0
Protocol Stack and Addressing<br />Team CharMusafirs<br />AnkanAdhikari [1MS07IS010]<br />Chandan Kumar [1MS07IS019]<br />...
  OSI Model <br />Overview of the OSI model<br />
  OSI Model <br />Application Layer<br />1.Application layer interacts with application programs and is the highest level ...
4<br />Application layer Protocols<br />  OSI Model<br />DHCP [Dynamic Host Configuration protocol]<br />Provides static/d...
 OSI Model<br />PRESENTATION LAYER<br />The presentation layer ensures that the information that the application layer of ...
 OSI Model<br />PRESENTATION LAYER PROTOCOL<br />ASCII (American Standard Code for Information Interchange )<br />ASCII  i...
 OSI Model<br />SESSION LAYER<br />The session layer defines how to start, control and end conversations (called sessions)...
 OSI Model<br />SESSION LAYER PROTOCOL<br />SSH (Secure Shell)<br />SSH is a protocol for creating a secure connection bet...
9<br />OSI and Protocol Stack<br />OSI: Open Systems Interconnect<br />OSI Model<br />TCP/IP Hierarchy<br />Protocols<br /...
  OSI Model <br />MAC Spoofing<br />Emulating MACs for illegal access.<br />HKEY_LOCAL_MACHINESYSTEMCurrentControlSetContr...
Upcoming SlideShare
Loading in...5
×

Protocol Stack [Layer 5,6,7]

2,333

Published on

Layer 5,6,7 of the OSI model

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,333
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
27
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Protocol Stack [Layer 5,6,7]"

  1. 1. Protocol Stack and Addressing<br />Team CharMusafirs<br />AnkanAdhikari [1MS07IS010]<br />Chandan Kumar [1MS07IS019]<br />Chandresh Kumar [1MS07IS020]<br />Pawan Kumar [1MS07IS065]<br />
  2. 2. OSI Model <br />Overview of the OSI model<br />
  3. 3. OSI Model <br />Application Layer<br />1.Application layer interacts with application programs and is the highest level of OSI model.<br />2. Application layer contains management functions to support distributed applications.<br />3. Application layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication.<br />4. Examples of application layer are applications such as file transfer, electronic mail, remote login etc.<br />
  4. 4. 4<br />Application layer Protocols<br /> OSI Model<br />DHCP [Dynamic Host Configuration protocol]<br />Provides static/dynamic address allocation, both manual and automatic.<br />Dynamic : Assigns IP address for a specified time (lease time)<br />Needed when a host moves from network to network or is connected/disconnected from a network.<br />DHCP server keeps a table of past IP address assignments, so that it can preferentially assign to a client the same IP address that the client previously had.<br />
  5. 5. OSI Model<br />PRESENTATION LAYER<br />The presentation layer ensures that the information that the application layer of one system sends out is readable by the application layer of another system.<br />If necessary, the presentation layer translates between multiple data formats by using a common format. <br />Provides encryption and compression of data.<br />Examples :- JPEG, MPEG, ASCII, EBCDIC, HTML , AFP, ICA, LPP,NCP, NDR,RDP,XDR,X.25 PAD.<br />
  6. 6. OSI Model<br />PRESENTATION LAYER PROTOCOL<br />ASCII (American Standard Code for Information Interchange )<br />ASCII is a character-encoding scheme based on the ordering of the English alphabet. ASCII codes represent text in computers, communications equipment, and other devices that use text.<br />ASCII includes definitions for 128 characters: 33 are non-printing control characters that affect how text and space is processed; 94 are printable characters, and the spaces is considered an invisible graphic.<br />HTML (Hyper Text Markup Language)<br />HTML is the predominant markup language for web pages. It provides a means to create structure documents by denoting structural semantics for text such as headings, paragraphs, lists etc as well as for links, quotes, and other items.<br />It allows images and objects to be embedded and can be used to create interactive forms. <br />
  7. 7. OSI Model<br />SESSION LAYER<br />The session layer defines how to start, control and end conversations (called sessions) between applications.<br />This includes the control and management of multiple bi-directional messages using dialogue control.<br />It also synchronizes dialogue between two hosts&apos; presentation layers and manages their data exchange.<br />The session layer offers provisions for efficient data transfer.<br />Examples :- SQL, ASP, ADSP,ASP,.ISO-SP, OSI, L2F, L2TP, NetBIOS<br />
  8. 8. OSI Model<br />SESSION LAYER PROTOCOL<br />SSH (Secure Shell)<br />SSH is a protocol for creating a secure connection between two systems.<br />In the SSH protocol, the client machine initiates a connection with a server machine.<br />SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.<br />
  9. 9. 9<br />OSI and Protocol Stack<br />OSI: Open Systems Interconnect<br />OSI Model<br />TCP/IP Hierarchy<br />Protocols<br />7th<br />Application Layer<br />6th<br />Presentation Layer<br />Application Layer<br />5th<br />Session Layer<br />4th<br />Transport Layer<br />Transport Layer<br />Network Layer<br />3rd<br />Network Layer<br />2nd<br />Link Layer<br />Link Layer<br />1st<br />Physical Layer<br />Link Layer : includes device driver and network interface card<br />Network Layer : handles the movement of packets, i.e. Routing<br />Transport Layer : provides a reliable flow of data between two hosts<br />Application Layer : handles the details of the particular application<br />
  10. 10.
  11. 11. OSI Model <br />MAC Spoofing<br />Emulating MACs for illegal access.<br />HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlClass{4D36E972-E325-11CE-BFC1-08002BE10318} contains driver information.<br />DriverDesc contains the Adapter’s information, Adding a NetworkAddress key.<br />3rd party tools: MadMACs, MacMakeUp.<br />Loosely possible to DDoS.<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×