How data flow from source to destination please Explain each
step from layer to layer?
Answers were Sorted based on User's Feedback
Answer / arunanshu tripathy
App. Layer- Someone wants to access CISCO.com the PC
(10.1.1.5) 1st sends a request to the DNS Server which
transforms the cisco.com to an IP address 200.1.1.1. Now the
PC knows that it needs to go to which IP address.
Presentation Layer- The PC then requests the page to be
displayed in HTTP format. This request is packaged into a
GENERIC Format, HTTP.
Session Layer- The Session Layer which understands that
there is a specific request for cisco.com. So, it separates
it and creates its own session so that it does not get
confused with all the other data coming in for other
requests. This ensures delivery to the correct source.
The Transport Layer- It does 2 things
- Chooses b/w reliable(TCP) and unreliable(UDP).
- Configures the Port No. for HTTP i.e. 80 for the
Destination Server to understand. Source Port is assigned a
Dynamic Source Port Number by the PC
HTTP uses TCP.
Network Layer- Adds the IP address at the Source & Dest. IP
addresses.
At Data Link Layer- Adds the H/W address i.e.the Sourc &
Dest. MAC addresses.
At Phy. Layer- the Ethernet Frames used for transportation.
The same reverse thing happens when it reaches the source
bottoms up.
| Is This Answer Correct ? | 26 Yes | 0 No |
Answer / ramya
data flows in the form of packets from source to destination. packets consists of addresses.
| Is This Answer Correct ? | 14 Yes | 5 No |
Answer / sandeep kumar
1-data send in raw bit form to physical layer.
2-now it comes into frames including,senders mac address at
the data link layer.
3-then it comes into a packet send through the network
layer device through network layer.
4-at this layer the transaction is imposed on the packet at
transport layer.
5-there is a session attached to the packet during the
transmission at the session layer with security and
handshaking.
6-at the presentation layer the packet reached at the
reciever end.
7-the data will be show on in the form of, including
text,images,and some graphics through the http, at
application layer.
| Is This Answer Correct ? | 2 Yes | 0 No |
What is wide-mouth frog?
Explain leaky bucket algorithm and compare it with token bucket algorithm.
Many business computers have three distinct and world wide unique identifiers. What are they?
what is flsm
According to you which is the most important OSI layer?
what is disk interleaving? why is disk interleaving adopted?
The Data Link Layer encapsulates the network-layer information in a PDU called __________.
Discuss the different factors affecting congestion control algorithms. ?
Explain distance vector routing . What are its limitations and how are they overcome?
Differentiate between Baseband co-axial cable and broad band coaxial cable
What was the reason for selecting a speed of 155.52 Mbps in the original ATM standard ?
What is the difference between boundary level masking and non- boundary level masking? Give examples