6 Networking Pt.1 - CET 4663 Networking Part 1 Last Time We...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
CET 4663 Networking Part 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Last Time We talked about encryption Symmetric-key Public-key We are going to jump around a bit now Networking
Background image of page 2
Network Communication Many security related issues Confidentiality Integrity Availability Extremely complex system Many points of vulnerability
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How does it all work anyway? Question: When you communicate from one computer to another, what is really going on? Answer: A lot
Background image of page 4
Moving Data on a Network Many different tasks required to move data One computer wants to communicate with another computer Application to application communication Network to network communication Point to point communication Physical media communication
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Layered Model To accomplish these varied tasks we break the problem down into separate layers OSI 7-Layer model Somewhat idealized model of network comm
Background image of page 6
History Rapid growth of computer networks caused compatibility problems ISO recognized the problem and released the OSI model in 1984 OSI stands for Open Systems Interconnection and consists of 7 Layers The use of layers is designed to reduce complexity and make standardization easier
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
7 Layers of the OSI Model Layer Responsible For: 7.) Application Provides Services to User Apps 6.) Presentation Data Representation 5.) Session Communication Between Hosts 4.) Transport Flow Ctrl, Error Detection/Correction 3.) Network End to End Delivery, Logical Addr 2.) Data Link Media Access Ctrl, Physical Addr 1.) Physical Medium, Interfaces, Puts Bits on Med.
Background image of page 8
Examples Layer Example 7.) Application HTTP, FTP, SMTP 6.) Presentation ASCII, JPEG, PGP 5.) Session BOOTP, NetBIOS, DHCP, DNS 4.) Transport TCP, UDP, SPX 3.) Network IP, IPX, ICMP 2.) Data Link Ethernet, Token Ring, Frame Relay 1.) Physical Bits, Interfaces, Hubs
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/24/2011 for the course CET 4663 taught by Professor Staff during the Fall '08 term at University of Central Florida.

Page1 / 36

6 Networking Pt.1 - CET 4663 Networking Part 1 Last Time We...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online