Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxtodd521
Running Head: THE SEVEN LAYER MODEL OF OSIKao 1
THE SEVEN LAYER MODEL OF OSIKao 2
The Seven Layer Model of OSI
Kao Badi Prudence
CMIT 265
Professor: Ryan Thomas
Date: 06/25/2020
The Seven Layer Model of OSIComment by Prof Thomas: Paper format changes between sections. Review format
The Open System Interconnect (OSI) is a very important concept in networking when considering the creation of a a networking system for the university. “It was created by the international organization of standards 1978 and its main purpose is to help describe the architecture of a network so as make it possible for computers to send and receive data from other computers”. Although the model is conceptual, appreciating its purpose and function will help the university in understanding how the protocol suits and network architecture work on an application basis. The OSI model is usually built from bottom to top in this order; physical, data link, network, transport, session, presentation and lastly application. Every layer of the OSI model has its own special function. The following sections describe the function of each layer.
The layers of the OSI model
Physical Layer (Layer 1)
The OSI model layer identifies the networks’ physical characteristics and specifications. This is the type of media used on the network for example type of connector, cables, and pinout format cables.
Topology
The topography is defined by the physical layer. This layer shows the type of topology to be applied in the network. Additional characteristics in this layer define voltage used on a given frequency and medium at which the signals that carrying the data operates. They dictate speed and bandwidth of a given medium and the maximum distance over which a specific media type can be applied
Data link Layer (Layer 2)
The layer is a designed protocol that operates in a program involved in data movement into and out of a physical link in a network. Layer 2 of the OSI model is responsible for receiving data for layer 1. It is then sent to layer 3 and the data from layer 3 is sent to layer 1. This layer also detects and corrects errors. The word ‘frame’ is usually used to refer to the logical data grouping at this layer. It has two distinctive sub-layers:
· Access control (MAC) - MAC address is the physical/hardware address burnt into each network interface card (NIC). It accesses specific areas that are found within the interior of buildings. Provides access that is faster to the people authorized and restricts access of people not authorized.
· Link control (LLC) – “this controls the error and flows control mechanism of the data link layer [2].” It plays the role of managing the transmissions of data to ensure that there is integrity. For NLC, it has a role of providing data link layers.
· Network Layer (Layer 3).
The primary faction of layer 3 is to giving access to the ways by which information can disseminate to and from different network systems. It does not specify.
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxtodd521
Running Head: THE SEVEN LAYER MODEL OF OSIKao 1
THE SEVEN LAYER MODEL OF OSIKao 2
The Seven Layer Model of OSI
Kao Badi Prudence
CMIT 265
Professor: Ryan Thomas
Date: 06/25/2020
The Seven Layer Model of OSIComment by Prof Thomas: Paper format changes between sections. Review format
The Open System Interconnect (OSI) is a very important concept in networking when considering the creation of a a networking system for the university. “It was created by the international organization of standards 1978 and its main purpose is to help describe the architecture of a network so as make it possible for computers to send and receive data from other computers”. Although the model is conceptual, appreciating its purpose and function will help the university in understanding how the protocol suits and network architecture work on an application basis. The OSI model is usually built from bottom to top in this order; physical, data link, network, transport, session, presentation and lastly application. Every layer of the OSI model has its own special function. The following sections describe the function of each layer.
The layers of the OSI model
Physical Layer (Layer 1)
The OSI model layer identifies the networks’ physical characteristics and specifications. This is the type of media used on the network for example type of connector, cables, and pinout format cables.
Topology
The topography is defined by the physical layer. This layer shows the type of topology to be applied in the network. Additional characteristics in this layer define voltage used on a given frequency and medium at which the signals that carrying the data operates. They dictate speed and bandwidth of a given medium and the maximum distance over which a specific media type can be applied
Data link Layer (Layer 2)
The layer is a designed protocol that operates in a program involved in data movement into and out of a physical link in a network. Layer 2 of the OSI model is responsible for receiving data for layer 1. It is then sent to layer 3 and the data from layer 3 is sent to layer 1. This layer also detects and corrects errors. The word ‘frame’ is usually used to refer to the logical data grouping at this layer. It has two distinctive sub-layers:
· Access control (MAC) - MAC address is the physical/hardware address burnt into each network interface card (NIC). It accesses specific areas that are found within the interior of buildings. Provides access that is faster to the people authorized and restricts access of people not authorized.
· Link control (LLC) – “this controls the error and flows control mechanism of the data link layer [2].” It plays the role of managing the transmissions of data to ensure that there is integrity. For NLC, it has a role of providing data link layers.
· Network Layer (Layer 3).
The primary faction of layer 3 is to giving access to the ways by which information can disseminate to and from different network systems. It does not specify.
As the urgency in the need for standards in differ ent computer networks was more,International Standard Organization (ISO) created a new subcommit tee for �Open System Interconnection� in 1977. The first priority of subcommittee was to de velop architecture for Open System Interconnection which could serve as a frame work f or the definition of standard protocols. In July 1979 the specifications of this architecture,established. That was passed under the name of �OSI Reference Model� to Technical committee .These recommendations were adopted at the end of 1979 as the basis for the following developm ent of standards for Open System Interconnection within ISO. This paper explains the OSI reference Model,which comprises of seven different layers & their own responsibilities .
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Experimental Based Learning and Modeling of Computer Networksijtsrd
Computer network experts are in great demand these days. This study aims to examine the effectiveness of using Cisco Packet Tracer as a simulation tool. This development reflected significant importance for higher education institutions. It ensures that all students have ample networking assistances. The computer network needs consideration of theory and practice. Hence, Cisco packet tracer software is recommended to solve this difficulty. In this paper, design and simulation of a computer network with Cisco network packet tracer simulation software is illustrated. This software would normally not work deprived of a variety of configurations. So, essential steps and configurations of software are explained in this paper which is useful in network design. Extensive simulation results validate this model. Prof. Jayesh Rane | Prof. Sarang Kulkarni "Experimental Based Learning and Modeling of Computer Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30595.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30595/experimental-based-learning-and-modeling-of-computer-networks/prof-jayesh-rane
6th International Conference on Networks, Communications, Wireless and Mobile...ijassn
NCWMC 2021 looks for significant contributions to the Computer Networks, Communications, wireless and mobile computing for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, network protocols and wireless networks, Data communication Technologies, network security and mobile computing. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
Owing to the increasing demand for reliable products built globally, and through the evolution of machine design, the need for improved and a common communications protocol in different geographical regions has intensified. In this paper, the goal is to reveal that the current protocols used to support disparate communication types in manufacturing have caused complexity in configurations and an increase in monetary overhead for industrial system designers and the end users. Through the simulation of an industrial network, the packet timing, and packet loss between peer-to-peer systems, similar protocol systems will be compared with two dissimilar protocols systems to establish the thesis. The internal validation research method used in this study will reveal the need for an all-inclusive protocol to eliminate the timing and packet loss issues, the systems’ configuration complexities, and the need to reduce the monetary overhead currently associated with the machine communications.
International Journal of Mobile ad hoc and sensor networks(IJMSN) jackson130
International Journal of Mobile ad hoc and sensor networks(IJMSN) is a open access journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
Software Defined Networking, the emerging technology is taking the network sector to a new variant. Networking sector completely focused on hardware infrastructure is now moving towards software programming. Due to an exponential growth in the number of user and the amount of information over wires, there arises a great risk with the existing IP Network architecture. Software Defined Networking paves a platform identifying a feasible solution to the problem by virtualization. Software Defined Networking provides a viable path in virtualization and managing the network resources in an “On Demand Manner”. This study is focused on the drawbacks of the existing technology and a fine grained introduction to Software Defined Networking. Further adding to the above topic, this study also passes over the current steps taken in the industrial sector in implementing Software Defined Networking. This study makes a walkthrough about the security features of Software Defined Networking, its advantages, limitations and further scope in identifying the loopholes in the security.
As the urgency in the need for standards in differ ent computer networks was more,International Standard Organization (ISO) created a new subcommit tee for �Open System Interconnection� in 1977. The first priority of subcommittee was to de velop architecture for Open System Interconnection which could serve as a frame work f or the definition of standard protocols. In July 1979 the specifications of this architecture,established. That was passed under the name of �OSI Reference Model� to Technical committee .These recommendations were adopted at the end of 1979 as the basis for the following developm ent of standards for Open System Interconnection within ISO. This paper explains the OSI reference Model,which comprises of seven different layers & their own responsibilities .
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Experimental Based Learning and Modeling of Computer Networksijtsrd
Computer network experts are in great demand these days. This study aims to examine the effectiveness of using Cisco Packet Tracer as a simulation tool. This development reflected significant importance for higher education institutions. It ensures that all students have ample networking assistances. The computer network needs consideration of theory and practice. Hence, Cisco packet tracer software is recommended to solve this difficulty. In this paper, design and simulation of a computer network with Cisco network packet tracer simulation software is illustrated. This software would normally not work deprived of a variety of configurations. So, essential steps and configurations of software are explained in this paper which is useful in network design. Extensive simulation results validate this model. Prof. Jayesh Rane | Prof. Sarang Kulkarni "Experimental Based Learning and Modeling of Computer Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30595.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30595/experimental-based-learning-and-modeling-of-computer-networks/prof-jayesh-rane
6th International Conference on Networks, Communications, Wireless and Mobile...ijassn
NCWMC 2021 looks for significant contributions to the Computer Networks, Communications, wireless and mobile computing for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, network protocols and wireless networks, Data communication Technologies, network security and mobile computing. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
Owing to the increasing demand for reliable products built globally, and through the evolution of machine design, the need for improved and a common communications protocol in different geographical regions has intensified. In this paper, the goal is to reveal that the current protocols used to support disparate communication types in manufacturing have caused complexity in configurations and an increase in monetary overhead for industrial system designers and the end users. Through the simulation of an industrial network, the packet timing, and packet loss between peer-to-peer systems, similar protocol systems will be compared with two dissimilar protocols systems to establish the thesis. The internal validation research method used in this study will reveal the need for an all-inclusive protocol to eliminate the timing and packet loss issues, the systems’ configuration complexities, and the need to reduce the monetary overhead currently associated with the machine communications.
International Journal of Mobile ad hoc and sensor networks(IJMSN) jackson130
International Journal of Mobile ad hoc and sensor networks(IJMSN) is a open access journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
Software Defined Networking, the emerging technology is taking the network sector to a new variant. Networking sector completely focused on hardware infrastructure is now moving towards software programming. Due to an exponential growth in the number of user and the amount of information over wires, there arises a great risk with the existing IP Network architecture. Software Defined Networking paves a platform identifying a feasible solution to the problem by virtualization. Software Defined Networking provides a viable path in virtualization and managing the network resources in an “On Demand Manner”. This study is focused on the drawbacks of the existing technology and a fine grained introduction to Software Defined Networking. Further adding to the above topic, this study also passes over the current steps taken in the industrial sector in implementing Software Defined Networking. This study makes a walkthrough about the security features of Software Defined Networking, its advantages, limitations and further scope in identifying the loopholes in the security.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
Data Communication and Networking Part 1 (Introduction)
1. DATACOMMUNICATION AND
NETWORKING
UNIT 1 – PART 1
02/02/2021 & 03/02/2021
STAFF NAME : Ms. P. ABIRAMI
DEPARTMENT OF COMPUTER SCIENCE
ETHIRAJ COLLEGE FOR WOMEN - CHENNAI
17. Protocols:
In computer networks, communication occurs between entities in
different systems. An entity is anything capable of sending or receiving
information.
A protocol is a set of rules that govern data communications. A protocol
defines what is communicated, how it is communicated, and when it is
communicated. The key elements of a protocol are syntax, semantics,
and timing.
17
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
18. Standards:
Standards provide guidelines to manufacturers, vendors, government agencies, and other service providers to
ensure the kind of interconnectivity necessary in today's marketplace and in international communications.
Data communication standards fall into two categories: de facto (meaning "by fact" or "by convention") and
de jure (meaning "by law" or "by regulation").
De facto:
Standards that have not been approved by an organized body but have been adopted as standards through
widespread use are de facto standards. De facto standards are often established originally by manufacturers
who seek to define the functionality of a new product or technology.
De jure:
Those standards that have been legislated by an officially recognized body are de jure standards.
18
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
22. The Open Systems Interconnection (OSI) model describes
seven layers that computer systems use to communicate over
a network.
It was the first standard model for network communications,
adopted by all major computer and telecommunication
companies in the early 1980s.
22
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
31. Physical layer converts the binary sequences into signals vice versa and transfer it through a
transmission media such as cables etc.
The signals generated by physical layer is based on the transmission media.
For example
1. Electrical signal is generated if the media is copper cable
2. Light signal if media is optical fibre
3. Radio signal in case of transmission media is air.
This generated signal is received by the physical layer at the receiver side and converts it
into bits.
31
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
32. Main functions of Physical Layer:
Digital Transmission:
One of the main functions of physical layer is to transfer data in form of signals. In this guide, we will
learn about digital transmission. A data can be either analog or digital. To transfer the data over a
transmission media such as wire, cable etc. physical layer must need to convert the data to its digital
signal.
Digital data to Digital signal conversion:
Physical layer converts digital data to digital signal. It uses two techniques to do this conversion: Line
coding and block coding.
Line coding:
A digital data is in form of binary sequence such as 1000111 (combination of 0s and 1s). Line coding uses
three schemes to represent these binary sequences in form of signals that can be transferred.
32
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
33. Data link layer
33
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021