当前位置:网站首页>OSI seven layer model
OSI seven layer model
2022-07-05 15:24:00 【Nineteen (drag on and on)】
OSI Seven layer model
List of articles
Preface : Model

OSI Seven layer model :
- application layer
- The presentation layer
- The session layer
- Transport layer
- The network layer
- Data link layer
- The physical layer
TCP Five layer model :
- application layer
- Transport layer
- The network layer
- Data link layer
- The physical layer
1: The physical layer

The physical layer defines the relationship between the device and the transmission medium . Such as copper cable 、 optical cable 、 voltage 、 Cable specification 、 A hub 、 Repeater 、 Network adapter, etc .
Main functions of physical layer : Establish connection or disconnection with the communication medium ; flow control ; Signal modulation or conversion between different equipment .
2: Data link layer

Data link layer : Main detection and correction The physical layer Possible errors .
3: The network layer

The network layer : Transmit variable length data sequences from source hosts on one network to target hosts on different networks , At the same time, ensure the request quality of the transport layer .
4: Transport layer

Transport layer : Provide services for communication between two host processes . Applications use this service to transport application layer messages .
5: The session layer

The session layer : Control the dialog connection between computers , establish 、 Manage and terminate connections between local and remote applications .
6: The presentation layer

The presentation layer : Enable communication applications to interpret the meaning of exchanged data . The service provided is data compression 、 Data encryption and data description .
7: application layer

application layer : Defines the interaction rules between application processes , Provide services for different network applications through different application layer protocols . Such as HTTP agreement ,SMTP agreement .
边栏推荐
- 如何将 DevSecOps 引入企业?
- Ctfshow web entry information collection
- Bugku's steganography
- Where is the operation of convertible bond renewal? Is it safer and more reliable to open an account
- Machine learning notes - gray wolf optimization
- [12 classic written questions of array and advanced pointer] these questions meet all your illusions about array and pointer, come on!
- Surpass palm! Peking University Master proposed diverse to comprehensively refresh the NLP reasoning ranking
- Redis distributed lock principle and its implementation with PHP (2)
- Bugku's Eval
- Redis distributed lock principle and its implementation with PHP (1)
猜你喜欢

Misc Basic test method and knowledge points of CTF

Crud de MySQL

Photoshop plug-in action related concepts actionlist actiondescriptor actionlist action execution load call delete PS plug-in development

Fr exercise topic --- comprehensive question

B站做短视频,学抖音死,学YouTube生?

How can I quickly check whether there is an error after FreeSurfer runs Recon all—— Core command tail redirection

把 ”中台“ 的思想迁移到代码中去

美团优选管理层变动:老将刘薇调岗,前阿里高管加盟

Bugku's Eval

Crud of MySQL
随机推荐
Mysql---- function
"Sequelae" of the withdrawal of community group purchase from the city
Your childhood happiness was contracted by it
Anti shake and throttling
Creation and use of thymeleaf template
Reconnaissance des caractères easycr
The elimination strategy of redis
Redis' transaction mechanism
CSRF, XSS science popularization and defense
JS knowledge points-01
可转债打新在哪里操作开户是更安全可靠的呢
Cartoon: what are the attributes of a good programmer?
MySQL表字段调整
Photoshop plug-in - action related concepts - actions in non loaded execution action files - PS plug-in development
sql server学习笔记
Calculate weight and comprehensive score by R entropy weight method
lv_font_conv离线转换
mapper. Comments in XML files
美团优选管理层变动:老将刘薇调岗,前阿里高管加盟
亿咖通科技通过ISO27001与ISO21434安全管理体系认证