Download - Jumble slover srivinay
08/04/2023Department of Computer Science, RLJIT1
OSI LAYERS
08/04/2023Department of Computer Science, RLJIT2
Jumble Solver (Kaun Banega Scorepathi)
on OSI LAYERS
08/04/2023Department of Computer Science, RLJIT3
giitennonrkrewt ?
08/04/2023Department of Computer Science, RLJIT4
Internetworking
08/04/2023Department of Computer Science, RLJIT5
The art and science of connecting individual local-area networks
(LANs) to create wide-area networks (WANs) , and connecting WANs
to form even larger WANs.
Internetworking
08/04/2023Department of Computer Science, RLJIT6
scaeannoitulp ?
08/04/2023Department of Computer Science, RLJIT7
encapsulation
08/04/2023Department of Computer Science, RLJIT8
Encapsulation
The above figure reveals another aspect of data communication in the OSI model: encapsulation.
A packet ( header and data) at level 7 is encapsulated in a packet at level 6.
The whole packet at level 6 is encapsulated in a packet at level 5, and so on.
In other words, the data portion of a packet at level N-1 carries the whole packet from level N. The concept is called encapsulation.
08/04/2023Department of Computer Science, RLJIT9
chnistaoisnnyor ?
08/04/2023Department of Computer Science, RLJIT10
synchronization
08/04/2023Department of Computer Science, RLJIT11
The session layer allows a process to add checkpoints , or synchronization points, to a stream
of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert
checkpoints after every 100 pages to ensure that each 100-page unit is received and
acknowledged independently. In this case, if a crash happens during the transmission of page
523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages
previous to 501 need not be resent.
Synchronization
08/04/2023Department of Computer Science, RLJIT12
geotntfimarna ?
08/04/2023Department of Computer Science, RLJIT13
fragmentation
08/04/2023Department of Computer Science, RLJIT14
Fragmentation is the process of breaking a packet into smaller pieces. The receiving
system reassembles the pieces into the original packets.
Fragmentation
08/04/2023Department of Computer Science, RLJIT15
ritcnyepno ?
08/04/2023Department of Computer Science, RLJIT16
encryption
08/04/2023Department of Computer Science, RLJIT17
Encryption
To carry sensitive information, a system must be able to ensure
privacy. Encryption means that the sender transforms the original
information to another form and sends the resulting message out over
the network. Decryption reverses the original process to transform the
message back to its original form.
08/04/2023Department of Computer Science, RLJIT18
ltpcooor ?
08/04/2023Department of Computer Science, RLJIT19
protocol
08/04/2023Department of Computer Science, RLJIT20
protocol
A protocol is a set of rules that govern data communications
08/04/2023Department of Computer Science, RLJIT21
THANK YOU!
08/04/2023Department of Computer Science, RLJIT22
08/04/2023Department of Computer Science, RLJIT23