Protocol Stack [Layer 5,6,7]
Upcoming SlideShare
Loading in...5
×
 

Protocol Stack [Layer 5,6,7]

on

  • 2,732 views

Layer 5,6,7 of the OSI model

Layer 5,6,7 of the OSI model

Statistics

Views

Total Views
2,732
Views on SlideShare
2,692
Embed Views
40

Actions

Likes
1
Downloads
22
Comments
0

3 Embeds 40

http://networkjourney.wordpress.com 32
http://www.slideshare.net 7
https://networkjourney.wordpress.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Protocol Stack [Layer 5,6,7] Protocol Stack [Layer 5,6,7] Presentation Transcript

    • Protocol Stack and Addressing
      Team CharMusafirs
      AnkanAdhikari [1MS07IS010]
      Chandan Kumar [1MS07IS019]
      Chandresh Kumar [1MS07IS020]
      Pawan Kumar [1MS07IS065]
    • OSI Model
      Overview of the OSI model
    • OSI Model
      Application Layer
      1.Application layer interacts with application programs and is the highest level of OSI model.
      2. Application layer contains management functions to support distributed applications.
      3. Application layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication.
      4. Examples of application layer are applications such as file transfer, electronic mail, remote login etc.
    • 4
      Application layer Protocols
      OSI Model
      DHCP [Dynamic Host Configuration protocol]
      Provides static/dynamic address allocation, both manual and automatic.
      Dynamic : Assigns IP address for a specified time (lease time)
      Needed when a host moves from network to network or is connected/disconnected from a network.
      DHCP server keeps a table of past IP address assignments, so that it can preferentially assign to a client the same IP address that the client previously had.
    • OSI Model
      PRESENTATION LAYER
      The presentation layer ensures that the information that the application layer of one system sends out is readable by the application layer of another system.
      If necessary, the presentation layer translates between multiple data formats by using a common format.
      Provides encryption and compression of data.
      Examples :- JPEG, MPEG, ASCII, EBCDIC, HTML , AFP, ICA, LPP,NCP, NDR,RDP,XDR,X.25 PAD.
    • OSI Model
      PRESENTATION LAYER PROTOCOL
      ASCII (American Standard Code for Information Interchange )
      ASCII is a character-encoding scheme based on the ordering of the English alphabet. ASCII codes represent text in computers, communications equipment, and other devices that use text.
      ASCII includes definitions for 128 characters: 33 are non-printing control characters that affect how text and space is processed; 94 are printable characters, and the spaces is considered an invisible graphic.
      HTML (Hyper Text Markup Language)
      HTML is the predominant markup language for web pages. It provides a means to create structure documents by denoting structural semantics for text such as headings, paragraphs, lists etc as well as for links, quotes, and other items.
      It allows images and objects to be embedded and can be used to create interactive forms.
    • OSI Model
      SESSION LAYER
      The session layer defines how to start, control and end conversations (called sessions) between applications.
      This includes the control and management of multiple bi-directional messages using dialogue control.
      It also synchronizes dialogue between two hosts' presentation layers and manages their data exchange.
      The session layer offers provisions for efficient data transfer.
      Examples :- SQL, ASP, ADSP,ASP,.ISO-SP, OSI, L2F, L2TP, NetBIOS
    • OSI Model
      SESSION LAYER PROTOCOL
      SSH (Secure Shell)
      SSH is a protocol for creating a secure connection between two systems.
      In the SSH protocol, the client machine initiates a connection with a server machine.
      SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.
    • 9
      OSI and Protocol Stack
      OSI: Open Systems Interconnect
      OSI Model
      TCP/IP Hierarchy
      Protocols
      7th
      Application Layer
      6th
      Presentation Layer
      Application Layer
      5th
      Session Layer
      4th
      Transport Layer
      Transport Layer
      Network Layer
      3rd
      Network Layer
      2nd
      Link Layer
      Link Layer
      1st
      Physical Layer
      Link Layer : includes device driver and network interface card
      Network Layer : handles the movement of packets, i.e. Routing
      Transport Layer : provides a reliable flow of data between two hosts
      Application Layer : handles the details of the particular application
    • OSI Model
      MAC Spoofing
      Emulating MACs for illegal access.
      HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlClass{4D36E972-E325-11CE-BFC1-08002BE10318} contains driver information.
      DriverDesc contains the Adapter’s information, Adding a NetworkAddress key.
      3rd party tools: MadMACs, MacMakeUp.
      Loosely possible to DDoS.