Question about Computers & Internet

1 Answer

Where are physical and data links exploitable?

Posted by on

1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points

    All-Star:

    An expert that got 10 achievements.

    MVP:

    An expert that got 5 achievements.

    Brigadier General:

    An expert that has over 10,000 points.

  • Master
  • 10,406 Answers

Anywhere where the intruder can get "physical" access to the network links.

Posted on Oct 04, 2010

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

3 Answers

Memory card corrupted


Hi

The only option after corruption of memory card is formatting it. But, after formatting certainly you will lose some data. Then you can recover lost data by making use of memory card recovery software because using this software I was able to recover data from formatted transcend memory card.


For more details visit - http://www.unformatdata.com/recover-data-from-formatted-microsdhc-transcend-memory-card.html

Jul 21, 2012 | Nokia E72 Smartphone

1 Answer

What is the child obuse?


Hi,

Hope this helps you.. Click thumbs up ok..
_____________________________
Child abuse is the physical, sexual, emotional mistreatment, or neglect of children.[1] In the United States, the Centers for Disease Control and Prevention (CDC) define child maltreatment as any act or series of acts of commission or omission by a parent or other caregiver that results in harm, potential for harm, or threat of harm to a child.[2] Most child abuse occurs in a child's home, with a smaller amount occurring in the organizations, schools or communities the child interacts with.[citation needed] There are four major categories of child abuse: neglect, physical abuse, psychological/emotional abuse, and child sexual abuse.
Different jurisdictions have developed their own definitions of what constitutes child abuse for the purposes of removing a child from his/her family and/or prosecuting a criminal charge. According to the Journal of Child Abuse and Neglect, child abuse is "any recent act or failure to act on the part of a parent or caretaker which results in death, serious physical or emotional harm, sexual abuse or exploitation, an act or failure to act which presents an imminent risk of serious harm".

Mar 17, 2011 | Acer Aspire One PC Notebook

1 Answer

I get the following error as soon as i start casino.exe. The application failed to initialize properly (0xc0000005). click ok to terminate the application. please help me. i like konami casino game...


In many cases this error has been generated by faulty RAM memory. So if you have just upgraded your computer with some new memory and you started getting this error then would remove them and see if the error goes away. If it does then send the memory back and get a refund!

In Windows XP Service Pack 2 Microsoft introduced Data execution prevention (DEP), a set of hardware and software technologies that perform additional checks on memory to help protect against malicious code exploits. In Windows XP SP2, DEP is enforced by both hardware and software.

Some software/application behaviours are incompatible with DEP - data execution prevention.

/NOEXECUTE

This option is only available on 32-bit versions of Windows when running on processors supporting no-execute protection. It enables no-execute protection (also known as Data Execution Protection - DEP), which results in the Memory Manager marking pages containing data as no-execute so that they cannot be executed as code. This can be useful for preventing malicious code from exploiting buffer overflow bugs with unexpected program input in order to execute arbitrary code. No-execute protection is always enabled on 64-bit versions of Windows on processors that support no-execute protection.

There are several options you can specify with this switch:

/NOEXECUTE=OPTIN Enables DEP for core system images and those specified in the DEP configuration dialog.

/NOEXECUTE=OPTOUT Enables DEP for all images except those specified in the DEP configuration dialog.

/NOEXECUTE=ALWAYSON Enables DEP on all images.

/NOEXECUTE=ALWAYSOFF Disables DEP. (This setting doesn't provide any DEP coverage for any part of the system, regardless of hardware DEP support. The processor doesn't run in Physical Address Extension (PAE) mode unless the /PAE option is present in the boot.ini file.)


This error also seen when people have updated drivers for their graphics card. If this happens just roll back your drivers. Also keep an eye on the vendors website to see if they have an update/patch available or coming soon.

Mar 03, 2011 | Konami Casino Inc. for Windows

1 Answer

How to downgrade psp 6.2 os to psp 5.5 os


you can go to pspslimhacks.com and look up for 6.20 save data exploit and then downgrade it........!!!!!!!111

Apr 29, 2010 | Sony PlayStation Portable (PSP) Console

1 Answer

Reformatting my PS2 Memory Card


Your memory card needs to be replaced. Using the AR Max Evo to format your Memory card can sometimes leave bits of information that cannot be removed, and also deletes the firmware of the card that allows the PS2 to read it.

There is no way for you to fix it, unless you exploiting the card with Free_MCBoot. It'll reformat the card if it detects it, and allow you to install the exploit on the card.

For legal reasons, I cannot tell you where to obtain the files.

Nov 08, 2009 | Sony Video Game Consoles & Games

1 Answer

Best free proxy list


1. Get a copy of Backtrack security audit cd from http://www.remote-exploit.org/backtrack.html
2. Learn Linux/Unix
3. Learn a lot about networks and data trafic
4. Do a heap of reading
5. Download some exploits from http://milw0rm.com/
6. Learn about using a software debugger so you can make and test your own exploits.
7. Play nice
Hope this helps

May 05, 2009 | Computers & Internet

1 Answer

Makes clicking sound


Hello, unfortunately there is a large chance that your drive is dying, and if the clicking noise is reasonably loud, it will die soon.

About the only thing you can do is attempt to read it in a system that allows you to force mount a drive.

BackTrack is a free Live OS, Meaning it boot's and runs off of a CD. Simply download and burn the ISO (Disk Image) and then when booting your computer follow the instructions on your screen for your Boot Options Menu and Select Boot From CD.

Once booted, Plug in your drive and BT should recognize it. If it can be recognized, you will be able to attempt to repair, or at the least should be able to bring your data over.

***Your drive is physically failing, and to be safe, please prioritize what your going to attempt to save before attempting this and work as quickly as possible.

Get BackTrack3 here:
http://www.remote-exploit.org/cgi-bin/fileget?version=bt3-cd

While the BT method may seem like a long and tedious process, its important to note that aside from actually replacing the electronics inside your drive, this is about the only way you can get your data back.

The final option is to stop using the drive completely and send it out for data recovery which is elaborately expensive.

I hope this information has helped in some way.
Sorry to hear about your drive.

Apr 25, 2009 | SimpleTech 250GB USB2.0 7200 RPM External...

4 Answers

Cannot access anti-virus websites


Download STINGER antivirus and scan with this tool.

Variants Can Detect:
BackDoor-ALI,BackDoor-AQJ,BackDoor-AQJ.b,BackDoor-CEB,BackDoor-CEB!bat,BackDoor-CEB!hosts,BackDoor-CEB.b,BackDoor-CEB.c,BackDoor-CEB.d,BackDoor-CEB.dll,BackDoor-CEB.dr,BackDoor-CEB.e,BackDoor-CEB.f,BackDoor-CEB.sys,BackDoor-CFB,BackDoor-JZ,BackDoor-JZ.dam,BackDoor-JZ.dr,BackDoor-JZ.gen,BackDoor-JZ.gen.b,Bat/Mumu.worm,Cleanup,CoreFlood,Coreflood!psexec,Coreflood.dldr,CoreFlood.dll,CoreFlood.dr,Danmec,Downloader-DN.a,Downloader-DN.b,Downloader-UA,Exploit-DcomRpc,Exploit-DcomRpc.b,Exploit-DcomRpc.dll,Exploit-Lsass,Exploit-Lsass.dll,Exploit-MS04-011,Exploit-MS04-011.gen,Exploit-MSExcel.k,Exploit-MSExcel.l,Exploit-MSExcel.m,Exploit-MSExcel.n,Exploit-MSExcel.o,Exploit-MSExcel.p,Exploit-MSExcel.q,Exploit-MSExcel.r,Exploit-PDF.b,Exploit-PDF.c,Exploit-PDF.d,Exploit-PDF.e,Exploit-PDF.f,Exploit-PDF.g,Exploit-PDF.h,Exploit-XMLhttp.d,Exploit-XMLhttp.d.gen,Exploit-XMLhttp.d.gen.b,Exploit-XMLhttpd.d,FakeAlert,FakeAlert-AA,FakeAlert-AB,FakeAlert-AB!htm,FakeAlert-AB.dldr,FakeAlert-AB.dr,FakeAlert-AC,FakeAlert-AD,FakeAlert-AE,FakeAlert-AF,FakeAlert-AG,FakeAlert-AG.gen.b,FakeAlert-AG.gen.c,FakeAlert-AH,FakeAlert-AI,FakeAlert-AJ,FakeAlert-AK,FakeAlert-AL,FakeAlert-AM,FakeAlert-AN,FakeAlert-AntiVirusPro,FakeAlert-AntiVirusXP,FakeAlert-AO,FakeAlert-AP,FakeAlert-AQ,FakeAlert-AR,FakeAlert-AS,FakeAlert-AT,FakeAlert-AU,FakeAlert-av360,FakeAlert-AW,FakeAlert-AZ,FakeAlert-AZ!htm,FakeAlert-B,FakeAlert-B.dldr,FakeAlert-B.dr,FakeAlert-BA,FakeAlert-BB,FakeAlert-BC,FakeAlert-BD,FakeAlert-BE,FakeAlert-BE.gen,FakeAlert-BF,FakeAlert-BG.dldr,FakeAlert-BH.dldr,FakeAlert-BI,FakeAlert-BJ,FakeAlert-BK,FakeAlert-BL,FakeAlert-BM,FakeAlert-BN,FakeAlert-BO,FakeAlert-BO.dldr,FakeAlert-BP,FakeAlert-BQ,FakeAlert-BR,FakeAlert-BS,FakeAlert-C,FakeAlert-C.dr,FakeAlert-C.gen,FakeAlert-D,FakeAlert-E,FakeAlert-F,FakeAlert-G,FakeAlert-H,FakeAlert-I,FakeAlert-J,FakeAlert-K,FakeAlert-L,FakeAlert-LastDefender,FakeAlert-M,FakeAlert-N,FakeAlert-N.dldr,FakeAlert-O,FakeAlert-P,FakeAlert-Q,FakeAlert-R,FakeAlert-S,FakeAlert-S.dll,FakeAlert-SpyKiller,FakeAlert-SpywareGuard,FakeAlert-T,FakeAlert-U,FakeAlert-V,FakeAlert-W,FakeAlert-WinwebSecurity,FakeAlert-X,FakeAlert-XPAntivirus,FakeAlert-XPSecCenter,FakeAlert-Y,FakeAlert-Y.dr,FakeAlert-Z,Fribet,Generic FakeAlert,Generic FakeAlert.d,Generic FakeAlert.e,Generic!atr,HideWindow,HideWindow.dll,HTool-T2W,IPCScan,IRC/Flood.ap,IRC/Flood.ap.bat,IRC/Flood.ap.dr,IRC/Flood.bi,IRC/Flood.bi.dr,IRC/Flood.cd,JS/Autorun.worm.ci,JS/Downloader-AUE,JS/FakeAlert,JS/FakeAlert-AB.dldr,NTServiceLoader,ProcKill,Proxy-Agent.af,Proxy-Agent.af.dr,PWS-Banker.dldr,PWS-FireMing,PWS-FireMing.dll,PWS-FireMing.dr,PWS-Gamania.gen.a,PWS-Narod,PWS-Narod.dll,PWS-Narod.gen,PWS-Sincom,PWS-Sincom.dll,PWS-Sincom.dr,rootkit,VBS/Autorun.bj,VBS/Autorun.worm.au,VBS/Autorun.worm.ay,VBS/Autorun.worm.bi,VBS/Autorun.worm.bj,VBS/Autorun.worm.bs,VBS/Autorun.worm.by,VBS/Autorun.worm.ca,VBS/Autorun.worm.cy,VBS/Autorun.worm.dm,VBS/Autorun.worm.dn,VBS/Autorun.worm.dn!atr,VBS/Autorun.worm.dn!txt,VBS/Autorun.worm.dv,VBS/Autorun.worm.dz,VBS/Autorun.worm.en,VBS/Autorun.worm.k,VBS/Autorun.worm.k!bat,VBS/Autorun.worm.zd,VBS/Autorun.worm.ze,VBS/Autorun.worm.zl,VBS/Autorun.worm.zn,VBS/FakeAlert-AB,VBS/IE-Title,Vundo,Vundo.dldr,Vundo.dr,Vundo.gen.h,Vundo.gen.i,Vundo.gen.j,Vundo.gen.k,Vundo.gen.l,Vundo.gen.m,Vundo.gen.n,Vundo.gen.o,Vundo.gen.p,Vundo.gen.r,Vundo.gen.s,Vundo.gen.t,Vundo.gen.u,W32/Anig.worm,W32/Anig.worm.dll,W32/Autorun.worm,W32/Autorun.worm!inf,W32/Autorun.worm!ini,W32/Autorun.worm.a,W32/Autorun.worm.aa,W32/Autorun.worm.ab,w32/autorun.worm.ac,W32/Autorun.worm.ad,W32/Autorun.worm.ae,W32/Autorun.worm.af,W32/Autorun.worm.ag,W32/Autorun.worm.ai,W32/Autorun.worm.aj,W32/Autorun.worm.ak,W32/Autorun.worm.al,W32/Autorun.worm.am,W32/Autorun.worm.an,W32/Autorun.worm.ao,W32/Autorun.worm.ap,W32/Autorun.worm.aq,W32/Autorun.worm.ar,W32/Autorun.worm.as,W32/Autorun.worm.at,W32/Autorun.worm.av,W32/Autorun.worm.aw,W32/Autorun.worm.ax,W32/Autorun.worm.az,W32/Autorun.worm.b,W32/Autorun.worm.b.cfg,W32/Autorun.worm.ba,W32/Autorun.worm.bb,W32/Autorun.worm.bc,W32/Autorun.worm.bd,W32/Autorun.worm.be,W32/Autorun.worm.bf,W32/Autorun.worm.bg,W32/Autorun.worm.bh,W32/Autorun.worm.bk,W32/Autorun.worm.bl,W32/Autorun.worm.bm,W32/Autorun.worm.bn,W32/Autorun.worm.bo,W32/Autorun.worm.bp,W32/Autorun.worm.bp!reg,W32/Autorun.worm.bq,W32/Autorun.worm.br,W32/Autorun.worm.bt,W32/Autorun.worm.bw,W32/Autorun.worm.bx,W32/Autorun.worm.bx!inf,W32/Autorun.worm.bx.gen,W32/Autorun.worm.bz,W32/Autorun.worm.c,W32/Autorun.worm.cb,W32/Autorun.worm.cb.dr,W32/Autorun.worm.cc,W32/Autorun.worm.cd,W32/Autorun.worm.ce,W32/Autorun.worm.cf,W32/Autorun.worm.cg,W32/Autorun.worm.ch,W32/Autorun.worm.cj,W32/Autorun.worm.ck,W32/Autorun.worm.cm,W32/Autorun.worm.cn,W32/Autorun.worm.co,W32/Autorun.worm.cp,W32/Autorun.worm.cp!bat,W32/Autorun.worm.cq,W32/Autorun.worm.cr,W32/Autorun.worm.cs,W32/Autorun.worm.ct,W32/Autorun.worm.cu,W32/Autorun.worm.cv,W32/Autorun.worm.cw,W32/Autorun.worm.cx,W32/Autorun.worm.cz,W32/Autorun.worm.d,W32/Autorun.worm.da,W32/Autorun.worm.db,W32/Autorun.worm.dc,W32/Autorun.worm.dd,W32/Autorun.worm.dd!inf,W32/Autorun.worm.de,W32/Autorun.worm.df,W32/Autorun.worm.dg,W32/Autorun.worm.dh,W32/Autorun.worm.di,W32/Autorun.worm.dj,W32/Autorun.worm.dk,W32/Autorun.worm.dl,W32/Autorun.worm.dn,W32/Autorun.worm.do,W32/Autorun.worm.dp,W32/Autorun.worm.dq,W32/Autorun.worm.ds,W32/Autorun.worm.dt,W32/Autorun.worm.du,W32/Autorun.worm.dw,W32/Autorun.worm.dx,W32/Autorun.worm.dy,W32/Autorun.worm.e,W32/Autorun.worm.ea,W32/Autorun.worm.eb,W32/Autorun.worm.ec,W32/Autorun.worm.ed,W32/Autorun.worm.ef,W32/Autorun.worm.eg,W32/Autorun.worm.ei,W32/Autorun.worm.ej,W32/Autorun.worm.ek,W32/Autorun.worm.el,W32/Autorun.worm.em,W32/Autorun.worm.eo,W32/Autorun.worm.ep,W32/Autorun.worm.eq,W32/Autorun.worm.f,W32/Autorun.worm.g,W32/Autorun.worm.gen!job,W32/Autorun.worm.gen.cl,W32/Autorun.worm.gen.za,W32/Autorun.worm.gen.zb,W32/Autorun.worm.h,W32/Autorun.worm.h!lnk,W32/Autorun.worm.i,W32/Autorun.worm.j,W32/Autorun.worm.l,W32/Autorun.worm.m,W32/Autorun.worm.n,W32/Autorun.worm.o,W32/Autorun.worm.p,W32/Autorun.worm.q,W32/Autorun.worm.r,W32/Autorun.worm.remmants,W32/Autorun.worm.s,W32/Autorun.worm.t,W32/Autorun.worm.u,W32/Autorun.worm.v,W32/Autorun.worm.v!bat,W32/Autorun.worm.w,W32/Autorun.worm.x,W32/Autorun.worm.y,W32/Autorun.worm.z,W32/Autorun.worm.zc,W32/Autorun.worm.zf,W32/Autorun.worm.zg,W32/Autorun.worm.zh,W32/Autorun.worm.zi,W32/Autorun.worm.zj,W32/Autorun.worm.zk,W32/Autorun.worm.zm,W32/Bagle,W32/Bagle!eml.gen,W32/Bagle!pwdzip,W32/Bagle.ad!src,W32/Bagle.dldr,W32/Bagle.dll.dr,W32/Bagle.eml,W32/Bagle.fb!pwdzip,W32/Bagle.fc!pwdzip,W32/Bagle.fd!pwdzip,W32/Bagle.fe!pwdzip,W32/Bagle.fm.dldr,W32/Bagle.gen,W32/Bagle@MM!cpl,W32/Blaster.worm,W32/Blaster.worm.k,W32/Bropia.worm,W32/Bugbear,W32/Bugbear.a.dam,W32/Bugbear.b!data,W32/Bugbear.b.dam,W32/Bugbear.gen@MM,W32/Bugbear.h@MM,W32/Bugbear@MM,W32/Conficker,W32/Conficker.sys,W32/Conficker.worm,W32/Conficker.worm!inf,W32/Conficker.worm!job,W32/Conficker.worm.gen.a,W32/Conficker.worm.gen.b,W32/Deborm.worm.ah,W32/Deborm.worm.gen,W32/Doomjuice.worm,W32/Dumaru,W32/Dumaru.ad@MM,W32/Dumaru.al.dll,W32/Dumaru.dll,W32/Dumaru.eml,W32/Dumaru.gen,W32/Dumaru.gen@MM,W32/Dumaru.w.gen,W32/Elkern.cav,W32/Elkern.cav.c,W32/Elkern.cav.c.dam,W32/Fizzer,W32/Fizzer.dll,W32/Fujacks!htm,W32/FunLove,W32/FunLove.apd,W32/Gaobot.worm,W32/Harwig.worm,W32/IRCbot,W32/IRCbot.worm,W32/IRCbot.worm.dll,W32/Klez,W32/Klez.dam,W32/Klez.eml,W32/Klez.gen.b@MM,W32/Klez.rar,W32/Koobface.worm,W32/Korgo.worm,W32/Lirva,W32/Lirva.c.htm,W32/Lirva.eml,W32/Lirva.gen@MM,W32/Lirva.htm,W32/Lirva.txt,W32/Lovgate,W32/Mimail,W32/Mimail.c@MM,W32/Mimail.i!data,W32/Mimail.q@MM,W32/MoFei.worm,W32/MoFei.worm.dr,W32/Mumu.b.worm,W32/Mydoom,W32/Mydoom!bat,W32/Mydoom!ftp,W32/Mydoom.b!hosts,W32/Mydoom.dam,W32/Mydoom.t.dll,W32/Mytob,W32/Mytob.gen@MM,W32/Mytob.worm,W32/MyWife,W32/MyWife.dll,W32/MyWife@MM,W32/Nachi!tftpd,W32/Nachi.worm,W32/Netsky,W32/Netsky.af@MM,W32/Nimda,W32/Nimda.dam,W32/Nimda.eml,W32/Nimda.gen@MM,W32/Nimda.htm,W32/Nuwar,W32/Nuwar.dam,W32/Nuwar.sys,W32/Nuwar@MM,W32/Nuwar@MM!rar,W32/Pate,W32/Pate!dam,W32/Pate.dam,W32/Pate.dr,W32/Polip,W32/Polip!mem,W32/Polybot,W32/Polybot.bat,W32/Sasser.worm,W32/Sasser.worm!ftp,W32/Sdbot,W32/Sdbot!irc,W32/Sdbot.bat,W32/Sdbot.cli,W32/Sdbot.dll,W32/Sdbot.dr,W32/Sdbot.worm,W32/Sdbot.worm!ftp,W32/Sdbot.worm.bat.b,W32/Sdbot.worm.dr,W32/Sdbot.worm.gen,W32/Sdbot.worm.gen.a,W32/Sdbot.worm.gen.b,W32/Sdbot.worm.gen.c,W32/Sdbot.worm.gen.d,W32/Sdbot.worm.gen.e,W32/Sdbot.worm.gen.q,W32/Sober,W32/Sober!data,W32/Sober.dam,W32/Sober.eml,W32/Sober.f.dam,W32/Sober.g.dam,W32/Sober.q!spam,W32/Sober.r.dr,W32/Sober.r@MM,W32/Sobig,W32/Sobig.dam,W32/Sobig.eml,W32/Sobig.f.dam,W32/Sobig.gen@MM,W32/Spybot.worm,W32/SQLSlammer.worm,W32/Swen,W32/Swen@MM,W32/Virut,W32/Virut!mem,W32/Yaha.eml,W32/Yaha.gen@MM,W32/Yaha.y@MM,W32/Yaha@MM,W32/Zafi,W32/Zafi.b.dam,W32/Zindos.worm,W32/Zotob.worm,W32/Zotob.worm!hosts


Download v10.0.0.482 [2,641,920 bytes] (01/10/2009).


Hope this will be helpfull

Thanks & Regards

Nanda Kishore :)

Mar 25, 2009 | Microsoft Windows XP Professional

1 Answer

Layer3


Which model are you talking about ? I have included both


Here is the OSI model
Layer 1 = physical medium & signal on the wire (physical)
Layer 2 = MAC Address and SNAP (ATM) (data link)
Layer 3 = IP Addressing V4 V6 (network)
Layer 4 = TCP/UDP (RTP, RTSP) (transport)
Layer 5 = Duplexing Half or full (Session)
Layer 6 = HTTP, FTP, SNMP (presentation)
Layer 7 = Web browser, FTP Client, (application)

TCP Model:
Layer 1 = physical medium & signal on the wire (physical) (Hub and reapeter)

Layer 2 = MAC Address and SNAP (ATM) (data) (Switches and bridges)

Layer 3 = IP Addressing V4 V6,
Layer 4 = TCP/UDP (RTP, RTSP) (Internetwork) (Firewall, IPSEC) Routers

(This function is split between 4&5) Duplexing Half or full

Layer 5 = , HTTP, FTP, SNMP, Web browser, FTP Client, (application) (programs)


I hope this helps,

Thank you,

Shuttle83

http://www.electron-age-technologies-llc.com

Feb 11, 2009 | IBM Nways 8277 Model 524 Networking Switch

1 Answer

What is osi model


The 7 Layers of the OSI Model
Last updated: March 03, 2008
The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.
Application
(Layer 7)
This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.
Presentation
(Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
Session
(Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.
Transport
(Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Network
(Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.
Data Link
(Layer 2)
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.
Physical
(Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.



For further details go to:

http://en.wikipedia.org/wiki/OSI_model

Jan 13, 2009 | Computers & Internet

Not finding what you are looking for?
Computers & Internet Logo

Related Topics:

55 people viewed this question

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...