SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Protocol Stack and Addressing Team CharMusafirs AnkanAdhikari [1MS07IS010] Chandan Kumar [1MS07IS019] Chandresh Kumar [1MS07IS020] Pawan Kumar [1MS07IS065]
  OSI Model  Overview of the OSI model
  OSI Model  Application Layer 1.Application layer interacts with application programs and is the highest level of OSI model. 2. Application layer contains management functions to support distributed applications. 3. Application layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. 4. Examples of application layer are applications such as file transfer, electronic mail, remote login etc.
4 Application layer Protocols   OSI Model DHCP [Dynamic Host Configuration protocol] Provides static/dynamic address allocation, both manual and automatic. Dynamic : Assigns IP address for a specified time (lease time) Needed when a host moves from network to network or is connected/disconnected from a network. DHCP server keeps a table of past IP address assignments, so that it can preferentially assign to a client the same IP address that the client previously had.
 OSI Model PRESENTATION LAYER The presentation layer ensures that the information that the application layer of one system sends out is readable by the application layer of another system. If necessary, the presentation layer translates between multiple data formats by using a common format.  Provides encryption and compression of data. Examples :- JPEG, MPEG, ASCII, EBCDIC, HTML , AFP, ICA, LPP,NCP, NDR,RDP,XDR,X.25 PAD.
 OSI Model PRESENTATION LAYER PROTOCOL ASCII (American Standard Code for Information Interchange ) ASCII  is a character-encoding scheme based on the ordering of the English alphabet. ASCII codes represent text in computers, communications equipment, and other devices that use text. ASCII includes definitions for 128 characters: 33 are non-printing control characters that affect how text and space is processed; 94 are printable characters, and the spaces is considered an invisible graphic. HTML (Hyper Text Markup Language) HTML is the predominant markup language for web pages. It provides a means to create structure documents by denoting structural semantics for text such as headings, paragraphs, lists etc as well as for links, quotes, and other items. It allows images and objects to be embedded and can be used to create interactive forms.
 OSI Model SESSION LAYER The session layer defines how to start, control and end conversations (called sessions) between applications. This includes the control and management of multiple bi-directional messages using dialogue control. It also synchronizes dialogue between two hosts' presentation layers and manages their data exchange. The session layer offers provisions for efficient data transfer. Examples :- SQL, ASP, ADSP,ASP,.ISO-SP, OSI, L2F, L2TP, NetBIOS
 OSI Model SESSION LAYER PROTOCOL SSH (Secure Shell) SSH is a protocol for creating a secure connection between two systems. In the SSH protocol, the client machine initiates a connection with a server machine. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.
9 OSI and Protocol Stack OSI: Open Systems Interconnect OSI Model TCP/IP Hierarchy Protocols 7th Application Layer 6th Presentation Layer Application Layer 5th Session Layer 4th Transport Layer Transport Layer Network Layer 3rd Network Layer 2nd Link Layer Link Layer 1st Physical Layer Link Layer           : includes device driver and network interface card Network Layer     : handles the movement of packets, i.e. Routing Transport Layer   : provides a reliable flow of data between two hosts Application Layer : handles the details of the particular application
  OSI Model  MAC Spoofing Emulating MACs for illegal access. HKEY_LOCAL_MACHINEYSTEMurrentControlSetontrollass4D36E972-E325-11CE-BFC1-08002BE10318} contains driver information. DriverDesc contains the Adapter’s information,  Adding a NetworkAddress key. 3rd party tools: MadMACs, MacMakeUp. Loosely possible to DDoS.

Weitere ähnliche Inhalte

Andere mochten auch

What is an Internet backbone
What is an Internet backboneWhat is an Internet backbone
What is an Internet backboneTelia Carrier
 
3rd Generation Virtual Computing
3rd Generation Virtual Computing3rd Generation Virtual Computing
3rd Generation Virtual ComputingMatthew Bulat
 
Network protocols and Java programming
Network protocols and Java programmingNetwork protocols and Java programming
Network protocols and Java programmingdifatta
 
Virtual Desktop Architecture
Virtual Desktop ArchitectureVirtual Desktop Architecture
Virtual Desktop Architecturedigitallibrary
 
Multi-tiered Node Architectures - JSConf 2011
Multi-tiered Node Architectures - JSConf 2011Multi-tiered Node Architectures - JSConf 2011
Multi-tiered Node Architectures - JSConf 2011Tom Croucher
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)NetProtocol Xpert
 
A Streaming Media Primer
A Streaming Media PrimerA Streaming Media Primer
A Streaming Media PrimerVideoguy
 
Presentation smart computing starts with a virtual desktop strategy
Presentation   smart computing starts with a virtual desktop strategyPresentation   smart computing starts with a virtual desktop strategy
Presentation smart computing starts with a virtual desktop strategysolarisyougood
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systemsSHATHAN
 
Osi model
Osi modelOsi model
Osi modelOnline
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingVimal Dewangan
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 

Andere mochten auch (18)

What is an Internet backbone
What is an Internet backboneWhat is an Internet backbone
What is an Internet backbone
 
3rd Generation Virtual Computing
3rd Generation Virtual Computing3rd Generation Virtual Computing
3rd Generation Virtual Computing
 
Network protocols and Java programming
Network protocols and Java programmingNetwork protocols and Java programming
Network protocols and Java programming
 
Virtual Desktop Architecture
Virtual Desktop ArchitectureVirtual Desktop Architecture
Virtual Desktop Architecture
 
Multi-tiered Node Architectures - JSConf 2011
Multi-tiered Node Architectures - JSConf 2011Multi-tiered Node Architectures - JSConf 2011
Multi-tiered Node Architectures - JSConf 2011
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
 
A Streaming Media Primer
A Streaming Media PrimerA Streaming Media Primer
A Streaming Media Primer
 
Osi model
Osi modelOsi model
Osi model
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 
Presentation smart computing starts with a virtual desktop strategy
Presentation   smart computing starts with a virtual desktop strategyPresentation   smart computing starts with a virtual desktop strategy
Presentation smart computing starts with a virtual desktop strategy
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systems
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
OSI Model
OSI ModelOSI Model
OSI Model
 

Kürzlich hochgeladen

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Protocol Stack [Layer 5,6,7]

  • 1. Protocol Stack and Addressing Team CharMusafirs AnkanAdhikari [1MS07IS010] Chandan Kumar [1MS07IS019] Chandresh Kumar [1MS07IS020] Pawan Kumar [1MS07IS065]
  • 2. OSI Model Overview of the OSI model
  • 3. OSI Model Application Layer 1.Application layer interacts with application programs and is the highest level of OSI model. 2. Application layer contains management functions to support distributed applications. 3. Application layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. 4. Examples of application layer are applications such as file transfer, electronic mail, remote login etc.
  • 4. 4 Application layer Protocols OSI Model DHCP [Dynamic Host Configuration protocol] Provides static/dynamic address allocation, both manual and automatic. Dynamic : Assigns IP address for a specified time (lease time) Needed when a host moves from network to network or is connected/disconnected from a network. DHCP server keeps a table of past IP address assignments, so that it can preferentially assign to a client the same IP address that the client previously had.
  • 5. OSI Model PRESENTATION LAYER The presentation layer ensures that the information that the application layer of one system sends out is readable by the application layer of another system. If necessary, the presentation layer translates between multiple data formats by using a common format. Provides encryption and compression of data. Examples :- JPEG, MPEG, ASCII, EBCDIC, HTML , AFP, ICA, LPP,NCP, NDR,RDP,XDR,X.25 PAD.
  • 6. OSI Model PRESENTATION LAYER PROTOCOL ASCII (American Standard Code for Information Interchange ) ASCII is a character-encoding scheme based on the ordering of the English alphabet. ASCII codes represent text in computers, communications equipment, and other devices that use text. ASCII includes definitions for 128 characters: 33 are non-printing control characters that affect how text and space is processed; 94 are printable characters, and the spaces is considered an invisible graphic. HTML (Hyper Text Markup Language) HTML is the predominant markup language for web pages. It provides a means to create structure documents by denoting structural semantics for text such as headings, paragraphs, lists etc as well as for links, quotes, and other items. It allows images and objects to be embedded and can be used to create interactive forms.
  • 7. OSI Model SESSION LAYER The session layer defines how to start, control and end conversations (called sessions) between applications. This includes the control and management of multiple bi-directional messages using dialogue control. It also synchronizes dialogue between two hosts' presentation layers and manages their data exchange. The session layer offers provisions for efficient data transfer. Examples :- SQL, ASP, ADSP,ASP,.ISO-SP, OSI, L2F, L2TP, NetBIOS
  • 8. OSI Model SESSION LAYER PROTOCOL SSH (Secure Shell) SSH is a protocol for creating a secure connection between two systems. In the SSH protocol, the client machine initiates a connection with a server machine. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary.
  • 9. 9 OSI and Protocol Stack OSI: Open Systems Interconnect OSI Model TCP/IP Hierarchy Protocols 7th Application Layer 6th Presentation Layer Application Layer 5th Session Layer 4th Transport Layer Transport Layer Network Layer 3rd Network Layer 2nd Link Layer Link Layer 1st Physical Layer Link Layer : includes device driver and network interface card Network Layer : handles the movement of packets, i.e. Routing Transport Layer : provides a reliable flow of data between two hosts Application Layer : handles the details of the particular application
  • 10.
  • 11. OSI Model MAC Spoofing Emulating MACs for illegal access. HKEY_LOCAL_MACHINEYSTEMurrentControlSetontrollass4D36E972-E325-11CE-BFC1-08002BE10318} contains driver information. DriverDesc contains the Adapter’s information, Adding a NetworkAddress key. 3rd party tools: MadMACs, MacMakeUp. Loosely possible to DDoS.