CONTACT US FOR

Any kind of computers, Laptops, Batteries for laptop, Servers , monitors, printers, hard disk, ram, ups, cabinet, keyboards, mouse, Broad-band, ADSL routers, speakers, pen drives, modems, CD, DVD, TV cards, Graphic cards, headphones and other related (desktop & laptop) accessories.

Surya Prasad Dhakal
LUS@N COMPUTER CONSULTANCY SERVICE
SHREESHA HIMALAYAN BUSINESS MART
Putalisadak, Kathmandu,Nepal
Contact no :- +977 - 01 - 4245403, 9841313530, 9741073413

Entertainment...............( मनोरन्जन )

TV Channels...

Sagarmatha TV(Live), Image Channel, Chhanel Nepal, Nepal One, Kantipur TV, Nepal Telivision, AVNews, ABC TV

News ....

eKantipur.com, Hamropalo.com, Himalayan Times,NepalNews.com, Nepal Horizons, Nepali Times, Telegraph, Nepal News, Gorkhapatra, Rajdhani, Nagarik, My Republica,Mahanagar, Naya Patrika, Annapurnapost, Kantipur in English


Big News Network, Birmarsha, Budhabar (Kathmandu), Business Manager, CBC News, Cyber Nepal, Deshantar (Kathmandu),Dishanirdesh (Kathmandu), Dristi(Kathmandu), EIN News,Gatibidhi, Himalayan Travel Trade Journal, HimoNews,Image Channel, Independent, Inside Nepal, Jana Aastha (Kathmandu),Janadharana (Kathmandu), Kamana, Kosheli (Kathmandu),Moreover, Nepal/Bhutan News, Nepal News Headlines, Nepal Samachaparta (Kathmandu), Nepal Traveller, Nepal News, Nepal Now, Nepali Post , Nepalnews.com in Nepali, New Business Age,Newslook, NewsTrove, Nispakshya, OneWorld, Parewa News,People’s Review Weekly (Kathmandu), Rajdhani (Kathmandu),The Rising Nepal (Kathmandu), RSS Nepal National News Agency, Samachar Patra, Sandhya Times (Kathmandu), Saptahik Weekly, Satyagraha, Spotlight (Kathmandu), Sunday Post(Kathmandu), Tasapaw (Kathmandu), Topix, Travellers’ Nepal,Washington Post Nepal News, Wave (Kathmandu)



FM Radios

Kantipur FM, Radio Salaam Namaste, Dallas, Texas,USA, BBC Nepali Sewa, CRI Nepali Sewa,Gurkha Radio, Hits FM, KATH 97.9, Machhapuchhre FM, Matri FM, Nepal Fm, Radio Dovan, Radio Nepal,Radio Sagarmatha, Ujyaalo 90 Network

View Nepali Sabdakosh
फेसबुकमा नेपालीमा टाईपगर्नु परेमा यहाँ क्लिक गर्नुहो (पहिला रोमन मा टाईप गर्नुहोस् र कपि पेस्ट गर्नुहोस्)

Dictionary

Saturday, December 19, 2009

OSI Seven(7) Layer Model

The OSI networking model is divided into 7 layers. Each layer has a different responsibility, and all the layers work together to provide network data communication.

* Physical - The Physical layer is the specification for the hardware connection, the electronics, logic circuitry, and wiring that transmit the actual signal. It is only concerned with moving bits of data on and off the network medium. Most network problems occur at the Physical layer.

* Data Link - The Data Link layer is the interface between the upper "software" layers and the lower "hardware" Physical layer. One of its main tasks is to create and interpret different frame types based on the network type in use. The Data Link layer is divided into two sub-layers: the Media Access Control (MAC) sub-layer and the Logical Link Control (LLC) sub-layer.
o LLC sub-layer starts maintains connections between devices (e.g. server - workstation).
o MAC sub-layer enables multiple devices to share the same medium. MAC sub-layer maintains physical device (MAC) addresses for communicating locally (the MAC address of the nearest router is used to send information onto a WAN).
* Network - The Network layer addresses messages and translates logical addresses and names into physical addresses. It also manages data traffic and congestion involved in packet switching and routing. It enables the option of specifying a service address (sockets, ports) to point the data to the correct program on the destination computer.

* Transport - The Transport layer provides flow control, error handling, and is involved in correction of transmission/reception problems. It also breaks up large data files into smaller packets, combines small packets into larger ones for transmission, and reassembles incoming packets into the original sequence.

* Session - The Session layer handles security and name recognition to enable two applications on different computers to communicate over the network. Manages dialogs between computers by using simplex(rare), half-duplex or full-duplex. The phases involved in a session dialog are as follows: establishment, data-transfer and termination.

* Presentation- The Presentation layer determines data exchange formats and translates specific files from the Application layer format into a commonly recognized data format. It provides protocol conversion, data translation, encryption, character-set conversion, and graphics-command expansion.

* Application - The Application layer represents user applications, such as software for file transfers, database access, and e-mail. It handles general network access, flow control, and error recovery. Provides a consistent neutral interface for software to access the network and advertises the computers resources to the network.

Here is an idiotic, yet easy way to remember the 7 layers. Memorize the following sentence: All People Seem To Need Data Processing. The first letter of each word corresponds to the first letter of the layers starting with Application and ending with the physical layer.

Layer 1 – The Physical Layer

* Translates data into bits, or bits into data
* Deals only with electrical and mechanical level of data communication, which builds the foundation to allow higher OSI layers to walk through it.
* Physical Layer devices are:
o NIC Cards
o Ethernet Hubs
o Repeaters
o Multistation Access Units (MAUs)
o Transceiver
o Media Filters

Layer 2 – The Data Link Layer

* Provides flow and error control and synchronization for the Physical Layer
* Is made up of the Logical Link control and MAC sublayers
* Data Link Layer Devices are:
o Bridges
o Switches
o Brouters

The Protocols that operate at the Data Link Layer are:

* Point-to-Point Protocol (PPP)
* Serial Line Internet Protocol (SLIP)
* High-Level Data Link Control (HDLC)
* Logical Link Control (LLC)
* Link Access Protocol (LAP)

Layer 3- The Network Layer

* Manages communications routing for packets that are destined for addresses that are not on the LAN
* Uses routable protocols to deliver packets across interconnected networks joined by routers.
* Device which operate at the Network Layer are:
o Routers
o Connectionless Oriented services

The two main protocols that operate at the Network Layer are:

* TCP/IP
* IPX/SPX

Layer 4 – The Transport Layer

o Manages the end-to-end control and error checking by providing an end-to-end connection between the source and the destination node to ensure reliable data delivery
o Also responsible for providing end-to-end recovery, flow control, and releasing the connection

Connectionless-Oriented Protocols that operate at this layer are:

* UDP

Connection-Oriented Protocols that operate at this layer are:

* TCP/IP
* SPX/IPX

Layer 5 – The Session Layer

* The session layer manages the establishment of a continuing series of requests and responses between the applications at each end.
* Mainframes used to use this layer – modern networking does not.

Layer 6 - The Presentation Layer

* Usually part of the Operating System
* It prepares incoming data for the Application layer and formats outgoing data that the Application layer sends and receives.
* Data compression and data encryption.

Layer 7 – The Application Layer

* The top layer of the OSI model
* Provides information services
* FTP and Telnet access the OSI model at this layer.

1 comment:

  1. Not a simple task is to write this post but the writer has done it. All information is updated and seems that written after good research. You should read this post once.How to remove Bullguard from Windows

    operating system?

    ReplyDelete

FANS OF LUS@N COMPUTER

Network Topologies

· Bus - This topology is an old one and essentially has each of the computers on the network daisy-chained to each other. This type of network is usually peer-to-peer and uses Thinnet (10base2) cabling. It is configured by connecting a "T-connector" to the network adapter and then connecting cables to the T-connectors on the computers on the right and left. At both ends of the chain, the network must be terminated with a 50 ohm impedance terminator. If a failure occurs with a host, it will prevent the other computers from communicating with each other. Missing terminators or terminators with an incorrect impedance will also cause problems.


As you can see if computer #1 sends a packet to computer #4, it must pass through computers #2 and #3, creating excess traffic.
ADVANTAGES: Cheap, simple to set up.
DISADVANTAGES
: Excess network traffic, a failure may affect many users, problems are difficult to troubleshoot.

· Star - The star topology uses twisted pair (10baseT or 100baseT) cabling and requires that all devices are connected to a hub.


ADVANTAGES: centralized monitoring, failures do not affect others unless it is the hub, easy to modify.

DISADVANTAGES: If the hub fails then everything connected to it is down. This is like if you were to burn down the phone company's central office, then anyone connected to it wouldn't be able to make any phone calls.

· Ring - The ring topology looks the same as the star, except that it uses special hubs and ethernet adapters. The ring topology is used with Token Ring networks.
ADVANTAGES: Equal access.
DISADVANTAGES: Difficult to troubleshoot, network changes affect many users, failures affect many users.

· Hybrid - Hybrid topologies are combinations of the above and are common on very large networks. For example, a star bus network has hubs connected in a row (like a bus network) and has computers connected to each hub as in the star topology.

· Mesh - In a true mesh topology every node has a connection to every other node in the network. A full mesh network can be very expensive, but provides redundancy in case of a failure between links.

· Wireless - As the name implies, wireless networks allow computers to comunicate without the use of cables. IEEE 802.11b defines two pieces of equipment, a wireless station, which is usually a PC or a Laptop with a wireless network interface card (NIC), and an Access Point (AP),which acts as a bridge between the wireless stations and Distribution System (DS) or wired networks. An 802.11b wireless network adapter can operate in two modes, Ad-Hoc and Infrastructure. In infrastructure mode, all your traffic passes through a wireless ‘access point’. In Ad-hoc mode your computers talk directly to each other and do not need an access point at all. 802.11b delivers data throughput of 11 Mbps.
ADVANTAGES: World-wide acceptance. Ranges over 150 feet. Freedom to move about and no cables (obvious).
DISADVANTAGES: Susceptible to interference from objects such as microwave ovens and cordless phones