Академический Документы
Профессиональный Документы
Культура Документы
paper-1
downloadPDFversion
Copy Milan K Antony | milankantony@gmail.com | http://solveditpapers.blogspot.in/
6. Presentation Layer
5. Session Layer
4. Transport Layer
3. Network Layer
1 Application layer:
This layer provides a means for the user to access information on the
network through an application. Many user applications that need to
communicate over the network interact with the Application layer
protocol directly. The user applications are not part of OSI
the receiving side, it changes the network format into the appropriate
host computers format so that data can be utilized independent of
Copy Milan K Antony | milankantony@gmail.com | http://solveditpapers.blogspot.in/
5. Network layer:
Network layer is responsible for the routing of packets through the
entire network. The layer uses logical addressing for this purpose.
Note that the physical address (like MAC address) keeps changing
destination address, and the data itself. The largest frame size that
can be sent is known as the maximum transmission Unit (MTU).
Important features of Data link layer:
the cable and provides data link service to the higher layers.
devices are addressed at the data link layer. The protocols used in
Data link layer are SLIP, PPP, and CSLP.
7. Physical layer:
This is the bottom-most layer of the OSI model. The Physical layer
voice, video, data, and other network services over the traditional
circuits of the public switched telephone network.
ISDN should not be mistaken for its use with a specific protocol,
model. In a broad
simultaneously.
devices can be
attached to the line, and used as needed. That means an ISDN line
can take
telephone copper wires. The 144 kbit/s rate is broken down into two
64 kbit/s bearer channels (B channels) and one 16 kbit/s signaling
the time intervals from which the random waiting time is selected are
increased step by step. This is known as exponential back off.
CSMA/CD is a type of contention protocol.
1-Persistent CSMA
Sense the channel.If busy, keep listening to the channel and
Non-Persistent CSMA
Sense the channel .If busy, wait a random amount of time and
collision occurs wait a random amount of time and start all over
again
Trade of
transmission, 1-Persistent:
C probably do not collide
of As transmission,
B and C collide
Non-Persistent: B and
P-Persistent CSMA
Optimal strategy: use P-Persistent CSMA Assume channels are
slotted One slot = contention period (i.e., one round trip
propagation delay)
If channel is idle,
protocol data units are called, do not cross the boundaries of a local
addressing, and media arbitration. In this way, the Data Link layer is
analogous to a neighborhood traffic cop; it endeavors to arbitrate
between parties contending for access to a medium.
from such collisions, but it does not prevent them from happening.
Delivery of frames by layer 2 devices is affected through the use of
unambiguous hardware addresses. A frames header contains source
and destination addresses that indicate which device originated the
frame and which device is expected to receive and process it. In
destination MAC address in the bridge table, and know which port
should be sent out. The capability to send data to only the correct
host was a huge advance in switching because collisions became much
less likely. If the destination MAC address wasnt found in the bridge
table, the switch would simply flood it out all ports. Thats the only
way to find where a host actually lives for the first time, so as you
(MAC) and physical (PHY) layers for a LAN with wireless connectivity.
It addresses local area networking where the connected devices
communicate over the air to other devices that are within close
other, they form a Basic Service Set (BSS). The minimum BSS consists
of two stations. 802.11 LANs use the BSS as the standard building
block. A BSS that stands alone and is not connected to a base is
operates at a higher level, concerned only with the two end systems,
for example a Web browser and a Web server. In particular, TCP
provides reliable, ordered delivery of a stream of bytes from a
The TCP/IP model consists of four layers (RFC 1122). From lowest
to highest, these are the Link Layer, the Internet Layer, the
Transport Layer, and the Application Layer
TCP consists of a set of rules: for the protocol, that are used with
the Internet Protocol, and for the IP, to send data in a form of
message units between computers over the Internet. At the same
time that IP takes care of handling the actual delivery of the data,
TCP takes care of keeping track of the individual units of data
efficient routing through the network. For example, when an HTML file
is sent from a Web server, the TCP software layer of that server
divides the sequence of bytes of the file into segments and forwards
them individually to the IP software layer (Internet Layer). The
they can be routed on different paths through the network. When the
client program on the destination computer receives them, the TCP
layer (Transport Layer) reassembles the individual segments and
ensures they are correctly ordered and error free as it streams them
to an application.
.
7. Discuss various transmission and switching techniques.
Different types of switching techniques are employed to provide
packet switching places a tight upper limit on block size. A fixed size
of packet which can be transmitted across the network is specified.
transfer rate is quicker although more errors will occur, as the clocks
will eventually get out of sync, and the receiving device would have
the wrong time that had been agreed in protocol (computing) for
octets, at regular time intervals, are also out of the scope of this
standard.) The number 802 was simply the next free number IEEE
could assign, though 802 is sometimes associated with the date the
first meeting was held February 1980. The services and protocols
specified in IEEE 802 map to the lower two layers (Data Link and
Physical) of the seven-layer OSI networking reference model. In
fact, IEEE 802 splits the OSI Data Link Layer into two sub-layers
named Logical Link Control (LLC) and Media Access Control (MAC) ,
so that the layers can be listed like this: Data link layer
Sublayer
MAC Sublayer
Physical layer
LLC
standards are for the Ethernet family, Token Ring, Wireless LAN,
Bridging and Virtual Bridged LANs. An individual Working Group
provides the focus for each area.
is checked using the error detection code used, and if the check
fails, retransmission of the data is requested this may be done
repeatedly, until the data can be verified.
ARQ and FEC may be combined, such that minor errors are corrected
without retransmission, and major errors are corrected via a request
for retransmission: this is called hybrid automatic repeat-request
(HARQ).
send the bit pattern "1011", the four-bit block can be repeated three
times, thus producing "1011 1011 1011". However, if this twelve-bit
pattern was received as "1010 1011 1011" where the first block is unlike
the other two it can be determined that an error has occurred.
A parity bit is a bit that is added to a group of source bits to
ensure that the number of set bits (i.e., bits with value 1) in the
Copy Milan K Antony | milankantony@gmail.com | http://solveditpapers.blogspot.in/
code words of a fixed word length (e.g., byte values). The sum may
field, taking the input data as the dividend, and where the remainder
becomes the result.
Applications
The Internet
In a typical TCP/IP stack, error control is performed at multiple
levels:
Deep-space telecommunications
Satellite broadcasting (DVB)
The demand for satellite transponder bandwidth continues to grow,
A "parity track" was present on the first magnetic tape data storage
trunk line, cellular telephone, specialized radio links, and fiber optic
links such as SONET. Most Internet service providers (ISPs) use PPP
the link. The protocol decompresses the frame at its destination. Two
compression protocols available in Cisco routers are Stacker and
Predictor.
Number options help ensure a reliable, loop-free data link. The Magic
Number field helps in detecting links that are in a looped-back
Multilink - Cisco IOS Release 11.1 and later supports multilink PPP.
This alternative provides load balancing over the router interfaces
that PPP uses. Multilink PPP (also referred to as MLPPP, MP, MPPP,
MLP, or Multilink) provides a method for spreading traffic across
multiple distinct PPP connections.
IT Papers by MilanKAntony is licensed under a Creative Commons AttributionNonCommercial-ShareAlike 4.0 International License.
Based on a work at http://solveditpapers.blogspot.com/.