Compare and contrast OSI and TCP/IP models :
II. Types of encoding
III. Data rate{no of bits sent each sec}
IV. Synchronization of bits.
V. Line configuration (Example: point to point , multipoint)
VI. Topology (Bus,Star,Ring,Mesh)
VII. Transmission (simplex ,half duplex, full duplex)
i) Character Count:
ii) Flag bytes with byte/character staffing
iii) Starting and ending flags, with bits staffing
iv) Physical bye coding valuations.
II. Physical addressing : header is adding to frame.
III. Flow control
IV. Error control
V. Access control
Function:
I. Logical Addressing: header to the packet coming from upper.
II.Routing :
Function:
I.Service point addressing: it is a Port address at which that particular Application is running.
II. Segmentation and reassembly: it is in this massage is dividing in to segmentation segment. and reassembly is reassemble to divided massage. Segmentation is work on sending side and reassembly work on receiving side.
III.Connection control : it is divided in two type i) connectionless ii)connection oriented.
IV.Flow and Error Control.
II.Synchronization:it is adding checkpoints
II.Encryption : the translation of data into a secret code. Encryption is the most effective way to achieve data security. Converting plaintext to cipher text and encryption work from sending side.
III.Decryption : Decryption is converting cipher text to plaintext and Decryption work from receiving side.
IV.Compression : reducing number of bits contained in the information. It is divided in two type :
i)Lossless : in this type if you have compress the file or document then no change in file/document quality.
ii)Lossy : in this type if you have compress the file or document then quality has been change.
II.file transfer access and management
III.email services
IV.Directory services
(Note: data transfer with including header it’s call Encapsulation and data transfer without header it's call Decapsulation)
Summary:
1.Physical Layer:
it is responsible for moving data form one node to the next.
Function:
I. Transmission mediaII. Types of encoding
III. Data rate{no of bits sent each sec}
IV. Synchronization of bits.
V. Line configuration (Example: point to point , multipoint)
VI. Topology (Bus,Star,Ring,Mesh)
VII. Transmission (simplex ,half duplex, full duplex)
2.Data like Layer:
it transforms the physical layer into a reliable link.
Function:
I.Framing: conversion of bits to frames. framing are working in four methods can be used to mark the start to end of frame.i) Character Count:
ii) Flag bytes with byte/character staffing
iii) Starting and ending flags, with bits staffing
iv) Physical bye coding valuations.
II. Physical addressing : header is adding to frame.
III. Flow control
IV. Error control
V. Access control
3.Network Layer:
Responsible for source to destination delivery of packets.Function:
I. Logical Addressing: header to the packet coming from upper.
II.Routing :
4. Transport Layer:
Responsible for process to process delivery.Function:
I.Service point addressing: it is a Port address at which that particular Application is running.
II. Segmentation and reassembly: it is in this massage is dividing in to segmentation segment. and reassembly is reassemble to divided massage. Segmentation is work on sending side and reassembly work on receiving side.
III.Connection control : it is divided in two type i) connectionless ii)connection oriented.
IV.Flow and Error Control.
5.Session Layer:
Function:
I.Dialog Control: it is divided in two type i) half Duplex(one way at a time) ii) Full Duplex(two ways at a time)II.Synchronization:it is adding checkpoints
6.Presentation Layer:
it deals with the syntax and semantics of the information exchanged between two systems.Function:
I.Translation : converting a massage to compatible bit stream.II.Encryption : the translation of data into a secret code. Encryption is the most effective way to achieve data security. Converting plaintext to cipher text and encryption work from sending side.
III.Decryption : Decryption is converting cipher text to plaintext and Decryption work from receiving side.
IV.Compression : reducing number of bits contained in the information. It is divided in two type :
i)Lossless : in this type if you have compress the file or document then no change in file/document quality.
ii)Lossy : in this type if you have compress the file or document then quality has been change.
7.Application Layer:
Application Layer is the Protocol Data unit(PDU) at this Layer is just call the Data. Application layer is a software’s which interact human with each other. It enable the users human and software to access the network. (Example: Web Browser, yahoo massager).Functions:
I. Network virtual Terminal: software version of physical terminal (remote host login is facilitate providing)II.file transfer access and management
III.email services
IV.Directory services
(Note: data transfer with including header it’s call Encapsulation and data transfer without header it's call Decapsulation)
Summary:
Open system interconnection
Application layer: The software which one human to another. (Web browsers)
presentation: Representation of data(Image,Video,Audio,Text)
session:Which creates and maintain the session.
transport:End to End delivery of data(TCP/UDP) Segment
Network:source IP address Destination IP Packet Router, L3 Switch
Data Link : Source Mac Address | Destination MAC Frame Switch
Physical : Encoding | Decoding
Comments
Post a Comment