Skip to main content

OSI Layer

Compare and contrast OSI and TCP/IP models :

1.Physical Layer: 

    it is responsible for moving data form one node to the next. 
Function:
I. Transmission media
II. Types of encoding
III. Data rate{no of bits sent each sec}
IV. Synchronization of bits.
V. Line configuration (Example: point to point , multipoint)
VI. Topology (Bus,Star,Ring,Mesh)
VII. Transmission (simplex ,half duplex, full duplex)

2.Data like Layer: 

    it transforms the physical layer into a reliable link.
Function:
I.Framing: conversion of bits to frames. framing are working in four methods can be used to mark the start to end of frame.
i) Character Count:
ii) Flag bytes with byte/character staffing
iii) Starting and ending flags, with bits staffing
iv) Physical bye coding valuations.
II.  Physical addressing : header is adding to frame.
III. Flow control
IV. Error control
V. Access control

3.Network Layer:

     Responsible for source to destination delivery of packets.
Function:
I.  Logical Addressing: header to the packet coming  from upper.
II.Routing :

4. Transport Layer:

    Responsible for process to process delivery.
Function:
I.Service point  addressing: it is a Port address at which that particular Application is running.
II. Segmentation and reassembly: it is in this massage is dividing in to segmentation segment. and reassembly is reassemble to divided  massage. Segmentation is work on sending side and reassembly work on receiving side.
III.Connection control : it is divided in two type i) connectionless ii)connection oriented.
IV.Flow and Error Control.

5.Session Layer:

Function:

I.Dialog Control: it is divided in two type i) half Duplex(one way at a time) ii) Full Duplex(two ways at a time)
II.Synchronization:it is adding checkpoints

6.Presentation Layer:

 it deals with  the syntax and semantics of the information exchanged between two systems.

 Function:

I.Translation    : converting a massage to compatible bit stream.
II.Encryption   : the translation of data into a secret code. Encryption is the most effective way to        achieve data    security. Converting plaintext to cipher text and encryption work from sending side.
III.Decryption : Decryption is converting cipher text to plaintext and Decryption work from receiving side.
IV.Compression : reducing number of bits contained in the information. It is divided in two type :
i)Lossless : in this type if you have compress the file or document  then no change  in file/document quality.
ii)Lossy : in this type if you have compress  the file or document then quality has been change.

7.Application Layer:

 Application Layer is the Protocol Data unit(PDU) at this Layer is just call the Data. Application layer is a software’s which interact human with each other. It enable the users human and software to access the network. (Example: Web Browser, yahoo massager).

Functions:

I. Network virtual Terminal: software version of physical terminal (remote host login is facilitate providing)
II.file transfer access and management
III.email services
IV.Directory services
(Note: data transfer with including header  it’s call Encapsulation and  data transfer without header it's call Decapsulation)




Summary:


Open system interconnection 
Application layer: The software which one human to another. (Web browsers)
presentation: Representation of data(Image,Video,Audio,Text)
session:Which creates and maintain the session.
transport:End to End delivery of data(TCP/UDP) Segment
Network:source IP address Destination IP Packet Router, L3 Switch
Data Link : Source Mac Address | Destination MAC Frame Switch
Physical : Encoding | Decoding



Comments

Popular posts from this blog

Access Controls Lists(ACL)

Access Controls   Lists(ACL): ACL is a set of rules which will allow or deny the traffic moving through the router. It is a layer 3 security which controls the flow of traffic from one router to another. It is also called as packet filtering firewall. ACL is two type: 1.Standard ACL: standard access controls   Lists(ACLs) are the oldest type of access control lists. Standard IP access lists are used to permit/deny traffic only based on source IP address of the IP datagram packets. Standard Access Control list can be created by using the access-list IOS command. Function: The access list number range is 1 -99 Can block a network, host and subnet Two way communication is stopped All services are blocked. Implemented closest to the destination. Filtering is done based on only source IP address. 2.Extended ACL: Extended Access Control Lists allow you to permit or deny traffic from specific IP addresses to a specific destination IP address and por...

HOW TO WORK DHCP?

Dynamic Host Configuration Protocol, a  protocol that allows a DHCP server to automatically set TCP/IP network configuration for a client computer. How does work DHCP? 1.Whenever a client computer boots up, it broadcasts a DHCPDISCOVER massage.  it doesn't matter where the client is in airport, at home, in a desert, or in a jungle  it would send this packet looking for a DHCP server.   And the client has no idea if there is any DHCP server closeby therefore broadcast the only way you may notice the destination  IP address is 255.255.255.255. DHCPDISCOVER packet simply says "Hello", is there any DHCP server out there? I want to connect the Internet." 2.supose there is a DHCP server close by  and it hears the DHCPDISCOVER massage. the DHCP server responds with a DHCPOFFER massage.   It is a broadcast UDP packet.   It simply replies :"I hear you. I can lease you this IP address and this subnet mask, so that you can connect to the local network. ...