SlideShare a Scribd company logo
1 of 30
TOPIC:
SESSION LAYER
SESSION LAYER
 In the seven-layer OSI model of computer
networking, the session layer is layer 5. The
session layer provides the mechanism for opening,
closing and managing a session between end-user
application processes.
 This layer allows users on different machines to
establish active communications sessions between
them
WORKING OF SESSION LAYER
• Session Layer, which is the 5th layer in the OSI model, uses the
services provided by the transport layer, enables applications to
establish and maintain sessions and to synchronize the sessions
In order to establish connections:
• First thing is we should map the session address to the shipping
address. The second thing is that we need to select the required
transport quality of service parameters. Next thing is we need to take
care of the negotiations which should happen between session
parameters. Then we further need to transmit limited transparent user
data. Then at last, we need to monitor Data Transfer phase properly.
FUNCTIONS OF SESSION LAYER
 Session establishment
 Dialog management
 Data transfer
 Synchronization
 Authentication
 Authorization
1. SESSION ESTABLISHMENT
The session layer establishes connections between devices which is known as
sessions. The session which is created allows users to share data, remote access, and
file management. When the session is released, the transport connection is mapped.
2. DIALOG MANAGEMENT
The session layer keeps log data on which connections are established to transmit and
receive data, which is called dialog management. It is accountable for establishing,
synchronizing, preserving, and ending the conversation between the sender and the
receiver.
3. DATA TRANSFER
It is the very basic function of the session layer, which handles the exchange of data
between systems in a full-duplex or half-duplex mode of transmission. The session layer
allows only one user to transmit data in half-duplex as well as exchange data in full-
duplex mode.
Full-duplex enables simultaneous two-way communication, which allows data to flow freely bi-
directionally.
Half-duplex enables two-way communication, but not simultaneously.
4. SYNCHRONIZATION
This layer allows a process to add checkpoints which are considered as synchronization
points into stream of data. Example: If a system is sending a file of 800 pages, adding
checkpoints after every 50 pages is recommended. This ensures that 50 page unit is
successfully received and acknowledged.
5. AUTHENTICATION
Authentication is about verifying the identity of a user (or system) by confirming their
credentials, while Session Management is about protecting a user's data during the
period of time when a user is actively engaged with a system or website
6. AUTHORIZATION
It grants privileges after authentication of the user. Authorization means providing
access to the data that is authorized to the specific user.
SESSION LAYER PROTOCOLS
Session Layer uses some protocols which are required for safe, secure and accurate
communication which exists between two-ender user applications.
1. AppleTalk Data Stream Protocol (ADSP)
2. Real-time Transport Control Protocol (RTCP)
3. Password Authentication Protocol (PAP)
4. Remote Procedure Call Protocol (RPCP)
5. Socket Direct Protocol (SDP)
1- ADSP:
ADSP is that type of protocol which was developed by Apple Inc. It includes a number of features that allow local area networks to be
connected with no prior setup. This protocol was released in 1985.
2- RTCP:
RTCP’s primary function is to provide feedback on the quality of service (QOS) in media distribution by periodically sending statistical
information such as transmitted octet and packet counts or packet loss to the participants in the streaming multimedia session.
3- PAP:
Password Authentication Protocol is a password-based authentication protocol used by Point to Point Protocol (PPP) to validate users.
Almost all network operating systems, remote servers support PAP.
4- RPCP:
Remote Procedure Call Protocol (RPCP) is a protocol that is used when a computer program causes a procedure (or a sub-routine) to
execute in a different address space without the programmer explicitly coding the details for the remote interaction.
5- SDP:
Sockets Direct Protocol (SDP) is a protocol that supports streams of sockets over Remote Direct Memory Access (RDMA) network
fabrics. The purpose of SDP is to provide an RDMA-accelerated alternative to the TCP protocol. The primary goal is to perform one
particular thing in such a manner which is transparent to the application.
TOPIC:
FIREWALL
FIREWALL
A firewall is a network security device, either hardware or software-based, which monitors all
incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or
drops that specific traffic.
Accept : Allow the traffic
Reject : Block the traffic but reply with an “unreachable error”
Drop : Block the traffic with no reply
VISUAL REPRESENTATION OF FIREWALL
WORKING OF FIREWALL
A firewall is either a hardware device or a software application that helps protect
your network from attackers. The firewall shields your network by acting as a 24/7
filter, scanning the data that attempts to enter your network and preventing anything that
looks suspicious from getting through.
Example: Think of a security guard with intimate knowledge of millions of potential
criminals. If the guard sees one, he or she keeps the criminal out of the building.
Similarly, a firewall’s protection comes from monitoring and regulating traffic that goes in
and out of your network. This is accomplished using a few different methods, including
packet filtering, a proxy service, and state-ful inspection.
HARDWARE & SOFTWARE FIREWALLS
HARDWARE FIREWALL
 A hardware firewall is a physical device
much like a server that filters the traffic
going to a computer.
 Protects the entire network
 Requires a dedicated specialist to install
& manage
 No updates needed
 High cost
SOFTWARE FIREWALL
 A software firewall is a piece of
software that is installed on your
computer in order to protect it from
unauthorized access.
 Protects a single device
 Easy to install
 Regular manual updates are
necessary
 Low cost
GENERATIONS OF FIREWALL
 First Generation: Packet Filtering Firewalls
 Second Generation: State-ful Inspection Firewalls
 Third Generation: Application Layer Firewalls (Proxy Firewalls)
 Fourth Generation: Next-Generation Firewalls (NGFW)
FIRST GENERATION : PACKET FILTERING FIREWALLS
Packet filtering firewall is used to control network access by monitoring outgoing
and incoming packets and allowing them to pass or stop based on source and
destination IP address, protocols, and ports. It analyses traffic at the transport protocol
layer (but mainly uses first 3 layers). Packet firewalls treat each packet in isolation. They
have no ability to tell whether a packet is part of an existing stream of traffic. Only It can
allow or deny the packets based on unique packet headers. Packet filtering firewall
maintains a filtering table that decides whether the packet will be forwarded or discarded.
From the given filtering table, the packets will be filtered according to the following
rules:
1- Incoming packets from network 192.168.21.0 are blocked.
2- Incoming packets destined for the internal TELNET server (port 23) are blocked.
3- Incoming packets destined for host 192.168.21.3 are blocked.
4- All well-known services to the network 192.168.21.0 are allowed.
SECOND GENERATION: STATEFUL INSPECTION FIREWALL
Stateful firewalls are able to determine the connection state of packet, unlike Packet
filtering firewall, which makes it more efficient. It keeps track of the state of networks
connection travelling across it, such as TCP streams. So the filtering decisions would not
only be based on defined rules, but also on packet’s history in the state table
THIRD GENERATION: APPLICATION LAYER FIREWALL
Application layer firewall can inspect and filter the packets on any OSI layer, up to the
application layer. It has the ability to block specific content, also recognize when certain
application and protocols (like HTTP, FTP) are being misused. In other words,
Application layer firewalls are hosts that run proxy servers.
A proxy firewall prevents the direct connection between either side of the firewall, each
packet has to pass through the proxy. It can allow or block the traffic based on
predefined rules
.NEXT GENERATION FIREWALLS (NGFW)
Next Generation Firewalls are being deployed these days to stop modern security
breaches like advance malware attacks and application-layer attacks. NGFW consists of
Deep Packet Inspection, Application Inspection, SSL/SSH inspection and many
functionalities to protect the network from these modern threats.
TYPES OF FIREWALL
1. Host based firewalls
2. Network based firewalls
HOST BASED FIREWALLS
Host-based firewall is installed on each network node which controls each incoming and
outgoing packet.
It is a software application or suite of applications, comes as a part of the operating system.
Host-based firewalls are needed because network firewalls cannot provide protection
inside a trusted network. Host firewall protects each host from attacks and unauthorized
access.
NETWORK BASED FIREWALLS
Network firewall function on network level. In other words, these firewalls filter all
incoming and outgoing traffic across the network.
It protects the internal network by filtering the traffic using rules defined on the firewall. A
Network firewall might have two or more network interface cards (NICs). A network-based
firewall is usually a dedicated system with proprietary software installed.
FIREWALLS
ADVANTAGES
 Protection from unauthorized access
 Prevention of malware and other threats
 Monitors network traffic
 Promotes privacy
 Network segmentation
DISADVANTAGES
 Complexity
 High cost
 Limited visibility
 Limited adaptability
 Performance impact
ANY QUESTION?

More Related Content

Similar to CN. Presentation for submitting project term pptx

what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?haq107457
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALASaikiran Panjala
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's TypesHem Pokhrel
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Computer network 6
Computer network 6Computer network 6
Computer network 6MDHASNAIN23
 
A firewall is a network security device.
A firewall is a network security device.A firewall is a network security device.
A firewall is a network security device.abidhassan225
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfatimagull32
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet BawaPuneet Bawa
 
Firewall security in computer security
Firewall security in computer security Firewall security in computer security
Firewall security in computer security PawansureshNishad
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewallsSapna Kumari
 
Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxShrayamManandhar
 

Similar to CN. Presentation for submitting project term pptx (20)

what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Computer network 6
Computer network 6Computer network 6
Computer network 6
 
Firewall
FirewallFirewall
Firewall
 
A firewall is a network security device.
A firewall is a network security device.A firewall is a network security device.
A firewall is a network security device.
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Sapna ppt
Sapna pptSapna ppt
Sapna ppt
 
Firewall security in computer security
Firewall security in computer security Firewall security in computer security
Firewall security in computer security
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
 

Recently uploaded

Species composition, diversity and community structure of mangroves in Barang...
Species composition, diversity and community structure of mangroves in Barang...Species composition, diversity and community structure of mangroves in Barang...
Species composition, diversity and community structure of mangroves in Barang...Open Access Research Paper
 
(PARI) Viman Nagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...
(PARI) Viman Nagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...(PARI) Viman Nagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...
(PARI) Viman Nagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...ranjana rawat
 
VIP Call Girls Service Bandlaguda Hyderabad Call +91-8250192130
VIP Call Girls Service Bandlaguda Hyderabad Call +91-8250192130VIP Call Girls Service Bandlaguda Hyderabad Call +91-8250192130
VIP Call Girls Service Bandlaguda Hyderabad Call +91-8250192130Suhani Kapoor
 
(NANDITA) Hadapsar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...
(NANDITA) Hadapsar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...(NANDITA) Hadapsar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...
(NANDITA) Hadapsar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...ranjana rawat
 
Mumbai Call Girls, 💞 Prity 9892124323, Navi Mumbai Call girls
Mumbai Call Girls, 💞  Prity 9892124323, Navi Mumbai Call girlsMumbai Call Girls, 💞  Prity 9892124323, Navi Mumbai Call girls
Mumbai Call Girls, 💞 Prity 9892124323, Navi Mumbai Call girlsPooja Nehwal
 
webinaire-green-mirror-episode-2-Smart contracts and virtual purchase agreeme...
webinaire-green-mirror-episode-2-Smart contracts and virtual purchase agreeme...webinaire-green-mirror-episode-2-Smart contracts and virtual purchase agreeme...
webinaire-green-mirror-episode-2-Smart contracts and virtual purchase agreeme...Cluster TWEED
 
Soil pollution causes effects remedial measures
Soil pollution causes effects remedial measuresSoil pollution causes effects remedial measures
Soil pollution causes effects remedial measuresvasubhanot1234
 
(ZARA) Call Girls Talegaon Dabhade ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Talegaon Dabhade ( 7001035870 ) HI-Fi Pune Escorts Service(ZARA) Call Girls Talegaon Dabhade ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Talegaon Dabhade ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girl Gorakhpur Aashi 8250192130 Independent Escort Service Gorakhpur
VIP Call Girl Gorakhpur Aashi 8250192130 Independent Escort Service GorakhpurVIP Call Girl Gorakhpur Aashi 8250192130 Independent Escort Service Gorakhpur
VIP Call Girl Gorakhpur Aashi 8250192130 Independent Escort Service GorakhpurSuhani Kapoor
 
NO1 Famous Kala Jadu specialist Expert in Pakistan kala ilam specialist Exper...
NO1 Famous Kala Jadu specialist Expert in Pakistan kala ilam specialist Exper...NO1 Famous Kala Jadu specialist Expert in Pakistan kala ilam specialist Exper...
NO1 Famous Kala Jadu specialist Expert in Pakistan kala ilam specialist Exper...Amil baba
 
See How do animals kill their prey for food
See How do animals kill their prey for foodSee How do animals kill their prey for food
See How do animals kill their prey for fooddrsk203
 
Hi FI Call Girl Ahmedabad 7397865700 Independent Call Girls
Hi FI Call Girl Ahmedabad 7397865700 Independent Call GirlsHi FI Call Girl Ahmedabad 7397865700 Independent Call Girls
Hi FI Call Girl Ahmedabad 7397865700 Independent Call Girlsssuser7cb4ff
 
VIP Call Girls Mahadevpur Colony ( Hyderabad ) Phone 8250192130 | ₹5k To 25k ...
VIP Call Girls Mahadevpur Colony ( Hyderabad ) Phone 8250192130 | ₹5k To 25k ...VIP Call Girls Mahadevpur Colony ( Hyderabad ) Phone 8250192130 | ₹5k To 25k ...
VIP Call Girls Mahadevpur Colony ( Hyderabad ) Phone 8250192130 | ₹5k To 25k ...Suhani Kapoor
 
Abu Dhabi Sea Beach Visitor Community pp
Abu Dhabi Sea Beach Visitor Community ppAbu Dhabi Sea Beach Visitor Community pp
Abu Dhabi Sea Beach Visitor Community pp202215407
 
Spiders by Slidesgo - an introduction to arachnids
Spiders by Slidesgo - an introduction to arachnidsSpiders by Slidesgo - an introduction to arachnids
Spiders by Slidesgo - an introduction to arachnidsprasan26
 

Recently uploaded (20)

Species composition, diversity and community structure of mangroves in Barang...
Species composition, diversity and community structure of mangroves in Barang...Species composition, diversity and community structure of mangroves in Barang...
Species composition, diversity and community structure of mangroves in Barang...
 
Call Girls In R.K. Puram 9953056974 Escorts ServiCe In Delhi Ncr
Call Girls In R.K. Puram 9953056974 Escorts ServiCe In Delhi NcrCall Girls In R.K. Puram 9953056974 Escorts ServiCe In Delhi Ncr
Call Girls In R.K. Puram 9953056974 Escorts ServiCe In Delhi Ncr
 
(PARI) Viman Nagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...
(PARI) Viman Nagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...(PARI) Viman Nagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...
(PARI) Viman Nagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...
 
VIP Call Girls Service Bandlaguda Hyderabad Call +91-8250192130
VIP Call Girls Service Bandlaguda Hyderabad Call +91-8250192130VIP Call Girls Service Bandlaguda Hyderabad Call +91-8250192130
VIP Call Girls Service Bandlaguda Hyderabad Call +91-8250192130
 
(NANDITA) Hadapsar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...
(NANDITA) Hadapsar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...(NANDITA) Hadapsar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...
(NANDITA) Hadapsar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune ...
 
Mumbai Call Girls, 💞 Prity 9892124323, Navi Mumbai Call girls
Mumbai Call Girls, 💞  Prity 9892124323, Navi Mumbai Call girlsMumbai Call Girls, 💞  Prity 9892124323, Navi Mumbai Call girls
Mumbai Call Girls, 💞 Prity 9892124323, Navi Mumbai Call girls
 
webinaire-green-mirror-episode-2-Smart contracts and virtual purchase agreeme...
webinaire-green-mirror-episode-2-Smart contracts and virtual purchase agreeme...webinaire-green-mirror-episode-2-Smart contracts and virtual purchase agreeme...
webinaire-green-mirror-episode-2-Smart contracts and virtual purchase agreeme...
 
Soil pollution causes effects remedial measures
Soil pollution causes effects remedial measuresSoil pollution causes effects remedial measures
Soil pollution causes effects remedial measures
 
(ZARA) Call Girls Talegaon Dabhade ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Talegaon Dabhade ( 7001035870 ) HI-Fi Pune Escorts Service(ZARA) Call Girls Talegaon Dabhade ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Talegaon Dabhade ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girl Gorakhpur Aashi 8250192130 Independent Escort Service Gorakhpur
VIP Call Girl Gorakhpur Aashi 8250192130 Independent Escort Service GorakhpurVIP Call Girl Gorakhpur Aashi 8250192130 Independent Escort Service Gorakhpur
VIP Call Girl Gorakhpur Aashi 8250192130 Independent Escort Service Gorakhpur
 
Model Call Girl in Rajiv Chowk Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Rajiv Chowk Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Rajiv Chowk Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Rajiv Chowk Delhi reach out to us at 🔝9953056974🔝
 
Green Banking
Green Banking Green Banking
Green Banking
 
NO1 Famous Kala Jadu specialist Expert in Pakistan kala ilam specialist Exper...
NO1 Famous Kala Jadu specialist Expert in Pakistan kala ilam specialist Exper...NO1 Famous Kala Jadu specialist Expert in Pakistan kala ilam specialist Exper...
NO1 Famous Kala Jadu specialist Expert in Pakistan kala ilam specialist Exper...
 
FULL ENJOY Call Girls In kashmiri gate (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In  kashmiri gate (Delhi) Call Us 9953056974FULL ENJOY Call Girls In  kashmiri gate (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In kashmiri gate (Delhi) Call Us 9953056974
 
See How do animals kill their prey for food
See How do animals kill their prey for foodSee How do animals kill their prey for food
See How do animals kill their prey for food
 
Hi FI Call Girl Ahmedabad 7397865700 Independent Call Girls
Hi FI Call Girl Ahmedabad 7397865700 Independent Call GirlsHi FI Call Girl Ahmedabad 7397865700 Independent Call Girls
Hi FI Call Girl Ahmedabad 7397865700 Independent Call Girls
 
Gandhi Nagar (Delhi) 9953330565 Escorts, Call Girls Services
Gandhi Nagar (Delhi) 9953330565 Escorts, Call Girls ServicesGandhi Nagar (Delhi) 9953330565 Escorts, Call Girls Services
Gandhi Nagar (Delhi) 9953330565 Escorts, Call Girls Services
 
VIP Call Girls Mahadevpur Colony ( Hyderabad ) Phone 8250192130 | ₹5k To 25k ...
VIP Call Girls Mahadevpur Colony ( Hyderabad ) Phone 8250192130 | ₹5k To 25k ...VIP Call Girls Mahadevpur Colony ( Hyderabad ) Phone 8250192130 | ₹5k To 25k ...
VIP Call Girls Mahadevpur Colony ( Hyderabad ) Phone 8250192130 | ₹5k To 25k ...
 
Abu Dhabi Sea Beach Visitor Community pp
Abu Dhabi Sea Beach Visitor Community ppAbu Dhabi Sea Beach Visitor Community pp
Abu Dhabi Sea Beach Visitor Community pp
 
Spiders by Slidesgo - an introduction to arachnids
Spiders by Slidesgo - an introduction to arachnidsSpiders by Slidesgo - an introduction to arachnids
Spiders by Slidesgo - an introduction to arachnids
 

CN. Presentation for submitting project term pptx

  • 2. SESSION LAYER  In the seven-layer OSI model of computer networking, the session layer is layer 5. The session layer provides the mechanism for opening, closing and managing a session between end-user application processes.  This layer allows users on different machines to establish active communications sessions between them
  • 3.
  • 4. WORKING OF SESSION LAYER • Session Layer, which is the 5th layer in the OSI model, uses the services provided by the transport layer, enables applications to establish and maintain sessions and to synchronize the sessions In order to establish connections: • First thing is we should map the session address to the shipping address. The second thing is that we need to select the required transport quality of service parameters. Next thing is we need to take care of the negotiations which should happen between session parameters. Then we further need to transmit limited transparent user data. Then at last, we need to monitor Data Transfer phase properly.
  • 5. FUNCTIONS OF SESSION LAYER  Session establishment  Dialog management  Data transfer  Synchronization  Authentication  Authorization
  • 6. 1. SESSION ESTABLISHMENT The session layer establishes connections between devices which is known as sessions. The session which is created allows users to share data, remote access, and file management. When the session is released, the transport connection is mapped.
  • 7. 2. DIALOG MANAGEMENT The session layer keeps log data on which connections are established to transmit and receive data, which is called dialog management. It is accountable for establishing, synchronizing, preserving, and ending the conversation between the sender and the receiver.
  • 8. 3. DATA TRANSFER It is the very basic function of the session layer, which handles the exchange of data between systems in a full-duplex or half-duplex mode of transmission. The session layer allows only one user to transmit data in half-duplex as well as exchange data in full- duplex mode. Full-duplex enables simultaneous two-way communication, which allows data to flow freely bi- directionally. Half-duplex enables two-way communication, but not simultaneously.
  • 9. 4. SYNCHRONIZATION This layer allows a process to add checkpoints which are considered as synchronization points into stream of data. Example: If a system is sending a file of 800 pages, adding checkpoints after every 50 pages is recommended. This ensures that 50 page unit is successfully received and acknowledged.
  • 10. 5. AUTHENTICATION Authentication is about verifying the identity of a user (or system) by confirming their credentials, while Session Management is about protecting a user's data during the period of time when a user is actively engaged with a system or website
  • 11. 6. AUTHORIZATION It grants privileges after authentication of the user. Authorization means providing access to the data that is authorized to the specific user.
  • 12. SESSION LAYER PROTOCOLS Session Layer uses some protocols which are required for safe, secure and accurate communication which exists between two-ender user applications. 1. AppleTalk Data Stream Protocol (ADSP) 2. Real-time Transport Control Protocol (RTCP) 3. Password Authentication Protocol (PAP) 4. Remote Procedure Call Protocol (RPCP) 5. Socket Direct Protocol (SDP)
  • 13. 1- ADSP: ADSP is that type of protocol which was developed by Apple Inc. It includes a number of features that allow local area networks to be connected with no prior setup. This protocol was released in 1985. 2- RTCP: RTCP’s primary function is to provide feedback on the quality of service (QOS) in media distribution by periodically sending statistical information such as transmitted octet and packet counts or packet loss to the participants in the streaming multimedia session. 3- PAP: Password Authentication Protocol is a password-based authentication protocol used by Point to Point Protocol (PPP) to validate users. Almost all network operating systems, remote servers support PAP. 4- RPCP: Remote Procedure Call Protocol (RPCP) is a protocol that is used when a computer program causes a procedure (or a sub-routine) to execute in a different address space without the programmer explicitly coding the details for the remote interaction. 5- SDP: Sockets Direct Protocol (SDP) is a protocol that supports streams of sockets over Remote Direct Memory Access (RDMA) network fabrics. The purpose of SDP is to provide an RDMA-accelerated alternative to the TCP protocol. The primary goal is to perform one particular thing in such a manner which is transparent to the application.
  • 15. FIREWALL A firewall is a network security device, either hardware or software-based, which monitors all incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or drops that specific traffic. Accept : Allow the traffic Reject : Block the traffic but reply with an “unreachable error” Drop : Block the traffic with no reply
  • 17. WORKING OF FIREWALL A firewall is either a hardware device or a software application that helps protect your network from attackers. The firewall shields your network by acting as a 24/7 filter, scanning the data that attempts to enter your network and preventing anything that looks suspicious from getting through. Example: Think of a security guard with intimate knowledge of millions of potential criminals. If the guard sees one, he or she keeps the criminal out of the building. Similarly, a firewall’s protection comes from monitoring and regulating traffic that goes in and out of your network. This is accomplished using a few different methods, including packet filtering, a proxy service, and state-ful inspection.
  • 18. HARDWARE & SOFTWARE FIREWALLS HARDWARE FIREWALL  A hardware firewall is a physical device much like a server that filters the traffic going to a computer.  Protects the entire network  Requires a dedicated specialist to install & manage  No updates needed  High cost SOFTWARE FIREWALL  A software firewall is a piece of software that is installed on your computer in order to protect it from unauthorized access.  Protects a single device  Easy to install  Regular manual updates are necessary  Low cost
  • 19. GENERATIONS OF FIREWALL  First Generation: Packet Filtering Firewalls  Second Generation: State-ful Inspection Firewalls  Third Generation: Application Layer Firewalls (Proxy Firewalls)  Fourth Generation: Next-Generation Firewalls (NGFW)
  • 20. FIRST GENERATION : PACKET FILTERING FIREWALLS Packet filtering firewall is used to control network access by monitoring outgoing and incoming packets and allowing them to pass or stop based on source and destination IP address, protocols, and ports. It analyses traffic at the transport protocol layer (but mainly uses first 3 layers). Packet firewalls treat each packet in isolation. They have no ability to tell whether a packet is part of an existing stream of traffic. Only It can allow or deny the packets based on unique packet headers. Packet filtering firewall maintains a filtering table that decides whether the packet will be forwarded or discarded. From the given filtering table, the packets will be filtered according to the following rules:
  • 21.
  • 22. 1- Incoming packets from network 192.168.21.0 are blocked. 2- Incoming packets destined for the internal TELNET server (port 23) are blocked. 3- Incoming packets destined for host 192.168.21.3 are blocked. 4- All well-known services to the network 192.168.21.0 are allowed.
  • 23. SECOND GENERATION: STATEFUL INSPECTION FIREWALL Stateful firewalls are able to determine the connection state of packet, unlike Packet filtering firewall, which makes it more efficient. It keeps track of the state of networks connection travelling across it, such as TCP streams. So the filtering decisions would not only be based on defined rules, but also on packet’s history in the state table
  • 24. THIRD GENERATION: APPLICATION LAYER FIREWALL Application layer firewall can inspect and filter the packets on any OSI layer, up to the application layer. It has the ability to block specific content, also recognize when certain application and protocols (like HTTP, FTP) are being misused. In other words, Application layer firewalls are hosts that run proxy servers. A proxy firewall prevents the direct connection between either side of the firewall, each packet has to pass through the proxy. It can allow or block the traffic based on predefined rules
  • 25. .NEXT GENERATION FIREWALLS (NGFW) Next Generation Firewalls are being deployed these days to stop modern security breaches like advance malware attacks and application-layer attacks. NGFW consists of Deep Packet Inspection, Application Inspection, SSL/SSH inspection and many functionalities to protect the network from these modern threats.
  • 26. TYPES OF FIREWALL 1. Host based firewalls 2. Network based firewalls
  • 27. HOST BASED FIREWALLS Host-based firewall is installed on each network node which controls each incoming and outgoing packet. It is a software application or suite of applications, comes as a part of the operating system. Host-based firewalls are needed because network firewalls cannot provide protection inside a trusted network. Host firewall protects each host from attacks and unauthorized access.
  • 28. NETWORK BASED FIREWALLS Network firewall function on network level. In other words, these firewalls filter all incoming and outgoing traffic across the network. It protects the internal network by filtering the traffic using rules defined on the firewall. A Network firewall might have two or more network interface cards (NICs). A network-based firewall is usually a dedicated system with proprietary software installed.
  • 29. FIREWALLS ADVANTAGES  Protection from unauthorized access  Prevention of malware and other threats  Monitors network traffic  Promotes privacy  Network segmentation DISADVANTAGES  Complexity  High cost  Limited visibility  Limited adaptability  Performance impact