These slides cover a topic on X.25, Frame relay and ATM in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
These slides cover a topic on Virtual circuit & message switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking
These slides cover a topic on Virtual circuit & message switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking
The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It’s all about routing.
5.1 Network Layer Design Issues
What do we need to think about in this layer?
5.2 Routing Algorithms
Strategies for getting from source to destination.
5.3 Congestion Control Algorithms
How do we keep from bottlenecking from too many packets?
5.4 Internetworking
Working with multiple networks and protocols in order to deliver packets.
5.5 The Network Layer in the Internet
Gluing together a collection of subnets.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
switching techniques in data communication and networkingHarshita Yadav
it is a detailed presentation on switching techniques. it includes the three types of switching technique. it is described in such manner that you can learn switching without any difficulties.
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
Protocols And IP suite PPT
Contents are
History
TCP/IP Suite Layer
a} Network Interface
b} Internet Layer
c} Transport Layer
d} Application Layer
3.Comparison of OSI and IP
The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It’s all about routing.
5.1 Network Layer Design Issues
What do we need to think about in this layer?
5.2 Routing Algorithms
Strategies for getting from source to destination.
5.3 Congestion Control Algorithms
How do we keep from bottlenecking from too many packets?
5.4 Internetworking
Working with multiple networks and protocols in order to deliver packets.
5.5 The Network Layer in the Internet
Gluing together a collection of subnets.
TCP/IP have 5 layers, whereas OSI model have 7 layers in its Model. TCP/IP is known for the secured connection and comunication. I have explained all functions and definitions of layers in TCP/IP Model
switching techniques in data communication and networkingHarshita Yadav
it is a detailed presentation on switching techniques. it includes the three types of switching technique. it is described in such manner that you can learn switching without any difficulties.
Hello People.. Welcome to GURUKULA!!!
Have you ever thought that how the protocols that are required for the effective delivery of the messages from one place to anpther place take place in a real time internet..... This video explains about the concept called PROTOCOL LAYERING, where you can learn the way how the protocols are layered in such a way..
Simple examples are also used to make the concepts clean nd clear.
This video will help you to learn:
What is protocol layering in networks, OSI Model in Computer Networks, Layers of OSI Model, OSI Model, OSI Internet Module, OSI Layers and their Functions, Examples of OSI Models, 7 layers of OSI Models, Principles of Protocol Layering, Why layering the Protocols,
Thanks for Watching, Keep Supporting and Keep Sharing...
Protocols And IP suite PPT
Contents are
History
TCP/IP Suite Layer
a} Network Interface
b} Internet Layer
c} Transport Layer
d} Application Layer
3.Comparison of OSI and IP
Introduction to TCP/IP: Issues in IPV4, IPV6 protocol
Mature Packet Switching Protocols:ITU Recommendation X.25, User Connectivity, Theory of Operations, Network Layer Functions, X.75 Internetworking Protocol, Advantages and
Drawbacks
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Pradnya Saval
Introduction to TCP/IP: Issues in IPV4, IPV6 protocol, Mature Packet Switching Protocols: ITU Recommendation X.25, User Connectivity, Theory of Operations, Network Layer Functions, X.75 Internetworking Protocol, Advantages and Drawbacks
In this slideshow, we have discussed Top 10 interview questions on topic OSI model
Q1. Define OSI layers.
Q2. Are there alternative models to the OSI model? If yes, define it.
Q3. What are the differences between TCP and UDP?
Q4. What is the importance of the OSI Physical Layer?
Q5. Which layers perform error detection and recovery functions?
Q6. How the network administrator detect the problem?
Q7. What is the difference between flow control and error control?
Q8. What is Data Encapsulation?
Q9. MAC address works on which layer? What are the differences between MAC sublayer and LLC sublayer?
Q10. What is the difference between half-duplex and full-duplex?
website: http://allabouttesting.org
Disclaimer: This SlideShare is for educational purpose only.
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
A distributed three hop routing protocol to increase theKamal Spring
Hybrid wireless networks combining the advantages of both mobile ad-hoc networks and infrastructure wireless networks have been receiving increased attention due to their ultra-high performance. An efficient data routing protocol is important in such networks for high network capacity and scalability. However, most routing protocols for these networks simply combine the ad-hoc transmission mode with the cellular transmission mode, which inherits the drawbacks of ad-hoc transmission. This paper presents a Distributed Three-hop Routing protocol (DTR) for hybrid wireless networks. To take full advantage of the widespread base stations, DTR divides a message data stream into segments and transmits the segments in a distributed manner. It makes full spatial reuse of a system via its high speed ad-hoc interface and alleviates mobile gateway congestion via its cellular interface. Furthermore, sending segments to a number of base stations simultaneously increases throughput and makes full use of widespread base stations. In addition, DTR significantly reduces overhead due to short path lengths and the elimination of route discovery and maintenance. DTR also has a congestion control algorithm to avoid overloading base stations. Theoretical analysis and simulation results show the superiority of DTR in comparison with other routing protocols in terms of throughput capacity, scalability and mobility resilience. The results also show the effectiveness of the congestion control algorithm in balancing the load between base stations.
This PPT consist of current trends of information technology which is prepared by Dr. Rajiv Shrivastava. Dr. Rajiv Shrivastava is a director in SIRT, Bhopal. SIRT Bhopal is one of the top 10 engineering colleges in india.
SIRT Bhopal, among top placement engineering colleges in MP has taken all responsibilities of campus placements / recruitments of all students. Be it a scenario of top placement in computer engineering but we provide top engineering placements for all other branches including Information Technology, Mechanical Engineering, Electronics Engg, Electrical Engg, Civil Engineering, MBA, MCA & Diploma Engineering Programs. The Sagar Group of Institutions has always proved itself as top.
Tips for Group Discussion given by Dr Rajiv Srivastava who is a Director in SIRT, Bhopal. SIRT, Bhopal is a Top Placement College in Bhopal (M.P.). It is a Best Placement College in Central India.
https://www.sirtbhopal.ac.in/
This ppt contains basic commands of UNIX operating system. This ppt is prepared by Dr. Rajiv Srivastava who is a director of SIRT, Bhopal which is a Best Engineering College in Central. India
Sagar Group of Institutions one of the Top Engineering Colleges in Bhopal. Which is providing Top Placements to students? To know more about Best Engineering College in Bhopal
Visit: - www.sirtbhopal.ac.in
These slides cover a topic on B ISDN in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
These slides cover a topic on ISDN(integrated services digital network) part 2 in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
These slides cover a topic on ISDN (Integrated Services Digital Network) in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
These slides cover a topic on Multiplexing in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
These slides cover a topic on Introduction to switching & circuit switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
These slides cover a topic on Terminal handling & polling in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
These slides cover a topic on Spread spectrum in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Applications of Time Division multiplexing : statistical TDMDr Rajiv Srivastava
These slides cover a topic on Applications of Time Division multiplexing and statistical TDM in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
These slides cover a topic on Wave Division Multiplexing in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Data Communication & Computer network: Shanon fano codingDr Rajiv Srivastava
These slides cover the fundamentals of data communication & networking. it covers Shanon fano coding which are used in communication of data over transmission medium. it is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Data Communication & Computer Networks : LZW compression methodDr Rajiv Srivastava
These slides cover the fundamentals of data communication & networking. it covers LZW compression method which are used in communication of data over transmission medium. it is useful for engineering students & also for the candidates who want to master data communication & computer networking.
These slides cover the fundamentals of data communication & networking. it covers LZ algorithms which are used in communication of data over transmission medium. it is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Data communication & computer networking: Huffman algorithmDr Rajiv Srivastava
These slides cover the fundamentals of data communication & networking. it covers Huffman algorithm. it is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Topic : X.25, Frame relay and ATM
1. Introduction to Data communication
Topic: X.25 and Frame Relay
Lecture # 12
Dr Rajiv Srivastava
Director
Sagar Institute of Research & Technology (SIRT)
Sagar Group of Institutions, Bhopal
http://www.sirtbhopal.ac.in
3. • Definition : X.25 is a standard suite of
protocols used for packet switching across
computer networks. The X.25 protocols works
at the physical, data link, and network layers
(Layers 1 to 3) of the OSI model.
• While X.25 has, to a large extent, been
replaced by less complex protocols, especially
the Internet protocol (IP), the service is still
used and available in niche and legacy
applications.
4. PSE : Packet Switch Exchange
DTE : Data Terminal Equipment
DCE : Data Circuit Terminating
Equipment
PAD : Packet Assembler/
TE
NT
5. • Its a virtual-circuit switching network
• It uses a data transfer speed of 64 kbps
• It uses extensive error & flow controls at both
data link & network layer
• X.25 defines how a packet-mode terminal can be
connected to a packet network for exchange of
data. It describes procedure necessary for
establishing, maintaining & terminating
connections.
• It also describes set of services, called facilities, to
provide functions such as reverse charge, call
direct & delay control
6. • X.25 is also known as a subscriber network
interface(SNI) protocol.
• It defines how user’s DTE communicates with
the network & how packets are sent over that
networks using DCEs.
• It uses a virtual circuit approach to packet
witching (SVC & PVC) & use
asynchronous(statistical) TDM to multiplex
packets.
7. X.25 Layers
• X.25 protocol specifies three layers:
1. Physical layer
2. Frame layer
3. Packet layer
• These layers defines functions of physical
layer, data link layer & network layer of OSI
model.
• Given figure explains the situation
10. Physical Layer
• X.25 specifies a protocol named as X.21 at
physical layer. It is also called as X.21 bis.
• X.21 has been designed by ITU-T
• X.21 is quite similar to other physical layer
protocols such as EIA-232 which is also
supported by X.25
11. Frame Layer
• X.25 uses a bit oriented protocol at frame layer.
• This protocol is called as Link Access Procedure,
Balanced (LAPB)
• LAPB is subset of High-level Data Control (HDLC),
(which is bit oriented protocol used in point to
point & multi point links)
• Figure shows general format of the LAPB packet.
13. Frames are of three categories :
• I-Frames : I-frames are used to encapsulate PLP
packets from the network layer.
• S-Frames : S-frames are for flow and error control in
the frame layer.
• U-Frames : U-frames are used to set up and
disconnect the links between a DTE and a DCE. The
three packets most frequently used by LAPB in this
category are
• SABM (or ESABM if the extended address mode is used)
• UA &
• DISC
14. Frame Layer Phases
In the frame layer, communication between a DTE and a
DCE involves three phases :
1. link setup
2. packet transfer, and
3. link disconnect
15. Packet Layer
• The network layer in X.25 is called the packet layer
protocol (PLP).
• This layer is responsible for establishing the connection,
transferring the data, and terminating the connection.
• In addition, it is responsible for creating the virtual circuits
and negotiating network services between two DTEs.
• While the frame layer is responsible for making a
connection between a DTE and a DCE, the packet layer is
responsible for making a connection between two DTEs
(end-to-end connection).
• Note that X.25 uses flow and error control at two levels
(frame layer and packet layer).
16. Advantages of X.25
• The main advantages of the switching and
routing technique are as follows –
• Fast response times
• No blocking except when the network storage
is completely flooded.
• High availability because of distributed
routing.
• High-speed data bursts can be handled as well
as low-speed requirements.
17. Disadvantages of X.25
Disadvantages of X.25 packet switching network
are as follows :
(i)X.25 has a low data rate i.e. 64-kbps.
(ii)X.25 has extensive flow and error control at
both the data link layer and the network layer.
(iii)Flow and error control at both layers create a
large overhead and slow down transmissions.
18. (iii) X.25 was designed for private use, not for the
Internet. X.25 has its own network layer which
means that the user data are encapsulated in the
network layer packets of X.25. Although, the Internet
has its own network layer, which means if the
Internet wants to use X.25, it has to deliver its
network layer packet, known as datagram, to X.25
for encapsulation in the X.25 packet. Thus, the
overhead doubles.
(iv) Limitations of X.25 has given way to another
technologies for WAN like Frame Relay & then ATM
(Asynchronous Transfer Mode).
19. Frame Relay
Frame relay is a wide area network with the following
features:
1. Frame Relay operates at a higher speed (1.544 Mbps and
recently 44.376 Mbps). This means that it can easily be
used instead of a mesh of T-1 or T-3 lines.
2. Frame Relay operates in just the physical and data link
layers. This means it can easily be used as a backbone
network to provide services to protocols that already have
a network layer protocol, such as the internet.
3. Frame Relay allows bursty data.
4. Frame Relay allows a frame size of 9000 bytes, which can
accommodate all local area network frame sizes.
20. 5. Frame Relay is less expansive than other
traditional WANs.
6. Frame Relay has error detection at data link
layer only. There is no flow control or error
control.
7. There is not even a retransmission policy if a
frame is damaged; it is silently dropped.
Frame Relay was designed in this way to
provide fast transmission capability for more
reliable media and for those protocol that
have flow and error control at the higher
layers.
21. ATM
• Short for Asynchronous Transfer Mode, a network
technology based on transferring data in cells or packets of
a fixed size. The cell used with ATM is relatively small
compared to units used with older technologies. The small,
constant cell size allows ATM equipment to transmit video,
audio, and computer data over the same network, and
assure that no single type of data hogs the line.
• ATM (asynchronous transfer mode) is a dedicated-
connection switching technology that organizes digital
data into 53-byte cell units and transmits them over a
physical medium using digital signal technology.
Individually, a cell is processed asynchronously relative to
other related cells and is queued before being multiplexed
over the transmission path.
22. • Because ATM is designed to be easily
implemented by hardware (rather than
software), faster processing and switch speeds
are possible.
• The prespecified bit rates are either 155.520
Mbps or 622.080 Mbps. Speeds on ATM
networks can reach 10 Gbps.
• Along with Synchronous Optical Network
(SONET) and several other technologies, ATM is
a key component of broadband ISDN (BISDN).
23. Thank You
Dr Rajiv Srivastava
Director
Sagar Institute of Research & Technology (SIRT)
Sagar Group of Institutions, Bhopal
http://www.sirtbhopal.ac.in