The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions and communication protocols used in computer networks. It provides a structured approach to understanding and designing network architectures, allowing different systems and devices to communicate with each other effectively.
The OSI model consists of seven interconnected layers, each responsible for specific functions and services. Here is a brief description of each layer:
Physical Layer: The physical layer is the lowest layer of the OSI model. It deals with the physical transmission of data over the network medium, including cables, connectors, and electrical signals. It defines characteristics such as voltage levels, data rates, and physical connectors.
Data Link Layer: The data link layer provides reliable point-to-point or point-to-multipoint data transfer between network nodes. It is responsible for framing data into packets, error detection and correction, and flow control. Ethernet switches operate at this layer.
Network Layer: The network layer manages the routing and forwarding of data packets across different networks. It determines the optimal path for data transmission, handles addressing, and controls congestion in the network. Routers operate at this layer.
Transport Layer: The transport layer ensures reliable end-to-end data delivery between hosts. It segments data from the upper layers into smaller packets, manages data flow, and provides error recovery mechanisms. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at this layer.
Session Layer: The session layer establishes, manages, and terminates communication sessions between applications. It provides services such as session establishment, maintenance, and synchronization, allowing multiple applications to communicate and coordinate their activities.
Presentation Layer: The presentation layer is responsible for data representation, encryption, compression, and translation. It ensures that data from the application layer is in a format that can be understood by the receiving system.
Application Layer: The application layer is the topmost layer of the OSI model. It provides a direct interface between the network and the applications. It includes protocols and services that support specific applications, such as HTTP for web browsing, SMTP for email, and FTP for file transfer.
The OSI model follows a layered approach, where each layer performs specific functions while relying on the services provided by the layers below it. This modular design allows for interoperability between different network technologies and facilitates easier troubleshooting and development of network protocols.
It's important to note that the OSI model is a conceptual framework and not a specific implementation. Actual networking protocols, such as TCP/IP, do not strictly adhere to the OSI model but borrow concepts from it.
As the urgency in the need for standards in differ ent computer networks was more,International Standard Organization (ISO) created a new subcommit tee for �Open System Interconnection� in 1977. The first priority of subcommittee was to de velop architecture for Open System Interconnection which could serve as a frame work f or the definition of standard protocols. In July 1979 the specifications of this architecture,established. That was passed under the name of �OSI Reference Model� to Technical committee .These recommendations were adopted at the end of 1979 as the basis for the following developm ent of standards for Open System Interconnection within ISO. This paper explains the OSI reference Model,which comprises of seven different layers & their own responsibilities .
As the urgency in the need for standards in differ ent computer networks was more,International Standard Organization (ISO) created a new subcommit tee for �Open System Interconnection� in 1977. The first priority of subcommittee was to de velop architecture for Open System Interconnection which could serve as a frame work f or the definition of standard protocols. In July 1979 the specifications of this architecture,established. That was passed under the name of �OSI Reference Model� to Technical committee .These recommendations were adopted at the end of 1979 as the basis for the following developm ent of standards for Open System Interconnection within ISO. This paper explains the OSI reference Model,which comprises of seven different layers & their own responsibilities .
Error detection refers to the process of identifying and detecting errors or inconsistencies in data or transmitted signals. It is an essential aspect of ensuring data integrity and reliability in various communication systems, computer networks, and storage systems.
The purpose of error detection is to determine if errors have occurred during data transmission or storage and to provide a mechanism to identify and correct these errors. Errors can occur due to various factors such as noise, interference, hardware failures, or software issues. By detecting errors, corrective measures can be taken to ensure the accuracy and integrity of the transmitted or stored data.
There are several techniques and algorithms commonly used for error detection. Here are a few notable ones:
Parity Check: Parity check is a simple and widely used error detection method. It involves adding an extra bit, called a parity bit, to a group of bits being transmitted. The parity bit is set to 1 or 0 based on whether the total number of 1s in the data is even or odd. At the receiving end, the parity bit is recalculated and compared to the received parity bit. If they do not match, an error is detected.
Checksum: Checksum is a technique that involves calculating a numerical value, often a sum or a hash, based on the data being transmitted. This value is then appended to the data. At the receiving end, the checksum is recalculated and compared to the received value. If they do not match, it indicates the presence of an error.
Cyclic Redundancy Check (CRC): CRC is a more sophisticated error detection algorithm widely used in networking protocols and storage systems. It involves generating a cyclic redundancy code based on the data being transmitted. This code is appended to the data, and at the receiving end, the code is recalculated and compared to the received code. A mismatch indicates the presence of errors.
Forward Error Correction (FEC): FEC is an error detection and correction technique that involves adding redundant information to the transmitted data. This redundancy allows the receiver to not only detect errors but also correct them without the need for retransmission. FEC is commonly used in applications where retransmission is expensive or not feasible, such as satellite communications and wireless networks.
Error detection techniques play a crucial role in ensuring data integrity and reliable communication. They provide a mechanism to detect errors and trigger appropriate actions, such as requesting retransmission or performing error correction. By implementing effective error detection mechanisms, data integrity can be maintained, and the overall quality and reliability of communication systems can be improved.
Data Center Multi-tier Model Overview.pptxBeniamTekeste
A multi-tier data center refers to a specialized facility that houses computing infrastructure and provides various levels of redundancy, reliability, and resilience for hosting critical IT systems and applications. The term "multi-tier" signifies the existence of multiple layers or levels within the data center architecture, each offering different functionalities and characteristics.
In a multi-tier data center, the infrastructure is organized into distinct tiers based on their purpose, capabilities, and level of redundancy. These tiers are designed to provide different levels of availability, fault tolerance, and performance, allowing organizations to match their specific requirements and business needs. The most commonly recognized tier classification system is the Telecommunications Industry Association (TIA) Data Center Tier Standard, which includes four tiers: Tier 1, Tier 2, Tier 3, and Tier 4.
Here is a breakdown of the typical characteristics of each tier:
Tier 1: Tier 1 data centers offer a basic level of infrastructure reliability and uptime. They generally consist of a single path for power and cooling with limited redundancy. This tier is suitable for small businesses or organizations with non-critical applications where occasional downtime can be tolerated.
Tier 2: Tier 2 data centers provide slightly higher availability than Tier 1 by incorporating redundant components and infrastructure elements. This includes redundant power and cooling systems to minimize the risk of service disruptions. Tier 2 data centers are suitable for small to medium-sized businesses that require improved uptime and availability for their IT systems.
Tier 3: Tier 3 data centers offer a significantly higher level of availability and redundancy compared to Tier 1 and Tier 2. They have multiple independent distribution paths for power and cooling, ensuring concurrent maintainability and fault tolerance. Tier 3 data centers are commonly used by medium to large enterprises that require high availability and reliability for their critical applications.
Tier 4: Tier 4 data centers provide the highest level of availability, fault tolerance, and redundancy. They have redundant components and infrastructure systems, offering no single point of failure. Tier 4 data centers provide the highest level of uptime and are designed for mission-critical applications and organizations that require continuous operations, such as financial institutions, healthcare providers, and large-scale enterprises.
It's important to note that these tiers represent general guidelines, and the specific requirements and characteristics of data centers may vary based on individual needs and industry standards. Multi-tier data centers play a crucial role in ensuring the availability, performance, and resilience of IT systems and applications, enabling businesses to operate reliably in the digital age.
Cyber, short for "cyberspace," refers to the virtual realm created by computer systems and networks where digital information is stored, transmitted, and processed. It encompasses the interconnected digital infrastructure that enables communication, data exchange, and online activities on a global scale.
In the cyber world, individuals, businesses, governments, and organizations interact and engage in a wide range of activities. This includes accessing information, communicating with others, conducting transactions, sharing media, and participating in online communities. The cyber domain has become an integral part of modern society, shaping various aspects of our lives and transforming how we work, learn, entertain, and connect with one another.
Cybersecurity is a crucial aspect of the cyber landscape. With the increasing reliance on digital technologies, protecting sensitive information and systems from unauthorized access, cyber attacks, and data breaches has become paramount. Cybersecurity measures involve implementing various techniques, such as encryption, firewalls, antivirus software, intrusion detection systems, and user authentication protocols, to safeguard networks, devices, and data from potential threats.
The term "cyber" is often associated with cybersecurity-related topics, such as cybercrime, cyber warfare, and cyber threats. Cybercrime refers to criminal activities conducted in the digital realm, such as hacking, identity theft, phishing, and ransomware attacks. Cyber warfare involves using cyber techniques to disrupt or sabotage the digital infrastructure of an adversary, including targeting critical systems, networks, or information. Cyber threats encompass any potential danger or vulnerability in the cyber domain that can lead to unauthorized access, data breaches, or disruptions to digital services.
Furthermore, the field of cybersecurity extends beyond protection and defense. It also includes proactive measures like ethical hacking, threat intelligence, vulnerability assessment, incident response, and security policy development. Cybersecurity professionals play a vital role in safeguarding digital assets and mitigating risks associated with the ever-evolving cyber landscape.
As technology continues to advance and more devices become interconnected through the Internet of Things (IoT), the cyber domain is expanding, presenting both opportunities and challenges. It is essential for individuals, businesses, and governments to stay vigilant, adopt best practices, and remain adaptable in order to navigate the complexities of the cyber world effectively.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
3. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
APPLICATIONS
A lot of things we take for granted are the result of
computer networks.
• Email
• Chat
• Web sites
• Sharing of documents and pictures
• Accessing a centralized database of information
• Mobile workers
4. THE NEED FOR
STANDARDS
• Over the past couple of decades many of the networks
that were built used different hardware and software
implementations, as a result they were incompatible and
it became difficult for networks using different
specifications to communicate with each other.
• To address the problem of networks being incompatible
and unable to communicate with each other, the
International Organisation for Standardisation (ISO)
researched various network schemes.
• The ISO recognised there was a need to create a
NETWORK MODEL that would help vendors create
interoperable network implementations.
5. 1. Organizations For
Communication Standards
Standards are developed by cooperation among
standards creation committees, forums, and
government regulatory agencies.
Standards Creation Committees
a) International Standards Organization (ISO)
b) International Telecommunications Union (ITU)
c) American National Standards Institute (ANSI)
d) Institute of Electrical and Electronics Engineers (IEEE)
e) Electronic Industries Association (EIA)
f) Internet Engineering Task Force (IETF)
6. a) International Standards
Organization (ISO)
- A multinational body whose membership is drawn mainly
from the standards creation committees of various
governments throughout the world
- Dedicated to worldwide agreement on international standards
in a variety field.
- Currently includes 82 memberships industrialized nations.
- Aims to facilitate the international exchange of goods and
services by providing models for compatibility, improved
quality, increased quality, increased productivity and decreased
prices.
7. - Also known as International Telecommunications
Union-Telecommunication Standards Sector (ITU-T)
- An international standards organization related to the
United Nations that develops standards for
telecommunications.
- Two popular standards developed by ITU-T are:
i) V series – transmission over phone lines
ii) X series – transmission over public digital
networks, email and directory services and ISDN.
b) International Telecommunications Union
(ITU)
8. c) American National Standards Institute
(ANSI)
- A non-profit corporation not affiliated with US
government.
- ANSI members include professional societies,
industry associations, governmental and
regulatory bodies, and consumer groups.
- Discussing the internetwork planning and
engineering, ISDN services, signaling, and
architecture and optical hierarchy.
9. d) Institute of Electrical and Electronics
Engineers (IEEE)
- The largest national professional group involved in
developing standards for computing, communication,
electrical engineering, and electronics.
- Aims to advance theory, creativity and product
quality in the fields of electrical engineering,
electronics and radio.
- It sponsored an important standard for local area
networks called Project 802 (eg. 802.3, 802.4 and
802.5 standards.)
10. e) Electronic Industries Association (EIA)
- An association of electronics manufacturers in
the US.
- Provide activities include public awareness
education and lobbying efforts in addition to
standards development.
- Responsible for developing the EIA-232-D
and EIA-530 standards.
11. f) Internet Engineering Task Force
(IETF)
- Concerned with speeding the growth and
evolution of Internet communications.
- The standards body for the Internet itself
- Reviews internet software and hardware.
12. LAYERED TASKS
• We use the concept of layers in our daily
life. As an example, let us consider two
friends who communicate through postal
mail. The process of sending a letter to a
friend would be complex if there were no
services available from the post office.
2.12
14. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
NETWORK ARCHITECTURES
A set of layers and protocols is called the network
architecture.
1. Protocol Hierarchies
Networks are organized as layers to
reduce design complexity. Each layer
offers services to the higher layers.
Between adjacent layers is an interface.
Basic concept of layering Network
architectures define the standards and
techniques for designing and building
communication systems for computers
and other devices.
15. In the past, vendors developed
their own architectures and required that other
vendors conform to this architecture if
they wanted to develop compatible hardware
and software.
There are proprietary network
architectures such as IBM's SNA (Systems
Network Architecture) and there are open
architectures like the OSI (Open Systems
Interconnection) model defined by the
International Organization for Standardization.
16. The previous strategy, where the
computer network is designed with the
hardware as the main concern and software is
afterthought, no longer works. Network
software is now highly structured.
To reduce the design complexity, most of the
networks are organized as a series of layers
or levels, each one build upon one below it.
The basic idea of a layered architecture is to
divide the design into small pieces.
17. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
NETWORK ARCHITECTURES
2. Design Issues for the Layers
• Mechanism for connection establishment
• Rules for data transfer
• Error control
• Fast sender swamping a slow receiver
• Inability of processes to accept long messages
• Routing in the case of multiple paths
18. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
The Open Systems Interconnection is the model
developed by the International Standards Organization.
Benefits
• Interconnection of different systems (open)
• Not limited to a single vendor solution
Negative Aspect
• Systems might be less secure
• Systems might be less stable
19. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
1. Physical Layer
a) Convert the logical 1’s and 0’s coming from
layer 2 into electrical signals.
b) Transmission of the electrical signals over a
communication channel.
Main topics:
• Transmission mediums
• Encoding
• Modulation
• RS232 and RS422 standards
• Repeaters
• Hubs (multi-port repeater)
20. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
2. Data Link Layer
a) Error control to compensate for the
imperfections of the physical layer.
b) Flow control to keep a fast sender from
swamping a slow receiver.
Main topics:
• Framing methods
• Error detection and correction methods
• Flow control
• Frame format
• IEEE LAN standards
• Bridges
• Switches (multi-port bridges)
22. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
3. Network Layer
a) Controls the operation of the subnet.
b) Routing packets from source to destination.
c) Logical addressing.
Main topics:
• Internetworking
• Routing algorithms
• Internet Protocol (IP) addressing
• Routers
24. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
4. Transport Layer
a) Provides additional Quality of Service.
b) Heart of the OSI model.
Main topics:
• Connection-oriented and connectionless services
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
25. Transport layer
• The transport layer is responsible for the
delivery of a message from one process to
another.
– Service-point addressing
– Segmentation and reassembly
– Connection control
– Flow control
– Error control
2.25
28. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
5. Session Layer
a) Allows users on different machines to establish
sessions between them.
b) One of the services is managing dialogue
control.
c) Token management.
d) Synchronization.
29. Session layer
• The session layer is responsible for dialog
control and synchronization.
2.29
30. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
6. Presentation Layer
a) Concerned with the syntax and semantics of the
information.
b) Preserves the meaning of the information.
c) Data compression.
d) Data encryption.
31. Presentation layer
• The presentation layer is responsible for
translation, compression, and encryption.
2.31
32. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
OSI REFERENCE MODEL
7. Application Layer
a) Provides protocols that are commonly needed.
Main topics:
• File Transfer Protocol (FTP)
• HyperText Transfer Protocol (HTTP)
• Simple Mail Transfer Protocol (SMTP)
• Simple Network Management Protocol (SNMP)
• Network File System (NFS)
• Telnet
33. Application layer
• The application layer is responsible for
providing services to the user.
2.33
35. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
SERVICES
Connection-Oriented and Connectionless
Connection-Oriented – before data is sent, the
service from the sending computer must establish
a connection with the receiving computer.
Connectionless – data can be sent at any time by
the service from the sending computer.
Q: Is downloading a music file from the Internet
connection-oriented or connectionless?
Q: Is email connection-oriented or connectionless?
36. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
SERVICES
3. Service Primitives
Request – entity wants the service to do some
work
Indicate – entity is to be informed about an event
Response – entity responds to an event
Confirm – entity is to be informed about its request
Sending Computer Receiving Computer
3 Network
1. request
3 Network
2. indicate 3. response
4. confirm
4 Transport 4 Transport
37. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
BANDWIDTH
The capacity of the medium to transmit data.
Analog Bandwidth
• Measurement is in Hertz (Hz) or cycles/sec.
Digital Bandwidth
• Measurement is in bits per second (bps).
Q: Is 100MHz = 100Mbps?
Q: Is 100Mbps = 100MBps?
38. 7 Application
6 Presentation
5 Session
4 Transport
1 Physical
2 Data Link
3 Network
Hello
Hello
AH
Hello
AH
PH
Hello
AH
PH
SH
Hello
AH
PH
SH
TH
Hello
AH
PH
SH
TH
NH
Hello
AH
PH
SH
TH
NH
DH DT
Bits