In networking ,the most commonly used model is 5-layer model besides OSI model and 4 -layer model with some changes made to 5-layer model. Show
5-Layers:
This layer comprises of the Cat-6 cables(category 6,other variations are Cat-5 and Cat-5e) used to send or receive the encapsulated Ethernet frame that comprises of IP datagram and TCP segment and the Network ports to which the cables are connected to determine the connections between devices through LED’s(Link LED and Activity LED). This layer is like a carrying path.
This is the layer where connection between nodes(devices) in a network is ensured through switches(similar to hubs(physical layer component,but prone to collision domain)but more reliable than them in aspect of collision domain as it uses Ethernet Protocol to efficiently send data packets i.e Ethernet frames in this layer).Ethernet protocol makes sure the node’s identity (i.e MAC address-Hardware address)to send the data packets. The correct node in a network intended as the destination is found by a protocol called ARP(Address Resolution Protocol) — sending broadcasting messages to all the nodes in the network and the MAC address present in the ARP response from the respected nodes is saved in the ARP cache(which gets restores often to ensure the changes made to the network) as IP-MAC pairs and the nodes lookup its respected ARP cache for future connections. Here CSMA/CD(Carrier Sense Multiple Access with Collision Domain), a part of Ethernet protocol makes the information(yes or no) about data transferring in the network available to all the nodes so that no other nodes commits to transfer when a node is transferring which prevents cross-talk/data miss-up is used.
This layer uses IP(Internet Protocol) predominantly to find the correct network where the destination node is present through Routers which connects . Networks are split up into subnets by subnetting process and are represented using CIDR ID(Class-less Inter-Domain Routing) to represent the networks.Routers use routing tables to find the destination network and send the data-grams to the appropriate routers that has shorter distance to the destination IP. It also uses couple of protocols out of which Link-Vector Protocol is commonly used nowadays which sends the routing information to all the routers in the ASN(Autonomous System of Networks) to update the shortest distance to all the routers. Time-To-Live(TTL) — It is a number that is used to prevent the data to be passed infinitely which is in case of the destination IP is not found. It is decremented every time a router hops the data-gram to another one so that when TTL becomes zero ,the data is thrown out. It is 64 in general practice.
Routing Table — This table is present in the routers to determine the destination network and the interface that has less passes. It primarily consists of 4 columns,
This layer uses TCP(Transfer Control Protocol)/UDP(User Datagram Protocol). TCP makes connection to server through system ports and to clients through ephemeral ports . Multiplexing and De-multiplexing processes are made through these ports. Then it uses acknowledgements to make sure the connection is in proper state every time,a communication is made between the nodes(devices) which leads to extra traffic but necessary for important data transfers like phone calls. If the connection between devices is achieved on both the sides, Full-Duplex is achieved or vice versa called Simplex is achieved. But UDP does not makes any acknowledgements and it is suitable for faster transfer with a danger of data loss which does not matter a lot in case of video streaming,radio listening,etc. Acknowledgments are made through activity flags present in the segment fields. The Three-way handshake is used for initiating a connection and Four-way handshake is used to terminate a connection.
This layer uses various protocols depending on the applications.For example, HTTP(Hyper Text Transfer Protocol) is used by the web-servers and the web-pages.In case of OSI model, this layer is split into Session layer , Presentation Layer and Application Layer.
I have made a positive attempt in explaining the contents of a basis network model. This is how a data is transferred to us in a moment.These processes happen in milliseconds in order to keep us intact with the applications like I kept you all through this story😉. If you want to experience it and clear the doubts in the above contents, just copy and paste this address 172.217.31.255 into your web-browser(Chrome,Safari,Firefox or Internet Explorer).Give it a try folks! See you all again after some time! Don’t forget to drop your comments below! Byeeeee!Happy Learning! What are 5 layers of network model?The TCP/IP model is based on a five-layer model for networking. From bottom (the link) to top (the user application), these are the physical, data link, net- work, transport, and application layers.
Which of the following are examples of layer of our five layer network model check all that apply?5-Layers:. Physical Layer.. Data-Link Layer.. Network Layer.. Transport Layer.. Application Layer.. What is the fifth layer of the Transmission Control Protocol Internet Protocol TCP IP model?The fifth layer of the TCP/IP model is the application layer. The application layer focuses on application specific protocols.
Which of the following is an example of network layer protocol?3. Network layer: Handles the routing and sending of data between different networks. The most important protocols at this layer are IP and ICMP.
|