OSI means "Open Systems Interconnection". The correct meaning of the OSI Model has been as of now given above. In less complex words, to be exact, the OSI model is a protocol utilized by IT experts to really model or follow the genuine stream of how information moves in networks. In this way, fundamentally, the OSI model is an intelligent model/portrayal of how the system frameworks should send information (or, convey) to one another.
The OSI Model separates this information exchange/correspondence methodology into various segments (called layers). In an aggregate, there are seven layers which together make up the OSI Model.In instance of some network issues, utilizing the OSI Layers, we can limit and find out in which part the issue is. So having an OSI Layered approach for investigating networking issues is an extremely useful.
Seven Layers Of OSI Model
The OSI Model is made out of seven layers with the application layer, which is nearest to the end client, at the top, going right down to physical layer, in which the real information exchange occurs with the utilization of a transmission medium.
the OSI MODEL can be represented in a below fig.
The International Standards Organization (ISO) developed the Open Systems Interconnection (OSI) model. Layers 1-4 are considered the lower layers, and mostly concern themselves with moving data around. Layers 5-7, the upper layers, contain application-level data. Each layer has a protocol data unit which is an open-system interconnection (OSI) term used in telecommunications that refers to a group of information added or removed by a layer of the OSI model. OSI layer may also have specific protocols which are a set of rules that governs the communications between computers on a network.
LAYER-1 PHYSICAL LAYER
The physical layer, the lowest layer of the OSI model, is concerned with the transmission and reception of the unstructured raw bit stream over a physical medium. It provides the hardware means of sending and receiving data on a carrier network.
Networking Device – Hub, Network Interface Card (NIC), repeater, gateway
Protocol Data Unit - Bit
Some Protocols - Ethernet
The physical layer of the network focuses on hardware elements, such as cables, repeaters, and network interface cards. By far the most common protocol used at the physical layer is Ethernet. For example, an Ethernet network (such as 10BaseT or 100BaseTX) specifies the type of cables that can be used, the optimal topology (star vs. bus, etc.), the maximum length of cables, etc.
KEY POINT: transmits bits over a medium establishing mechanical and electrical specifications.
LAYER-2 DATA LINK LAYER
When obtaining data from the Physical layer, the Data Link layer checks for physical transmission errors and packages bits into data "frames". The data link layer provides error-free transfer of data frames from one node to another over the physical layer, allowing layers above it to assume virtually error-free transmission over the link.
The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.
Networking Device – Bridge, Ethernet Switches and multi layer switches, proxy server, gateway
Protocol Data Unit - Frame
Some Protocols – Ethernet, Point to Point Protocol (PPP)
KEY POINT: organizes bits into frames providing node-to-node delivery.
LAYER-3 NETWORK LAYER
The network layer controls the operation of deciding which physical path the data should take based on network conditions, priority of service, and other factors. When data arrives at the Network layer, the source and destination addresses contained inside each frame are examined to determine if the data has reached its final destination. If the data has reached the final destination, then network layer formats the data into packets delivered up to the Transport layer. Otherwise, the Network layer updates the destination address and pushes the frame back down to the lower layers.
Networking Device – Router, multi layer switches, gateway, proxy server
Protocol Data Unit - Packets
Some Protocols – Address Resolution Protocol (ARP), IPv4/IPv6, Internet Protocol, Routing Information Protocol (RIP), IPX.
KEY POINT: moves packets from source to destination providing inter networking capabilities
LAYER-4 TRANSPORT LAYER
The Transport Layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It relieves the higher layer protocols from any concern with the transfer of data between them and their peers. The transport layer controls the reliability of communications through flow control, segmentation, and error control. Two great examples of transport protocols are TCP (as in TCP/IP) and UDP.
Networking Device – proxy server, gateway
Protocol Data Unit – Segments for TCP, Datagram for UDP
Some Protocols – SPX, TCP
TCP, paired with IP, is by far the most popular protocol at the transport level. If the IPX protocol is used at the network layer, then it is paired with SPX at the transport layer.
KEY POINT: provides reliable process-to-process message delivery and error recovery
LAYER-5 SESSION LAYER
The session layer sets up, coordinates and terminates conversations. Services include authentication and re-connection after an interruption. It allows session establishment between processes running on different stations.
Networking Device – gateway, Logical Ports
Protocol Data Unit – Data/Session
Some Protocols – AppleTalk Data Stream Protocol, Remote Procedure Call Protocol (RPC)
KEY POINT: establishes, manages, and terminates communicative sessions
LAYER-6 PRESENTATION LAYER
As the sixth layer of the OSI model, the presentation layer is primarily responsible for managing two networking characteristics: protocol and architecture.Whereas, protocol defines a standard set of guidelines under which the network operates, the network's architecture determines what protocol applies. Encryption is typically done at this level too.
Networking Device – gateway
Protocol Data Unit – Data/ Encoded User Data
Some Protocols – Musical instrument digital interface (MIDI), Moving picture experts group (MPEG)
KEY POINT : translates, encrypts, and compresses data
LAYER-7 APPLICATION LAYER
The application layer serves as the window for users and application processes to access network services. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level.
Networking Device – gateway
Protocol Data Unit – Data
Some Protocols – DNS, FTP, SMTP, POP3, IMAP, Telnet, HTTP
KEY POINT : provides access to available network resources
1 Describe briefly the types of models used for communication model and different (20) communication task.
Question:1 List 3 different telemedicine communication modes, briefly explain. (Hint:Telemedicine communication modes are different from telemedicine transmission modes) Describe the most suitable healthcare setting for each communication mode (Hint: What healthcare function/action can be better achieved with each communication mode). Provide examples. Which of these communication modes most suitable for consultations with out of state physicians? Explain. Question: 2 List 3 Evidence Based Medicine Literature limitations, briefly describe each one of them.
Briefly describe five different types of Security audits
Regarding HTML and CSS answer the following... 1: Describe the different types of positioning used in CSS. 2: What is the difference between section and article elements in HTML5 3: What are the various types of semantic elements in HTML5. Please describe them briefly 4: What is the difference in a and b a. #myId, .myClass p, #myidTwo p:first-child a { color;blue; } b.#myId { color:blue; } .myClass p { color:blue; } #myidTwo p:first-child a { color:blue; }
Name at least 4 statistical models used in the reliability analysis and briefly describe them.
1. Draw a memory hierarchy diagram. 2. Briefly describe the different types of memory in the memory hierarchy in terms of performance, access time and cost. 3. Describe the followings regarding cache: a. Block placement b. Block identification c. Block replacement d. Write strategy
Briefly describe the four different types of strategies sales managers must develop and implement.
1. Describe three different types of media that can be used in a microbiology lab. Describe how or why each would be used. 2. What ingredients are typically found in microbiology media?
Briefly compare and contrast the different types of hepatitis. Choose one form and describe the cause, clinical manifestations, prevention and treatment.
Briefly compare and contrast the different types of hepatitis. Choose one form and describe the cause, clinical manifestations, prevention and treatment.
describe briefly about EFQM EXCELLENCE Model in detail ? how it is different with Balance scorecard?