The international standard organization (ISO) is a multinational body dedicated to a worldwide agreement on international standards.
An ISO standard that covers all aspects of network communications is the Open Systems Interconnection OSI model layers.
An open system may be a model that permits any two different systems to speak no matter their underlying architecture.
The purpose of the OSI model layers is to open communication between different systems without requiring changes to the logic of the underlying computer hardware and software.
The Open Systems Interconnection (OSI) model began as a reference model, but has since been implemented. It was created by the International Organization for Standardization (ISO) to provide a logical framework for how data communication processes should interact across networks. Standards were created for the computer industry allowing different networks to work together efficiently.ThesisScientist.com
Pwani notes-Network Essentials.pp for Internet ProtocoltxMosesOkumu4
These notes are for Internet Protocol and the OSI model layers
So any student looking for notes for the internet protocol layers , this is among the best
In the earliest era of networking, computers could usually communicate only with computers, which were from the similar manufacturer.
The purpose of OSI model is to show how to facilitate communication between different systems without requiring changes to its underlying Hardware and Software.
The Open Systems Interconnection (OSI) model began as a reference model, but has since been implemented. It was created by the International Organization for Standardization (ISO) to provide a logical framework for how data communication processes should interact across networks. Standards were created for the computer industry allowing different networks to work together efficiently.ThesisScientist.com
Pwani notes-Network Essentials.pp for Internet ProtocoltxMosesOkumu4
These notes are for Internet Protocol and the OSI model layers
So any student looking for notes for the internet protocol layers , this is among the best
In the earliest era of networking, computers could usually communicate only with computers, which were from the similar manufacturer.
The purpose of OSI model is to show how to facilitate communication between different systems without requiring changes to its underlying Hardware and Software.
OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International Organization of Standardization‘, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform.
This note is about the introduction of the OSI Model & TCP/IP Model. It contains details of the seven layers of the OSI Model which are Application layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer
What is modem Types of modem How does the Modem work.pdfsunil shukla
The full form of modem is “modulator/demodulator”. It is a hardware component that allows computers or other devices to be connected to computers or other devices over the Internet.
It converts or “modulates” the analog signal from the phone or cable into a digital signal that can be easily recognized by a computer. Similarly, it converts digital data into analog signals on computers or other devices.
Network Topology In Computer Network 6-Types of topologies.pdfsunil shukla
The term Network Topology in computer network refers to the means a network is set out, either physically or logically.
Two or a lot of network devices are connected with 2 or a lot of links type a topology. The Topology is the geometric illustration of the link of all the links and linking devices usually known as nodes to every difference.
Network topology defines the physical or logical arrangement of links in an exceedingly network.
These are 5 labels describe however the devices in an exceedingly network square measure interconnected instead of their physical arrangement.
More Related Content
Similar to OSI model layers 7 Types of OSI Model Edifyclue.pdf
OSI stands for Open Systems Interconnection. It has been developed by ISO – ‘International Organization of Standardization‘, in the year 1984. It is a 7 layer architecture with each layer having specific functionality to perform.
This note is about the introduction of the OSI Model & TCP/IP Model. It contains details of the seven layers of the OSI Model which are Application layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer
What is modem Types of modem How does the Modem work.pdfsunil shukla
The full form of modem is “modulator/demodulator”. It is a hardware component that allows computers or other devices to be connected to computers or other devices over the Internet.
It converts or “modulates” the analog signal from the phone or cable into a digital signal that can be easily recognized by a computer. Similarly, it converts digital data into analog signals on computers or other devices.
Network Topology In Computer Network 6-Types of topologies.pdfsunil shukla
The term Network Topology in computer network refers to the means a network is set out, either physically or logically.
Two or a lot of network devices are connected with 2 or a lot of links type a topology. The Topology is the geometric illustration of the link of all the links and linking devices usually known as nodes to every difference.
Network topology defines the physical or logical arrangement of links in an exceedingly network.
These are 5 labels describe however the devices in an exceedingly network square measure interconnected instead of their physical arrangement.
Benefits of ICT in 7 different sectors Edifyclue.pdfsunil shukla
ICT is a short form that stands for Information Communication Technology. A good way to think about ICT is all the equipment and methods used by people to handle information.
ICT includes any product that will store, retrieve, manipulate, transmit, or receive information electronically in a digital form. For example, Computers, digital T.V, E-mails, and many more.
Abacus and the printing press are examples of ICT, the term usually refers to modern technology based on electronics.
ICT combines the technology of computing and telecommunications so that a large amount of data can be stored and transmitted.
Televisions, computers, satellites, and telephones are just some of the types of equipment used in ICT.
Types of Routers What is a Router How Routers Work, and Uses of routers.pdfsunil shukla
The Router then receives the Packet data, and forwards the Destination Device after analyzing any hidden information in the Data Packet.
This Networking Device is used to connect different networks Wire or Wirelessly. We also use it at home, which we call Wireless Router. Which you access the Internet.
Unguided Media in Computer Network Advantages and Disadvantages Edifyclue.in.pdfsunil shukla
Unguided Media
Unguided media is also known as wireless communication. It does not require any physical medium to transmit any electromagnetic signals.
Medium media transmits electromagnetic signals through the air to all. These signals are available to anyone who has a device capable of receiving those signals.
Signals go from transmitter to beneficiary by means of a way. this path called the media can be guided media or unguided media.
A guided media is contained within physical boundaries, while an unguided media is boundless.
It is also known as unbounded media and does not have any specific limits. All this allows the user to stay connected at all times.
Because the communication done by it is wireless, the user can connect himself anywhere on the network. It is also classified into three radio waves, microwave, and infrared waves.
Computer Hardware And Software Types, Functions, Difference between Hardware ...sunil shukla
Computer Software
We are already aware that computers need instructions to carry out the tasks, and they cannot perform themselves without any instructions.
When instructions are given to computers in a manner that computers can understand them and execute those instructions accordingly.
Such instructions to carry out certain tasks or tasks that are predesigned when made available in a computer-readable format are called programs. Such programs are called computer software.
This software can be stored in secondary storage devices such as (hard disks, cd-rom, etc) and make use of them as and when required.
Software is a set of programs that can be stored on a medium that is used to get the job done.
It plays an important and crucial role in all computer systems by creating a connection or bridge between the user and computer hardware.
The software needs to be checked before being used. There are some terms that are used for the process of accessing software including starting, executing, running, opening, and others.
Computer Hardware
Let’s understand this in easy language, Hardware is the physical and touchable parts of a computer means you can touch those components.
Internal hardware parts of a computer are known as components and external hardware parts of a computer are called peripherals both of them are known as computer hardware.
In both PCs or desktop computers, the components of hardware are the same but there is a big difference in the size of the hardware.
Computers can only operate or start when both software and hardware are present and work together in the system, there is no chance to start a computer only with software or hardware.
You can enter the operating system by using operating software where hardware helps the operating software to perform fast and easily.
What is Keyboard Different Types of Keyboards Advantages, and Disadvantages.pdfsunil shukla
We already discussed that this is the main input device used to give the command to the computer.
The primary function of this is to act as an input device by using this, users are able to type documents, use different key shortcuts, play games, and many other tasks.
The inspiration for keyboard design is taken from the typewriter.
In simple words, A keyboard is an input device that contains keys and is used to enter data into your computer.
A desktop computer usually has 100 to 105 keys, but this is not fixed some small computers like notebook computers have fewer keys than normal PCs.
Full-Form of Keyboard
According to Fullformhub.com there is no full form of keyboard is present, but some people named this word as an acronym with a different meanings, most common full form of Keyboard is:
K – Keys
E – Electronic
Y – Yet
B – Board
O – Operating
A – A to Z
R – Response
D – Directly
Different Types of keyboards Keys
ABCDE, XPERT, QWERTZ, AZERTY, and QWERTY are the different types of keyboard keys layout.
This headline is based on how keys are organized on the keyboard because the keys are divided into too many sections for making the user experience faster.
Keys Layout of a Qwerty Keyboard
Alphanumeric keys: Alphanumeric are divided into two parts, alphabets, and number keys and this includes letters, numbers, punctuation, and symbol keys.
Function keys: This is located o the top of the board, there are a total of 12 function keys used to perform specific tasks, like F1 displays a help window and F5 used to refresh window or any browser same as all 12 keys have their own work to perform.
Control keys: Control keys are used to perform different work examples of control keys are Ctrl, Alt key, Window logo key, and Esc. these keys are used alone or with other function keys.
Numeric Keypad: This is located on the right side of a keyboard. The arrangement of all numeric keys is very similar to calculators that included numbers, decimals, and many other keys. this is the most recent invention, to enhance the user experience.
Navigation keys: These keys are just touching with the numeric keys which include Arrow keys, page up and down keys, delete keys, home, and insert keys.
This is the basic key layout but in some cases, there are different types of layouts present. Your keyboard layout must be a different type.
Why do we have two ctrl, alt, and shift keys?
All the keys present on the keyboard are made to increase our effectiveness and work performance.
At the start, there are only one ctrl, alt, and shift key, but when the makers identified the problem of users they add dual keys.
This is done because when you want to type “A” you will use your right hand to press the shift same as when you want to type “L” you will use your left hand to press shift, this will help the pro users to enhance their productivity. It also increases the life of some most used keys.
Types of Computer Cables, 5 points of advantages.pdfsunil shukla
As you may know that every computer system has many different types of parts which are connected to our computer system.
All these parts can be directly plugged into the computer system computer motherboard, or simply say some cable is required to connect the computer parts to the system.
These parts can be digital cameras, hard drives, mice, or other equipment. There are different types of cables in the market, such as HDMI cables, VGA cables, DVI cables, Ethernet cables, PS/2 cables, 3.5mm audio cables, USB cables, computer power cord cables, etc.
Types of Computer Cables
HDMI cable
VGA cable
DVI cable
Ethernet Cable
PS/2 Cable
5mm Audio Cable5mm Audio Cable
USB cable
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Digital Tools and AI for Teaching Learning and Research
OSI model layers 7 Types of OSI Model Edifyclue.pdf
1. OSI model layers | 7 Types
of OSI Model | Edifyclue
The international standard organization (ISO) is a multinational body
dedicated to a worldwide agreement on international standards.
An ISO standard that covers all aspects of network communications is the
Open Systems Interconnection OSI model layers.
An open system may be a model that permits any two different systems to
speak no matter their underlying architecture.
The purpose of the OSI model layers is to open communication between
different systems without requiring changes to the logic of the underlying
computer hardware and software.
The OSI model is not a protocol it is a model for understanding and designing
a data network architecture that is flexible, robust, and interoperable.
2. The Open System Interconnection (OSI model layers) is a framework for
the design of network systems that allow for communication across all types of
computer systems.
It consists of 7 separate but related layers, each of which defines a segment of
the process of moving information across a network.
Function Of The OSI model layers
In this section, we briefly describe the functions of each seven-layer
in the OSI model:-
3. ● Application layer
● Presentation layer
● Session layer
● Transport layer
● Network layer
● Data Link layer
● Physical Layer
Physical Layer:-
The physical layer coordinates the functions needed to transmit a bitstream
over a physical medium. It deals with the mechanical and electrical
specifications of the interface and transmission medium.
It conjointly defines the procedures and functions that physical devices and
interfaces got to perform for transmission to occur. The position of the
4. physical layer is relevant to the transmission medium and also the electrical
circuit layer.
The responsibilities of the physical layer include the following:-
● Physical characteristics of interface and media – The
physical layer defines the characteristics of the interface between
the devices and also the transmission medium.
● Representation of bits:- The physical layer information
incorporates a stream of bits (sequence of 0s and 1s) with no
interpretation. To be transmitted, bits should be encoded into
signals electrical and optical. The physical layer defines the kind
of coding.
● Data rate:- The transmission rate of the number of bits sent
every second is additionally outlined by the physical layer. The
physical layer defines the period of touch, that is however long it
lasts.
● Synchronization of bits:- The sender and receiver should be
synchronous at the bit level. The sender and also the receiver
clocks should be synchronous.
● Line configuration:- The physical layer cares about the
affiliation of devices to the medium. in an exceeding
purpose-to-purpose configuration, 2 devices square measure
connected along through an obsessive link. in an exceedingly
multipoint configuration, a link is shared between many devices.
● Physical topology:- The topology defines however devices
square measure connected to form to network. Devices are often
connected employing a mesh (every device connected to each
alternative device), a topology (devices square measure
connected through central devices), a hoop topology (every
device is connected to successive, forming a ring), or a topology
(every device on a standard link).
● Transmission mode:- The physical layer conjointly defines the
transmission mechanism between 2 devices simplex, half-duplex,
or full-duplex. within the simplex mode, just one device will send
the opposite will solely receive. The simplex mode could be
5. unidirectional communication. within the half-duplex mode, 2
devices will send and receive, however not at the same time. in an
exceedingly full-duplex mode, 2 devices send and receive at
identical times.
Datalink Layer:-
The data link layer transforms the physical layer, a raw transmission facility,
into a reliable link and is responsible for node to node delivery.
It makes the physical layer appear error-free to the upper layer (Network
layer) and the relationship of the data link layer to the network and physical
layers.
The responsibilities of the data link layer include the following:-
6. ● Framing:- the info link layer divides the stream of bits received
from the network layer into manageable data units called frames.
● Physical addressing:- If frames are to be distributed to a
different system on the network, the data link layer adds a header
to the frame to define the physical address of the sender (source
address) and receiver (destination address) of the frame. If the
frame is intended for a system outside the sender network, the
receiver address is the address of the device that connects one
network to the next.
● Flow control:- Data absorbed by the receiver is less than the
rate produced in the sender, the data link layer imposes a flow
control mechanism to prevent massive the receiver.
● Error control:- The data link layer adds reliability to the
physical layer by adding a mechanism to direct and transmit
damaged or lost frames. It also uses a mechanism to stop the
duplication of frames. Error control is generally achieved through
a trailer added to the top of the frame.
● Access control:- When 2 or more devices are connected to an
equivalent link, link-layer protocols are necessary to work out
which device has control over the link at any given time.
Network Layer:-
7. The network layer is responsible for the source to destination delivery of a
packet possibly across multiple network links.
The data link layer oversees the delivery of the packet between 2 systems on
the same network links, and the network later ensures that each packet gets
from its point of origin to its final destination.
If 2 systems are connected to the same link, there is usually no need for a
network layer. If the 2 systems are connected to different network links with
attached devices between the network links, there is often a need for the
network layer to accomplish source-to-destination delivery.
The relationship of the network layer o the data link and transport layer.
The responsibilities of the network layer include the following:-
8. ● Logical addressing:- The physical addressing implemented by
the info link layer handles the addressing problem locally. If a
packet passes the network boundary, we’d like another
addressing system to assist distinguish the source and
destination systems. The network layer adds a header to the
packet coming from the upper layer that, among other things,
involves the logical addresses of the sender and receiver.
● Routing:- When independent networks or links are connected
together to create an internetwork or a large network, the
connecting devices called routers and gateways route the packets
to their final destination. One of the functions of the network
layer is to give this mechanism.
Transport Layer:-
9. The transport layer is accountable for the supply to destination (end-to-end)
delivery of the entire message.
The network layer oversees the finish to complete delivery of individual
packets, it does not acknowledge any relationship between those packets.
It treats all severally as if every bit belonged to a separate message. The
transport layer, on the other hand, ensures that the whole message arrives
intact and then as, overseeing each error management and flow management
at the supply to destination level.
The connection of the transport layer to the network and session layers. The
transport layer mat creates an affiliation between the two finish ports. An
affiliation could be a single logical path between the supply and destination
that go with all packets in a very message.
making an affiliation involves 3 steps: affiliation institution, knowledge
transfer, and affiliation unharness.
Transmission of all packets to 1 pathway, the transport layer has a lot of
management over sequencing, flow, and error detection and correction.
The responsibilities of the transport layer include the following:-
● Service purpose addressing:- Computers usually run many
programs at identical times. supply to destination delivery
suggests that delivery not solely from one pc to the next but
conjointly from a specific method on one pc to a specific method
on the other. The transport layer header so should embody a sort
of address referred to as a service purpose address. The network
layer gets every packet to the correct pc the transport layer gets
the entire message to the correct method on its pc.
● Segmentation and reconstruction:- A message divided into
communicable segments, every phase containing a sequence
variety. These numbers modify the transport layer to put together
10. the message properly upon inward at the destination and to
identify and replace packets that were lost inside the
transmission.
● Connection management:- A connectionless transport layer
treats every phase as AN freelance packet and delivers it to the
transport layer at the destination machine. A
connection-oriented transport layer makes respect to the
transport layer at the destination machine initial before
delivering the packets. in the end, the information is transferred,
and the affiliation is terminated.
● Flow management:- The transport layer is accountable for
flow management. However, flow management at this layer is
performed finish to complete rather than across one link.
● Error management:- The transport layer is accountable for
flow management. However, flow management at this layer is
performed finish to complete rather than across one link. The
causing transport layer makes positive that the entire message
arrives at the receiving transport layer while not an error.
Session layer:-
11. The service provided by the primary three-layer (physical, data link, and
network) is not adequate for a few processes. The session layer is the network
dialog controller. it establishes, maintains, and synchronizes the interaction
between the communication system.
Specific responsibilities of the session layer include the following:-
● Dialog management:- The session layer permits 2 systems to
enter into a dialog. It permits the communication between 2
processes to require place either in half-duplex (one approach at
a time) or full-duplex (two-approach at a time).
Presentation Layer:-
12. The presentation layer is bothered with the syntax and linguistics of the
knowledge changed between the two systems. the connection between the
presentation layer and thus the applying and session layer.
Specific responsibilities of the presentation layer include the
following:-
● Translation:- The method (running program) in 2 systems is
typically exchanging data within the kind of character string,
numbers, and so on. the knowledge ought to be modified to
bitstreams before being transmitted. as a result of totally
different|completely different} computers using different
cryptography systems, the presentation layer is chargeable for
ability between these totally different cryptography ways.
13. The presentation layer at the sender changes the information from its
sender-dependent format into a regular format. the presentation layer at the
receiving machine changes the same format into its receiver-dependent
format.
OSI Model –Wikipedia
● Encryption:- To carry sensitive data, a system should be able to
assure privacy. cryptography implies that the sender transforms
the first data to a different kind and sends that ensuing message
out over the network. cryptography reverses the first method to
rework the messages back to their original kind.
● Compression:- Information compression reduces the amount
of bits t be transmitted. information compression becomes
significantly necessary in the transmission of transmissions like
text, audio, and video.
Application Layer:-
14. The appliance layer allows the user, whether or not human or computer code,
to access the network. It provides user interfaces and support for services like
email correspondence, remote file access and transfer, shared management,
and alternative forms of distributed info services.
Specific services provided by the appliance layer include the
following:-
● Network virtual terminals:- A network virtual terminal may
be a computer code version of a physically terminal and permits a
user to go surfing in a foreign host. the appliance creates a
computer code emulation of a terminal at the remote host. That
user’s laptop talks to the computer code terminal. The remote
host believes it’s a human activity with one amongst its own
terminals and permits you to brand on. File transfer, access, and
15. management (FTAM) – This application permits a user to access
files in an exceedingly remote laptop, and to manage or manage
files in an exceedingly remote laptop.
● Mails services:- This application provides the premise for
email forwarding and storage.
● Directory services:- This application provides distributed info
sources and access to world info regarding varied objects and
services.
Conclusion:-
I hope you have understood this article’s OSI model layers. Share this article
with your friends and if you want to get some information about it, then you
can subscribe.