This document provides an overview of computer network layers and protocols. It discusses the OSI reference model and its seven layers - physical, data link, network, transport, session, presentation, and application layer. It describes the functions of each layer and some examples of protocols used. The document also covers topics like connection-oriented vs connectionless services, network architectures, and network goals of communication and resource sharing.
This document provides information on layering in networked computing by discussing the OSI and TCP/IP models. It begins by outlining the learning objectives, which are to understand the need for layering, the layers and protocols in each model, and how data is transmitted between layers and hosts. It then describes each layer in the OSI model and its functions. The TCP/IP model is also explained, comparing it to the OSI model by mapping its 4 layers to the 7 layers of OSI. Key protocols at each layer are identified and packet encapsulation in TCP/IP is demonstrated.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions and communication protocols used in computer networks. It provides a structured approach to understanding and designing network architectures, allowing different systems and devices to communicate with each other effectively.
The OSI model consists of seven interconnected layers, each responsible for specific functions and services. Here is a brief description of each layer:
Physical Layer: The physical layer is the lowest layer of the OSI model. It deals with the physical transmission of data over the network medium, including cables, connectors, and electrical signals. It defines characteristics such as voltage levels, data rates, and physical connectors.
Data Link Layer: The data link layer provides reliable point-to-point or point-to-multipoint data transfer between network nodes. It is responsible for framing data into packets, error detection and correction, and flow control. Ethernet switches operate at this layer.
Network Layer: The network layer manages the routing and forwarding of data packets across different networks. It determines the optimal path for data transmission, handles addressing, and controls congestion in the network. Routers operate at this layer.
Transport Layer: The transport layer ensures reliable end-to-end data delivery between hosts. It segments data from the upper layers into smaller packets, manages data flow, and provides error recovery mechanisms. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at this layer.
Session Layer: The session layer establishes, manages, and terminates communication sessions between applications. It provides services such as session establishment, maintenance, and synchronization, allowing multiple applications to communicate and coordinate their activities.
Presentation Layer: The presentation layer is responsible for data representation, encryption, compression, and translation. It ensures that data from the application layer is in a format that can be understood by the receiving system.
Application Layer: The application layer is the topmost layer of the OSI model. It provides a direct interface between the network and the applications. It includes protocols and services that support specific applications, such as HTTP for web browsing, SMTP for email, and FTP for file transfer.
The OSI model follows a layered approach, where each layer performs specific functions while relying on the services provided by the layers below it. This modular design allows for interoperability between different network technologies and facilitates easier troubleshooting and development of network protocols.
It's important to note that the OSI model is a conceptual framework and not a specific implementation. Actual networking protocols, such as TCP/IP, do not strictly adhere to the OSI model but borrow concepts from it.
This document discusses network protocol models, including the OSI 7-layer model and IEEE 802 project model. It describes the purpose of having standardized network models and some of the organizations that define these models, such as ISO and IEEE. Each layer of the OSI model is defined, from the physical layer up to the application layer, along with example protocols and functions of each layer. The relationship between the layers is illustrated. The IEEE 802 project categories and its enhancements to the OSI model by dividing the data link layer are also summarized.
OSI layers describes how the data can be send from one parties to another during data communication. it also gives the detailed information of how the data functionally divided into small pieces and reaches the destination.
This document discusses layered network models, specifically the OSI model and TCP/IP model. It provides an overview of each layer in both models and their functions. The key points are:
- The OSI model defines 7 layers that break communication into smaller parts to simplify the process and allow different hardware/software to work together.
- The TCP/IP model has 4 layers - application, transport, internet, and network access. It is used widely on the internet.
- Each layer adds header information to data as it moves down the stack. This encapsulation allows communication between layers and across networks.
This document contains lecture notes on fundamentals of computer systems from Dr. Atif Shahzad. It covers topics such as logic, Boolean algebra, memory, CPU, registers, fetch-execute cycle, file management, networking, OSI model, LAN, WAN, communication protocols, latency, capacity, broadcast, firewalls, and network speeds. The document provides definitions and explanations of key computer science concepts.
osi model, What is osi model, osi model by shubham mishra, osi model layers, osi model protocols, osi model layer protocols, osi model used protocols, osi model used devices, osi model application, osi model advantages and dis advantages, layers of osi model, osi model layer functions, how many layers in osi model, physical later, data link layer, network layer, transport layer, session later,presentation layer, application layer, MGCGV, Shubham Mishra
The document discusses network reference models and the OSI and TCP/IP models. It provides details on each layer of the OSI model and its functions. The key points are that reference models divide network communication into simpler components, provide standardization, and prevent changes in one layer from affecting others. The OSI model has 7 layers and separates network functions into upper layers for applications and lower layers for data transmission. The TCP/IP model is based on widely used TCP and IP protocols.
This document provides information on layering in networked computing by discussing the OSI and TCP/IP models. It begins by outlining the learning objectives, which are to understand the need for layering, the layers and protocols in each model, and how data is transmitted between layers and hosts. It then describes each layer in the OSI model and its functions. The TCP/IP model is also explained, comparing it to the OSI model by mapping its 4 layers to the 7 layers of OSI. Key protocols at each layer are identified and packet encapsulation in TCP/IP is demonstrated.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions and communication protocols used in computer networks. It provides a structured approach to understanding and designing network architectures, allowing different systems and devices to communicate with each other effectively.
The OSI model consists of seven interconnected layers, each responsible for specific functions and services. Here is a brief description of each layer:
Physical Layer: The physical layer is the lowest layer of the OSI model. It deals with the physical transmission of data over the network medium, including cables, connectors, and electrical signals. It defines characteristics such as voltage levels, data rates, and physical connectors.
Data Link Layer: The data link layer provides reliable point-to-point or point-to-multipoint data transfer between network nodes. It is responsible for framing data into packets, error detection and correction, and flow control. Ethernet switches operate at this layer.
Network Layer: The network layer manages the routing and forwarding of data packets across different networks. It determines the optimal path for data transmission, handles addressing, and controls congestion in the network. Routers operate at this layer.
Transport Layer: The transport layer ensures reliable end-to-end data delivery between hosts. It segments data from the upper layers into smaller packets, manages data flow, and provides error recovery mechanisms. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at this layer.
Session Layer: The session layer establishes, manages, and terminates communication sessions between applications. It provides services such as session establishment, maintenance, and synchronization, allowing multiple applications to communicate and coordinate their activities.
Presentation Layer: The presentation layer is responsible for data representation, encryption, compression, and translation. It ensures that data from the application layer is in a format that can be understood by the receiving system.
Application Layer: The application layer is the topmost layer of the OSI model. It provides a direct interface between the network and the applications. It includes protocols and services that support specific applications, such as HTTP for web browsing, SMTP for email, and FTP for file transfer.
The OSI model follows a layered approach, where each layer performs specific functions while relying on the services provided by the layers below it. This modular design allows for interoperability between different network technologies and facilitates easier troubleshooting and development of network protocols.
It's important to note that the OSI model is a conceptual framework and not a specific implementation. Actual networking protocols, such as TCP/IP, do not strictly adhere to the OSI model but borrow concepts from it.
This document discusses network protocol models, including the OSI 7-layer model and IEEE 802 project model. It describes the purpose of having standardized network models and some of the organizations that define these models, such as ISO and IEEE. Each layer of the OSI model is defined, from the physical layer up to the application layer, along with example protocols and functions of each layer. The relationship between the layers is illustrated. The IEEE 802 project categories and its enhancements to the OSI model by dividing the data link layer are also summarized.
OSI layers describes how the data can be send from one parties to another during data communication. it also gives the detailed information of how the data functionally divided into small pieces and reaches the destination.
This document discusses layered network models, specifically the OSI model and TCP/IP model. It provides an overview of each layer in both models and their functions. The key points are:
- The OSI model defines 7 layers that break communication into smaller parts to simplify the process and allow different hardware/software to work together.
- The TCP/IP model has 4 layers - application, transport, internet, and network access. It is used widely on the internet.
- Each layer adds header information to data as it moves down the stack. This encapsulation allows communication between layers and across networks.
This document contains lecture notes on fundamentals of computer systems from Dr. Atif Shahzad. It covers topics such as logic, Boolean algebra, memory, CPU, registers, fetch-execute cycle, file management, networking, OSI model, LAN, WAN, communication protocols, latency, capacity, broadcast, firewalls, and network speeds. The document provides definitions and explanations of key computer science concepts.
osi model, What is osi model, osi model by shubham mishra, osi model layers, osi model protocols, osi model layer protocols, osi model used protocols, osi model used devices, osi model application, osi model advantages and dis advantages, layers of osi model, osi model layer functions, how many layers in osi model, physical later, data link layer, network layer, transport layer, session later,presentation layer, application layer, MGCGV, Shubham Mishra
The document discusses network reference models and the OSI and TCP/IP models. It provides details on each layer of the OSI model and its functions. The key points are that reference models divide network communication into simpler components, provide standardization, and prevent changes in one layer from affecting others. The OSI model has 7 layers and separates network functions into upper layers for applications and lower layers for data transmission. The TCP/IP model is based on widely used TCP and IP protocols.
This document provides an introduction to computer networks. It discusses the key components and layers of networks including local area networks (LANs), wide area networks (WANs), protocols, addressing, and models like OSI and TCP/IP. It explains how data is encapsulated as it travels from an application down the protocol stack and across physical networks. Key topics covered include network interfaces, protocols, addressing, data encapsulation, the OSI model layers, TCP/IP layers, and protocols like IP, TCP, UDP.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices like hubs, switches, routers, and network interface cards. Finally, it covers networking topics such as network topologies, the OSI model, TCP/IP protocols, WANs, LANs, and the IEEE 802 standards.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of local, metropolitan, and wide area networks. Finally, it introduces the OSI model and its seven layers, describing the function of each layer.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of local, metropolitan, and wide area networks. Finally, it introduces the OSI model and its seven layers, describing the function of each layer.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
The document provides information about networking certifications and the CCNA exam. It discusses the CCNA exam number, total marks, duration, passing score, number of questions, question types, and benefits of obtaining the certification. It also covers networking topics like data networks, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs, WANs, virtual private networks, bandwidth, internetworking devices, network structure and hierarchy, IEEE 802 standards, and the OSI model.
This document provides an outline and overview of key topics related to computer networks, including:
1. The various uses of computer networks for businesses, homes, and mobile users.
2. The hardware components that make up networks, from personal area networks to wide area networks.
3. The software protocols and layered models that define how networks operate, such as the OSI 7-layer model and TCP/IP model.
4. Descriptions and comparisons of reference models like OSI and TCP/IP, explaining the functions of each layer.
The document summarizes the fundamental concepts of computer networks discussed in Chapter 1. It introduces the five components of data communication: data representation, data flow, delivery, accuracy, and jitter. It then discusses different types of networks, including LANs, MANs, WANs, and the Internet. The document also covers the OSI 7-layer model and describes the function of each layer, from the physical layer dealing with bit transmission to the application layer providing user services.
This document summarizes the key concepts from Chapter 1 of the textbook "Fundamental concepts of computer networks". It discusses the five components of data communication including data representation, data flow, and delivery. It also covers different types of networks including LANs, WANs, and the Internet. Common network topologies such as star, bus, ring and hybrid models are explained. Finally, it introduces the OSI 7-layer model and standards organizations that develop network protocols.
The document summarizes the fundamental concepts of computer networks discussed in Chapter 1. It introduces the five components of data communication: data representation, data flow, delivery, accuracy, and jitter. It then discusses different types of networks, including LANs, MANs, WANs, and the Internet. The document also covers network protocols and standards, as well as models like the OSI model. It provides details on each of the seven layers of the OSI model and their functions.
The document summarizes the fundamental concepts of computer networks discussed in Chapter 1. It introduces the five components of data communication: data representation, data flow, delivery, accuracy, and jitter. It then discusses different types of networks, including LANs, MANs, WANs, and the Internet. The document also covers the OSI 7-layer model, describing each layer's responsibilities and functions. Finally, it discusses protocols, standards, and standards organizations important to computer networking.
Introduction to computer network and functions.pptManimegalaM3
The document summarizes the fundamental concepts of computer networks discussed in Chapter 1. It introduces the five components of data communication: data representation, data flow, delivery, accuracy, and jitter. It then discusses different types of networks, including LANs, MANs, WANs, and the Internet. The document also covers network protocols and standards, as well as models like the OSI model. It provides details on each of the seven layers of the OSI model and their functions.
The document summarizes the fundamental concepts of computer networks discussed in Chapter 1. It introduces the five components of data communication: data representation, data flow, delivery, accuracy, and jitter. It then discusses different types of networks, including LANs, MANs, WANs, and the Internet. The document also covers network protocols and standards, as well as models like the OSI model. It provides an overview of the seven layers of the OSI model and their functions: physical, data link, network, transport, session, presentation, and application.
This document provides an introduction to computer networks and networking concepts. It discusses network structures including local area networks (LANs) and wide area networks (WANs). It then introduces network architecture and the layered protocol model, using the OSI reference model as an example. It describes how networks are structured into layers that communicate with peer layers on other machines. The document also provides an overview of network services and the TCP/IP protocol suite.
The document provides an overview of network reference models and standards, specifically explaining the OSI reference model and IEEE 802 networking model. The OSI model is a seven-layer framework for networking that separates functions into the physical, data link, network, transport, session, presentation, and application layers. The IEEE 802 standards define networking interfaces and cabling to ensure compatibility between devices.
This presentation is about:
Uses of Networking.
Various types of networking.
Applications used for networking.
Methods of network security.
Methods of communication -2G,3G,4G,Fiber Optics
Transmission Media.
Various types of protocols.
Cloud Computing
Protection against Viruses.
This document provides an introduction to the OSI and TCP/IP network models. It describes the seven layers of the OSI model and the four layers of the TCP/IP model. It explains the functions of each layer, such as the transport layer providing reliable data delivery and the network layer providing network-wide addressing and routing. The document also discusses protocols like TCP, UDP, and IP that operate at different layers and how data is encapsulated as it passes through the layers.
This document provides an introduction to computer networks. It discusses the key components and layers of networks including local area networks (LANs), wide area networks (WANs), protocols, addressing, and models like OSI and TCP/IP. It explains how data is encapsulated as it travels from an application down the protocol stack and across physical networks. Key topics covered include network interfaces, protocols, addressing, data encapsulation, the OSI model layers, TCP/IP layers, and protocols like IP, TCP, UDP.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices like hubs, switches, routers, and network interface cards. Finally, it covers networking topics such as network topologies, the OSI model, TCP/IP protocols, WANs, LANs, and the IEEE 802 standards.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of local, metropolitan, and wide area networks. Finally, it introduces the OSI model and its seven layers, describing the function of each layer.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of local, metropolitan, and wide area networks. Finally, it introduces the OSI model and its seven layers, describing the function of each layer.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
The document provides information about networking certifications and the CCNA exam. It discusses the CCNA exam number, total marks, duration, passing score, number of questions, question types, and benefits of obtaining the certification. It also covers networking topics like data networks, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs, WANs, virtual private networks, bandwidth, internetworking devices, network structure and hierarchy, IEEE 802 standards, and the OSI model.
This document provides an outline and overview of key topics related to computer networks, including:
1. The various uses of computer networks for businesses, homes, and mobile users.
2. The hardware components that make up networks, from personal area networks to wide area networks.
3. The software protocols and layered models that define how networks operate, such as the OSI 7-layer model and TCP/IP model.
4. Descriptions and comparisons of reference models like OSI and TCP/IP, explaining the functions of each layer.
The document summarizes the fundamental concepts of computer networks discussed in Chapter 1. It introduces the five components of data communication: data representation, data flow, delivery, accuracy, and jitter. It then discusses different types of networks, including LANs, MANs, WANs, and the Internet. The document also covers the OSI 7-layer model and describes the function of each layer, from the physical layer dealing with bit transmission to the application layer providing user services.
This document summarizes the key concepts from Chapter 1 of the textbook "Fundamental concepts of computer networks". It discusses the five components of data communication including data representation, data flow, and delivery. It also covers different types of networks including LANs, WANs, and the Internet. Common network topologies such as star, bus, ring and hybrid models are explained. Finally, it introduces the OSI 7-layer model and standards organizations that develop network protocols.
The document summarizes the fundamental concepts of computer networks discussed in Chapter 1. It introduces the five components of data communication: data representation, data flow, delivery, accuracy, and jitter. It then discusses different types of networks, including LANs, MANs, WANs, and the Internet. The document also covers network protocols and standards, as well as models like the OSI model. It provides details on each of the seven layers of the OSI model and their functions.
The document summarizes the fundamental concepts of computer networks discussed in Chapter 1. It introduces the five components of data communication: data representation, data flow, delivery, accuracy, and jitter. It then discusses different types of networks, including LANs, MANs, WANs, and the Internet. The document also covers the OSI 7-layer model, describing each layer's responsibilities and functions. Finally, it discusses protocols, standards, and standards organizations important to computer networking.
Introduction to computer network and functions.pptManimegalaM3
The document summarizes the fundamental concepts of computer networks discussed in Chapter 1. It introduces the five components of data communication: data representation, data flow, delivery, accuracy, and jitter. It then discusses different types of networks, including LANs, MANs, WANs, and the Internet. The document also covers network protocols and standards, as well as models like the OSI model. It provides details on each of the seven layers of the OSI model and their functions.
The document summarizes the fundamental concepts of computer networks discussed in Chapter 1. It introduces the five components of data communication: data representation, data flow, delivery, accuracy, and jitter. It then discusses different types of networks, including LANs, MANs, WANs, and the Internet. The document also covers network protocols and standards, as well as models like the OSI model. It provides an overview of the seven layers of the OSI model and their functions: physical, data link, network, transport, session, presentation, and application.
This document provides an introduction to computer networks and networking concepts. It discusses network structures including local area networks (LANs) and wide area networks (WANs). It then introduces network architecture and the layered protocol model, using the OSI reference model as an example. It describes how networks are structured into layers that communicate with peer layers on other machines. The document also provides an overview of network services and the TCP/IP protocol suite.
The document provides an overview of network reference models and standards, specifically explaining the OSI reference model and IEEE 802 networking model. The OSI model is a seven-layer framework for networking that separates functions into the physical, data link, network, transport, session, presentation, and application layers. The IEEE 802 standards define networking interfaces and cabling to ensure compatibility between devices.
This presentation is about:
Uses of Networking.
Various types of networking.
Applications used for networking.
Methods of network security.
Methods of communication -2G,3G,4G,Fiber Optics
Transmission Media.
Various types of protocols.
Cloud Computing
Protection against Viruses.
This document provides an introduction to the OSI and TCP/IP network models. It describes the seven layers of the OSI model and the four layers of the TCP/IP model. It explains the functions of each layer, such as the transport layer providing reliable data delivery and the network layer providing network-wide addressing and routing. The document also discusses protocols like TCP, UDP, and IP that operate at different layers and how data is encapsulated as it passes through the layers.
Top 10 Digital Marketing Trends in 2024 You Should KnowMarkonik
Digital marketing has started to prove itself to be one of the most promising arenas of technical development. Any brand, whether it is dealing in lifestyle or beauty, hospitality or any other field, should seek the help of digital marketing at some point in their journey to become successful in the online world.
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITSarthak Sobti
Network Security and Cyber Laws
Detailed Course Content
Unit 1: Introduction to Network Security
- Introduction to Network Security
- Goals of Network Security
- ISO Security Architecture
- Attacks and Categories of Attacks
- Network Security Services & Mechanisms
- Authentication Applications: Kerberos, X.509 Directory Authentication Service
Unit 2: Application Layer Security
- Security Threats and Countermeasures
- SET Protocol
- Electronic Mail Security
- Pretty Good Privacy (PGP)
- S/MIME
- Transport Layer Security: Secure Socket Layer & Transport Layer Security
- Wireless Transport Layer Security
Unit 3: IP Security and System Security
- Authentication Header
- Encapsulating Security Payloads
- System Security: Intruders, Intrusion Detection System, Viruses
- Firewall Design Principles
- Trusted Systems
- OS Security
- Program Security
Unit 4: Introduction to Cyber Law
- Cyber Crime, Cyber Criminals, Cyber Law
- Object and Scope of the IT Act: Genesis, Object, Scope of the Act
- E-Governance and IT Act 2000
- Legal Recognition of Electronic Records
- Legal Recognition of Digital Signatures
- Use of Electronic Records and Digital Signatures in Government and its Agencies
- IT Act in Detail
- Basics of Network Security: IP Addresses, Port Numbers, and Sockets
- Hiding and Tracing IP Addresses
- Scanning: Traceroute, Ping Sweeping, Port Scanning, ICMP Scanning
- Fingerprinting: Active and Passive Email
Unit 5: Advanced Attacks
- Different Kinds of Buffer Overflow Attacks: Stack Overflows, String Overflows, Heap and Integer Overflows
- Internal Attacks: Emails, Mobile Phones, Instant Messengers, FTP Uploads, Dumpster Diving, Shoulder Surfing
- DOS Attacks: Ping of Death, Teardrop, SYN Flooding, Land Attacks, Smurf Attacks, UDP Flooding
- Hybrid DOS Attacks
- Application-Specific Distributed DOS Attacks
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...Web Inspire
What is CRO?
Conversion Rate Optimization, or CRO, is the process of enhancing your website to increase the percentage of visitors who take a desired action. This could be anything from purchasing a product to signing up for a newsletter. Essentially, CRO is about making your website more effective in turning visitors into customers.
Why is CRO Important?
CRO is crucial because it directly impacts your bottom line. A higher conversion rate means more customers and revenue without needing to increase your website traffic. Plus, a well-optimized site improves user experience, which can lead to higher customer satisfaction and loyalty.
Measuring and Understanding the Route Origin Validation (ROV) in RPKIAPNIC
Shane Hermoso, APNIC's Training Delivery Manager (Southeast Asia and East Asia), presented on 'Measuring and Understanding the Route Origin Validation (ROV) in RPKI' during VNNIC Internet Conference 2024 held in Hanoi, Viet Nam from 4 to 7 July 2024.
4. NETWORK GOALS
By:Dr.Eng.Muhamed.Shujaa 4
1 Physical
7 Application
The two main benefits of networking computers are…
Communications
Information can be distributed very quickly, such as
email and video conferencing.
Saving Money
Resources such as information, software, and
hardware can be shared.
CPUs and hard disks can be pooled together to
create a more powerful machine.
2 Data Link
3 Network
4 Transport
5 Session
6 Presentation
5. NETWORK ARCHITECTURES
By:Dr.Eng.Muhamed.Shujaa
7 Application
1 Physical
5
A set of layers and protocols is called the network
architecture.
.1 Protocol Hierarchies
Networks are organized as layers to reduce design
complexity. Each layer offers services to the higher
layers. Between adjacent layers is an interface.
Services – connection oriented and
connectionless.
Interface – defines which primitives and services
the lower layer will offer to the upper layer.
Primitives – operations such as request, indicate,
response, confirm.
2 Data Link
3 Network
4 Transport
5 Session
6 Presentation
6. NETWORK ARCHITECTURES
By:Dr.Eng.Muhamed.Shujaa 6
Application
2. Design Issues for the Layers(functions(
• Mechanism for connection establishment
• Rules for data transfer
• Error control
• Fast sender swamping a slow receiver
• Inability of processes to accept long messages
• Routing in the case of multiple paths
Network
Data Link
Physical
Transport
Session
6 Presentation
7. Network Protocols
By:Dr.Eng.Muhamed.Shujaa 7
• Protocol: is a format order of messages sent and
received among the net entities and action takenon msgs
transmission receipt.
Protocol process:
• The format or structure of themessage
• The process by which networking devices shareinformation
about pathways with othernetworks
• How and when error and systemmessages are passed
between devices
• The setup andtermination of data transfer sessions
9. Learning outcomes
• Understand the need of layeringin Networkedcomputing
• Understand the OSImodel and the TCP/IPmodel
– Understand the function protocols and their
role at each layer.
• TCPprotocol
• UDPprotocol
• Understand the role of header in communication betweenlayers
• Understand how data sent from one host arrive to thetarget host.
By:Dr.Eng.Muhamed.Shujaa 9
10. What is Layering in Networked
Computing?
By:Dr.Eng.Muhamed.Shujaa 10
– Breaksdown communication into smaller, simplerparts.
11. Why alayered
model?
By:Dr.Eng.Muhamed.Shujaa 11
– Easierto teach communicationprocess.
– Speedsdevelopment, changesin one layer doesnot
affect how the other levelsworks.
– Allows different hardware and software towork
together.
– Reducescomplexity
12. What is “THEMODEL?”
By:Dr.Eng.Muhamed.Shujaa 12
• Commonly referred to asthe OSIreferencemodel.
• TheOSImodel
– is atheoretical blueprint that helps usunderstandhow
data gets from one user’s computer toanother.
– It is also amodel that helps develop standards so thatall
of our hardware and software talks nicely to eachother.
– It aids to provide an organized structure for hardware and
software developers to follow, to insure there productsare
compatible with current and future technologies.
13. 7 LayerOSIModel
• Q.Why useareference model?
– Servesasan outline of rules for how protocols canbe used to allow
communication betweencomputers.
– Eachlayer hasits own function and provides support to other
layers.
• Q.What are Other reference models are inuse.
– Most well known is the TCP/IPreferencemodel.
– Wewill compare OSIand TCP/IPmodels
• Ascomputing requirements increased, the network modeling hadto
evolve to meet ever increasing demandsof larger networks and
multiple venders.
13
• Problems and technology advancesalso added to the demandsfor
changesin network modeling.
By: Dr.Eng.Muhamed.Shujaa
14. Evolution of the 7-Layers
By:Dr.Eng.Muhamed.Shujaa 14
• SingleLayerModel - First Communication Between Computer Devices
– Dedicated copper wire or radiolink
– Hardware & software inextricablyintertwined
– Singlespecification for all aspects ofcommunication
1
DEVICEA DEVICE B
Hardware
&
Software
Hardware
&
Software
15. Evolution of the 7-Layers
By:Dr.Eng.Muhamed.Shujaa 15
• Two LayerModel
– Problem: Applications were being developed torun over ever-increasing
number of media/signalingsystems.
– Solution: Separateapplication aspects from technical (signaling and routing)
aspects
– Application Layer:Concerned with user interface, file accessand file transfer
Application
Technical
Standards
Application
Technical
Standards
16. Evolution of the7-Layers
By:Dr.Eng.Muhamed.Shujaa 16
• Four Layer Model - Network connectivity inherently requires travel over
intermediate devices (nodes)
• Technical Standards Level divided into Network, Data-link and Physical
Layers 1
Application
Network
Data-Link
Physical
Application
Network
Data-Link
Physical
17. Evolution of the7-Layers
By:Dr.Eng.Muhamed.Shujaa 17
Physical Layer
–Describes physical aspects of network: cards, wires, etc
–Specifies interconnect topologies and devices
Network Layer
–Defines a standard method for operating between nodes
–Address scheme is defined (IP)
–Accounts for varying topologies
Data-Link
–Works with Network Layer to translate logical addresses (IP) into hardware
addresses (MAC) for transmission
–Defines a single link protocol for transfer between two nodes(DLC protocol)
DLC:Data link controlprotocol
18. Evolution of the7-Layers
By:Dr.Eng.Muhamed.Shujaa 18
1
• Five Layer Model – Increase Quality of Service(QOS)
•Variable levels of data integrity in network
•Additional data exchanges to ensure connectivity over worstconditions
•Became the Transport Layer
Application
Transport
Network
Data-Link
Physical
Application
Transport
Network
Data-Link
Physical
20. Evolution of the 7-Layers
By:Dr.Eng.Muhamed.Shujaa 20
• The Seven Layer OSI Model - Addition of Management andSecurity
– Standardizing notation or syntax for application messages (abstract syntax)
1
– Set of encoding rules (transfer syntax)
– Became the Presentation Layer
Application
Presentation
Session
Transport
Network
Data-Link
Physical
Application
Presentation
Session
Transport
Network
Data-Link
Physical
25. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 25
7 Application
The Open Systems Interconnection is the model
developed by the International Standards Organization.
Benefits-Advantage
• Interconnection of different systems (open)
• Not limited to a single vendor solution
Negative Aspect (disadvantage(
• Systems might be less secure
• Systems might be less stable
1 Physical
2 Data Link
3 Network
4 Transport
5 Session
6 Presentation
26. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 26
Application
1. Physical Layer
a)Convert the logical 1’s and 0’s coming from
layer 2 into electrical signals.
b)Transmission of the electrical signals over a
communication channel.
Main topics:
• Transmission mediums
• Encoding
• Modulation
• RS232 and RS422 standards
• Repeaters
• Hubs (multi-port repeater)
Physical
Data Link
Network
Transport
Session
Presentation
27. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 27
Application
Physical
2. Data Link Layer
a)Error control to compensate for the
imperfections of the physical layer.
b)Flow control to keep a fast sender from
swamping a slow receiver.
Main topics:
• Framing methods
• Error detection and correction methods
• Flow control
• Frame format
• IEEE LAN standards
• Bridges
• Switches (multi-port bridges)
Data Link
Network
Transport
Session
Presentation
28. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 28
Application
Physical
3. Network Layer
a) Controls the operation of the subnet.
b) Routing packets from source to destination.
c) Logical addressing.
Main topics:
• Internetworking
• Routing algorithms
• Internet Protocol (IP) addressing
• Routers
Data Link
Network
Transport
Session
Presentation
29. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 29
Application
Physical
4. Transport Layer
a) Provides additional Quality of Service.
b) Heart of the OSI model.
Main topics:
• Connection-oriented and connectionless services
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
•ACK
Data Link
Network
Transport
Session
Presentation
30. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 30
Application
Physical
5. Session Layer
a)Allows users on different machines to establish
sessions (dialogue) between them.
b)One of the services is managing dialogue
control.
c) Token management.
d) Synchronization.
Data Link
Network
Transport
Session
Presentation
31. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 31
Application
Physical
6. Presentation Layer
a)Concerned with the syntax and semantics of the
information.
b) Preserves the meaning of the information.
c) Data compression.
d) Data encryption.
Data Link
Network
Transport
Session
Presentation
32. OSI REFERENCE MODEL
By:Dr.Eng.Muhamed.Shujaa 32
Application
Physical
7. Application Layer
a) Provides protocols that are commonly needed.
Main topics:
• File Transfer Protocol (FTP)
• HyperText Transfer Protocol (HTTP)
• Simple Mail Transfer Protocol (SMTP)
• Simple Network Management Protocol (SNMP)
• Network File System (NFS)
• Telnet
Data Link
Network
Transport
Session
Presentation
33. SERVICES
By:Dr.Eng.Muhamed.Shujaa 33
Physical
Application
Each layer provides services to the layer above it.
1. Terminologies (scientific words means)
Entities – active elements in each layer (e.g.
process, intelligent I/O chip).
Peer Entities – entities in the same layer on
different machines.
Service Provider – Layer N.
Service User – Layer N + 1.
Service Access Points – places where layer N + 1
can access services offered by layer N.
Data Link
Network
Transport
Session
Presentation
34. SERVICES
By:Dr.Eng.Muhamed.Shujaa 34
Physical
Application
2. Connection-Oriented and Connectionless
Connection-Oriented – before data is sent, the
service from the sending computer must establish
a connection with the receiving computer.
Connectionless – data can be sent at any time by
the service from the sending computer.
Q: Is downloading a music file from the Internet
connection-oriented or connectionless?
Q: Is email connection-oriented or connectionless?
Data Link
Network
Transport
Session
Presentation
35. SERVICES
By:Dr.Eng.Muhamed.Shujaa 35
Application
4 Transport
4 Transport
3. Service Primitives
Request – entity wants the service to do some
work
Indicate – entity is to be informed about an event
Response – entity responds to an event
Confirm – entity is to be informed about its request
Sending Computer Receiving Computer
1. request 4. confirm 2. indicate 3. response
3 Network 3 Network
Physical
Data Link
Network
Transport
Session
Presentation