ISO is an organization which is established in 1947.
AN ISO standard that covers all aspects of network communication.
Network communication model is defined in OSI.
It was first introduced in the late 1970s, 1983
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
On these slides i describe all the detail about Connection Establishment & Flow and Congestion Control. For more detail visit: https://chauhantricks.blogspot.com/
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
On these slides i describe all the detail about Connection Establishment & Flow and Congestion Control. For more detail visit: https://chauhantricks.blogspot.com/
Power point presentation on osi model.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact -dhawalm8@gmail.com
mob. no-7023419969
Overview of the FTP protocol.
In the early days of the Internet, applications were mostly restricted to mail transfer (email) and file transfer. FTP (File Transfer Protocol) is one of the first standardized protocols for exchanging binary and text files between hosts.
FTP is rather simple in that it uses a TCP connection for exchanging commands and a data transfer TCP connection for the actual file transfer.
In normal FTP operation, the client opens the control connection to the FTP server while it is up to the server to open data connections for each file transfer. With the upcoming firewalls, this scheme proved to pose a problem since firewalls tend to block incoming TCP connections. Thus a passive mode was defined where the client is responsible to open the data connection to the server.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
Power point presentation on osi model.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact -dhawalm8@gmail.com
mob. no-7023419969
Overview of the FTP protocol.
In the early days of the Internet, applications were mostly restricted to mail transfer (email) and file transfer. FTP (File Transfer Protocol) is one of the first standardized protocols for exchanging binary and text files between hosts.
FTP is rather simple in that it uses a TCP connection for exchanging commands and a data transfer TCP connection for the actual file transfer.
In normal FTP operation, the client opens the control connection to the FTP server while it is up to the server to open data connections for each file transfer. With the upcoming firewalls, this scheme proved to pose a problem since firewalls tend to block incoming TCP connections. Thus a passive mode was defined where the client is responsible to open the data connection to the server.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
is a lesson about computer network that is the development EngAbdirahman Hassan Nour of students IT university Golis of Berbera to receive an assignment of the PPT 21Slide...
In this presentation, we will discuss in details about the TCP/ IP framework, the backbone of every ebusiness.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
The International Standard Organization was developed a well-defined model for Communication Systems known as Open System Interconnection, or the OSI Model in the late 1970s. This layered model is a conceptualized view of how one system should communicate with the other, using various protocols defined in each layer. Further, each layer is designated to a well-defined part of communication system. For example, the Physical layer defines all the components of physical nature, i.e. wires, frequencies, pulse codes, voltage transmission etc. of a communication system.
TCP/IP means Transmission Control Protocol and Internet Protocol. It is the network model used in the current Internet architecture as well. Protocols are set of rules which govern every possible communication over a network. These protocols describe the movement of data between the source and destination or the internet. These protocols offer simple naming and addressing schemes.
Protocol layer
OSI model description details
post office protocol version 3 (pop3)
these three topics are describe in this slide.
this slide made by zakirul islam.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2. PROTOCOL STACK
• Protocol Stack is a combination of different protocol.
• All these protocols works together to perform specific task.
• Every Layer Hs different protocol.
• We discuss aboouut layer
SK Ahsan
3. LAYERED TASK
•We use the concept of layers in our daily life.
•As an example would two friends who communicate
through postal email.
•The process of sending a letter to a friend would be
complex if there are no service available from the post
office
SK Ahsan
4. LAYERED TASK
SK Ahsan
Sender Receiver
The letter is written put in an
envelope, and dropped in a
mailbox
The letter is delivered to
carrier by the post office
The letter is carried from the
mailbox to a post office
The letter is picked up,
removed from the envelop,
and read
The letter is delivered to
carrier by the post office
The letter is carried from the
mailbox to a post officeMiddle Layer
Lower Layer
Higher Layer
Parcel is Carried from the source to the destination
5. THE OSI MODEL
• ISO is an organization which is established in 1947.
• AN ISO standard that covers all aspects of network
communication.
• Network communication model is defined in OSI.
• It was first introduced in the late 1970s, 1983
SK Ahsan
6. ISO is the organization.
OSI is the model.
Note
SK Ahsan
7. WHY OSI MODEL
• OSI model decide how different equipment from different
vendors can communicate with one another
• Communication process is divided into different subtasks.
• Using OSI model NETWORK HARDWARE and SOFTWARE
can easily communicate with one another.
• If any kind of change is required then it occurs only in
required layer.
SK Ahsan
8. 7 LAYERS OF OSI MODEL
SK Ahsan
Application
Network process to Application
Presentation
Data Representation and Encryption
Session
Interhost Communication
Transport
End to End Connection and Reliability
Network
Path Determination and IP(Logical) Add.
DataLink
MAC and LLC(Physical Addr)
Physical
Media, Signal and Binary Transmission Send Packet in the form of BITS
Error Checking and Physical Connection
Sequencing and Address Information
Errors Control
Traffic Flow Information
Formatting and Encryption of Packets data
Accept request to Communicate
DATA
DATA
DATA
Segment
Packets
Frames
Bits
9. MNEMONICS
•The following mnemonics may help you remember
the layers sequence and names.
•All People Seems To Need Data Processing.
•Please Do Not Take Sales People’s Advice.
•People Design Networks To Send packets
Accurately
•Always Put Some Thoughts Into Designing
Programs.
SK Ahsan
10. LAYERING AND INTERNETWORKING
•Communication environments separate the
networking functions and application processing
are called LAYERING.
• OSI divides the big task of host-to-host
networking called INTERNETWORKING in to a
vertical stack.
• This OSI stack contains the seven numbered layers
,these indicate distinct functions.
SK Ahsan
11. CLIENT AND SERVER
SK Ahsan
Application
Presentation
Session
Transport
Network
Datalink
Physical
Client Server
Application
Presentation
Session
Transport
Network
Datalink
PhysicalPhysical Link
Logical Link
12. SK Ahsan Figure:The interaction between layers in the OSI model
OSI Layers Interaction
16. PHYSICAL LAYER
• It transmits data over physical medium or on network like
hardware like cables, cards, electrical, optical, mechanical
and functional interface to the medium.
• It handles the transmission of raw bits over a
communication link.
• It is responsible for transmitting bit(ZERO and ONE) by
providing signaling of the message and the interface
between the sender or receiver and the medium.
SK Ahsan
17. PHYSICAL LAYER
• Physical Layer must decide the following
• Characteristics of Media
• Representation of Bits
• Data Rate
• Synchronization
• Line Configuration
• Transmission Mode
SK Ahsan
18. The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
Note
20. DATA LINK LAYER
• Frames not raw bits are actually delivered to the host.
• The data link layer is responsible for moving frames from
one hop (node) to the next.
• Manage physical layer communication between
connecting systems.
• It is responsible for providing node to node
communication on a single, local network.
SK Ahsan
22. FUNCTIONS OF DATA LINK LAYER
• It must provide an address mechanism that enable messages to be delivered
to the correct nodes.
• Data units at the Data Link layer are most commonly called frames, although
the term packets is used with some protocols.
• The single layer actually incorporates two sub-layers as IEEE Logical Link
Control Model.
• The Lower of the two sub-layers is called the MAC and the upper sub-layer is
the LLC.
• The MAC layer provides local addressing. Error correction and in some
cases includes a field to distinguish the frame type from the other types.
• Example of Data Link Standards include frame relay, ETHERNET, Token Ring
and FDDI.
SK Ahsan
23. DATA LINK LAYER
•Datalink layer must decide the following
•Framing
•Flow control
•Error Control
•Access Control
SK Ahsan
24. The data link layer is responsible for moving
frames from one hop (node) to the next.
Note
27. NETWORK LAYER
• The network layer handles routing among nodes within a
packet switched network.
• The network layer operates independently of the physical
medium, which is a concern of the physical layers.
• Routers are network layer devices, they can be used to
forward packets between physically different networks.
• It adds a header to the message that includes the source and
destination network address.
• This combination of data plus the network layer is called a
PACKETS
SK Ahsan
28. NETWORK LAYER
• It translates logical addresses and names into physical addresses for
Packets Delivery.
• The addressing which makes this delivery can be thought of as a
universal address as compared to the local addressing of the MAC.
• It determines routes for sending, managing network traffic problems,
packet switching, routing, data congestion and reassembling data.
• It control end-to-end flow of segmentation and reassembly functions
of large packets of data which exceed the Maximum Transmission
Units.
• The Internet Protocol(IP) is the most common example.
SK Ahsan
33. TRANSPORT LAYER
• It translates system names into addresses.
• The unit of data exchange is commonly called MESSAGE rather than a
packet or frame.
• It divides messages into fragments that fit within the size limitation
established by the network.
• It allows users to segments/reassemble several upper layer application on
to the same transport data stream.
• It ensure host to host session connection.
• This layer is responsible for addressing, determining network traffic
problems, packet switching, routing, congestion and reassembling data at
receiving end to recover the original message.
SK Ahsan
34. TRANSPORT LAYER
• It ensures that the segments delivered will be acknowledge back too the
sender.
• It provides retransmission of segments those are not acknowledged.
• Puts segments back into their correct sequence at the destination.
• To enable packets reassemble in their original order, this layer include a
MESSAGE SEQUENCE NUMBER in its header.
• Sometimes it provides a multiplexing between the same two end-points.
• Delivery may be GUARANTEED or CONNECTION-ORIENTED streams like
TCP or UDP
SK Ahsan
35. TRANSPORT LAYER
•It is also responsible for delivering message from a
specific process on one computer to the
corresponding process on the destination computer.
•Transport layer assigns a service access point to
each packet. In TCP/IP terms that is called PORT.
•One more responsibility of the transport layer is
DETECTING ERRORS In transmitting data.
SK Ahsan
36. TRANSPORT LAYER
•Some responsibilities of the transport layer are as
follows
•Service Point Addressing
•Segmentation and Re-assembly
•Connection Control
•Flow Control
•Error Control
SK Ahsan
37. The transport layer is responsible for the delivery
of a message from one process to another.
Note
40. SESSION LAYER
• It establishes, manages and terminates session between application.
• It provides mechanism for managing end-user, host, process operations
termination and restart procedures.
• It is responsible for dialog control between nodes. Dialog is a formal
conversation in which two nodes agree to exchange data.
• The communication across a network can take place and controlled in one of
three dialog modes are simplex, Half Duplex and Full Duplex.
• Testing for out-of-sequence packet is handles also.
• Session enables communication in organized manner in three phases as
Connection Establishment, Data Transfer and Connection Release.
SK Ahsan
42. PRESENTATION LAYER
• This layer provides data communication and code formatting.
• It provides a way for a remote host to inform the local client how to
present the data to the application or client.
• It ensures that the data that arrives from the network can be used by the
application, and information send by the application can be transmitted
on the network.
• It directly translates data from one format to another.
• It provides data encryptioiin, decryption, compression and
decompression.
• It delivers and format information for application layer processing.
SK Ahsan
46. APPLICATION LAYER
• The application layer provides different services to user application.
• It interfaces directly to these services and provide conversion between
associated application process.
• It contains a variety of protocols that are commonly needed.
• Another application layer function is file transfer.
• Different file system have different file naming conventions.
• Transferring a file between two different system requires handling all
incompatibilities.
SK Ahsan