0% found this document useful (0 votes)
6 views

IT Practical Project

The document describes 7 practical assignments involving creating tables, graphs, and presentations in Microsoft Office and describing the 7 layers of the OSI model. Practical assignments include creating class records and tables with marks/percentages, creating word documents and powerpoint presentations, sorting/filtering tables, and using math functions. The description of the OSI model includes explanations of the functions and protocols of each layer.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

IT Practical Project

The document describes 7 practical assignments involving creating tables, graphs, and presentations in Microsoft Office and describing the 7 layers of the OSI model. Practical assignments include creating class records and tables with marks/percentages, creating word documents and powerpoint presentations, sorting/filtering tables, and using math functions. The description of the OSI model includes explanations of the functions and protocols of each layer.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

PRACTICAL 1: - Create a class record having sum and percentage of each

student. (Using some formatting rap text, merge and center etc.)

PRACTICAL 2: - Create a table having class marks and percentage with


graph using conditional formatting.

1
PRACTICAL 3: - Create a word file on any topic using text formatting such
as header folder, and draw diagram using shape.

2
PRACTICAL 4: - Create a table and apply statistical function.

3
PRACTICAL 5: - Make a power-point presentation.

4
5
PRACTICAL 6: -Create table, sort the data and filter, use math function.
1. Sorted data

2. Filtered data

3. Math functions

6
PRACTICAL 7: - Describe OSI Model in detail with all layer.
OSI stands for Open System Interconnection. It has been developed by ISO-
‘International Organization for Standardization’, in the year 1984. It is a 7-
layer architecture with each layer having specific functionality to perform. All
these 7 layers work collaboratively to transmit the data from one person to another
across the globe.

1. Physical layer (Layer 1): The lowest layer of the OSI reference model is the
physical layer. It is responsible for the actual physical connection between the
devices. The physical layer contains information in the form of bits. It is
responsible for transmitting individual bits from one node to the next. When
receiving data, this layer will get the signal received and convert it into 0s and 1s
and send them to the Data Link layer. The functions of the physical layer are as
follows:
I. Bit synchronization: The physical layer provides the synchronization of the
bits by providing a clock. This clock controls both sender and receiver thus
providing synchronization at bit level.
II. Bit rate control: The Physical layer also defines the transmission rate i.e.
the number of bits sent per second.
III. Physical topologies: Physical layer specifies the way in which the different,
devices/nodes are arranged in a network i.e. bus, star, or mesh topology.
IV. Transmission mode: Physical layer also defines the way in which the data
flows between the two connected devices. The various transmission modes
possible are Simplex, half-duplex and full-duplex
*Hub, Repeater, Modem, Cables are Physical layer devices.

7
** Network layer, Data link layer, and Physical layer are also known as Lower
Layers or Hardware Layers.
2. Data Link Layer (DLL) (Layer 2): The data link layer is responsible for the
node-to-node delivery of the message. The main function of this layer is to make
sure data transfer is error-free from one node to another, over the physical layer.
When a packet arrives in a network, it is the responsibility of DLL to transmit it to
the Host using its MAC address. Data Link Layer is divided into two sublayers:
I. Logical Link Control (LLC)
II. Media Access Control (MAC)
The packet received from the network layer is further divided into frames
depending on the frame size of NIC (Network Interface Card). DLL also
encapsulates Sender and Receiver’s MAC address in the header. The receiver’s
MAC address is obtained by placing an ARP (Address Resolution Protocol)
request onto the wire asking “who has that IP address?” and the destination host
will reply with its MAC address.

The functions of the Data Link Layer are:


I. Farming: Farming is a function of the data link layer. It provides a way for
a sender to transmit a set of bits that are meaningful to the receiver. This can
be accomplished by attaching special bit patterns to the beginning and end of
the frame.
II. Physical addressing: After creating frame, the Data link layer adds physical
addresses (MAC address) of the sender and/or receiver in the header of each
frame.
III. Error control: Data link layer provides the mechanism of error control in
which it detects and retransmits damaged or lost frames.
IV. Flow control: The data rate must be constant on both sides else the data
may get corrupted thus, flow control coordinates the amount of data that can
be sent before receiving acknowledgement.

8
V. Access control: When a single communication channel is shared by multiple
devices, the MAC sub-layer of the data link layer helps to determine which
device has control over the channel at a given time.

*Packet in Data Link Layer is referred to as Frame.


**Data Link Layer is handled by the NIC (Network Interface Card) and device
drivers of host machines.
***Switch and Bridge are Data Link Layer device.
3. Network Layer (Layer 3): The network layer works for the transmission of
data from one host to the other located in different networks. It also takes care of
packet routing i.e. selection of the shortest path to transmit the packet, from the
number of routes available. The sender & receiver’s IP addresses are placed in the
header by the network layer. The functions of the Network layer are:
I. Routing: The network layer protocols determine which route is suitable from
source to destination. This function of the network layer is known as routing.
II. Logical Addressing: In order to identify each device on internetwork
uniquely, the network layer defines an addressing scheme. The sender &
receiver’s IP addresses are placed in the header by the network layer. Such
an address distinguishes each device uniquely and universally.
*Segment in Network layer is referred to as Packet.

**Network layer in implemented by networking devices such as routers.

4. Transport Layer (Layer 4): The transport layer provides services to the
application layer and takes services from the network layer. The data in the

9
transport layer is referred to as Segments. It is responsible for the End to End
Delivery of the complete message. The transport layer also provides the
acknowledgement of the successful data transmission and re-transmits the data if
an error is found.
At sender’s side: Transport layer receives the formatted data from the upper
layers, performs Segmentation, and also implements Flow & Error control to
ensure proper data transmission. It also adds Source and Destination port numbers
in its header and forwards the segmented data to the Network Layer.
Note: The sender needs to know the port number associated with the receiver’s
application. Generally, this destination port number is configured, either by default
or manually. For example, when a web application makes a request to a web
server, it typically uses port number 80, because this is the default port assigned to
web applications. Many applications have default ports assigned.
At receiver’s side: Transport Layer reads the port number from its header and
forwards the Data which it has received to the respective application. It also
performs sequencing and reassembling of the segmented data. The functions of the
transport layer are as follows:
1. Segmentation and Reassembly: This layer accepts the message from the
(session) layer, and breaks the message into smaller units. Each of the segments
produced has a header associated with it. The transport layer at the destination
station reassembles the message.
2. Service Point Addressing: In order to deliver the message to the correct
process, the transport layer header includes a type of address called service point
address or port address. Thus, by specifying this address, the transport layer makes
sure that the message is delivered to the correct process.
The services provided by the transport layer:
A. Connection-Oriented Service: It is a three-phase process that includes
– Connection Establishment
– Data Transfer
–Termination / disconnection

10
In this type of transmission, the receiving device sends an acknowledgement, back
to the source after a packet or group of packets is received. This type of
transmission is reliable and secure.
B. Connectionless service: It is a one-phase process and includes Data Transfer.
In this type of transmission, the receiver does not acknowledge receipt of a packet.
This approach allows for much faster communication between devices.
Connection-oriented service is more reliable than connectionless Service.
* Data in the Transport Layer is called as Segments.
** Transport layer is operated by the Operating System. It is a part of the OS and
communicates with the Application Layer by making system calls.
Transport Layer is called as Heart of OSI model.
5. Session Layer (Layer 5): This layer is responsible for the establishment of
connection, maintenance of sessions, authentication, and also ensures security.
The functions of the session layer are:
1. Session establishment, maintenance, and termination: The layer allows the
two processes to establish, use and terminate a connection.
2. Synchronization: This layer allows a process to add checkpoints which are
considered synchronization points into the data. These synchronization points help
to identify the error so that the data is re-synchronized properly, and ends of the
messages are not cut prematurely and data loss is avoided.
3. Dialog Controller: The session layer allows two systems to start
communication with each other in half-duplex or full-duplex.
**All the below 3 layers (including Session Layer) are integrated as a single layer
in the TCP/IP model as “Application Layer”.
**Implementation of these 3 layers is done by the network application itself. These
are also known as Upper Layers or Software Layers.
Scenario:
Let us consider a scenario where a user wants to send a message through some
Messenger application running in his browser. The “Messenger” here acts as the
application layer which provides the user with an interface to create the data. This

11
message or so-called Data is compressed, encrypted (if any secure data), and
converted into bits (0’s and 1’s) so that it can be transmitted.

6. Presentation Layer (Layer 6): The presentation layer is also called the
Translation layer. The data from the application layer is extracted here and
manipulated as per the required format to transmit over the network. The functions
of the presentation layer are:
• Translation: For example, ASCII to EBCDIC.
• Encryption/ Decryption: Data encryption translates the data into another form
or code. The encrypted data is known as the ciphertext and the decrypted data is
known as plain text. A key value is used for encrypting as well as decrypting data.
• Compression: Reduces the number of bits that need to be transmitted on the
network.
7. Application Layer (Layer 7): At the very top of the OSI Reference Model
stack of layers, we find the Application layer which is implemented by the network
applications. These applications produce the data, which has to be transferred over
the network. This layer also serves as a window for the application services to
access the network and for displaying the received information to the user.
Example: Application – Browsers, Skype Messenger, etc.
**Application Layer is also called Desktop Layer..

12
The functions of the Application layer are:
1. Network Virtual Terminal
2. FTAM-File transfer access and management
3. Mail Services
4. Directory Services

13
OSI model acts as a reference model and is not implemented on the Internet
because of its late invention. The current model being used is the TCP/IP model.
OSI model in a nutshell
NO. Layer Name Responsibility Information
Form (Data Unit) Device
7 Application Helps in identifying the -
layer client and synchronize Message
communication.
6 Presentation Data from application Message -
layer layer is extracted and
(Translation manipulated as required
layer) format for transmission.
5 Session layer Establishes connection, Message Gateway
maintenance,
authentication and
ensures security.
4 Transport Take service from Segment Firewall
layer network layer and
(HEART of provide it to application
OSI) layer.
3 Network Transmission of data Packet Router
layer from one host to other.
Located in different
network.
2 Data link Node to node delivery of Frame Switch,
layer messages. Bridge
1 Physical Establishing physical Bits Hub,
layer connection between Repeater,
devices. Modem,
Cables

14
PRACTICAL 8: - Explain memory hierarchy.
The Computer memory hierarchy looks like a pyramid structure which is used to
describe the differences among memory types. It separates the computer storage
based on hierarchy.
Level 0: CPU registers
Level 1: Cache memory
Level 2: Main memory or primary memory
Level 3: Magnetic disks or secondary memory
Level 4: Optical disks or magnetic types or tertiary Memory

In Memory Hierarchy the cost of memory, capacity is inversely proportional to


speed. Here the devices are arranged in a manner Fast to slow, that is form register
to Tertiary memory.
Let us discuss each level in detail:
Level-0 − Registers
The registers are present inside the CPU. As they are present inside the CPU, they
have least access time. Registers are most expensive and smallest in size generally
in kilobytes. They are implemented by using Flip-Flops.
Level-1 − Cache

15
Cache memory is used to store the segments of a program that are frequently
accessed by the processor. It is expensive and smaller in size generally in
Megabytes and is implemented by using static RAM.
Level-2 − Primary or Main Memory It directly communicates with the CPU and
with auxiliary memory devices through an I/O processor. Main memory is less
expensive than cache memory and larger in size generally in Gigabytes. This
memory is implemented by using dynamic RAM.
Level-3 − Secondary storage Secondary storage devices like Magnetic Disk are
present at level 3. They are used as backup storage. They are cheaper than main
memory and larger in size generally in a few TB.
Level-4 − Tertiary storage Tertiary storage devices like magnetic tape are present
at level 4. They are used to store removable files and are the cheapest and largest in
size (1-20 TB). Let us see the memory levels in terms of size, access time,
bandwidth.

Level Register Cache Primary Secondary


memory memory
Bandwidth 4k to 32k 800 to 5k 400 to 2k 4 to 32
MB/sec MB/sec MB/sec MB/sec
Size Less than Less than Less than 2 Greater
1KB 4MB GB than 2 GB
Access 2 to 5nsec 3 to 10nsec 80 to 400 5ms
time nsec
Managed Compiler Hardware Operating OS or user.
by system

16

You might also like