Completely describe the steps based on OSI Model, what
happens when you enter the address http://google.com in
browser??
Summarize the complete steps based on layered OSI approach.
Answer Posted / s.m.feroz ahmed
Hi,
OSI is defined as Open Systems Internetwork.OSI layer is
the backbone of Networking and Networking concept is
dependent on OSI Layer.In OSI layer you will find 7 layers
on source side and 7 layers on destination side.
Source
Destination
Presentation layer Application Layer
data link layer Physical Layer
Network layer Session Layer
Transport layer Tansport Layer
session layer Network Layer
physical layer and Datalink Layer
Application layer . Presentation Layer
one can see these 7 layers on Source and destination.
without these 7 layers one cannot access application
layer.Among all these layers Network layers plays a vital
role as without network layer one cannot access
application .
when we enter http://google.com in browser it is a session
layer where we are calling network layer to connect to
htt://www.google.com and to communicate to external network
one requires a lan card which comes under physical layer
and to open session for the typed URL data is transported
from source to desination and viceversa and so defined
www.google.com is an application layer which is the 7th
layer in OSI architechture.Passing through all these layers
one can able to access application layer and can open
session for accessing www.google.com.
Is This Answer Correct ? | 7 Yes | 17 No |
Post New Answer View All Answers
What is protocol data unit in ccna?
How are straight and crossable cables different from each other?
In port based access-list which command you give instead of ip?
Which layer called error detection layer?
What is the simplest way to remotely configure a router?
How is private ip different from public ip?
What is the purpose of data link layer?
Explain the difference between tracert and traceroute?
Which protocol you manually enable route summarization?
Explain how many ways to access router?
In port based access-list which command u give instead of ip?
How are internetworks created?
Explain what is route poisoning?
How do we do encryption and authentication in L2TP?
Explain the types of resource sharing?