SlideShare uma empresa Scribd logo
1 de 16
Chapter 5
Making Networks Work

Networking Concepts – Eric Vanderburg ©2005
OSI Reference Model
Application

Application

Presentation

Presentation

Session

Session

Transport

Transport

Network

Network

Datalink

Datalink

Physical

Medium
Networking Concepts – Eric
Vanderburg ©2005

Physical
OSI Reference Model


How to remember this





Please Do Not Throw Sausage Pizza Away
Think of your own…

3 Sections of the Model


Application






Transport




Application Layer (7)
Presentation Layer (6)
Session Layer (5)
Transport Layer (4)

Network




Network Layer (3)
Datalink Layer (2)
Physical Layer (1)
Networking Concepts – Eric
Vanderburg ©2005
Encapsulation
 Enclosing

some data within another
thing so that the included data is not
apparent.

Networking Concepts – Eric
Vanderburg ©2005
Application – Layer 7
 Where

programs access network
services
 FTP, HTTP, Client Software
 Problems at this layer:
 Misconfigured

settings
 Incompatible commands

Networking Concepts – Eric
Vanderburg ©2005
Presentation – Layer 6
 Formats

data
 Protocol conversion
 Encryption
 Compression
 Character set (ASCII, Unicode, EBCDIC)
 Problems at this layer:
 Cannot

decrypt
 Wrong conversion
Networking Concepts – Eric
Vanderburg ©2005
Redirector
 Sends

requests for services to the
appropriate network device.
 RDR can sometimes stand for redirector
 Rdr.sys
 Windows

redirector registry entries stored in

 HKEY_LOCAL_MACHINESYSTEMCurrentCon

trolSetServices
LanmanWorkstationParameters and
 HKEY_LOCAL_MACHINESYSTEMCurrentCon
trolSetServicesRdr
Networking Concepts – Eric
Vanderburg ©2005
Session – Layer 5







Manages communication
Identification
Window size
Keep alive messages
ACK, NAK
Name resolution






DNS
NetBIOS

Logon
Problems at this level:


Incorrect or no name resolution
Networking Concepts – Eric
Vanderburg ©2005
Transport – Layer 4
 Segmenting
 Sequencing
 Error

checking
 Flow control – as much data as can
handle
 TCP & SPX
 Problems at this layer:
 Overly

large segments
Networking Concepts – Eric
Vanderburg ©2005
Network – Layer 3
 Logical

addressing

 Routing
 QOS
 Deals

with packets
 IP & IPX
 Problems at this layer:
Incorrect routing (bad config)
 Incorrect routing table
 Incorrect routing protocol
 Incorrect IP configuration


Networking Concepts – Eric
Vanderburg ©2005
Datalink – Layer 2
 Physical

Addressing
 Deals with frames
 Discards bad frames
 Convert to bits
 Problems at this layer:
Collisions
 Bad frames
 Faulty NIC
 Incorrect bridging tables


Networking Concepts – Eric
Vanderburg ©2005
Datalink Sublayers
 MAC
 Manages

multiple NICs
 Creates frame and sends to physical
 Sense carrier
 Pass tokens
 LLC
 Error

recovery
 Integrity checking
Networking Concepts – Eric
Vanderburg ©2005
Physical – Layer 1
 Encoding

- Convert bits to signals

 101001011001

 Problems

at this level:

 Interference
 Noise
 Cable

not connected

Networking Concepts – Eric
Vanderburg ©2005
OSI & TCP/IP
OSI Model
Application
Presentation
Session
Transport
Network
Datalink
Physical
Networking Concepts – Eric
Vanderburg ©2005

TCP/IP
Application
Transport
Internet
Network
802 Specifications
 802.1

Bridging and
Internetworks
 802.2 Flow control
LLC Sublayer
 802.3 Ethernet
 802.4 Token Bus
 802.5 Token Ring
 802.6 MAN

 802.7

Broadband
 802.8 Fiber Optics
 802.9 VOIP
 802.10 Security
 802.11 Wireless
 802.15 WPAN
 802.18 Radio
Wireless

Networking Concepts – Eric
Vanderburg ©2005
Terms
 Congestion

Control – adjusts network
transmissions based on current
utilization
 Flow control – send as much data as
each computer can handle at a time
 PDU – Packet Data Unit, Payload Data
Unit, Protocol Data Unit

Networking Concepts – Eric
Vanderburg ©2005

Mais conteúdo relacionado

Mais procurados

Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...
Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...
Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...Eric Vanderburg
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgEric Vanderburg
 
Zigbee wireless control made easy
Zigbee wireless control made easyZigbee wireless control made easy
Zigbee wireless control made easyrajrayala
 
ZIGBEE NETWORKS
ZIGBEE NETWORKSZIGBEE NETWORKS
ZIGBEE NETWORKSnaimish12
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell youIT Tech
 
Wireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeWireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeXaver Y.R. Chen
 
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehraMohit Mehra
 
IoT Device Management using open standards end-to-end
IoT Device Management using open standards end-to-endIoT Device Management using open standards end-to-end
IoT Device Management using open standards end-to-endPilgrim Beart
 
Sensor(zigbee)
Sensor(zigbee)Sensor(zigbee)
Sensor(zigbee)rajrayala
 
Internet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & StandardsInternet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & StandardsAshu Joshi
 
Training on basic internet troubleshooting
Training on basic internet troubleshootingTraining on basic internet troubleshooting
Training on basic internet troubleshootingSpandan Pradhan
 
Ccna( Cisco Certified Network Associate)
Ccna( Cisco Certified Network  Associate)Ccna( Cisco Certified Network  Associate)
Ccna( Cisco Certified Network Associate)Sukant Gupta
 
Zigbee technology
Zigbee technologyZigbee technology
Zigbee technologySerma Pavi
 

Mais procurados (20)

Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...
Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...
Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vand...
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
 
Wi fi
Wi fiWi fi
Wi fi
 
Zigbee wireless control made easy
Zigbee wireless control made easyZigbee wireless control made easy
Zigbee wireless control made easy
 
ZIGBEE NETWORKS
ZIGBEE NETWORKSZIGBEE NETWORKS
ZIGBEE NETWORKS
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell you
 
Zigbee
 Zigbee    Zigbee
Zigbee
 
Wireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeWireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBee
 
Zigbee technology2
Zigbee technology2Zigbee technology2
Zigbee technology2
 
Zigbee technology
Zigbee technology Zigbee technology
Zigbee technology
 
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
 
IoT Device Management using open standards end-to-end
IoT Device Management using open standards end-to-endIoT Device Management using open standards end-to-end
IoT Device Management using open standards end-to-end
 
Sensor(zigbee)
Sensor(zigbee)Sensor(zigbee)
Sensor(zigbee)
 
Internet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & StandardsInternet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & Standards
 
Training on basic internet troubleshooting
Training on basic internet troubleshootingTraining on basic internet troubleshooting
Training on basic internet troubleshooting
 
Ccna( Cisco Certified Network Associate)
Ccna( Cisco Certified Network  Associate)Ccna( Cisco Certified Network  Associate)
Ccna( Cisco Certified Network Associate)
 
Zigbee technology
Zigbee technologyZigbee technology
Zigbee technology
 
Dccn ppt
Dccn pptDccn ppt
Dccn ppt
 
ZIGBEE TECHNOLOGY
ZIGBEE TECHNOLOGYZIGBEE TECHNOLOGY
ZIGBEE TECHNOLOGY
 

Destaque

Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgEric Vanderburg
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgEric Vanderburg
 
Basic networking
Basic networkingBasic networking
Basic networkingworr1244
 
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgEric Vanderburg
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking conceptsMujeeb Ahmad
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistMiss Cheska
 

Destaque (8)

Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking concepts
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance Checklist
 

Semelhante a Making Networks Work - OSI Reference Model and Networking Concepts

Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric VanderburgNetworking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric VanderburgEric Vanderburg
 
Ccna 2nd Edition
Ccna 2nd EditionCcna 2nd Edition
Ccna 2nd Editiondznet
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6APSU
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 
Layer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptLayer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptBeniamTekeste
 
CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9Irsandi Hasan
 
Jorgenson Loki
Jorgenson LokiJorgenson Loki
Jorgenson LokiCarl Ford
 
Introduction To Computer Networks
Introduction To Computer NetworksIntroduction To Computer Networks
Introduction To Computer Networksadil raja
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODELMousa_k
 
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.pptAndrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.pptNiharikaDubey17
 
1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF WorkshopARCFIRE ICT
 
Edge Device Multi-unicasting for Video Streaming
Edge Device Multi-unicasting for Video StreamingEdge Device Multi-unicasting for Video Streaming
Edge Device Multi-unicasting for Video StreamingTal Lavian Ph.D.
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - BasicsYoram Orzach
 
Optical Networking Services
Optical Networking ServicesOptical Networking Services
Optical Networking ServicesTal Lavian Ph.D.
 
Networks - Lecture D
Networks - Lecture DNetworks - Lecture D
Networks - Lecture DCMDLearning
 
18 link state - balanced hybrid routing
18   link state - balanced hybrid  routing18   link state - balanced hybrid  routing
18 link state - balanced hybrid routingCYBERINTELLIGENTS
 
Unit 1
Unit 1Unit 1
Unit 1sasi
 

Semelhante a Making Networks Work - OSI Reference Model and Networking Concepts (20)

Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric VanderburgNetworking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
 
OSI_TCPIP_layers.pptx
OSI_TCPIP_layers.pptxOSI_TCPIP_layers.pptx
OSI_TCPIP_layers.pptx
 
Ccna 2nd Edition
Ccna 2nd EditionCcna 2nd Edition
Ccna 2nd Edition
 
QSpiders - Day1 Network Basics
QSpiders - Day1 Network BasicsQSpiders - Day1 Network Basics
QSpiders - Day1 Network Basics
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
Layer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptLayer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.ppt
 
CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9
 
Jorgenson Loki
Jorgenson LokiJorgenson Loki
Jorgenson Loki
 
Introduction To Computer Networks
Introduction To Computer NetworksIntroduction To Computer Networks
Introduction To Computer Networks
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.pptAndrew S. Tanembaum, Computer Networks, 4th ed.ppt
Andrew S. Tanembaum, Computer Networks, 4th ed.ppt
 
Osi and tcp ip model
Osi and tcp ip modelOsi and tcp ip model
Osi and tcp ip model
 
1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop
 
Edge Device Multi-unicasting for Video Streaming
Edge Device Multi-unicasting for Video StreamingEdge Device Multi-unicasting for Video Streaming
Edge Device Multi-unicasting for Video Streaming
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Optical Networking Services
Optical Networking ServicesOptical Networking Services
Optical Networking Services
 
Networks - Lecture D
Networks - Lecture DNetworks - Lecture D
Networks - Lecture D
 
18 link state - balanced hybrid routing
18   link state - balanced hybrid  routing18   link state - balanced hybrid  routing
18 link state - balanced hybrid routing
 
Unit 1
Unit 1Unit 1
Unit 1
 

Mais de Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

Mais de Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Último

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Making Networks Work - OSI Reference Model and Networking Concepts

  • 1. Chapter 5 Making Networks Work Networking Concepts – Eric Vanderburg ©2005
  • 3. OSI Reference Model  How to remember this    Please Do Not Throw Sausage Pizza Away Think of your own… 3 Sections of the Model  Application     Transport   Application Layer (7) Presentation Layer (6) Session Layer (5) Transport Layer (4) Network    Network Layer (3) Datalink Layer (2) Physical Layer (1) Networking Concepts – Eric Vanderburg ©2005
  • 4. Encapsulation  Enclosing some data within another thing so that the included data is not apparent. Networking Concepts – Eric Vanderburg ©2005
  • 5. Application – Layer 7  Where programs access network services  FTP, HTTP, Client Software  Problems at this layer:  Misconfigured settings  Incompatible commands Networking Concepts – Eric Vanderburg ©2005
  • 6. Presentation – Layer 6  Formats data  Protocol conversion  Encryption  Compression  Character set (ASCII, Unicode, EBCDIC)  Problems at this layer:  Cannot decrypt  Wrong conversion Networking Concepts – Eric Vanderburg ©2005
  • 7. Redirector  Sends requests for services to the appropriate network device.  RDR can sometimes stand for redirector  Rdr.sys  Windows redirector registry entries stored in  HKEY_LOCAL_MACHINESYSTEMCurrentCon trolSetServices LanmanWorkstationParameters and  HKEY_LOCAL_MACHINESYSTEMCurrentCon trolSetServicesRdr Networking Concepts – Eric Vanderburg ©2005
  • 8. Session – Layer 5       Manages communication Identification Window size Keep alive messages ACK, NAK Name resolution     DNS NetBIOS Logon Problems at this level:  Incorrect or no name resolution Networking Concepts – Eric Vanderburg ©2005
  • 9. Transport – Layer 4  Segmenting  Sequencing  Error checking  Flow control – as much data as can handle  TCP & SPX  Problems at this layer:  Overly large segments Networking Concepts – Eric Vanderburg ©2005
  • 10. Network – Layer 3  Logical addressing  Routing  QOS  Deals with packets  IP & IPX  Problems at this layer: Incorrect routing (bad config)  Incorrect routing table  Incorrect routing protocol  Incorrect IP configuration  Networking Concepts – Eric Vanderburg ©2005
  • 11. Datalink – Layer 2  Physical Addressing  Deals with frames  Discards bad frames  Convert to bits  Problems at this layer: Collisions  Bad frames  Faulty NIC  Incorrect bridging tables  Networking Concepts – Eric Vanderburg ©2005
  • 12. Datalink Sublayers  MAC  Manages multiple NICs  Creates frame and sends to physical  Sense carrier  Pass tokens  LLC  Error recovery  Integrity checking Networking Concepts – Eric Vanderburg ©2005
  • 13. Physical – Layer 1  Encoding - Convert bits to signals  101001011001  Problems at this level:  Interference  Noise  Cable not connected Networking Concepts – Eric Vanderburg ©2005
  • 14. OSI & TCP/IP OSI Model Application Presentation Session Transport Network Datalink Physical Networking Concepts – Eric Vanderburg ©2005 TCP/IP Application Transport Internet Network
  • 15. 802 Specifications  802.1 Bridging and Internetworks  802.2 Flow control LLC Sublayer  802.3 Ethernet  802.4 Token Bus  802.5 Token Ring  802.6 MAN  802.7 Broadband  802.8 Fiber Optics  802.9 VOIP  802.10 Security  802.11 Wireless  802.15 WPAN  802.18 Radio Wireless Networking Concepts – Eric Vanderburg ©2005
  • 16. Terms  Congestion Control – adjusts network transmissions based on current utilization  Flow control – send as much data as each computer can handle at a time  PDU – Packet Data Unit, Payload Data Unit, Protocol Data Unit Networking Concepts – Eric Vanderburg ©2005