SlideShare a Scribd company logo
OSI LAYERS


1     Department of Computer Science, RLJIT   5/23/2012
Jumble Solver
    (Kaun Banega Scorepathi)

        on
    OSI LAYERS
2       Department of Computer Science, RLJIT   5/23/2012
giitennonrkrewt ?


3        Department of Computer Science, RLJIT   5/23/2012
Internetworking 


4        Department of Computer Science, RLJIT   5/23/2012
Internetworking

  The art and science of connecting individual local-area networks
(LANs) to create wide-area networks (WANs) , and connecting WANs
to form even larger WANs.




 5                      Department of Computer Science, RLJIT   5/23/2012
scaeannoitulp ?


6       Department of Computer Science, RLJIT   5/23/2012
encapsulation 


7       Department of Computer Science, RLJIT   5/23/2012
Encapsulation




  The above figure reveals another aspect of data communication in the OSI model:
encapsulation.

  A packet ( header and data) at level 7 is encapsulated in a packet at level 6.

  The whole packet at level 6 is encapsulated in a packet at level 5, and so on.

  In other words, the data portion of a packet at level N-1 carries the whole packet from level N.
The concept is called encapsulation.
 8                                 Department of Computer Science, RLJIT           5/23/2012
chnistaoisnnyor ?


9       Department of Computer Science, RLJIT   5/23/2012
synchronization 


10       Department of Computer Science, RLJIT   5/23/2012
Synchronization

  The session layer allows a process to add checkpoints , or synchronization points, to a stream
of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert
checkpoints after every 100 pages to ensure that each 100-page unit is received and
acknowledged independently. In this case, if a crash happens during the transmission of page
523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages
previous to 501 need not be resent.




  11                              Department of Computer Science, RLJIT           5/23/2012
geotntfimarna ?


12       Department of Computer Science, RLJIT   5/23/2012
fragmentation 


13       Department of Computer Science, RLJIT   5/23/2012
Fragmentation
  Fragmentation is the process of breaking a packet into smaller pieces. The receiving system
reassembles the pieces into the original packets.




  14                               Department of Computer Science, RLJIT         5/23/2012
ritcnyepno ?


15      Department of Computer Science, RLJIT   5/23/2012
encryption 


16      Department of Computer Science, RLJIT   5/23/2012
Encryption

  To carry sensitive information, a system must be able to ensure
privacy. Encryption means that the sender transforms the original
information to another form and sends the resulting message out over
the network. Decryption reverses the original process to transform the
message back to its original form.




 17                       Department of Computer Science, RLJIT   5/23/2012
ltpcooor ?


18     Department of Computer Science, RLJIT   5/23/2012
protocol 


19    Department of Computer Science, RLJIT   5/23/2012
protocol


  A protocol is a set of rules that
govern data communications




20          Department of Computer Science, RLJIT     5/23/2012
THANK YOU!

21      Department of Computer Science, RLJIT   5/23/2012
22   Department of Computer Science, RLJIT   5/23/2012
23   Department of Computer Science, RLJIT   5/23/2012

More Related Content

Viewers also liked

12.1. short functional text
12.1. short functional text12.1. short functional text
12.1. short functional textHeriyono Yono
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
44t
 
Dahoam
DahoamDahoam
Kotler mm13e media_09
Kotler mm13e media_09Kotler mm13e media_09
Kotler mm13e media_09
swastika_p
 
Session 9 10,-store_location
Session 9 10,-store_locationSession 9 10,-store_location
Session 9 10,-store_location
swastika_p
 
Analysis of competition_1
Analysis of competition_1Analysis of competition_1
Analysis of competition_1
swastika_p
 
Big mac to rice burger
Big mac to rice burgerBig mac to rice burger
Big mac to rice burger
fknd
 
Juran & ishikawa
Juran & ishikawaJuran & ishikawa
Juran & ishikawa
swastika_p
 
Tqm in hrm
Tqm in hrmTqm in hrm
Tqm in hrm
swastika_p
 
Baromètre TIC 2013 de la Wallonie. Citoyens. Entreprises. Education
Baromètre TIC 2013 de la Wallonie. Citoyens. Entreprises. EducationBaromètre TIC 2013 de la Wallonie. Citoyens. Entreprises. Education
Baromètre TIC 2013 de la Wallonie. Citoyens. Entreprises. Education
Agence du Numérique (AdN)
 
Thèse professionnelle "Quel avenir pour les jeux vidéos en 2016?"
Thèse professionnelle "Quel avenir pour les jeux vidéos en 2016?"Thèse professionnelle "Quel avenir pour les jeux vidéos en 2016?"
Thèse professionnelle "Quel avenir pour les jeux vidéos en 2016?"
Clémence Rigaud
 
E portfolio hesso-fribourg-journee2-13-10-14
E portfolio hesso-fribourg-journee2-13-10-14E portfolio hesso-fribourg-journee2-13-10-14
E portfolio hesso-fribourg-journee2-13-10-14
Dominique-Alain JAN
 
10 tactiques SEO pour 2016
10 tactiques SEO pour 201610 tactiques SEO pour 2016
10 tactiques SEO pour 2016
Virginie Clève - largow ☕️
 
Le site internet est-il (bientôt) mort ?
Le site internet est-il (bientôt) mort ?Le site internet est-il (bientôt) mort ?
Le site internet est-il (bientôt) mort ?
Virginie Clève - largow ☕️
 

Viewers also liked (14)

12.1. short functional text
12.1. short functional text12.1. short functional text
12.1. short functional text
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Dahoam
DahoamDahoam
Dahoam
 
Kotler mm13e media_09
Kotler mm13e media_09Kotler mm13e media_09
Kotler mm13e media_09
 
Session 9 10,-store_location
Session 9 10,-store_locationSession 9 10,-store_location
Session 9 10,-store_location
 
Analysis of competition_1
Analysis of competition_1Analysis of competition_1
Analysis of competition_1
 
Big mac to rice burger
Big mac to rice burgerBig mac to rice burger
Big mac to rice burger
 
Juran & ishikawa
Juran & ishikawaJuran & ishikawa
Juran & ishikawa
 
Tqm in hrm
Tqm in hrmTqm in hrm
Tqm in hrm
 
Baromètre TIC 2013 de la Wallonie. Citoyens. Entreprises. Education
Baromètre TIC 2013 de la Wallonie. Citoyens. Entreprises. EducationBaromètre TIC 2013 de la Wallonie. Citoyens. Entreprises. Education
Baromètre TIC 2013 de la Wallonie. Citoyens. Entreprises. Education
 
Thèse professionnelle "Quel avenir pour les jeux vidéos en 2016?"
Thèse professionnelle "Quel avenir pour les jeux vidéos en 2016?"Thèse professionnelle "Quel avenir pour les jeux vidéos en 2016?"
Thèse professionnelle "Quel avenir pour les jeux vidéos en 2016?"
 
E portfolio hesso-fribourg-journee2-13-10-14
E portfolio hesso-fribourg-journee2-13-10-14E portfolio hesso-fribourg-journee2-13-10-14
E portfolio hesso-fribourg-journee2-13-10-14
 
10 tactiques SEO pour 2016
10 tactiques SEO pour 201610 tactiques SEO pour 2016
10 tactiques SEO pour 2016
 
Le site internet est-il (bientôt) mort ?
Le site internet est-il (bientôt) mort ?Le site internet est-il (bientôt) mort ?
Le site internet est-il (bientôt) mort ?
 

Similar to Jumble slover srivinay

Information systems a revision
Information systems  a revisionInformation systems  a revision
Information systems a revision
venkataramanan Thiru
 
Investigating the Impact of Network Topology on the Processing Times of SDN C...
Investigating the Impact of Network Topology on the Processing Times of SDN C...Investigating the Impact of Network Topology on the Processing Times of SDN C...
Investigating the Impact of Network Topology on the Processing Times of SDN C...
Steffen Gebert
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
KalpanaC14
 
Grid computing & its applications
Grid computing & its applicationsGrid computing & its applications
Grid computing & its applications
Alokeparna Choudhury
 
Loosely-Coupled Architecture - how to get rid of the domino effect
Loosely-Coupled Architecture - how to get rid of the domino effectLoosely-Coupled Architecture - how to get rid of the domino effect
Loosely-Coupled Architecture - how to get rid of the domino effect
Radosław Maziarka
 
SIRG-BSU_7_1.pptx
SIRG-BSU_7_1.pptxSIRG-BSU_7_1.pptx
SIRG-BSU_7_1.pptx
DrAhmedElngar
 
SIRG-BSU_7.pptx
SIRG-BSU_7.pptxSIRG-BSU_7.pptx
SIRG-BSU_7.pptx
DrAhmedElngar
 
81202015
8120201581202015
81202015
IJRAT
 
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxRunning Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
todd521
 
Coding openflow enable network
Coding openflow enable networkCoding openflow enable network
Coding openflow enable network
IJCNCJournal
 
IRJET - Rain Technology
IRJET - Rain TechnologyIRJET - Rain Technology
IRJET - Rain Technology
IRJET Journal
 
Cloud Technologies for Microsoft Computational Biology Tools
Cloud Technologies for Microsoft Computational Biology ToolsCloud Technologies for Microsoft Computational Biology Tools
Cloud Technologies for Microsoft Computational Biology Tools
ijait
 
Grid Computing in a Commodity World (KCCMG, 2005)
Grid Computing in a Commodity World (KCCMG, 2005)Grid Computing in a Commodity World (KCCMG, 2005)
Grid Computing in a Commodity World (KCCMG, 2005)
Lorin Olsen
 
Csc341 – Lecture 1 network management
Csc341 – Lecture 1 network managementCsc341 – Lecture 1 network management
Csc341 – Lecture 1 network management
Kabul Education University
 
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based NetworksAnalytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
Azeem Iqbal
 
Module 1.1 CCN.pptx
Module 1.1 CCN.pptxModule 1.1 CCN.pptx
Module 1.1 CCN.pptx
ShwethaMS13
 
B0781013215
B0781013215B0781013215
B0781013215
Prafull Maktedar
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
ijtsrd
 
C017631521
C017631521C017631521
C017631521
IOSR Journals
 
Review on Green Networking Solutions
Review on Green Networking SolutionsReview on Green Networking Solutions
Review on Green Networking Solutions
iosrjce
 

Similar to Jumble slover srivinay (20)

Information systems a revision
Information systems  a revisionInformation systems  a revision
Information systems a revision
 
Investigating the Impact of Network Topology on the Processing Times of SDN C...
Investigating the Impact of Network Topology on the Processing Times of SDN C...Investigating the Impact of Network Topology on the Processing Times of SDN C...
Investigating the Impact of Network Topology on the Processing Times of SDN C...
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
 
Grid computing & its applications
Grid computing & its applicationsGrid computing & its applications
Grid computing & its applications
 
Loosely-Coupled Architecture - how to get rid of the domino effect
Loosely-Coupled Architecture - how to get rid of the domino effectLoosely-Coupled Architecture - how to get rid of the domino effect
Loosely-Coupled Architecture - how to get rid of the domino effect
 
SIRG-BSU_7_1.pptx
SIRG-BSU_7_1.pptxSIRG-BSU_7_1.pptx
SIRG-BSU_7_1.pptx
 
SIRG-BSU_7.pptx
SIRG-BSU_7.pptxSIRG-BSU_7.pptx
SIRG-BSU_7.pptx
 
81202015
8120201581202015
81202015
 
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxRunning Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
 
Coding openflow enable network
Coding openflow enable networkCoding openflow enable network
Coding openflow enable network
 
IRJET - Rain Technology
IRJET - Rain TechnologyIRJET - Rain Technology
IRJET - Rain Technology
 
Cloud Technologies for Microsoft Computational Biology Tools
Cloud Technologies for Microsoft Computational Biology ToolsCloud Technologies for Microsoft Computational Biology Tools
Cloud Technologies for Microsoft Computational Biology Tools
 
Grid Computing in a Commodity World (KCCMG, 2005)
Grid Computing in a Commodity World (KCCMG, 2005)Grid Computing in a Commodity World (KCCMG, 2005)
Grid Computing in a Commodity World (KCCMG, 2005)
 
Csc341 – Lecture 1 network management
Csc341 – Lecture 1 network managementCsc341 – Lecture 1 network management
Csc341 – Lecture 1 network management
 
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based NetworksAnalytical Modeling of End-to-End Delay in OpenFlow Based Networks
Analytical Modeling of End-to-End Delay in OpenFlow Based Networks
 
Module 1.1 CCN.pptx
Module 1.1 CCN.pptxModule 1.1 CCN.pptx
Module 1.1 CCN.pptx
 
B0781013215
B0781013215B0781013215
B0781013215
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
 
C017631521
C017631521C017631521
C017631521
 
Review on Green Networking Solutions
Review on Green Networking SolutionsReview on Green Networking Solutions
Review on Green Networking Solutions
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Jumble slover srivinay

  • 1. OSI LAYERS 1 Department of Computer Science, RLJIT 5/23/2012
  • 2. Jumble Solver (Kaun Banega Scorepathi) on OSI LAYERS 2 Department of Computer Science, RLJIT 5/23/2012
  • 3. giitennonrkrewt ? 3 Department of Computer Science, RLJIT 5/23/2012
  • 4. Internetworking  4 Department of Computer Science, RLJIT 5/23/2012
  • 5. Internetworking The art and science of connecting individual local-area networks (LANs) to create wide-area networks (WANs) , and connecting WANs to form even larger WANs. 5 Department of Computer Science, RLJIT 5/23/2012
  • 6. scaeannoitulp ? 6 Department of Computer Science, RLJIT 5/23/2012
  • 7. encapsulation  7 Department of Computer Science, RLJIT 5/23/2012
  • 8. Encapsulation The above figure reveals another aspect of data communication in the OSI model: encapsulation. A packet ( header and data) at level 7 is encapsulated in a packet at level 6. The whole packet at level 6 is encapsulated in a packet at level 5, and so on. In other words, the data portion of a packet at level N-1 carries the whole packet from level N. The concept is called encapsulation. 8 Department of Computer Science, RLJIT 5/23/2012
  • 9. chnistaoisnnyor ? 9 Department of Computer Science, RLJIT 5/23/2012
  • 10. synchronization  10 Department of Computer Science, RLJIT 5/23/2012
  • 11. Synchronization The session layer allows a process to add checkpoints , or synchronization points, to a stream of data. For example, if a system is sending a file of 2000 pages, it is advisable to insert checkpoints after every 100 pages to ensure that each 100-page unit is received and acknowledged independently. In this case, if a crash happens during the transmission of page 523, the only pages that need to be resent after system recovery are pages 501 to 523. Pages previous to 501 need not be resent. 11 Department of Computer Science, RLJIT 5/23/2012
  • 12. geotntfimarna ? 12 Department of Computer Science, RLJIT 5/23/2012
  • 13. fragmentation  13 Department of Computer Science, RLJIT 5/23/2012
  • 14. Fragmentation Fragmentation is the process of breaking a packet into smaller pieces. The receiving system reassembles the pieces into the original packets. 14 Department of Computer Science, RLJIT 5/23/2012
  • 15. ritcnyepno ? 15 Department of Computer Science, RLJIT 5/23/2012
  • 16. encryption  16 Department of Computer Science, RLJIT 5/23/2012
  • 17. Encryption To carry sensitive information, a system must be able to ensure privacy. Encryption means that the sender transforms the original information to another form and sends the resulting message out over the network. Decryption reverses the original process to transform the message back to its original form. 17 Department of Computer Science, RLJIT 5/23/2012
  • 18. ltpcooor ? 18 Department of Computer Science, RLJIT 5/23/2012
  • 19. protocol  19 Department of Computer Science, RLJIT 5/23/2012
  • 20. protocol A protocol is a set of rules that govern data communications 20 Department of Computer Science, RLJIT 5/23/2012
  • 21. THANK YOU! 21 Department of Computer Science, RLJIT 5/23/2012
  • 22. 22 Department of Computer Science, RLJIT 5/23/2012
  • 23. 23 Department of Computer Science, RLJIT 5/23/2012