Vous êtes sur la page 1sur 2

The Five Layer Network Model Layers in Ascending Order.

Physical Layer

The Physical Layer is the first layer in the Five-Layer Network Model. It is composed of all the physical
devices needed for the networking process such as cables which are required in order to send and
recieve signals.

Data Link Layer

The Data Link Layer is the second layer in the Five-Layer Network Model. It is were the signals sent by
the Physical Layer are interpruted according to various protocals with the most common protocal being
Ethernet. This layer essentialy sets the ground rules for how these signals can be interpruted in order for
all networking devices to have a common ground when understanding these signals and communicating
with each other.

Network Layer

The Network Layer expands the connectivity of this model from the single link connection the Data Link
Layer provides, into connecting with separate networks. The communication between these separate
networks is achieved by using physical devices called routers.

Transport Layer

The Transport Layer takes the data that it has received and decides which data gets sent to which
programs. These programs consist of two types known as client programs and server programs.

The Application Layer

The Application Layer is the final layer in the Five Layer Network Model. This layer contains a large
amount of different protocols which are specific to an application.

MAC address

A Media Access Control address or MAC address is a 48 bit number represented by six groupings of two
hexadecimal numbers. It is a globally unique identifier attached to an individual network interface.

IP Address

(copped from webbook) IP addresses are 32-bit long numbers made up of 4 octets, and each octet is
normally described in decimal numbers. IP addresses are distributed in large sections to various
organizations and companies, instead of being determined by hardware vendors.

TCP Port
In TCP/IP and UDP networks, a port is an endpoint to a logical connection and the way a client program
specifies a specific server program on a computer in a network. The port number identifies what type of
port it is. For example, port 80 is used for HTTP traffic

Routing Table

In computer networking a routing table, or routing information base, is a data table stored in a router or
a networked computer that lists the routes to particular network destinations, and in some cases,
metrics associated with those routes. Wikipedia

Checksum Check

The next field is a 16-bit checksum. It operates just like the checksum fields at the IP and Ethernet level.
Once all of this segment has been ingested by a recipient, the checksum is calculated across the entire
segment and is compared with the checksum in the header to make sure that there was no data lost or
corrupted along the way. A checksum is a small-sized datum derived from a block of digital data for the
purpose of detecting errors which may have been introduced during its transmission or storage. It is
usually applied to an installation file after it is received from the download server. Wikipedia

TTL

The Time to Live or TTL field is an 8-bit field that indicates how many router hops a datagram can
traverse before it's thrown away. Every time a datagram reaches a new router, that router decrements
the TTL field by one. Once this value reaches zero, a router knows it doesn't have to forward the
datagram any further. The main purpose of this field is to make sure that when there's a
misconfiguration in routing that causes an endless loop, datagrams don't spend all eternity trying to
reach their destination.

Vous aimerez peut-être aussi