How data flow from source to destination, Explain each step
from layer to layer?
Answers were Sorted based on User's Feedback
Answer / nagaraju r
This is how data flow from Source to destination
Let us assume we are trying to send one attachment mail. we
login web email client using web browser where application
layer comes into picture. at the moment when we attach one
doc file of 512 kb presentation layer comes into picture
where presentation layer compress doc format to 300 kb and
hand over to transport layer where transport layer divides
300 kb of data in to segments and add sequence number to
each segments (this will help destination transport layer
to arrange in proper order) then Network layer ensapsulates
it in to IP packets/Datagram and route ip packets to
destination address, once destination router receives ip
packet it will decapsulates ip packet in to frame and
handover frame to data link layer where data link layer
carry the frames in to bits hand over to physical layer.
Physcial layer to Application layer.....this process
continues.....until communication ends.
| Is This Answer Correct ? | 17 Yes | 3 No |
Answer / sukhjinder singh
bulshit answer
please post the answer as a technical expert
| Is This Answer Correct ? | 7 Yes | 2 No |
Answer / guest
data flowo into 7 different layers i.e Application layer
Presentaion layer,session layer ,transport layer ,network
layer ,datalink layer ,Physical layer.
| Is This Answer Correct ? | 11 Yes | 7 No |
Answer / syed mahboob feroz ahmed
Hi,
The concept of Transferring data from sourse to Destination
is known as OSI Model.There are 7 layers on the Source Side
and 7 Layers on the Destination Side and these layers are
defined as below :
1)Presentation Layer
2)DataLink Layer
3)Network Layer
4)Transport Layer
5)Session Layer
6)Physical Layer
7)Application Layer
Presentation Layer helps in Converting data from machine
Language to User Level Language.
DataLink Layer links Data from Source to Destination .
Among all these layers Network Layer Plays a Vital Role in
Transmitting data from Sourse to Destination without
Network Layer no transmission of data is possible.
Transport Layer helps in transmitting data from Source to
Destination.
Session Layer creates Session.
Physical Layer Consists of both input and output devices on
a system (ex.LanCard,Modem,Ram Etc)
Application Layer : Application Layer is saved in the form
of file extension .
With the help of these 7 layers on
source side and Destination side data flow is possible and
this concept is known as OSI Model.
| Is This Answer Correct ? | 7 Yes | 10 No |
Answer / raj kumar
bit to packet and packet make mack addrees , sources
address and sestination address and checkpoint
| Is This Answer Correct ? | 4 Yes | 8 No |
What are the important topologies for networks?
What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP or IP?
Define Wireless Networks
Is the nyquist theorem true for optical fibre or only for copper wire ? Explain.
Subnet the class C network address 198.67.25.0 into eight subnets. Why are the ‘all ones’ and ‘all zeroes’ subnets not used ?
What is tdm?
1. What is the difference between layer 2 and layer 3 in the OSI model? 2. What is the difference between a hub, switch, and router? 3. What is a VLAN? 4. What is the difference between TCP and UDP? 5. How do you distinguish a DNS problem from a network problem? 6. What is a runt, Giant, and collision? 7. What is a broadcast storm? 8. What is the purpose of VRRP? 9. What is a VPN? 10. What information about a peer would I need to establish a VPN? 11. What is a full-class C in CIDR notation? 12. What is a default route? 13. What is a metric? 14. What is a MAC address? 15. What is ARP/RARP? 16. Describe a TCP connection sequence 17. What is MTU? 18. What other TCP setting can you modify besides MTU to shorten packets?
2 Answers 247Customer, Bharat BPO, Verinon Technology Solutions,
What are the advantages of cell switching that is used in ATM?
If A sends a message to B with encryption then key is a)A public key b)B public key c)A private key d)B private key
Difference between Network and Networking ?
how many types of backups are there & explain them in theory mode & practical mode?
What is redirector