SlideShare a Scribd company logo
1 of 27
Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Network Layer Electrical and/or Optical Signals Application A Application B Data Link Layer Physical Layer Network Layer Data Link Layer Physical Layer Communication Network Figure 2.6 Review of seven layers
Data Link Control ,[object Object],[object Object],[object Object],[object Object],[object Object],WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998
Data Link Layer WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998
WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998
Peer-to-peer protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],Physical link network
1 2 Physical layer entity Data link layer entity 3 Network layer entity Physical Layer Data link Layer Physical Layer Data link Layer A B A B Packets Packets Frames (a) (b) Peer-to-peer protocol across a single hop 1. take packets 2. form frame 3. transfer through Physical layer 5. deliver to network layer Several pairs of data link & physical entities Only one network layer entity, a router may connect several different networks 4. Pass up 3 2 1 1 2 2 1 3 2 1 1 2 2 1 2 1 Medium
Physical Layer Data link Layer Physical Layer Data link Layer End system  Network Layer Network Layer Physical Layer Data link Layer Network Layer Physical Layer Data link Layer Network Layer Transport Layer Transport Layer Messages Messages Segments End system  Network Peer-to-peer protocol operating end-to-end across network
Medium A B 3 C 3 4 3 4 End System  End System  Network 1 2 Physical layer entity Data link layer entity Network layer entity Network layer entity Transport layer entity Figure 5.4 Peer-to-peer protocol operating end-to-end across network 1. Layer 4 not in middle  2.Data go up and down in router 3. Different paths 4. Out of order, delay, duplicate, lost 3 2 1 1 2 2 1 3 2 1 1 2 2 1 2 1 2 1 1 2 2 1 2 1 2 1 2 1 1 2 3 3 4
Service models ,[object Object],[object Object],[object Object]
1 2 3 4 5 Data Data Data Data ACK/NAK ACK/NAK ACK/NAK ACK/NAK End-to-end  Hop-by-hop Figure 5.7 Adaptation functions may be implemented end-to-end or hop-by-hop  Data are ACK or NAK by the other end Data are ACK or NAK by each hop 1 2 3 4 5 Data Data Data ACK/NAK Data
End-to-end versus hop-by-hop (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],--Adaptations are implemented at which layer(s)? Hop-by-hop:  End-by-End: Data link  & network layer Transport & application layer
End-to-end versus hop-by-hop (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ARQ (Automatic Repeat Request) protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Typical ARQ  protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stop-and-Wait ARQ ,[object Object],[object Object],[object Object],[object Object]
A B One  frame  ACK Another  frame ACK time Another frame Figure 5.9 Stop-and-Wait ARQ ,[object Object],[object Object],[object Object],Any Problem with it? Transmitted frame may lost, the acknowledgment may lost. How to solve? Set up timer, when timer times out, resends the frame
(a)  Frame 1 lost or badly garbled A B One frame   Another  frame ACK The  frame ACK time Time-out Another frame (b)  ACK lost A B One frame   Another frame ACK the frame ACK time Time-out Another frame ACK Figure 5.9 Using timer to retransmit the frame when a frame or acknowledgement lost Any problem? Frame was received twice when ACK lost. How to solve it? Introduce sequence number (SN) into frame and discard  duplicate frame
Go-back-N ARQ ,[object Object],[object Object],[object Object]
A B fr 0 time fr 1 fr 2 fr 3 fr 4 fr 5 fr 6 fr 3 ACK1 error Out-of-sequence frames Go-Back-4: 4 frames are outstanding; so go back 4 fr 5 fr 6 fr 4 fr 7 fr 8 fr 9 ACK2 ACK3 ACK4 ACK5 ACK6 ACK7 ACK8 ACK9 Figure 5.13 Basic Go-back-N ARQ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sliding Window Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sliding Window Figure 10-11 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998
Sliding window ,[object Object],[object Object]
WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 Sender Sliding Window
Figure 10-13 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 Receiver Sliding Window
Figure 10-14 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 Sliding Window Example
Figure 10-14-continued WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 Sender
WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 Receiver

More Related Content

What's hot

3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link ControlJeoffnaRuth
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lanyanhul
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
12 multiple access
12 multiple access12 multiple access
12 multiple accessbheemsain
 
Multiple access in Communication Netwroks
Multiple access in Communication NetwroksMultiple access in Communication Netwroks
Multiple access in Communication Netwroksaounraza007
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Accessanushkashastri
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 

What's hot (20)

3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Mac
MacMac
Mac
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lan
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
multiple access
 multiple access multiple access
multiple access
 
12 multiple access
12 multiple access12 multiple access
12 multiple access
 
Multiple access in Communication Netwroks
Multiple access in Communication NetwroksMultiple access in Communication Netwroks
Multiple access in Communication Netwroks
 
13 atm
13 atm13 atm
13 atm
 
Mac layer
Mac  layerMac  layer
Mac layer
 
07 data linkcontrol
07 data linkcontrol07 data linkcontrol
07 data linkcontrol
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 

Similar to application layers

09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.pptShaliniKumariGupta1
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptxTejasRao8
 
Flow Control (1).ppt
Flow Control (1).pptFlow Control (1).ppt
Flow Control (1).pptsarthakgithub
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eadpeer
 
Data link control & protocol concepts
Data link control & protocol conceptsData link control & protocol concepts
Data link control & protocol conceptsRaji Lakshmi
 
Datalink control(framing,protocols)
Datalink control(framing,protocols)Datalink control(framing,protocols)
Datalink control(framing,protocols)Hira Awan
 
Data Link Layer of OSI Model responsibilities
Data Link Layer of OSI Model responsibilitiesData Link Layer of OSI Model responsibilities
Data Link Layer of OSI Model responsibilitiesHemantPareek21
 
Data linkcontrol
Data linkcontrolData linkcontrol
Data linkcontrolBablu Shofi
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer kavish dani
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link controlVishal kakade
 
DataLinkControl.ppt
DataLinkControl.pptDataLinkControl.ppt
DataLinkControl.pptMaddalaSeshu
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batchJaimin Jani
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxk2w9psdb96
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continuedkavish dani
 

Similar to application layers (20)

09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt
 
Unit IV_Flow.pptx
Unit IV_Flow.pptxUnit IV_Flow.pptx
Unit IV_Flow.pptx
 
Flow Control (1).ppt
Flow Control (1).pptFlow Control (1).ppt
Flow Control (1).ppt
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9e
 
Data link control & protocol concepts
Data link control & protocol conceptsData link control & protocol concepts
Data link control & protocol concepts
 
Datalink control(framing,protocols)
Datalink control(framing,protocols)Datalink control(framing,protocols)
Datalink control(framing,protocols)
 
Data Link Layer of OSI Model responsibilities
Data Link Layer of OSI Model responsibilitiesData Link Layer of OSI Model responsibilities
Data Link Layer of OSI Model responsibilities
 
Data_Link_Layer.ppt
Data_Link_Layer.pptData_Link_Layer.ppt
Data_Link_Layer.ppt
 
Data linkcontrol
Data linkcontrolData linkcontrol
Data linkcontrol
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Chapter 5 my_ppt
Chapter 5 my_pptChapter 5 my_ppt
Chapter 5 my_ppt
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
07 data linkcontrol
07 data linkcontrol07 data linkcontrol
07 data linkcontrol
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
DataLinkControl.ppt
DataLinkControl.pptDataLinkControl.ppt
DataLinkControl.ppt
 
Data link control
Data link controlData link control
Data link control
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continued
 

More from Mahesh Kumar Attri (20)

Web technologies
Web technologiesWeb technologies
Web technologies
 
Plant layout
Plant layoutPlant layout
Plant layout
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Ch08 1
Ch08 1Ch08 1
Ch08 1
 
Lect21 09-11
Lect21 09-11Lect21 09-11
Lect21 09-11
 
work measurement
work measurementwork measurement
work measurement
 
production management
production managementproduction management
production management
 
Fom (pm)
Fom (pm)Fom (pm)
Fom (pm)
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Data Communication
Data CommunicationData Communication
Data Communication
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
International marketing
International marketingInternational marketing
International marketing
 
Ch01
Ch01Ch01
Ch01
 
OSI models
OSI modelsOSI models
OSI models
 
1.prallelism
1.prallelism1.prallelism
1.prallelism
 
As department
As departmentAs department
As department
 
2.computer org.
2.computer org.2.computer org.
2.computer org.
 
1.prallelism
1.prallelism1.prallelism
1.prallelism
 
Staffing & manpower planning(9)
Staffing & manpower planning(9)Staffing & manpower planning(9)
Staffing & manpower planning(9)
 
Science & art (2) 2
Science & art (2) 2Science & art (2) 2
Science & art (2) 2
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

application layers

  • 1. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Network Layer Electrical and/or Optical Signals Application A Application B Data Link Layer Physical Layer Network Layer Data Link Layer Physical Layer Communication Network Figure 2.6 Review of seven layers
  • 2.
  • 3. Data Link Layer WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998
  • 4. WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998
  • 5.
  • 6. 1 2 Physical layer entity Data link layer entity 3 Network layer entity Physical Layer Data link Layer Physical Layer Data link Layer A B A B Packets Packets Frames (a) (b) Peer-to-peer protocol across a single hop 1. take packets 2. form frame 3. transfer through Physical layer 5. deliver to network layer Several pairs of data link & physical entities Only one network layer entity, a router may connect several different networks 4. Pass up 3 2 1 1 2 2 1 3 2 1 1 2 2 1 2 1 Medium
  • 7. Physical Layer Data link Layer Physical Layer Data link Layer End system  Network Layer Network Layer Physical Layer Data link Layer Network Layer Physical Layer Data link Layer Network Layer Transport Layer Transport Layer Messages Messages Segments End system  Network Peer-to-peer protocol operating end-to-end across network
  • 8. Medium A B 3 C 3 4 3 4 End System  End System  Network 1 2 Physical layer entity Data link layer entity Network layer entity Network layer entity Transport layer entity Figure 5.4 Peer-to-peer protocol operating end-to-end across network 1. Layer 4 not in middle 2.Data go up and down in router 3. Different paths 4. Out of order, delay, duplicate, lost 3 2 1 1 2 2 1 3 2 1 1 2 2 1 2 1 2 1 1 2 2 1 2 1 2 1 2 1 1 2 3 3 4
  • 9.
  • 10. 1 2 3 4 5 Data Data Data Data ACK/NAK ACK/NAK ACK/NAK ACK/NAK End-to-end Hop-by-hop Figure 5.7 Adaptation functions may be implemented end-to-end or hop-by-hop Data are ACK or NAK by the other end Data are ACK or NAK by each hop 1 2 3 4 5 Data Data Data ACK/NAK Data
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. (a) Frame 1 lost or badly garbled A B One frame Another frame ACK The frame ACK time Time-out Another frame (b) ACK lost A B One frame Another frame ACK the frame ACK time Time-out Another frame ACK Figure 5.9 Using timer to retransmit the frame when a frame or acknowledgement lost Any problem? Frame was received twice when ACK lost. How to solve it? Introduce sequence number (SN) into frame and discard duplicate frame
  • 18.
  • 19.
  • 20.
  • 21. Sliding Window Figure 10-11 WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998
  • 22.
  • 23. WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998 Sender Sliding Window
  • 24. Figure 10-13 WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998 Receiver Sliding Window
  • 25. Figure 10-14 WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998 Sliding Window Example
  • 26. Figure 10-14-continued WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998 Sender
  • 27. WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998 Receiver