You are on page 1of 7

Explain about OSI layers?

7 - application 6 - presentation 5 - session 4 - transport 3 - network 2 - data link 1 - physical Each layer provides a service for the layer above it and receives service from the one below it. Layer 7 is closest to the user of the computer and Layer 1 is closest to the computer hardware. So layer 1 talks to the actual computer and as a "service" gives layer 2 the ability to talk the actual computer. Layer 2 gives a physical address. The computer is physically HERE. Example, longitude and latitude coordinates. Layer 3 gives a logical address. You can get to the computer by using this ADDRESS. Example, home address. Layer 4 does the transport. Example, the post office - get there through rain, sleet, or snow. Layer 5 lets you talk to others. Example, using the phone instead of the post office. However, remember that each layer uses the one below it. So it is sort of like using the phone but there is a little mail man delivering the messages from phone to phone. Layer 6 lets you talk to others in different languages. Take the example above but the mailman also will change your message to Russian if that is what the receiver understands. Layer 7 is like the actual phone. You use it to get things done but there is a whole bunch of other technology behind it (or really below it) that lets you do what you need to do.

OR

Home > Quick Reference > The 7 Layers of the OSI Model

The 7 Layers of the OSI Model

Related Terms

The OSI Reference Model - Understanding Layers OSI - Open System Interconnection MAC Layer Logical Link Control layer Understanding The Data Link Layer routing switch dual layer Modbus protocol layer EV SSL X.400 layered defense modeling PDU

By: Last Updated: 06-06-2013 , Posted: 09-24-2010

The OSI, or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. This article explains the 7 Layers of the OSI Model.
The OSI, or Open System Interconnection, model defines a networking framework to implement protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.

Application (Layer 7)
This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This

layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.

The Network Enabled Enterprise = Empowered Business Download Now

Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.

Transport (Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

Network (Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.

Data Link (Layer 2)


At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.

Physical (Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.
__________________________________________________________________________________

Name Different types of OSI Model ? What is Adapter? Why do you need an adapter? Function of adapter ? Different between Sleep and Hibernate
sleep is a low-power state, meaning that your computer is technically on but most of it's components are off (such as the hard drive) hibernate on the other hand takes everything that is stored in your RAM memory and puts it onto the hard drive, then turns it off completely. The next time you turn on the computer, it will access that file that it stored on your hard drive and it will be like you never turned it off (it's a bit faster than shutting it down completely because it doesn't have to load the startup items)

LS1 And LS2 Model of cache memory ? What is cache memory? Cache memory is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. As the microprocessor processes data, it looks first in the cache memory and if it finds the data there (from a previous reading of data), it does not have to do the more time-consuming reading of data from larger memory. Cache memory is sometimes described in levels of closeness and accessibility to the microprocessor. An L1 cache is on the same chip as the microprocessor. (For example, the PowerPC 601 processor has a 32 kilobyte level-1 cache built into its chip.) L2 is usually a separate static RAM (SRAM) chip. The main RAM is usually a dynamic RAM (DRAM) chip. In addition to cache memory, one can think of RAM itself as a cache of memory for hard disk storage since all of RAM's contents come from the hard disk initially when you turn your computer on and load the operating system (you are loading it into RAM) and later as you start new applications and access new data. RAM can also contain a special area called a disk cache that contains the data most recently read in from the hard disk.

Memory in system

Hyper threading
Hyper-Threading Technology (Intel HT Technology)1 uses processor resources more efficiently, enabling multiple threads to run on each core. As a performance feature, Intel HT Technology also increases processor throughput, improving overall performance on threaded software.

L1 and L2 cache memory? Answer in Cache memory.

Name 3 topology

Three types of network topology


Bus Topology This topology consists of a Backbone cable connecting all nodes on a network without intervening connectivity devices. The single cable is called Bus and can support only one channel for communication; as a result, every node shares the buss total capacity. On a Bus Topology network, devices share the responsibility for getting data from one point to another. But only the intended recipient actually receives and processes the transmitted message while a device wants to send the broadcast message to all the devices that connected to the shared cable. At the ends of each bus network are 50-ohm resistors known as terminators. The terminators stop signals after they have reached the end of the cable. Without these terminators, signals on a bus network would travel endlessly between the two ends of the network; this phenomenon is called signal bounce, and new signals could not get through. Ethernet bus topology is actually easy to install and does not require much cabling and only a main shared cable is used for network communication. 10BASE2 and 10BASE-T are two popular types of the Ethernet cables used in the Bus topology. Also, Bus network works with very limited devices. Performance issues are likely to occur in the Bus topology if more than 1215 computers are added in a Bus Network. In addition, if the Backbone cable fails then all network becomes useless and communication fails among all the devices.

Ring Topology In ring network, each node is connected to the two nearest nodes so that the entire network forms a circle. In a ring network, all the communication messages are transmitted clockwise in one direction, around the ring. Each workstation accepts and responds to packets

addressed to it, and then forwards the other packets to the next workstation in the network. Each workstation just acts as a repeater for the transmission, in other words, all workstations participate in delivery makes the ring topology an active topology. A ring topology has no ends and transmitted data stops at its destination. Twisted-pair or fiber-optic cabling is commonly used as the physical medium. Any damage of the cable of any cable or device can result in the breakdown of the whole network. In addition, just as in a bus topology, the more workstations that must participate in data transmission, the slower the response time. Due to these shortcomings, ring topology now has become almost obsolete. FDDI, SONET or Token Ring Technology can be used to implement Ring Technology. Ring topologies can be found in office, school or small buildings.

Star Topology In the computer networking world the most commonly used topology in local area networking is the star topology. Star topologies can be implemented in home, offices or even in a building. All the computers in the star topologies are connected to central devices like hub, switch or router. The functionality of all these devices is different. Computers in a network are usually connected with the hub, switch or router with the unshielded twisted-pair (UTP) or Shielded Twisted-pair cables. Star topology networks can support a maximum of only 1024 addressable nodes on a logical network. Star topology requires more cabling than ring and bus. It also requires more configurations. However, because each node is separately connected to a central connectivity device, they are more fault-tolerant. A single malfunctioning workstation cannot disable an entire star network. A failure in the central connectivity device can take down a local area networking segment. Because they include a centralized connection point, star topology can easily be moved, isolated or interconnected with other networks through hubs, switches to form more complex topologies. Most Ethernet networks are based on the star topology.

Read more from Computer Networks

You might also like