Majid Z Hacker - Free Crack Softwares
Advertisement
  • Home
  • Articles
    • Tech Articles
    • Tech Guides
  • Android
    • APK
    • Games APK
    • Moded Apk
  • Cracked Softwares
    • Marketing Softwares
    • PC Cracked Softwares
    • Premium Softwares
    • Remote Administration Tools
    • Vpns
  • SEO
    • SEO Tools
  • PC Softwares
    • Windows Softwares
  • Tech Courses
No Result
View All Result
  • Home
  • Articles
    • Tech Articles
    • Tech Guides
  • Android
    • APK
    • Games APK
    • Moded Apk
  • Cracked Softwares
    • Marketing Softwares
    • PC Cracked Softwares
    • Premium Softwares
    • Remote Administration Tools
    • Vpns
  • SEO
    • SEO Tools
  • PC Softwares
    • Windows Softwares
  • Tech Courses
No Result
View All Result
Majid Z Hacker - Free Crack Softwares
No Result
View All Result
  • Home
  • Articles
  • Android
  • Cracked Softwares
  • SEO
  • PC Softwares
  • Tech Courses
Home Articles

OSI Model Explained Fully With Complete Details

Majid Z Hacker by Majid Z Hacker
in Articles, Tech Articles
0
0
SHARES
8
VIEWS
Share on FacebookShare on TwitterShare on WhatsappShare on Telegram

OSI Model Explained Fully With Complete Details

OSI Model Explained Fully With Complete Details

What is the OSI model? the model is a hypothetical heap of seven layers that can be utilized as a kind of perspective to help see how systems work the model was acquainted with institutionalize arranges in a way that allowed multi vender structures going before this. You may in all probability have a one dealer mastermind in light of the way that the devices from one seller couldn’t speak with others. It’s important now that we don’t really utilize the OSI model we use something many refer to as the tcp/ip model the ideas are actually the equivalent the layers are marginally extraordinary so in the event that we don’t utilize the OSI model for what reason would we try learning it well that is on the grounds that despite everything it referenced a ton when investigating or portraying system tasks how about we investigate the layers beginning from the base.

OSI MODEL LAYERS TYPE :

Up layer one is the physical layer. The physical layer is the least layer of the OSI model it’s key obligation is to convey the information crosswise over physical Hardware, for example, Ethernet links layer two is the information connection layer at this layer the physical delivers are added to the information this is the source and goal MAC tends to switches are situated at this layer the system layer handles IP tending to and directing at this phase of the OSI model the source and goal IP address are included reuters work this layer in this manner the vehicle. The vehicle layer of the OSI model includes the vehicle conventions, for example, TCP and UDP TCP for instance is utilized for blunder dealing with and sequencing to guarantee no information is lost this layer additionally includes the source and goal port numbers layer 5 session this layer is in charge of setting up and ending associations between gadgets layer 6 introduction. This layer designs the information in a manner the accepting application can comprehend it this layer is additionally ready to encode and decode information if necessary layer 7 application this layer is the place the application and client imparts application explicit conventions are utilized here, for example, SMTP in case you’re sending an email for instance a great method to recall these layers is just all individuals appear to require information preparing a PS T and DP so to completely see how this model functions you have to see a certifiable model. Suppose you send an email the information goes through the OSI model including and handling information each layer and this procedure is called exemplification. Stage one the application layer our heap makes the information the email you composed the email addresses and so on and so on and prepares to send it utilizing SMTP which is the Simple Mail Transfer Protocol stage 2 introduction there the information is organized in a manner the getting gadget will comprehend in this model most likely a SC III this layer could likewise scramble the information if necessary step3 session layer a session with accepting mail server is begun venture for vehicle. This is the place it chooses to utilize TCP or UDP for this situation. We’ll utilize TCP to ensure each parcel gets conveyed likewise the source and goal port is added to the information stage 5 Network the IP address of the mail server is included as the goal and the source IP address is additionally included through the information stage 6 information connection the MAC address of the switch and the source MAC address of the host is added to the information stage 7 physical the information is conveyed on the system utilizing Ethernet so when the information arrives at the opposite side the accepting gadget will process the information similarly however in Reverse beginning from the base up alright so’s the OSI model yet how might we utilize this to investigate you may have heard the term or that is a layer 2 issue or seems like a layer 3 issue when you hear that that is individuals alluding to this model suppose there’s an issue with the system on the off chance that.

Also Read : Marketing Mix Stimuli

We experience this model checking each layer we can before long analyze the issue for instance layer 1 or the links connected is the system card working would it be able to be a defective link layer 2 perhaps the switch has turned sour layer 3 is the course to working do I have the correct IP address and the procedure continues forever from that point.

ShareTweetSendShare
Previous Post

What Is The Difference Between Viruses And Malware ? Explained Complete In Details

Next Post

Types Of Computer Networks (PAN, LAN, MAN & WAN) Explain All In Details

Majid Z Hacker

Majid Z Hacker

Related Posts

Articles

Why Dedicated Software Development In Ukraine Is Booming [ 2025 ]

by Majid Z Hacker
14 January 2025
Articles

Tips How To Find PST Files In Microsoft Outlook 2007 And 2010 [ 2025 ]

by Majid Z Hacker
17 January 2025
Articles

Data-Driven Agriculture: 5 Useful APIs In Farming [ 2025 ]

by Majid Z Hacker
14 January 2025
Articles

Zlibrary – A New And Virus-Free Online Library Website [ 2025 ]

by Majid Z Hacker
15 January 2025
Next Post

Types Of Computer Networks (PAN, LAN, MAN & WAN) Explain All In Details

Telegram Channel

Advertise With Us

advertise with us

Popular Posts

  • fl studio

    FL Studio 24.0 Crack Download [ 2025 ] Full Activated

    0 shares
    Share 0 Tweet 0
  • Adobe Acrobat Pro DC 24.4.1.2 Crack Download [ 2025 ] Activated

    0 shares
    Share 0 Tweet 0
  • WonderDraft 1.1.9 Crack Download [ 2025 ] Fantasy Maps Creator

    0 shares
    Share 0 Tweet 0
  • Wondershare Filmora 14.13.12 Crack Download [ 2025 ] Activated

    0 shares
    Share 0 Tweet 0
  • AnyUnlock 2.1.0 Crack [ 2025 ] Download – iPhone Password Unlocker

    0 shares
    Share 0 Tweet 0
Majid Z Hacker - Free Crack Softwares

We provide here windows and pc softwares, tech tips and tricks, digital marketing, seo and blogging, crypto and tech related articles for free.

  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms And Conditions
  • Advertise With Us
  • Write For Us
No Result
View All Result
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms And Conditions
  • Advertise With Us
  • Write For Us

© 2024 Majid Z Hacker - Website Created By Admin.