Yashaswini's Level - 1 Report
29 / 3 / 2025
CL-CY Level - 1 Report :
Task 1 : OSI
This task helped me understand the interconnectedness between all the electronic devices. OSI stands for Open System Interconnection. This gives a clear idea of the layers involved in the smooth functioning of the internet and software. There are 7 layers involved. These layers with certain protocols ensures that the applications run smoothly. They are :
1. Application Layer :
The application layer, the top layer of the OSI model, is where network applications and user interfaces reside, providing services like email, web browsing, and file transfer by utilising protocols like HTTP, SMTP, and FTP.
Abbreviations of some protocols:
- HTTP : Hyper Text Transfer Protocol
- SMTP : Simple Mail Transfer Protocol
- FTP : File Transfer Protocol
- DNS : Domain Name System
- LDAP : Lightweight Directory Access Protocol
- SSH : Secure Shell
- SNMP : Simple Network Management Protocol
- DHCP : Dynamic Host Configuration Protocol
- TFTP : Trivial File Transfer Protocol
2. Presentation Layer :
The Presentation Layer is the sixth layer of the OSI model, responsible for ensuring data from the application layer is readable by the receiving system by handling data formatting, encryption and compression.
- Data Formatting : It handles the formatting of data, ensuring it's in a readable and understandable format for the receiving application.
- Encryption and Decryption : The presentation layer is responsible for encrypting data before transmission and decrypting it upon receipt, ensuring data confidentiality.
- Data Compression : It can also compress data to reduce bandwidth usage and improve transmission speed
3. Session Layer :
The Session Layer is the fifth layer of the OSI model, which manages and controls connections between applications, establishing, maintaining, and terminating sessions for communication. It ensures data exchange occurs efficiently and in an organized manner, including features like authentication and session checkpointing.
- Session Establishment : It sets up the connection between applications, negotiating parameters like authentication and communication direction (full-duplex or half-duplex).
- Session Management : It oversees the ongoing communication, ensuring data exchange is organized and efficient.
- Session Termination : It gracefully closes the connection when the applications are finished communicating.
4. Transport Layer :
The Transport Layer is the fourth layer in the OSI model, which ensures reliable and efficient data delivery between applications on different computers, using protocols like TCP and UDP, and handles tasks like flow control, error detection, and data segmentation/reassembly.
Key functions of Transport Layer :
- Segmentation and Reassembly : Divides data into smaller packets (segments) for transmission and reassembles them at the destination.
- Error Control : Detects and corrects errors in data transmission, ensuring data integrity.
- Flow Control : Regulates the rate of data transmission to prevent the receiver from being overwhelmed.
Below are a few Transport Layer Protocols that are used in this stage.
- TCP (Transmission Control Protocol) : Provides reliable, connection-oriented communication with features like error checking, flow control, and guaranteed delivery.
- UDP (User Datagram Protocol) : Provides faster, connectionless communication, suitable for applications where speed is more important than reliability, like video streaming.
5. Network Layer :
The Network Layer is the third layer in the OSI model, which facilitates the data transfer between different networks by breaking down segments into packets, assigning logical addresses (like IP addresses), and determining the optimal path (routing) for data transmission.
Key functions of the Network Layer :
- Packetization : It receives data segments from the transport layer (layer 4) and divides them into smaller units called packets.
- Addressing : It uses logical addresses, such as IP addresses, to identify the source and destination networks and devices.
- Routing : The network layer determines the best path (routing) for packets to travel across the network, using routers and routing protocols.
Below are the few protocols used in this stage.
- Internet Control Message Protocol (ICMP) : Used for error reporting and diagnostics, providing feedback on network issues.
- Internet Protocol (IP) : The fundamental protocol for addressing and routing data packets across networks.
- Internet Group Management Protocol (IGMP) : Used by hosts to join and leave multicast groups, and by routers to learn which hosts are members of which multicast groups.
6. Data Link Layer :
The Data Link Layer is the second layer in the OSI model, which handles reliable data transfer across a physical link, framing data into packets, managing physical addressing, and ensuring error detection and flow control.
Key responsibilities of the Data Link Layer :
- Framing : Packages raw data bits into frames, adding headers and trailers for identification and error checking.
- Physical Addressing : Uses MAC (Media Access Control) addresses to identify devices on the network.
- Error Detection and Correction : Implements mechanisms to detect and potentially correct errors that occur during transmission.
- Flow Control : Manages the flow of data to prevent network congestion.
- Media Access Control : Regulates access to the physical transmission medium to prevent collisions and ensure fair access.
7. Physical Layer :
The Physical Layer is the first layer in the OSI model, which deals with the physical transmission of data, including the hardware, cables, and connectors, ensuring raw data bits are transmitted across a physical medium.
Here is a flowchart of the OSI model :
Task 2 : IaaS, PaaS and SaaS
Cloud Computing with AI, or "Cloud AI", combines the power of cloud infrastructure with artificial intelligence, enabling organisations to leverage AI technologies like machine learning and natural language processing without significant upfront investments in hardware or software.
Cloud Computing has three main Cloud Service models : IaaS (Infrastructure as a Service), PaaS (Platform as a Service), SaaS (Software as a Service).
1. IaaS (Infrastructure as a Service) :
- Provides access to fundamental computing resources like virtual machines, storage, and networking, allowing users to build and manage their own applications and infrastructure.
- Users manage the operating systems, applications, and data, while the provider manages the underlying infrastructure.
- Suitable for organizations that need flexibility and control over their infrastructure.
2. PaaS(Platform as a Service) :
- Offers a platform for developers to build, deploy, and manage applications without worrying about the underlying infrastructure.
- Provides tools, libraries, and services for application development and deployment.
- Suitable for development teams that want to optimize their time and resource.
3. SaaS(Software as a Service) :
- Delivers software applications over the internet, allowing users to access and use them without installing or managing them on their own devices.
- Users access the software through a web browser or application, and the provider manages the software and infrastructure.
- Suitable for users who need easy access to software applications without managing them.