics collected together for reference or analysis
- 6. these protocols deliver data units over a network composed of the links established through the DLC protocols of layer2.
- 8. the unauthorized use or reproduction of another's work.
- 10. a person who uses computers to gain unauthorized access to data
- 11. a computer or computer program which manages access to a centralized resource or service in a network
- 12. a folder or box for holding loose papers together and in order for easy reference
- 16. a concealed miniature microphone, used for secret eavesdropping or recording
- 18. an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet in a secure way