The Open Systems Interconnection (OSI) model describes seven layers that computer systems use to communicate over a network.
Layer 1: Physical Layer
It represents the electrical and physical representation of the data connection / system.
When a networking problem occurs, many networking pros go right to the physical layer to check that all of the cables are properly connected.
It is responsible for the actual physical connection between the devices. The physical layer contains information in the form of bits.
Layer 2: Data Link Layer
The data link layer is responsible for the node to node delivery of the message. The main function of this layer is to make sure data transfer is error-free from one node to another, over the physical layer.
It is IP address understandable layer, which helps you to define logical addressing so that any endpoint should be identified.
The layer also helps you implement routing of packets through a network.
Layer 3: Network Layer
Network layer works for the transmission of data from one host to the other located in different networks. It also takes care of packet routing.
The sender & receiverβs IP address are placed in the header by the network layer.
Layer-management protocols that belong to the network layer are:
The Transport Layer deals with the coordination of the data transfer between end systems and hosts. How much data to send, at what rate, where it goes, etc.
The data in the transport layer is referred to as Segments.
Two examples of the Transport Layer are the UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) that is build on top of the Internet Protocol (IP model), which work at layer 3.
Layer 5: Session Layer
This layer is responsible for establishment of connection, maintenance of sessions, authentication and also ensures security.
Important function of Session Layer:
1. It establishes, maintains, and ends a session. 2. Session layer enables two systems to enter into a dialog 3. It also allows a process to add a checkpoint to steam of data.
Layer 6: Presentation Layer
The presentation layer is responsible for ensuring that the data is understandable for the end system or useful for later stages. It translates or formats data based on the applicationβs syntax or semantics.
The functions of the presentation layer are :
1. Translation : For example, ASCII to EBCDIC.
2. Encryption/ Decryption : Data encryption translates the data into another form or code.
3. Compression: Reduces the number of bits that need to be transmitted on the network.
Layer 7: Application Layer
At this layer the user directly interacts with a software application, so it is closest to the end user. When the user wants to transmit files or pictures, this layer interacts with the application communicating with the nw.
Examples: Web Browsers
The functions of the Application layer are :
1. Network Virtual Terminal 2. FTAM-File transfer access and management 3. Mail Services 4. Directory Services
Some common protocols include:
1. POP3 or SMTP for emails 2. FTP for emails 3. Telnet for controlling remote devices
Retweet the thread if it's useful.
β’ β’ β’
Missing some Tweet in this thread? You can try to
force a refresh
𧡠How to Start Learning Linux for DevOps Aspirants ππ§
From newbie to pro in no time!
Letβs make Linux your ultimate superpower. π¦ΈββοΈπ¦ΈββοΈ
1/ Start with the Basics π οΈβ¨
β’ Discover Linux distros: Ubuntu π£, CentOS π΅, Red Hat π΄.
β’ Set up Linux in a VM (VirtualBox/VMware π»).
β’ Get cozy with the terminal β your new BFF! π₯οΈπ
1/ Whatβs the difference? π€
All these roles focus on improving software delivery and reliability but have different goals. Hereβs a quick breakdown:
2/ Platform Engineer π·
π Goal: Make life easier for developers.
β’ Build tools & platforms (e.g. CI/CD pipelines, Kubernetes)
β’ Standardize workflows for efficiency
β’ Create self-service systems so developers can work faster
π οΈ They focus on improving developer productivity.
A List of critical #AWS services and their limitations π
1. EC2 β Instance limits by region, instance type restrictions. 2. RDS β Max database storage limits, instance size restrictions. 3. S3 β Max object size is 5TB, bucket policies can limit access. 4. EBS β Volume size max of 64TB, 20,000 IOPS for io1/io2 volumes.
5. IAM β Max 5,000 roles per account, policy size limits. 6. Lambda β Max execution timeout of 15 minutes, memory max 10GB. 7. DynamoDB β Partition throughput limits, item size max of 400KB. 8. CloudFormation β 200 resources limit per stack.
𧡠Mastering Docker Troubleshooting: 15 Key Tips for Developers and DevOps Engineers!
A Thread ππ
1/ π³ Check Container Status
Use docker ps -a to view all containers and their statuses. A container may have exited unexpectedly.
Look at STATUS and RESTART policies to identify potential issues.
2/ π Inspect Logs
Run docker logs <container_name> to see the container logs.
This helps troubleshoot crashes, errors, or other issues within the app or service.