SlideShare a Scribd company logo
Chapter 5
Making Networks Work

Networking Concepts – Eric Vanderburg ©2005
OSI Reference Model
Application

Application

Presentation

Presentation

Session

Session

Transport

Transport

Network

Network

Datalink

Datalink

Physical

Medium
Networking Concepts – Eric
Vanderburg ©2005

Physical
OSI Reference Model


How to remember this





Please Do Not Throw Sausage Pizza Away
Think of your own…

3 Sections of the Model


Application






Transport




Application Layer (7)
Presentation Layer (6)
Session Layer (5)
Transport Layer (4)

Network




Network Layer (3)
Datalink Layer (2)
Physical Layer (1)
Networking Concepts – Eric
Vanderburg ©2005
Encapsulation
 Enclosing

some data within another
thing so that the included data is not
apparent.

Networking Concepts – Eric
Vanderburg ©2005
Application – Layer 7
 Where

programs access network
services
 FTP, HTTP, Client Software
 Problems at this layer:
 Misconfigured

settings
 Incompatible commands

Networking Concepts – Eric
Vanderburg ©2005
Presentation – Layer 6
 Formats

data
 Protocol conversion
 Encryption
 Compression
 Character set (ASCII, Unicode, EBCDIC)
 Problems at this layer:
 Cannot

decrypt
 Wrong conversion
Networking Concepts – Eric
Vanderburg ©2005
Redirector
 Sends

requests for services to the
appropriate network device.
 RDR can sometimes stand for redirector
 Rdr.sys
 Windows

redirector registry entries stored in

 HKEY_LOCAL_MACHINESYSTEMCurrentCon

trolSetServices
LanmanWorkstationParameters and
 HKEY_LOCAL_MACHINESYSTEMCurrentCon
trolSetServicesRdr
Networking Concepts – Eric
Vanderburg ©2005
Session – Layer 5







Manages communication
Identification
Window size
Keep alive messages
ACK, NAK
Name resolution






DNS
NetBIOS

Logon
Problems at this level:


Incorrect or no name resolution
Networking Concepts – Eric
Vanderburg ©2005
Transport – Layer 4
 Segmenting
 Sequencing
 Error

checking
 Flow control – as much data as can
handle
 TCP & SPX
 Problems at this layer:
 Overly

large segments
Networking Concepts – Eric
Vanderburg ©2005
Network – Layer 3
 Logical

addressing

 Routing
 QOS
 Deals

with packets
 IP & IPX
 Problems at this layer:
Incorrect routing (bad config)
 Incorrect routing table
 Incorrect routing protocol
 Incorrect IP configuration


Networking Concepts – Eric
Vanderburg ©2005
Datalink – Layer 2
 Physical

Addressing
 Deals with frames
 Discards bad frames
 Convert to bits
 Problems at this layer:
Collisions
 Bad frames
 Faulty NIC
 Incorrect bridging tables


Networking Concepts – Eric
Vanderburg ©2005
Datalink Sublayers
 MAC
 Manages

multiple NICs
 Creates frame and sends to physical
 Sense carrier
 Pass tokens
 LLC
 Error

recovery
 Integrity checking
Networking Concepts – Eric
Vanderburg ©2005
Physical – Layer 1
 Encoding

- Convert bits to signals

 101001011001

 Problems

at this level:

 Interference
 Noise
 Cable

not connected

Networking Concepts – Eric
Vanderburg ©2005
OSI & TCP/IP
OSI Model
Application
Presentation
Session
Transport
Network
Datalink
Physical
Networking Concepts – Eric
Vanderburg ©2005

TCP/IP
Application
Transport
Internet
Network
802 Specifications
 802.1

Bridging and
Internetworks
 802.2 Flow control
LLC Sublayer
 802.3 Ethernet
 802.4 Token Bus
 802.5 Token Ring
 802.6 MAN

 802.7

Broadband
 802.8 Fiber Optics
 802.9 VOIP
 802.10 Security
 802.11 Wireless
 802.15 WPAN
 802.18 Radio
Wireless

Networking Concepts – Eric
Vanderburg ©2005
Terms
 Congestion

Control – adjusts network
transmissions based on current
utilization
 Flow control – send as much data as
each computer can handle at a time
 PDU – Packet Data Unit, Payload Data
Unit, Protocol Data Unit

Networking Concepts – Eric
Vanderburg ©2005

More Related Content

What's hot

Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...
Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...
Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...
Eric Vanderburg
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Eric Vanderburg
 
Wi fi
Wi fiWi fi
Wi fi
kendre1234
 
Zigbee wireless control made easy
Zigbee wireless control made easyZigbee wireless control made easy
Zigbee wireless control made easy
rajrayala
 
ZIGBEE NETWORKS
ZIGBEE NETWORKSZIGBEE NETWORKS
ZIGBEE NETWORKS
naimish12
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
Maathu Michael
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell you
IT Tech
 
Zigbee
 Zigbee    Zigbee
Zigbee
Ammad Marwat
 
Wireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeWireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBee
Xaver Y.R. Chen
 
Zigbee technology2
Zigbee technology2Zigbee technology2
Zigbee technology2
Presentaionslive.blogspot.com
 
Zigbee technology
Zigbee technology Zigbee technology
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
Mohit Mehra
 
IoT Device Management using open standards end-to-end
IoT Device Management using open standards end-to-endIoT Device Management using open standards end-to-end
IoT Device Management using open standards end-to-end
Pilgrim Beart
 
Sensor(zigbee)
Sensor(zigbee)Sensor(zigbee)
Sensor(zigbee)
rajrayala
 
Internet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & StandardsInternet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & Standards
Ashu Joshi
 
Training on basic internet troubleshooting
Training on basic internet troubleshootingTraining on basic internet troubleshooting
Training on basic internet troubleshooting
Spandan Pradhan
 
Ccna( Cisco Certified Network Associate)
Ccna( Cisco Certified Network  Associate)Ccna( Cisco Certified Network  Associate)
Ccna( Cisco Certified Network Associate)
Sukant Gupta
 
Zigbee technology
Zigbee technologyZigbee technology
Zigbee technology
Serma Pavi
 
Dccn ppt
Dccn pptDccn ppt
Dccn ppt
Tashfain Yousuf
 
ZIGBEE TECHNOLOGY
ZIGBEE TECHNOLOGYZIGBEE TECHNOLOGY
ZIGBEE TECHNOLOGY
Yuvaraj Asthana
 

What's hot (20)

Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...
Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...
Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
 
Wi fi
Wi fiWi fi
Wi fi
 
Zigbee wireless control made easy
Zigbee wireless control made easyZigbee wireless control made easy
Zigbee wireless control made easy
 
ZIGBEE NETWORKS
ZIGBEE NETWORKSZIGBEE NETWORKS
ZIGBEE NETWORKS
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell you
 
Zigbee
 Zigbee    Zigbee
Zigbee
 
Wireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeWireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBee
 
Zigbee technology2
Zigbee technology2Zigbee technology2
Zigbee technology2
 
Zigbee technology
Zigbee technology Zigbee technology
Zigbee technology
 
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
 
IoT Device Management using open standards end-to-end
IoT Device Management using open standards end-to-endIoT Device Management using open standards end-to-end
IoT Device Management using open standards end-to-end
 
Sensor(zigbee)
Sensor(zigbee)Sensor(zigbee)
Sensor(zigbee)
 
Internet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & StandardsInternet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & Standards
 
Training on basic internet troubleshooting
Training on basic internet troubleshootingTraining on basic internet troubleshooting
Training on basic internet troubleshooting
 
Ccna( Cisco Certified Network Associate)
Ccna( Cisco Certified Network  Associate)Ccna( Cisco Certified Network  Associate)
Ccna( Cisco Certified Network Associate)
 
Zigbee technology
Zigbee technologyZigbee technology
Zigbee technology
 
Dccn ppt
Dccn pptDccn ppt
Dccn ppt
 
ZIGBEE TECHNOLOGY
ZIGBEE TECHNOLOGYZIGBEE TECHNOLOGY
ZIGBEE TECHNOLOGY
 

Viewers also liked

Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Eric Vanderburg
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Eric Vanderburg
 
Basic networking
Basic networkingBasic networking
Basic networking
worr1244
 
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Eric Vanderburg
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking concepts
Mujeeb Ahmad
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
LALIT MAHATO
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
Hj Habib
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance Checklist
Miss Cheska
 

Viewers also liked (8)

Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking concepts
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance Checklist
 

Similar to Networking Concepts Lesson 05 - OSI - Eric Vanderburg

Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric VanderburgNetworking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Eric Vanderburg
 
OSI_TCPIP_layers.pptx
OSI_TCPIP_layers.pptxOSI_TCPIP_layers.pptx
OSI_TCPIP_layers.pptx
SeemaChaudhary48
 
Ccna 2nd Edition
Ccna 2nd EditionCcna 2nd Edition
Ccna 2nd Edition
dznet
 
QSpiders - Day1 Network Basics
QSpiders - Day1 Network BasicsQSpiders - Day1 Network Basics
QSpiders - Day1 Network Basics
Qspiders - Software Testing Training Institute
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
APSU
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
ahmady
 
Layer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptLayer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.ppt
BeniamTekeste
 
CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9
Irsandi Hasan
 
Jorgenson Loki
Jorgenson LokiJorgenson Loki
Jorgenson Loki
Carl Ford
 
Introduction To Computer Networks
Introduction To Computer NetworksIntroduction To Computer Networks
Introduction To Computer Networks
adil raja
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
Mousa_k
 
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.pptAndrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
NiharikaDubey17
 
Osi and tcp ip model
Osi and tcp ip modelOsi and tcp ip model
Osi and tcp ip model
Muhammad Nadeem Rana
 
1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop
ARCFIRE ICT
 
Edge Device Multi-unicasting for Video Streaming
Edge Device Multi-unicasting for Video StreamingEdge Device Multi-unicasting for Video Streaming
Edge Device Multi-unicasting for Video Streaming
Tal Lavian Ph.D.
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
Yoram Orzach
 
Optical Networking Services
Optical Networking ServicesOptical Networking Services
Optical Networking Services
Tal Lavian Ph.D.
 
Networks - Lecture D
Networks - Lecture DNetworks - Lecture D
Networks - Lecture D
CMDLearning
 
18 link state - balanced hybrid routing
18   link state - balanced hybrid  routing18   link state - balanced hybrid  routing
18 link state - balanced hybrid routing
CYBERINTELLIGENTS
 
Unit 1
Unit 1Unit 1
Unit 1
sasi
 

Similar to Networking Concepts Lesson 05 - OSI - Eric Vanderburg (20)

Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric VanderburgNetworking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
 
OSI_TCPIP_layers.pptx
OSI_TCPIP_layers.pptxOSI_TCPIP_layers.pptx
OSI_TCPIP_layers.pptx
 
Ccna 2nd Edition
Ccna 2nd EditionCcna 2nd Edition
Ccna 2nd Edition
 
QSpiders - Day1 Network Basics
QSpiders - Day1 Network BasicsQSpiders - Day1 Network Basics
QSpiders - Day1 Network Basics
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
Layer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptLayer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.ppt
 
CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9
 
Jorgenson Loki
Jorgenson LokiJorgenson Loki
Jorgenson Loki
 
Introduction To Computer Networks
Introduction To Computer NetworksIntroduction To Computer Networks
Introduction To Computer Networks
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.pptAndrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
 
Osi and tcp ip model
Osi and tcp ip modelOsi and tcp ip model
Osi and tcp ip model
 
1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop
 
Edge Device Multi-unicasting for Video Streaming
Edge Device Multi-unicasting for Video StreamingEdge Device Multi-unicasting for Video Streaming
Edge Device Multi-unicasting for Video Streaming
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Optical Networking Services
Optical Networking ServicesOptical Networking Services
Optical Networking Services
 
Networks - Lecture D
Networks - Lecture DNetworks - Lecture D
Networks - Lecture D
 
18 link state - balanced hybrid routing
18   link state - balanced hybrid  routing18   link state - balanced hybrid  routing
18 link state - balanced hybrid routing
 
Unit 1
Unit 1Unit 1
Unit 1
 

More from Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
Eric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
Eric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
Eric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

Networking Concepts Lesson 05 - OSI - Eric Vanderburg

  • 1. Chapter 5 Making Networks Work Networking Concepts – Eric Vanderburg ©2005
  • 3. OSI Reference Model  How to remember this    Please Do Not Throw Sausage Pizza Away Think of your own… 3 Sections of the Model  Application     Transport   Application Layer (7) Presentation Layer (6) Session Layer (5) Transport Layer (4) Network    Network Layer (3) Datalink Layer (2) Physical Layer (1) Networking Concepts – Eric Vanderburg ©2005
  • 4. Encapsulation  Enclosing some data within another thing so that the included data is not apparent. Networking Concepts – Eric Vanderburg ©2005
  • 5. Application – Layer 7  Where programs access network services  FTP, HTTP, Client Software  Problems at this layer:  Misconfigured settings  Incompatible commands Networking Concepts – Eric Vanderburg ©2005
  • 6. Presentation – Layer 6  Formats data  Protocol conversion  Encryption  Compression  Character set (ASCII, Unicode, EBCDIC)  Problems at this layer:  Cannot decrypt  Wrong conversion Networking Concepts – Eric Vanderburg ©2005
  • 7. Redirector  Sends requests for services to the appropriate network device.  RDR can sometimes stand for redirector  Rdr.sys  Windows redirector registry entries stored in  HKEY_LOCAL_MACHINESYSTEMCurrentCon trolSetServices LanmanWorkstationParameters and  HKEY_LOCAL_MACHINESYSTEMCurrentCon trolSetServicesRdr Networking Concepts – Eric Vanderburg ©2005
  • 8. Session – Layer 5       Manages communication Identification Window size Keep alive messages ACK, NAK Name resolution     DNS NetBIOS Logon Problems at this level:  Incorrect or no name resolution Networking Concepts – Eric Vanderburg ©2005
  • 9. Transport – Layer 4  Segmenting  Sequencing  Error checking  Flow control – as much data as can handle  TCP & SPX  Problems at this layer:  Overly large segments Networking Concepts – Eric Vanderburg ©2005
  • 10. Network – Layer 3  Logical addressing  Routing  QOS  Deals with packets  IP & IPX  Problems at this layer: Incorrect routing (bad config)  Incorrect routing table  Incorrect routing protocol  Incorrect IP configuration  Networking Concepts – Eric Vanderburg ©2005
  • 11. Datalink – Layer 2  Physical Addressing  Deals with frames  Discards bad frames  Convert to bits  Problems at this layer: Collisions  Bad frames  Faulty NIC  Incorrect bridging tables  Networking Concepts – Eric Vanderburg ©2005
  • 12. Datalink Sublayers  MAC  Manages multiple NICs  Creates frame and sends to physical  Sense carrier  Pass tokens  LLC  Error recovery  Integrity checking Networking Concepts – Eric Vanderburg ©2005
  • 13. Physical – Layer 1  Encoding - Convert bits to signals  101001011001  Problems at this level:  Interference  Noise  Cable not connected Networking Concepts – Eric Vanderburg ©2005
  • 14. OSI & TCP/IP OSI Model Application Presentation Session Transport Network Datalink Physical Networking Concepts – Eric Vanderburg ©2005 TCP/IP Application Transport Internet Network
  • 15. 802 Specifications  802.1 Bridging and Internetworks  802.2 Flow control LLC Sublayer  802.3 Ethernet  802.4 Token Bus  802.5 Token Ring  802.6 MAN  802.7 Broadband  802.8 Fiber Optics  802.9 VOIP  802.10 Security  802.11 Wireless  802.15 WPAN  802.18 Radio Wireless Networking Concepts – Eric Vanderburg ©2005
  • 16. Terms  Congestion Control – adjusts network transmissions based on current utilization  Flow control – send as much data as each computer can handle at a time  PDU – Packet Data Unit, Payload Data Unit, Protocol Data Unit Networking Concepts – Eric Vanderburg ©2005