Completely describe the steps based on OSI Model, what
happens when you enter the address http://google.com in
browser??
Summarize the complete steps based on layered OSI approach.

Answers were Sorted based on User's Feedback



Completely describe the steps based on OSI Model, what happens when you enter the address http://go..

Answer / abhishek

The answer is correct but the procedure is wrong. .
Never ever start from layer 1. . .
Always start from Layer 7 i.e Application Layer to Physical Layer. .
coz its not explain the layers. . its summarize teh steps based on OSI approach. . .

Is This Answer Correct ?    42 Yes 1 No

Completely describe the steps based on OSI Model, what happens when you enter the address http://go..

Answer / jitendra

Physical, Layer 1 : This layer conveys the bit stream -
electrical impulse, light or radio signal -- through the
network at the electrical and mechanical level. It provides
the hardware means of sending and receiving data on a
carrier, including defining cables, cards and physical
aspects. Fast Ethernet, RS232, and ATM are protocols with
physical layer components.


Data Link, Layer 2 : At this layer, data packets are
encoded and decoded into bits. It furnishes transmission
protocol knowledge and management and handles errors in the
physical layer, flow control and frame synchronization. The
data link layer is divided into two sublayers: The Media
Access Control (MAC) layer and the Logical Link Control
(LLC) layer. The MAC sublayer controls how a computer on
the network gains access to the data and permission to
transmit it. The LLC layer controls frame synchronization,
flow control and error checking.

.

Network, Layer 3 : This layer provides switching and
routing technologies, creating logical paths, known as
virtual circuits, for transmitting data from node to node.
Routing and forwarding are functions of this layer, as well
as addressing, internetworking, error handling, congestion
control and packet sequencing.

.

Transport, Layer 4 : This layer provides transparent
transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control.
It ensures complete data transfer.



Session, Layer 5 : This layer establishes, manages and
terminates connections between applications. The session
layer sets up, coordinates, and terminates conversations,
exchanges, and dialogues between the applications at each
end. It deals with session and connection coordination.

Presentation, Layer 6 : This layer provides independence
from differences in data representation (e.g., encryption)
by translating from application to network format, and vice
versa. The presentation layer works to transform data into
the form that the application layer can accept. This layer
formats and encrypts data to be sent across a network,
providing freedom from compatibility problems. It is
sometimes called the syntax layer.


Application, Layer 7 : This layer supports application and
end-user processes. Communication partners are identified,
quality of service is identified, user authentication and
privacy are considered, and any constraints on data syntax
are identified. Everything at this layer is application-
specific. This layer provides application services for file
transfers, e-mail, and other network software services.
Telnet and FTP are applications that exist entirely in the
application level. Tiered application architectures are
part of this layer.

If all of the other layers are working and have been
tested, then this is usually just a matter of applying
patches to software or reinstalling. Everyone probably has
experience troubleshooting problems in windows. Telnet is
an excellent tool for connecting to virtually any port to
check to see if the above layers are functioning properly.

.

Thanks

Is This Answer Correct ?    20 Yes 12 No

Completely describe the steps based on OSI Model, what happens when you enter the address http://go..

Answer / s.m.feroz ahmed

Hi,

OSI is defined as Open Systems Internetwork.OSI layer is
the backbone of Networking and Networking concept is
dependent on OSI Layer.In OSI layer you will find 7 layers
on source side and 7 layers on destination side.

Source
Destination

Presentation layer Application Layer
data link layer Physical Layer
Network layer Session Layer
Transport layer Tansport Layer
session layer Network Layer
physical layer and Datalink Layer
Application layer . Presentation Layer

one can see these 7 layers on Source and destination.
without these 7 layers one cannot access application
layer.Among all these layers Network layers plays a vital
role as without network layer one cannot access
application .

when we enter http://google.com in browser it is a session
layer where we are calling network layer to connect to
htt://www.google.com and to communicate to external network
one requires a lan card which comes under physical layer
and to open session for the typed URL data is transported
from source to desination and viceversa and so defined
www.google.com is an application layer which is the 7th
layer in OSI architechture.Passing through all these layers
one can able to access application layer and can open
session for accessing www.google.com.

Is This Answer Correct ?    7 Yes 17 No

Post New Answer

More CCNA Interview Questions

On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this channel? A.) 64 Kbps B.) 1.544 Mbps C.) 128 Kbps D.) 2.048 Mbps E.) 16 Kbps

4 Answers  


What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message

1 Answers  


Given the command 'cl?', what will it display? A.) Syntax of the 'clock' command B.) Syntax of the 'clear' command C.) All commands that begin with 'cl' D.) All commands that begin with 'c'

3 Answers  


What is the distance limitation for 100BaseT? A. 305.955 ft B. 7283.46 inches C. 184 Meters D. 185 Kilometers

3 Answers  


Can anyone explain the load balancing of PVST+????

1 Answers  






Given the IPX address 4a.0002.1111.a999, what is the network ID and what is the node ID? A.) net 4a host 0002.1111.a999 B.) net a999 node 0002.1111 C.) net 0002.1111.a999 node 4a D.) net 0002.1111 node a999

2 Answers  


Which of the following will show an extended access list 150? A.) sh access-list B.) sh ip int C.) sh ip access-list 150 D.) sh access-list 150 extended

1 Answers  


What do you mean by Port Mirroring?

0 Answers  


Identify the purpose of the Ping command? A.) Share routing information with a neighbor router B.) Transmit user data when buffers are full C.) Test connectivity at layer 3 D.) Test entire protocol stack

1 Answers  


Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery

1 Answers  


In which two modes can the ICMP ping command be used? (Choose two) A. user B. privileged C. global configuration D. interface configuration

1 Answers  


The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC

2 Answers  


Categories