Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How data flow from source to destination please Explain each
step from layer to layer?

Answer Posted / arunanshu tripathy

App. Layer- Someone wants to access CISCO.com the PC
(10.1.1.5) 1st sends a request to the DNS Server which
transforms the cisco.com to an IP address 200.1.1.1. Now the
PC knows that it needs to go to which IP address.
Presentation Layer- The PC then requests the page to be
displayed in HTTP format. This request is packaged into a
GENERIC Format, HTTP.
Session Layer- The Session Layer which understands that
there is a specific request for cisco.com. So, it separates
it and creates its own session so that it does not get
confused with all the other data coming in for other
requests. This ensures delivery to the correct source.
The Transport Layer- It does 2 things
- Chooses b/w reliable(TCP) and unreliable(UDP).
- Configures the Port No. for HTTP i.e. 80 for the
Destination Server to understand. Source Port is assigned a
Dynamic Source Port Number by the PC
HTTP uses TCP.
Network Layer- Adds the IP address at the Source & Dest. IP
addresses.
At Data Link Layer- Adds the H/W address i.e.the Sourc &
Dest. MAC addresses.
At Phy. Layer- the Ethernet Frames used for transportation.
The same reverse thing happens when it reaches the source
bottoms up.

Is This Answer Correct ?    26 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is lock granularity?

2499


Why is IP called ‘best-effort delivery’ protocol?

3094


1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?

2771


what is buffering and flooding in NIC ?

2526


what is colour port? what is the use with it?

2140


If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.

3027


What is the baud rate of a standard 10 mbps Ethernet LAN ?

4211


Discuss the different factors affecting congestion control algorithms. ?

3483


Draw the IP datagram header format. “IP datagram has a checksum field still it is called an unreliable protocol”. Justify?

2592


Explain Token ring

1615


1. What is LAN segmentation? Why it is used? What are the different techniques to create LAN segments?

2784


What is sliding window protocol ?

1808


Explain network topologies ?

1196


Differentiate between stop-and wait ARQ and Go-back-N protocol.

4327


what is scsi?. what we do if scsi/scsi drive failed?.

2395