How data flow from source to destination please Explain each
step from layer to layer?
Answers were Sorted based on User's Feedback
Answer / arunanshu tripathy
App. Layer- Someone wants to access CISCO.com the PC
(10.1.1.5) 1st sends a request to the DNS Server which
transforms the cisco.com to an IP address 200.1.1.1. Now the
PC knows that it needs to go to which IP address.
Presentation Layer- The PC then requests the page to be
displayed in HTTP format. This request is packaged into a
GENERIC Format, HTTP.
Session Layer- The Session Layer which understands that
there is a specific request for cisco.com. So, it separates
it and creates its own session so that it does not get
confused with all the other data coming in for other
requests. This ensures delivery to the correct source.
The Transport Layer- It does 2 things
- Chooses b/w reliable(TCP) and unreliable(UDP).
- Configures the Port No. for HTTP i.e. 80 for the
Destination Server to understand. Source Port is assigned a
Dynamic Source Port Number by the PC
HTTP uses TCP.
Network Layer- Adds the IP address at the Source & Dest. IP
addresses.
At Data Link Layer- Adds the H/W address i.e.the Sourc &
Dest. MAC addresses.
At Phy. Layer- the Ethernet Frames used for transportation.
The same reverse thing happens when it reaches the source
bottoms up.
Is This Answer Correct ? | 26 Yes | 0 No |
Answer / ramya
data flows in the form of packets from source to destination. packets consists of addresses.
Is This Answer Correct ? | 14 Yes | 5 No |
Answer / sandeep kumar
1-data send in raw bit form to physical layer.
2-now it comes into frames including,senders mac address at
the data link layer.
3-then it comes into a packet send through the network
layer device through network layer.
4-at this layer the transaction is imposed on the packet at
transport layer.
5-there is a session attached to the packet during the
transmission at the session layer with security and
handshaking.
6-at the presentation layer the packet reached at the
reciever end.
7-the data will be show on in the form of, including
text,images,and some graphics through the http, at
application layer.
Is This Answer Correct ? | 2 Yes | 0 No |
Which layer is used to detect and correct errors
Explain leaky bucket algorithm and compare it with token bucket algorithm.
what are the basic networking questions?
NFS server + Solaris client + Linux client, all connected at GigE to the same switch. The Linux client is fast but the Solaris client is slow. Explain troubleshooting steps
Which one is not done by Data link layer ? 1. bit stuffing 2. LRC 3. CRC 4. parity check
What is TCP/IP ?
What are the two reasons for using layered protocols?
Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.
give an example of bus type network.
How kernal work in operating system?
1. What is the difference between layer 2 and layer 3 in the OSI model? 2. What is the difference between a hub, switch, and router? 3. What is a VLAN? 4. What is the difference between TCP and UDP? 5. How do you distinguish a DNS problem from a network problem? 6. What is a runt, Giant, and collision? 7. What is a broadcast storm? 8. What is the purpose of VRRP? 9. What is a VPN? 10. What information about a peer would I need to establish a VPN? 11. What is a full-class C in CIDR notation? 12. What is a default route? 13. What is a metric? 14. What is a MAC address? 15. What is ARP/RARP? 16. Describe a TCP connection sequence 17. What is MTU? 18. What other TCP setting can you modify besides MTU to shorten packets?
2 Answers 247Customer, Bharat BPO, Verinon Technology Solutions,
Does Ethernet 10Gbps support multiple access