computer networking field : based on the OSI 7-Layer Model
The OSI model divides the process of network communication into seven distinct stages (or layers). Each layer performs a specific function and exchanges data with the layers above and below it.
1. Physical Layer
Description: This is the most fundamental layer of the network. It's responsible for converting data into physical forms like electrical signals, light, or radio waves for transmission. Components like cables, hubs, and repeaters belong to this layer.
Simple Analogy: This is like converting a computer's digital signals (the 0s and 1s) into electrical signals to send them through a LAN cable.
Workplace Scenario Example:
A: "I can't connect to the server. What could be the problem?" B: "Let's check the Physical Layer first. Make sure the LAN cable is plugged in properly and see if the router is powered on."
2. Data Link Layer
Description: This layer defines the rules for exchanging data between devices on the same network. It attaches a unique hardware address, called a MAC address, to data frames to ensure they are sent to the correct device. It also detects and corrects errors that may occur during data transmission. Switches and bridges operate at this layer.
Simple Analogy: It’s like accurately delivering a letter from apartment A, unit 101 (a MAC address) to apartment B, unit 202 (another MAC address) within the same apartment complex (the same network).
Workplace Scenario Example:
A: "My new laptop won't connect to the company Wi-Fi." B: "Did you register your laptop's MAC address with the network administration team? Access might be controlled at the Data Link Layer based on MAC addresses."
3. Network Layer
Description: This layer is responsible for data transmission between devices on different networks. It assigns an IP address to data packets and finds the optimal path (routing) to the destination. The router is the representative piece of equipment for this layer.
Simple Analogy: When you send a package from City A (source network) to City B (destination network), this layer is like a navigation system that finds the fastest route (the optimal path) for the delivery.
Key Protocols:
IP (Internet Protocol): Divides data into packets and attaches the source and destination IP addresses to each packet for transmission.
ICMP (Internet Control Message Protocol): Used to send error messages or diagnose network status. (e.g., the
pingcommand).
4. Transport Layer
Description: This layer ensures that data is delivered accurately and reliably. It establishes a connection between the sender and the receiver, controls the amount of data being sent (flow control), and requests retransmission if errors occur.
Simple Analogy: This is like sending a package and then making a confirmation call (connection-oriented) to the recipient to make sure they received it properly. If any items are missing, you send them again (error control).
Key Protocols:
TCP (Transmission Control Protocol): A connection-oriented protocol that guarantees reliable data transmission. Before sending data, it establishes a connection with the other party and verifies that all data has arrived in the correct order. (Used for: file transfers, email).
UDP (User Datagram Protocol): A connectionless protocol that prioritizes speed over reliability. It doesn't go through the connection verification process like TCP, so it's faster, but data packets can be lost or arrive out of order. (Used for: live video streaming, online games).
5. Session Layer
Description: This layer provides the means for managing the communication between application processes on both ends. It is responsible for establishing, maintaining, and terminating connections (or "sessions"). It also handles the synchronization of the dialogue between the two hosts.
Simple Analogy: It's like managing the entire process of a video call: starting the call, keeping the connection active during the conversation, and then properly ending the call when it's over.
Workplace Scenario Example:
A: "I was working on a remote server and suddenly got disconnected." B: "It might be a session timeout. For security reasons, the Session Layer might automatically terminate the connection if there's no activity for a certain period. Try logging in again."
6. Presentation Layer
Description: This layer is responsible for translating data into a common format that all systems can understand. It handles data encryption, compression, and character encoding (e.g., ASCII, UTF-8).
Simple Analogy: This is like a translator who translates Korean (data format A) into English (data format B) so that an American friend can understand it.
Key Protocols:
SSL/TLS (Secure Sockets Layer/Transport Layer Security): A protocol for encrypting data to ensure it is transmitted securely. HTTPS is simply HTTP with SSL/TLS applied.
7. Application Layer
Description: This layer deals with protocols related to the network applications that the user directly interacts with. The programs we actually use, such as email clients, web browsers, and file transfer programs, belong to this layer.
Simple Analogy: Just as we use a post office counter to send a letter, this layer acts as the user's interface to network services.
Key Protocols:
HTTP (HyperText Transfer Protocol): The set of rules for transferring web pages (HTML documents) between a web browser and a web server.
HTTPS (HTTP Secure): A secure version of HTTP that is encrypted with SSL/TLS.
FTP (File Transfer Protocol): The rules for transferring files between a server and a client.
SMTP (Simple Mail Transfer Protocol): The protocol used for sending emails.
DNS (Domain Name System): The system that translates human-readable domain names (like
) into computer-readable IP addresses.www.google.com

댓글
댓글 쓰기