Jumble slover srivinay

  • 89 views
Uploaded on

A jumble solver game on OSI layers

A jumble solver game on OSI layers

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
89
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
2
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. OSI LAYERS1 Department of Computer Science, RLJIT 5/23/2012
  • 2. Jumble Solver (Kaun Banega Scorepathi) on OSI LAYERS2 Department of Computer Science, RLJIT 5/23/2012
  • 3. giitennonrkrewt ?3 Department of Computer Science, RLJIT 5/23/2012
  • 4. Internetworking 4 Department of Computer Science, RLJIT 5/23/2012
  • 5. Internetworking The art and science of connecting individual local-area networks(LANs) to create wide-area networks (WANs) , and connecting WANsto form even larger WANs. 5 Department of Computer Science, RLJIT 5/23/2012
  • 6. scaeannoitulp ?6 Department of Computer Science, RLJIT 5/23/2012
  • 7. encapsulation 7 Department of Computer Science, RLJIT 5/23/2012
  • 8. Encapsulation The above figure reveals another aspect of data communication in the OSI model:encapsulation. A packet ( header and data) at level 7 is encapsulated in a packet at level 6. The whole packet at level 6 is encapsulated in a packet at level 5, and so on. In other words, the data portion of a packet at level N-1 carries the whole packet from level N.The concept is called encapsulation. 8 Department of Computer Science, RLJIT 5/23/2012
  • 9. chnistaoisnnyor ?9 Department of Computer Science, RLJIT 5/23/2012
  • 10. synchronization 10 Department of Computer Science, RLJIT 5/23/2012
  • 11. Synchronization The session layer allows a process to add checkpoints , or synchronization points, to a streamof data. For example, if a system is sending a file of 2000 pages, it is advisable to insertcheckpoints after every 100 pages to ensure that each 100-page unit is received andacknowledged independently. In this case, if a crash happens during the transmission of page523, the only pages that need to be resent after system recovery are pages 501 to 523. Pagesprevious to 501 need not be resent. 11 Department of Computer Science, RLJIT 5/23/2012
  • 12. geotntfimarna ?12 Department of Computer Science, RLJIT 5/23/2012
  • 13. fragmentation 13 Department of Computer Science, RLJIT 5/23/2012
  • 14. Fragmentation Fragmentation is the process of breaking a packet into smaller pieces. The receiving systemreassembles the pieces into the original packets. 14 Department of Computer Science, RLJIT 5/23/2012
  • 15. ritcnyepno ?15 Department of Computer Science, RLJIT 5/23/2012
  • 16. encryption 16 Department of Computer Science, RLJIT 5/23/2012
  • 17. Encryption To carry sensitive information, a system must be able to ensureprivacy. Encryption means that the sender transforms the originalinformation to another form and sends the resulting message out overthe network. Decryption reverses the original process to transform themessage back to its original form. 17 Department of Computer Science, RLJIT 5/23/2012
  • 18. ltpcooor ?18 Department of Computer Science, RLJIT 5/23/2012
  • 19. protocol 19 Department of Computer Science, RLJIT 5/23/2012
  • 20. protocol A protocol is a set of rules thatgovern data communications20 Department of Computer Science, RLJIT 5/23/2012
  • 21. THANK YOU!21 Department of Computer Science, RLJIT 5/23/2012
  • 22. 22 Department of Computer Science, RLJIT 5/23/2012
  • 23. 23 Department of Computer Science, RLJIT 5/23/2012