The document discusses key concepts in networking including internetworking, encapsulation, synchronization, fragmentation, encryption, and protocols. Intenetworking is defined as connecting local area networks to create wide area networks and connecting wide area networks. Encapsulation involves adding header and data packets at each layer of the OSI model. Synchronization allows adding checkpoints to data streams. Fragmentation is the process of breaking packets into smaller pieces for transmission. Encryption transforms information during transmission to ensure privacy. Protocols are sets of rules that govern data communication.
5. Internetworking
The art and science of connecting individual local-area networks
(LANs) to create wide-area networks (WANs) , and connecting WANs
to form even larger WANs.
5 Department of Computer Science, RLJIT 5/23/2012
8. Encapsulation
The above figure reveals another aspect of data communication in the OSI model:
encapsulation.
A packet ( header and data) at level 7 is encapsulated in a packet at level 6.
The whole packet at level 6 is encapsulated in a packet at level 5, and so on.
In other words, the data portion of a packet at level N-1 carries the whole packet from level N.
The concept is called encapsulation.
8 Department of Computer Science, RLJIT 5/23/2012
11. Synchronization
The session layer allows a process to add checkpoints , or synchronization points, to a stream
of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert
checkpoints after every 100 pages to ensure that each 100-page unit is received and
acknowledged independently. In this case, if a crash happens during the transmission of page
523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages
previous to 501 need not be resent.
11 Department of Computer Science, RLJIT 5/23/2012
14. Fragmentation
Fragmentation is the process of breaking a packet into smaller pieces. The receiving system
reassembles the pieces into the original packets.
14 Department of Computer Science, RLJIT 5/23/2012
15. ritcnyepno ?
15 Department of Computer Science, RLJIT 5/23/2012
16. encryption
16 Department of Computer Science, RLJIT 5/23/2012
17. Encryption
To carry sensitive information, a system must be able to ensure
privacy. Encryption means that the sender transforms the original
information to another form and sends the resulting message out over
the network. Decryption reverses the original process to transform the
message back to its original form.
17 Department of Computer Science, RLJIT 5/23/2012
18. ltpcooor ?
18 Department of Computer Science, RLJIT 5/23/2012
19. protocol
19 Department of Computer Science, RLJIT 5/23/2012
20. protocol
A protocol is a set of rules that
govern data communications
20 Department of Computer Science, RLJIT 5/23/2012
21. THANK YOU!
21 Department of Computer Science, RLJIT 5/23/2012
22. 22 Department of Computer Science, RLJIT 5/23/2012
23. 23 Department of Computer Science, RLJIT 5/23/2012