The document discusses computer networks and the OSI model. It covers the seven layers of the OSI model in detail, describing the functions of each layer. It also discusses other topics related to computer networks, such as network goals, applications, structures, architectures, protocols, bandwidth, physical layer components, routing algorithms, and IP addressing.
The document provides an overview of computer networks and the OSI model. It discusses the seven layers of the OSI model from physical to application layer and the functions of each layer. It also covers topics like network goals, applications, architectures, services, and bandwidth.
The document discusses the OSI model and TCP/IP model for networking. It provides details on the seven layers of the OSI model and five layers of the TCP/IP model. Key points covered include functions of each layer like the physical layer dealing with physical connections, data link layer dealing with MAC addresses, network layer dealing with logical addressing, and transport layer dealing with reliable data transmission.
OSI - OSI Reference Model and TCP (Transmission Control Protocol)Dktechnozone.in
The document discusses network models and the OSI reference model. It describes the seven layers of the OSI model and how layering in the model prevents changes in one layer from affecting others. It also discusses how layering and standardization make network design, development, and troubleshooting easier. Protocols are described as sets of rules that allow entities to communicate. Common protocols like TCP/IP, HTTP, and FTP are discussed. Packet encapsulation and how data is passed between layers is summarized.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions and communication protocols used in computer networks. It provides a structured approach to understanding and designing network architectures, allowing different systems and devices to communicate with each other effectively.
The OSI model consists of seven interconnected layers, each responsible for specific functions and services. Here is a brief description of each layer:
Physical Layer: The physical layer is the lowest layer of the OSI model. It deals with the physical transmission of data over the network medium, including cables, connectors, and electrical signals. It defines characteristics such as voltage levels, data rates, and physical connectors.
Data Link Layer: The data link layer provides reliable point-to-point or point-to-multipoint data transfer between network nodes. It is responsible for framing data into packets, error detection and correction, and flow control. Ethernet switches operate at this layer.
Network Layer: The network layer manages the routing and forwarding of data packets across different networks. It determines the optimal path for data transmission, handles addressing, and controls congestion in the network. Routers operate at this layer.
Transport Layer: The transport layer ensures reliable end-to-end data delivery between hosts. It segments data from the upper layers into smaller packets, manages data flow, and provides error recovery mechanisms. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at this layer.
Session Layer: The session layer establishes, manages, and terminates communication sessions between applications. It provides services such as session establishment, maintenance, and synchronization, allowing multiple applications to communicate and coordinate their activities.
Presentation Layer: The presentation layer is responsible for data representation, encryption, compression, and translation. It ensures that data from the application layer is in a format that can be understood by the receiving system.
Application Layer: The application layer is the topmost layer of the OSI model. It provides a direct interface between the network and the applications. It includes protocols and services that support specific applications, such as HTTP for web browsing, SMTP for email, and FTP for file transfer.
The OSI model follows a layered approach, where each layer performs specific functions while relying on the services provided by the layers below it. This modular design allows for interoperability between different network technologies and facilitates easier troubleshooting and development of network protocols.
It's important to note that the OSI model is a conceptual framework and not a specific implementation. Actual networking protocols, such as TCP/IP, do not strictly adhere to the OSI model but borrow concepts from it.
The document discusses various topics related to computer networks including metropolitan area networks, wide area networks, wireless networks, home network categories, network software, protocol hierarchies, connection-oriented and connectionless services, service primitives, and reference models such as OSI and TCP/IP. It provides details on the seven layers of the OSI model including the functions and services provided by each layer.
The document discusses the OSI reference model and TCP/IP reference model. The OSI model divides network architecture into seven layers - physical, data link, network, transport, session, presentation and application layer. The TCP/IP model has four layers - process/application layer, host-to-host layer, internet layer, and network access layer. The TCP/IP model was created by the US Department of Defense to allow networks to survive disruptions like nuclear war.
The network layer is responsible for packet forwarding including routing through intermediate routers. It controls the operation of the subnet and decides which physical path data takes. Routing is the process of moving packets from source to destination, usually performed by routers. Internetworking connects different network technologies like LANs and WANs using devices like routers. The network layer uses IP addressing to identify devices and enable routing. Private IP addresses identify internal devices while public addresses provide external internet access.
The document provides an overview of computer networks and the OSI model. It discusses the seven layers of the OSI model from physical to application layer and the functions of each layer. It also covers topics like network goals, applications, architectures, services, and bandwidth.
The document discusses the OSI model and TCP/IP model for networking. It provides details on the seven layers of the OSI model and five layers of the TCP/IP model. Key points covered include functions of each layer like the physical layer dealing with physical connections, data link layer dealing with MAC addresses, network layer dealing with logical addressing, and transport layer dealing with reliable data transmission.
OSI - OSI Reference Model and TCP (Transmission Control Protocol)Dktechnozone.in
The document discusses network models and the OSI reference model. It describes the seven layers of the OSI model and how layering in the model prevents changes in one layer from affecting others. It also discusses how layering and standardization make network design, development, and troubleshooting easier. Protocols are described as sets of rules that allow entities to communicate. Common protocols like TCP/IP, HTTP, and FTP are discussed. Packet encapsulation and how data is passed between layers is summarized.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions and communication protocols used in computer networks. It provides a structured approach to understanding and designing network architectures, allowing different systems and devices to communicate with each other effectively.
The OSI model consists of seven interconnected layers, each responsible for specific functions and services. Here is a brief description of each layer:
Physical Layer: The physical layer is the lowest layer of the OSI model. It deals with the physical transmission of data over the network medium, including cables, connectors, and electrical signals. It defines characteristics such as voltage levels, data rates, and physical connectors.
Data Link Layer: The data link layer provides reliable point-to-point or point-to-multipoint data transfer between network nodes. It is responsible for framing data into packets, error detection and correction, and flow control. Ethernet switches operate at this layer.
Network Layer: The network layer manages the routing and forwarding of data packets across different networks. It determines the optimal path for data transmission, handles addressing, and controls congestion in the network. Routers operate at this layer.
Transport Layer: The transport layer ensures reliable end-to-end data delivery between hosts. It segments data from the upper layers into smaller packets, manages data flow, and provides error recovery mechanisms. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at this layer.
Session Layer: The session layer establishes, manages, and terminates communication sessions between applications. It provides services such as session establishment, maintenance, and synchronization, allowing multiple applications to communicate and coordinate their activities.
Presentation Layer: The presentation layer is responsible for data representation, encryption, compression, and translation. It ensures that data from the application layer is in a format that can be understood by the receiving system.
Application Layer: The application layer is the topmost layer of the OSI model. It provides a direct interface between the network and the applications. It includes protocols and services that support specific applications, such as HTTP for web browsing, SMTP for email, and FTP for file transfer.
The OSI model follows a layered approach, where each layer performs specific functions while relying on the services provided by the layers below it. This modular design allows for interoperability between different network technologies and facilitates easier troubleshooting and development of network protocols.
It's important to note that the OSI model is a conceptual framework and not a specific implementation. Actual networking protocols, such as TCP/IP, do not strictly adhere to the OSI model but borrow concepts from it.
The document discusses various topics related to computer networks including metropolitan area networks, wide area networks, wireless networks, home network categories, network software, protocol hierarchies, connection-oriented and connectionless services, service primitives, and reference models such as OSI and TCP/IP. It provides details on the seven layers of the OSI model including the functions and services provided by each layer.
The document discusses the OSI reference model and TCP/IP reference model. The OSI model divides network architecture into seven layers - physical, data link, network, transport, session, presentation and application layer. The TCP/IP model has four layers - process/application layer, host-to-host layer, internet layer, and network access layer. The TCP/IP model was created by the US Department of Defense to allow networks to survive disruptions like nuclear war.
The network layer is responsible for packet forwarding including routing through intermediate routers. It controls the operation of the subnet and decides which physical path data takes. Routing is the process of moving packets from source to destination, usually performed by routers. Internetworking connects different network technologies like LANs and WANs using devices like routers. The network layer uses IP addressing to identify devices and enable routing. Private IP addresses identify internal devices while public addresses provide external internet access.
The document discusses the CCNA certification exam and provides details about its format, benefits, and requirements. It then covers networking concepts like network devices, topologies, protocols, and the OSI model. Key points include that the CCNA exam tests knowledge of networking fundamentals, has multiple choice and simulation questions, and benefits career advancement. It also defines common network components, topologies, and each layer of the OSI model.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, standards, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, IEEE 802 standards, and an explanation of each of the seven layers of the OSI model.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, protocols, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, the 7 layers of the OSI model and what each layer is responsible for, and how data is encapsulated as it moves through the layers from physical to application.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides an overview of networking concepts including the purpose of networking, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs/WANs, virtual private networks, bandwidth, the OSI model, and IEEE 802 standards.
Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary standards for networking and for operating system involved in networking functions.
This document provides an introduction to computer networks and network topologies. It discusses the basics of computer networks including definitions, examples, advantages and applications. It also describes different network topologies like bus, star, ring and mesh and analyzes their advantages and disadvantages. Finally, it introduces two common reference models for networking - OSI model and TCP/IP model, explaining their layers and differences between the two approaches.
This document provides an overview of computer network layers and protocols. It discusses the OSI reference model and its seven layers - physical, data link, network, transport, session, presentation, and application layer. It describes the functions of each layer and some examples of protocols used. The document also covers topics like connection-oriented vs connectionless services, network architectures, and network goals of communication and resource sharing.
This document discusses network protocol models, including the OSI 7-layer model and IEEE 802 project model. It describes the purpose of having standardized network models and some of the organizations that define these models, such as ISO and IEEE. Each layer of the OSI model is defined, from the physical layer up to the application layer, along with example protocols and functions of each layer. The relationship between the layers is illustrated. The IEEE 802 project categories and its enhancements to the OSI model by dividing the data link layer are also summarized.
This document discusses the OSI model, which defines 7 layers of network communication. It defines each layer, their functions, and the encapsulation process between layers. Key points covered include defining the 7 layers and their functions, comparing TCP and UDP protocols, and stating that OSI model allows different hardware/software to communicate by organizing networks into well-defined modules. The purpose of OSI is to represent a perfect network and organize it into functional layers to allow troubleshooting and different technologies to work together across networks.
This document provides an overview of the CS303: Computer Networks course, including the evaluation scheme, topics to be covered, and introductory information on data communications, networks, protocols, layered tasks, the OSI model, TCP/IP protocol suite, and addressing in networks. The key topics include data communication components and data flow, physical network structures and categories, elements of communication protocols, layered approaches to tasks, the seven layers of the OSI model and functions of each layer, comparison of OSI and TCP/IP models, and different types of addresses used including physical, logical, port, and specific addresses.
The document discusses network layer models. It describes the seven layers of the OSI model and the four layers of the TCP/IP model. It explains how each layer functions, such as the physical layer transmitting signals and the application layer enabling programs like web browsers. It then compares the two models, noting similarities like layered structures but also differences like OSI having more defined layers and TCP/IP being more practical. The purpose of network layer models is to help understand complex network interactions by breaking them into standardized, interconnected layers.
This document discusses layered network models, specifically the OSI model and TCP/IP model. It provides an overview of each layer in both models and their functions. The key points are:
- The OSI model defines 7 layers that break communication into smaller parts to simplify the process and allow different hardware/software to work together.
- The TCP/IP model has 4 layers - application, transport, internet, and network access. It is used widely on the internet.
- Each layer adds header information to data as it moves down the stack. This encapsulation allows communication between layers and across networks.
This document provides an overview of multimedia communication and networks. It discusses open data network models and the layered OSI model. It describes the narrow waist model of the Internet and some of its limitations. It also discusses transport protocols like TCP and UDP, addressing in TCP/IP, and popular applications that use UDP. The document is an introductory unit on network fundamentals and protocols.
The document provides an overview of computer networking, including definitions of key terms like computer network and network topology. It discusses why networks are needed, how they work, common network models like OSI and TCP/IP. It also covers topics like IP addressing, different network types (LAN, MAN, WAN), common network devices, applications, and security concerns.
The document provides information about networking certifications and the CCNA exam. It discusses the CCNA exam number, total marks, duration, passing score, number of questions, question types, and benefits of obtaining the certification. It also covers networking topics like data networks, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs, WANs, virtual private networks, bandwidth, internetworking devices, network structure and hierarchy, IEEE 802 standards, and the OSI model.
The document discusses network layering models and protocols. It describes:
1. The OSI reference model which has 7 layers from physical to application layer and defines the function of each layer.
2. The TCP/IP reference model which has 4 layers from host-to-network to application layer and the protocols used at each layer.
3. The key concepts of layers, protocols, services, interfaces, and how layers communicate with PDUs and SDUs.
The document compares the OSI and TCP/IP models and provides details on each layer of the OSI model.
The key points are:
1) The OSI model is an internationally standardized network architecture consisting of 7 layers, while TCP/IP was developed independently and its layers do not exactly match the OSI layers.
2) Each OSI layer has a specific function, with the physical layer defining physical interfaces, the data link layer handling framing and addressing, the network layer routing packets, and higher layers focusing on reliability and delivering data to applications.
3) TCP/IP uses four types of addresses - physical, logical, port, and application-specific - that correspond to different layers, with physical addresses changing
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
The document discusses the CCNA certification exam and provides details about its format, benefits, and requirements. It then covers networking concepts like network devices, topologies, protocols, and the OSI model. Key points include that the CCNA exam tests knowledge of networking fundamentals, has multiple choice and simulation questions, and benefits career advancement. It also defines common network components, topologies, and each layer of the OSI model.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, standards, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, IEEE 802 standards, and an explanation of each of the seven layers of the OSI model.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, protocols, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, the 7 layers of the OSI model and what each layer is responsible for, and how data is encapsulated as it moves through the layers from physical to application.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides an overview of networking concepts including the purpose of networking, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs/WANs, virtual private networks, bandwidth, the OSI model, and IEEE 802 standards.
Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary standards for networking and for operating system involved in networking functions.
This document provides an introduction to computer networks and network topologies. It discusses the basics of computer networks including definitions, examples, advantages and applications. It also describes different network topologies like bus, star, ring and mesh and analyzes their advantages and disadvantages. Finally, it introduces two common reference models for networking - OSI model and TCP/IP model, explaining their layers and differences between the two approaches.
This document provides an overview of computer network layers and protocols. It discusses the OSI reference model and its seven layers - physical, data link, network, transport, session, presentation, and application layer. It describes the functions of each layer and some examples of protocols used. The document also covers topics like connection-oriented vs connectionless services, network architectures, and network goals of communication and resource sharing.
This document discusses network protocol models, including the OSI 7-layer model and IEEE 802 project model. It describes the purpose of having standardized network models and some of the organizations that define these models, such as ISO and IEEE. Each layer of the OSI model is defined, from the physical layer up to the application layer, along with example protocols and functions of each layer. The relationship between the layers is illustrated. The IEEE 802 project categories and its enhancements to the OSI model by dividing the data link layer are also summarized.
This document discusses the OSI model, which defines 7 layers of network communication. It defines each layer, their functions, and the encapsulation process between layers. Key points covered include defining the 7 layers and their functions, comparing TCP and UDP protocols, and stating that OSI model allows different hardware/software to communicate by organizing networks into well-defined modules. The purpose of OSI is to represent a perfect network and organize it into functional layers to allow troubleshooting and different technologies to work together across networks.
This document provides an overview of the CS303: Computer Networks course, including the evaluation scheme, topics to be covered, and introductory information on data communications, networks, protocols, layered tasks, the OSI model, TCP/IP protocol suite, and addressing in networks. The key topics include data communication components and data flow, physical network structures and categories, elements of communication protocols, layered approaches to tasks, the seven layers of the OSI model and functions of each layer, comparison of OSI and TCP/IP models, and different types of addresses used including physical, logical, port, and specific addresses.
The document discusses network layer models. It describes the seven layers of the OSI model and the four layers of the TCP/IP model. It explains how each layer functions, such as the physical layer transmitting signals and the application layer enabling programs like web browsers. It then compares the two models, noting similarities like layered structures but also differences like OSI having more defined layers and TCP/IP being more practical. The purpose of network layer models is to help understand complex network interactions by breaking them into standardized, interconnected layers.
This document discusses layered network models, specifically the OSI model and TCP/IP model. It provides an overview of each layer in both models and their functions. The key points are:
- The OSI model defines 7 layers that break communication into smaller parts to simplify the process and allow different hardware/software to work together.
- The TCP/IP model has 4 layers - application, transport, internet, and network access. It is used widely on the internet.
- Each layer adds header information to data as it moves down the stack. This encapsulation allows communication between layers and across networks.
This document provides an overview of multimedia communication and networks. It discusses open data network models and the layered OSI model. It describes the narrow waist model of the Internet and some of its limitations. It also discusses transport protocols like TCP and UDP, addressing in TCP/IP, and popular applications that use UDP. The document is an introductory unit on network fundamentals and protocols.
The document provides an overview of computer networking, including definitions of key terms like computer network and network topology. It discusses why networks are needed, how they work, common network models like OSI and TCP/IP. It also covers topics like IP addressing, different network types (LAN, MAN, WAN), common network devices, applications, and security concerns.
The document provides information about networking certifications and the CCNA exam. It discusses the CCNA exam number, total marks, duration, passing score, number of questions, question types, and benefits of obtaining the certification. It also covers networking topics like data networks, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs, WANs, virtual private networks, bandwidth, internetworking devices, network structure and hierarchy, IEEE 802 standards, and the OSI model.
The document discusses network layering models and protocols. It describes:
1. The OSI reference model which has 7 layers from physical to application layer and defines the function of each layer.
2. The TCP/IP reference model which has 4 layers from host-to-network to application layer and the protocols used at each layer.
3. The key concepts of layers, protocols, services, interfaces, and how layers communicate with PDUs and SDUs.
The document compares the OSI and TCP/IP models and provides details on each layer of the OSI model.
The key points are:
1) The OSI model is an internationally standardized network architecture consisting of 7 layers, while TCP/IP was developed independently and its layers do not exactly match the OSI layers.
2) Each OSI layer has a specific function, with the physical layer defining physical interfaces, the data link layer handling framing and addressing, the network layer routing packets, and higher layers focusing on reliability and delivering data to applications.
3) TCP/IP uses four types of addresses - physical, logical, port, and application-specific - that correspond to different layers, with physical addresses changing
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
1. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
COMPUTER NETWORKS
OSI MODEL:
Physical Layer
Data Link
Network
Varna Free University
2. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
Source
1. Computer Networks, Andrew S.
Tanenbaum
2. www.cisco.com
3. www.novell.com
4. www.rad.com
5. www.3com.com
4. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
NETWORK GOALS
The two main benefits of networking computers are…
Communications
Information can be distributed very quickly, such as
email and video conferencing.
Saving Money
Resources such as information, software, and
hardware can be shared.
CPUs and hard disks can be pooled together to
create a more powerful machine.
5. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
APPLICATIONS
A lot of things we take for granted are the result of
computer networks.
• Email
• Chat
• Web sites
• Sharing of documents and pictures
• Accessing a centralized database of information
• Mobile workers
6. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
NETWORK STRUCTURE
The subnet interconnects hosts.
Subnet
Carries messages from host to host. It is made up
of telecommunication lines (i.e. circuits, channels,
trunks) and switching elements (i.e. IMPs, routers).
Hosts
End user machines or computers.
Q: Is the host part of the subnet?
7. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
NETWORK ARCHITECTURES
A set of layers and protocols is called the network
architecture.
1. Protocol Hierarchies
Networks are organized as layers to reduce design
complexity. Each layer offers services to the higher
layers. Between adjacent layers is an interface.
Services – connection oriented and
connectionless.
Interface – defines which primitives and services
the lower layer will offer to the upper layer.
Primitives – operations such as request, indicate,
response, confirm.
8. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
NETWORK ARCHITECTURES
2. Design Issues for the Layers
• Mechanism for connection establishment
• Rules for data transfer
• Error control
• Fast sender swamping a slow receiver
• Inability of processes to accept long messages
• Routing in the case of multiple paths
9. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
The Open Systems Interconnection is the model
developed by the International Standards Organization.
Benefits
• Interconnection of different systems (open)
• Not limited to a single vendor solution
Negative Aspect
• Systems might be less secure
• Systems might be less stable
10. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
1. Physical Layer
a) Convert the logical 1’s and 0’s coming from
layer 2 into electrical signals.
b) Transmission of the electrical signals over a
communication channel.
Main topics:
• Transmission mediums
• Encoding
• Modulation
• RS232 and RS422 standards
• Repeaters
• Hubs (multi-port repeater)
11. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
2. Data Link Layer
a) Error control to compensate for the
imperfections of the physical layer.
b) Flow control to keep a fast sender from
swamping a slow receiver.
Main topics:
• Framing methods
• Error detection and correction methods
• Flow control
• Frame format
• IEEE LAN standards
• Bridges
• Switches (multi-port bridges)
12. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
3. Network Layer
a) Controls the operation of the subnet.
b) Routing packets from source to destination.
c) Logical addressing.
Main topics:
• Internetworking
• Routing algorithms
• Internet Protocol (IP) addressing
• Routers
13. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
4. Transport Layer
a) Provides additional Quality of Service.
b) Heart of the OSI model.
Main topics:
• Connection-oriented and connectionless services
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
14. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
5. Session Layer
a) Allows users on different machines to establish
sessions between them.
b) One of the services is managing dialogue
control.
c) Token management.
d) Synchronization.
15. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
6. Presentation Layer
a) Concerned with the syntax and semantics of the
information.
b) Preserves the meaning of the information.
c) Data compression.
d) Data encryption.
16. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
7. Application Layer
a) Provides protocols that are commonly needed.
Main topics:
• File Transfer Protocol (FTP)
• HyperText Transfer Protocol (HTTP)
• Simple Mail Transfer Protocol (SMTP)
• Simple Network Management Protocol (SNMP)
• Network File System (NFS)
• Telnet
17. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
SERVICES
Each layer provides services to the layer above it.
1. Terminologies
Entities – active elements in each layer (e.g.
process, intelligent I/O chip).
Peer Entities – entities in the same layer on
different machines.
Service Provider – Layer N.
Service User – Layer N + 1.
Service Access Points – places where layer N + 1
can access services offered by layer N.
18. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
SERVICES
2. Connection-Oriented and Connectionless
Connection-Oriented – before data is sent, the
service from the sending computer must establish
a connection with the receiving computer.
Connectionless – data can be sent at any time by
the service from the sending computer.
Q: Is downloading a music file from the Internet
connection-oriented or connectionless?
Q: Is email connection-oriented or connectionless?
19. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
SERVICES
3. Service Primitives
Request – entity wants the service to do some
work
Indicate – entity is to be informed about an event
Response – entity responds to an event
Confirm – entity is to be informed about its request
Sending Computer Receiving Computer
3 Network
1. request
3 Network
2. indicate 3. response
4. confirm
4 Transport 4 Transport
20. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
BANDWIDTH
The capacity of the medium to transmit data.
Analog Bandwidth
• Measurement is in Hertz (Hz) or cycles/sec.
Digital Bandwidth
• Measurement is in bits per second (bps).
Q: Is 100MHz = 100Mbps?
Q: Is 100Mbps = 100MBps?
21. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
Hello
Hello
AH
Hello
AH
PH
Hello
AH
PH
SH
Hello
AH
PH
SH
TH
Hello
AH
PH
SH
TH
NH
Hello
AH
PH
SH
TH
NH
DH DT
Bits
23. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OVERVIEW
1. Signals
• Fourier analysis
• Maximum data rate of a channel
2. Transmission Media
• Guided and Unguided
3. Analog Transmission
• Modulation
• Modems
• RS-232, RS-422
4. Digital Transmission
• Encoding schemes
• Repeaters and hubs
5. Transmission and Switching
• Multiplexing (FDM and TDM)
• Circuit vs. packet switching
24. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
SIGNALS
1. Fourier Analysis
a) All signals can be represented mathematically.
b) A periodic function can be constructed by adding
a number of sine and cosine functions.
Fundamental frequency – where f = 1/T
Harmonics – integer multiples of the fundamental
frequency
Baud – number of signal level changes per second
Q: Is baud and data rate different terms?
Q: Is 1 baud equal to 1bps?
25. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
SIGNALS
2. Maximum Data Rate of a Channel
Nyquist
Maximum data rate = 2H log2V (bits/sec)
H = line bandwidth
V = a signal with V discrete levels
Example:
A noiseless 3kHz channel cannot transmit binary (2
level) signals at a rate faster than 6000bps
2(3k) log22 = 6000bps
logAV = (1 / ln A) ln V
26. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
SIGNALS
Shannon
Maximum data rate (bits/sec) = H log2(1+ PS/PN)
H = line bandwidth
PS = signal strength in watts
PN = noise strength in watts
Example:
A 3kHz channel with a noise ratio of 30dB
(PS/PN = 1000) cannot transmit at a rate faster
than 30,000bps
(3k) log2(1001) = 30,000bps
Note: SNR = 10log10(PS/PN)
27. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
SIGNALS
3. Attenuation vs. Amplification
Attenuation
The signal received is weaker than the signal sent.
Attenuation (dB) = 10log10(P1/P2)
Amplification
The signal received is stronger than the signal
sent.
Amplification (dB) = 10log10(P2/P1)
Note:
P1 = transmitted signal power in watts
P2 = received signal power in watts
Q: If the result of the attenuation formula is negative, what
happened to the signal?
28. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
TRANSMISSION MEDIA
1. Guided
Data is sent via a wire or optical cable.
Twisted Pair
Two copper wires are twisted together to reduce
the effect of crosstalk noise. (e.g. Cat5, UTP, STP)
Baseband Coaxial Cable
A 50-ohm cable used for digital transmission. Used
in 10Base2 and 10Base5.
Broadband Coaxial Cable
A 75-ohm cable used for analog transmission such
as Cable TV.
29. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
TRANSMISSION MEDIA
Fiber Optic Cables
Two general types are multimode and single mode.
In multimode, light is reflected internally. Light
source is an LED.
In single mode, the light propagates in a straight
line. Light source come from expensive laser
diodes. Faster and longer distances as compared
to multimode.
* Fiber optic cables are difficult to tap (higher security)
and are normally used for backbone cabling.
30. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
TRANSMISSION MEDIA
2. Unguided
Data is sent through the air.
Line-of-sight
Transmitter and receiver must “see” each other,
such as a terrestrial microwave system.
Communication Satellites
A big microwave repeater in the sky. Data is
broadcasted, and can be “pirated.”
Radio
Term used to include all frequency bands, such as
FM, UHF, and VHF television.
31. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
ANALOG TRANSMISSION
1. Modulation
Modulating a sine wave carrier to convey data.
Amplitude Modulation (AM)
Amplitude is increased/decreased while frequency
remains constant.
Frequency Modulation (FM)
Frequency is increased/decreased while amplitude
remains constant.
Phase Modulation
Wave is shifted, while amplitude and frequency
remains constant.
32. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
ANALOG TRANSMISSION
2. Modems
A device that accepts digital signals and outputs a
modulated carrier wave, and vice versa.
It is used to interconnect the digital computer to the
analog telephone network.
* Modems for PC’s can be external or internal.
* Nokia makes modems for leased line connections.
33. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
ANALOG TRANSMISSION
3. RS-232 and RS-449
Two well known physical layer standards.
RS-232
• 20 kbps
• Cables up to 15 meters
• Unbalanced transmission (common ground)
RS-422
• 2 Mbps at 60 meters
• 1 Mbps at 100 meters
• Balanced transmission (a pair of wires for Tx, Rx)
34. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
DIGITAL TRANSMISSION
1. Encoding Schemes
Converting logical data into electrical signals
suitable for transmission.
Manchester
• Mid bit transition for clock synchronization and
data
• Logic 0 = high to low transition
• Logic 1 = low to high transition
Differential Manchester
• Mid bit transition for clock synchronization only
• Logic 0 = transition at the beginning of each bit
period
• Logic 1 = no transition at the beginning of each
bit period
35. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
DIGITAL TRANSMISSION
2. Repeaters and Hubs
These are physical layer devices.
Repeaters
• Restores the strength of an attenuated signal.
• Used to increase the transmission distance.
• Does not filter data traffic.
Hubs
• Multi-port repeater.
• Interconnects several computers.
• Does not filter data traffic.
* Picture from 3com.com
37. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OVERVIEW
1. Routing Algorithms
• Shortest Path
• Flooding
• Flow-based
• Distance Vector
• Link State
• Hierarchical
• Broadcast
• Multicast
• Routing for Mobile Hosts
2. Congestion control
3. IP Addressing
4. Routers
38. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
ROUTING ALGORITHMS
1. Shortest Path
A
C
D
B
E
F
2
2
2
1
2
1
1
3
3 2
B(A,2)
A(-,-)
E(A,2)
C(B,3)
D(E,3)
F(E,4)
A – E – D – F
A – E – F is the answer.
39. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
ROUTING ALGORITHMS
2. Flooding
IMP
B
Packet
Packet to IMP C
Packet to IMP D
Packet to IMP E
To prevent packets from circulating indefinitely, a
packet has a hop counter. Every time a packet arrives
at an IMP, the hop counter is decrease by 1. Once the
hop counter of a packet reaches 0, the packet is
discarded.
40. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
IP ADDRESSING
Format
x x x x x x x x . x x x x x x x x . x x x x x x x x . x x x x x x x x
where x is either 0 or 1
Example 1:
1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . 0 0 0 0 0 0 0 0 . 0 0 0 0 0 0 0 0
255.255.0.0
Example 2:
1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . 1 0 0 0 0 0 0 0 . 0 0 0 0 0 0 0 0
255.255.192.0
41. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
IP ADDRESSING
Network Address
Example 1:
IP address of computer 180.100.7.1
Mask 255.255.0.0
Network address 180.100.0.0
Example 2:
IP address of computer 180.100.7.1
Mask 255.255.255.0
Network address 180.100.7.0
Example 3:
IP address of computer 180.100.7.2
Mask 255.255.192.0
Network address 180.100.0.0
42. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
IP ADDRESSING
Mask
Valid mask are contiguous 1’s from left to right.
Examples:
Valid
255.0.0.0
255.255.0.0
255.255.255.0
Invalid
255.1.0.0
255.0.255.0
255.255.64.0
200.255.0.0
43. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
IP ADDRESSING
Subnets
The Internet is running out of IP address. One solution
is to subnet a network address.
This is done by borrowing host bits to be used as
network bits.
Example:
Class B mask 255.255.0.0
Borrowing 1 bit gives a subnet mask of 255.255.128.0
Borrowing 2 bits gives a subnet mask of 255.255.192.0
Borrowing 3 bits gives a subnet mask of 255.255.224.0
Borrowing 4 bits gives a subnet mask of 255.255.240.0
44. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
IP ADDRESSING
Example:
Given an IP address of 180.200.0.0, subnet by
borrowing 4 bits.
Subnet mask = 255.255.240.0
The 4 bits borrowed are value 128, 64, 32, 16. This will
create 16 sub networks, where the first and last will be
unusable.
Sub network address:
180.200.0.0
180.200.16.0
180.200.32.0
180.200.48.0
180.200.64.0
etc…
45. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
IP ADDRESSING
The first 3 usable sub networks are:
180.200.16.0
180.200.32.0
180.200.48.0
For sub network 180.200.16.0, the valid IP address
are:
180.200.16.1 to 180.200.31.254
Directed broadcast address is:
180.200.31.255
46. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
ROUTERS
A layer 3 device that is used to interconnect 2 or more
logical networks.
Can filter broadcast traffic, preventing broadcast traffic
from one network from reaching another network.
180.200.0.0 202.5.3.0