SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Communication
Networks
- Protocol Layering
Introduction / Need for Protocol Layering
• In data communication and networking, a
protocol defines the rules that both the
sender and receiver and all intermediate
devices need to follow for effective
communication.
• When communication is simple, we may
need only one simple protocol.
• when the communication is complex, we
may need to divide the task between
different layers.
• In this case we need a protocol at each
layer, or protocol layering.
Scenario 1: Simple Communication
Scenario 2: Complex Communication
Does layering actually satisfies the needs?
Lets assume that you own a shop where you sell Jam breads, Few people gets satisfied
with what you serve. Now a Foodie walks in and asks for customization. Can you really
satisfy him with what you have?
Principles of Protocol Layering
The first principle dictates that if we
want bidirectional communication, we
need to make each layer so that it is
able to perform two opposite tasks,
one in each direction.
The second principle that we need to
follow in protocol layering is that the
two objects under each layer at both
sites should be identical.
The Entire internet operates on a Globally
Accepted Standard / Model to communicate
effectively
•
•
•
•
Network Support
layers
✓ Deals with physical aspects
of moving data from one
device to another device
User Support layers
✓ Deals with the
interoperability among
unrelated software systems
Transport Layer
✓ Ensures the reliable data
transmission
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
OSI Model – Open System Interconnect
Alligator
Pet
Steve’s
Touch
Not
Do
Please
1. Physical Layer
Transmission Rate Bit
Synchronization
Physical Topology
2.Data Link Layer
➢ Framing
➢ Physical Addressing
➢ Flow Control
➢ Error Control
➢ Access Control
3. Network Layer
Logical Addressing Routing
4. Transport Layer
• Functions:
• Service port addressing
• Segmentation and reassembly
• Connection control
• Connection oriented services
• Connection less services
• Flow control and error control
Segmentation and reassembly
Service Port addressing
5. Session layer
• Functions
• Dialogue control
• This function decides which application send / receive data and
connection type (Simplex or Duplex)
• Synchronization
• Maintains the same data rates at both sender and receiver nodes.
6. Presentation layer
• Functions:
• Translation
• Encryption and decryption
• Compression
Presentation layer
7. Application Layer
Email Services
Browsers
Online
Shopping
Services
References:
• ―
• ―
•

Más contenido relacionado

La actualidad más candente

Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switchinghoanv
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basicsRomeo Alonzo
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 

La actualidad más candente (20)

TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Osi model
Osi modelOsi model
Osi model
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basics
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 

Similar a Protocol Layering in Communication Networks: A Guide to the 7 Layers of the OSI Model

ITFT_Osi reference model
ITFT_Osi reference modelITFT_Osi reference model
ITFT_Osi reference modelSneh Prabha
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx183JAIDEEP
 
Chapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptxChapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptxManasaPM3
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocolNayan Sarma
 
Osi model
Osi modelOsi model
Osi modelOnline
 
Overview of an OSI reference Model
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference ModelDarshan Bhatt
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Zakirul Islam
 
OSI reference model
OSI reference modelOSI reference model
OSI reference modelshanthishyam
 
Network standards
Network standardsNetwork standards
Network standardshspatalia
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxDevChaudhari17
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit iJAIGANESH SEKAR
 
7 layers of osi models
7 layers of osi models7 layers of osi models
7 layers of osi modelsSathish Kumar
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsAya Mahmoud
 

Similar a Protocol Layering in Communication Networks: A Guide to the 7 Layers of the OSI Model (20)

ITFT_Osi reference model
ITFT_Osi reference modelITFT_Osi reference model
ITFT_Osi reference model
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
Chapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptxChapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptx
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
OSI Reerence Model
OSI Reerence ModelOSI Reerence Model
OSI Reerence Model
 
Computer networks
Computer networksComputer networks
Computer networks
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Osi model
Osi modelOsi model
Osi model
 
Overview of an OSI reference Model
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference Model
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Osi layer model
Osi layer modelOsi layer model
Osi layer model
 
Network standards
Network standardsNetwork standards
Network standards
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
 
ch5-osi.pdf
ch5-osi.pdfch5-osi.pdf
ch5-osi.pdf
 
Computer networks unit i
Computer networks    unit iComputer networks    unit i
Computer networks unit i
 
7 layers of osi models
7 layers of osi models7 layers of osi models
7 layers of osi models
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systems
 

Más de JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnettingJAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnettingJAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switchingJAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15JAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methodsJAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methodsJAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cdJAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressingJAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1JAIGANESH SEKAR
 

Más de JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
 

Último

Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Último (20)

Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 

Protocol Layering in Communication Networks: A Guide to the 7 Layers of the OSI Model

  • 2. Introduction / Need for Protocol Layering • In data communication and networking, a protocol defines the rules that both the sender and receiver and all intermediate devices need to follow for effective communication. • When communication is simple, we may need only one simple protocol. • when the communication is complex, we may need to divide the task between different layers. • In this case we need a protocol at each layer, or protocol layering. Scenario 1: Simple Communication Scenario 2: Complex Communication
  • 3. Does layering actually satisfies the needs? Lets assume that you own a shop where you sell Jam breads, Few people gets satisfied with what you serve. Now a Foodie walks in and asks for customization. Can you really satisfy him with what you have?
  • 4. Principles of Protocol Layering The first principle dictates that if we want bidirectional communication, we need to make each layer so that it is able to perform two opposite tasks, one in each direction. The second principle that we need to follow in protocol layering is that the two objects under each layer at both sites should be identical.
  • 5. The Entire internet operates on a Globally Accepted Standard / Model to communicate effectively • • • • Network Support layers ✓ Deals with physical aspects of moving data from one device to another device User Support layers ✓ Deals with the interoperability among unrelated software systems Transport Layer ✓ Ensures the reliable data transmission Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer
  • 6. OSI Model – Open System Interconnect Alligator Pet Steve’s Touch Not Do Please
  • 7. 1. Physical Layer Transmission Rate Bit Synchronization Physical Topology
  • 8. 2.Data Link Layer ➢ Framing ➢ Physical Addressing ➢ Flow Control ➢ Error Control ➢ Access Control
  • 9. 3. Network Layer Logical Addressing Routing
  • 10. 4. Transport Layer • Functions: • Service port addressing • Segmentation and reassembly • Connection control • Connection oriented services • Connection less services • Flow control and error control
  • 13. 5. Session layer • Functions • Dialogue control • This function decides which application send / receive data and connection type (Simplex or Duplex) • Synchronization • Maintains the same data rates at both sender and receiver nodes.
  • 14. 6. Presentation layer • Functions: • Translation • Encryption and decryption • Compression
  • 16. 7. Application Layer Email Services Browsers Online Shopping Services