SlideShare ist ein Scribd-Unternehmen logo
1 von 23
OSI LAYERS


1     Department of Computer Science, RLJIT   5/23/2012
Jumble Solver
    (Kaun Banega Scorepathi)

        on
    OSI LAYERS
2       Department of Computer Science, RLJIT   5/23/2012
giitennonrkrewt ?


3        Department of Computer Science, RLJIT   5/23/2012
Internetworking 


4        Department of Computer Science, RLJIT   5/23/2012
Internetworking

  The art and science of connecting individual local-area networks
(LANs) to create wide-area networks (WANs) , and connecting WANs
to form even larger WANs.




 5                      Department of Computer Science, RLJIT   5/23/2012
scaeannoitulp ?


6       Department of Computer Science, RLJIT   5/23/2012
encapsulation 


7       Department of Computer Science, RLJIT   5/23/2012
Encapsulation




  The above figure reveals another aspect of data communication in the OSI model:
encapsulation.

  A packet ( header and data) at level 7 is encapsulated in a packet at level 6.

  The whole packet at level 6 is encapsulated in a packet at level 5, and so on.

  In other words, the data portion of a packet at level N-1 carries the whole packet from level N.
The concept is called encapsulation.
 8                                 Department of Computer Science, RLJIT           5/23/2012
chnistaoisnnyor ?


9       Department of Computer Science, RLJIT   5/23/2012
synchronization 


10       Department of Computer Science, RLJIT   5/23/2012
Synchronization

  The session layer allows a process to add checkpoints , or synchronization points, to a stream
of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert
checkpoints after every 100 pages to ensure that each 100-page unit is received and
acknowledged independently. In this case, if a crash happens during the transmission of page
523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages
previous to 501 need not be resent.




  11                              Department of Computer Science, RLJIT           5/23/2012
geotntfimarna ?


12       Department of Computer Science, RLJIT   5/23/2012
fragmentation 


13       Department of Computer Science, RLJIT   5/23/2012
Fragmentation
  Fragmentation is the process of breaking a packet into smaller pieces. The receiving system
reassembles the pieces into the original packets.




  14                               Department of Computer Science, RLJIT         5/23/2012
ritcnyepno ?


15      Department of Computer Science, RLJIT   5/23/2012
encryption 


16      Department of Computer Science, RLJIT   5/23/2012
Encryption

  To carry sensitive information, a system must be able to ensure
privacy. Encryption means that the sender transforms the original
information to another form and sends the resulting message out over
the network. Decryption reverses the original process to transform the
message back to its original form.




 17                       Department of Computer Science, RLJIT   5/23/2012
ltpcooor ?


18     Department of Computer Science, RLJIT   5/23/2012
protocol 


19    Department of Computer Science, RLJIT   5/23/2012
protocol


  A protocol is a set of rules that
govern data communications




20          Department of Computer Science, RLJIT     5/23/2012
THANK YOU!

21      Department of Computer Science, RLJIT   5/23/2012
22   Department of Computer Science, RLJIT   5/23/2012
23   Department of Computer Science, RLJIT   5/23/2012

Weitere ähnliche Inhalte

Andere mochten auch

12.1. short functional text
12.1. short functional text12.1. short functional text
12.1. short functional text
Heriyono Yono
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
44t
 
Big mac to rice burger
Big mac to rice burgerBig mac to rice burger
Big mac to rice burger
fknd
 
Juran & ishikawa
Juran & ishikawaJuran & ishikawa
Juran & ishikawa
swastika_p
 

Andere mochten auch (14)

12.1. short functional text
12.1. short functional text12.1. short functional text
12.1. short functional text
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Dahoam
DahoamDahoam
Dahoam
 
Kotler mm13e media_09
Kotler mm13e media_09Kotler mm13e media_09
Kotler mm13e media_09
 
Session 9 10,-store_location
Session 9 10,-store_locationSession 9 10,-store_location
Session 9 10,-store_location
 
Analysis of competition_1
Analysis of competition_1Analysis of competition_1
Analysis of competition_1
 
Big mac to rice burger
Big mac to rice burgerBig mac to rice burger
Big mac to rice burger
 
Juran & ishikawa
Juran & ishikawaJuran & ishikawa
Juran & ishikawa
 
Tqm in hrm
Tqm in hrmTqm in hrm
Tqm in hrm
 
Baromètre TIC 2013 de la Wallonie. Citoyens. Entreprises. Education
Baromètre TIC 2013 de la Wallonie. Citoyens. Entreprises. EducationBaromètre TIC 2013 de la Wallonie. Citoyens. Entreprises. Education
Baromètre TIC 2013 de la Wallonie. Citoyens. Entreprises. Education
 
Thèse professionnelle "Quel avenir pour les jeux vidéos en 2016?"
Thèse professionnelle "Quel avenir pour les jeux vidéos en 2016?"Thèse professionnelle "Quel avenir pour les jeux vidéos en 2016?"
Thèse professionnelle "Quel avenir pour les jeux vidéos en 2016?"
 
E portfolio hesso-fribourg-journee2-13-10-14
E portfolio hesso-fribourg-journee2-13-10-14E portfolio hesso-fribourg-journee2-13-10-14
E portfolio hesso-fribourg-journee2-13-10-14
 
10 tactiques SEO pour 2016
10 tactiques SEO pour 201610 tactiques SEO pour 2016
10 tactiques SEO pour 2016
 
Le site internet est-il (bientôt) mort ?
Le site internet est-il (bientôt) mort ?Le site internet est-il (bientôt) mort ?
Le site internet est-il (bientôt) mort ?
 

Ähnlich wie Jumble slover srivinay

Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxRunning Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
todd521
 

Ähnlich wie Jumble slover srivinay (20)

Information systems a revision
Information systems  a revisionInformation systems  a revision
Information systems a revision
 
Investigating the Impact of Network Topology on the Processing Times of SDN C...
Investigating the Impact of Network Topology on the Processing Times of SDN C...Investigating the Impact of Network Topology on the Processing Times of SDN C...
Investigating the Impact of Network Topology on the Processing Times of SDN C...
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
 
Grid computing & its applications
Grid computing & its applicationsGrid computing & its applications
Grid computing & its applications
 
Loosely-Coupled Architecture - how to get rid of the domino effect
Loosely-Coupled Architecture - how to get rid of the domino effectLoosely-Coupled Architecture - how to get rid of the domino effect
Loosely-Coupled Architecture - how to get rid of the domino effect
 
SIRG-BSU_7_1.pptx
SIRG-BSU_7_1.pptxSIRG-BSU_7_1.pptx
SIRG-BSU_7_1.pptx
 
SIRG-BSU_7.pptx
SIRG-BSU_7.pptxSIRG-BSU_7.pptx
SIRG-BSU_7.pptx
 
81202015
8120201581202015
81202015
 
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxRunning Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
 
Coding openflow enable network
Coding openflow enable networkCoding openflow enable network
Coding openflow enable network
 
IRJET - Rain Technology
IRJET - Rain TechnologyIRJET - Rain Technology
IRJET - Rain Technology
 
Cloud Technologies for Microsoft Computational Biology Tools
Cloud Technologies for Microsoft Computational Biology ToolsCloud Technologies for Microsoft Computational Biology Tools
Cloud Technologies for Microsoft Computational Biology Tools
 
Grid Computing in a Commodity World (KCCMG, 2005)
Grid Computing in a Commodity World (KCCMG, 2005)Grid Computing in a Commodity World (KCCMG, 2005)
Grid Computing in a Commodity World (KCCMG, 2005)
 
Csc341 – Lecture 1 network management
Csc341 – Lecture 1 network managementCsc341 – Lecture 1 network management
Csc341 – Lecture 1 network management
 
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based NetworksAnalytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
 
Module 1.1 CCN.pptx
Module 1.1 CCN.pptxModule 1.1 CCN.pptx
Module 1.1 CCN.pptx
 
B0781013215
B0781013215B0781013215
B0781013215
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
 
Review on Green Networking Solutions
Review on Green Networking SolutionsReview on Green Networking Solutions
Review on Green Networking Solutions
 
C017631521
C017631521C017631521
C017631521
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

Jumble slover srivinay

  • 1. OSI LAYERS 1 Department of Computer Science, RLJIT 5/23/2012
  • 2. Jumble Solver (Kaun Banega Scorepathi) on OSI LAYERS 2 Department of Computer Science, RLJIT 5/23/2012
  • 3. giitennonrkrewt ? 3 Department of Computer Science, RLJIT 5/23/2012
  • 4. Internetworking  4 Department of Computer Science, RLJIT 5/23/2012
  • 5. Internetworking The art and science of connecting individual local-area networks (LANs) to create wide-area networks (WANs) , and connecting WANs to form even larger WANs. 5 Department of Computer Science, RLJIT 5/23/2012
  • 6. scaeannoitulp ? 6 Department of Computer Science, RLJIT 5/23/2012
  • 7. encapsulation  7 Department of Computer Science, RLJIT 5/23/2012
  • 8. Encapsulation The above figure reveals another aspect of data communication in the OSI model: encapsulation. A packet ( header and data) at level 7 is encapsulated in a packet at level 6. The whole packet at level 6 is encapsulated in a packet at level 5, and so on. In other words, the data portion of a packet at level N-1 carries the whole packet from level N. The concept is called encapsulation. 8 Department of Computer Science, RLJIT 5/23/2012
  • 9. chnistaoisnnyor ? 9 Department of Computer Science, RLJIT 5/23/2012
  • 10. synchronization  10 Department of Computer Science, RLJIT 5/23/2012
  • 11. Synchronization The session layer allows a process to add checkpoints , or synchronization points, to a stream of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert checkpoints after every 100 pages to ensure that each 100-page unit is received and acknowledged independently. In this case, if a crash happens during the transmission of page 523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages previous to 501 need not be resent. 11 Department of Computer Science, RLJIT 5/23/2012
  • 12. geotntfimarna ? 12 Department of Computer Science, RLJIT 5/23/2012
  • 13. fragmentation  13 Department of Computer Science, RLJIT 5/23/2012
  • 14. Fragmentation Fragmentation is the process of breaking a packet into smaller pieces. The receiving system reassembles the pieces into the original packets. 14 Department of Computer Science, RLJIT 5/23/2012
  • 15. ritcnyepno ? 15 Department of Computer Science, RLJIT 5/23/2012
  • 16. encryption  16 Department of Computer Science, RLJIT 5/23/2012
  • 17. Encryption To carry sensitive information, a system must be able to ensure privacy. Encryption means that the sender transforms the original information to another form and sends the resulting message out over the network. Decryption reverses the original process to transform the message back to its original form. 17 Department of Computer Science, RLJIT 5/23/2012
  • 18. ltpcooor ? 18 Department of Computer Science, RLJIT 5/23/2012
  • 19. protocol  19 Department of Computer Science, RLJIT 5/23/2012
  • 20. protocol A protocol is a set of rules that govern data communications 20 Department of Computer Science, RLJIT 5/23/2012
  • 21. THANK YOU! 21 Department of Computer Science, RLJIT 5/23/2012
  • 22. 22 Department of Computer Science, RLJIT 5/23/2012
  • 23. 23 Department of Computer Science, RLJIT 5/23/2012