{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Network Attacks - Network Attacks Attacks Wm Arthur Conklin...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
9/19/2007 1 Network Attacks Wm. Arthur Conklin, PhD Assistant Professor Department of Information & Logistics Technology College of Technology Protocols o A protocol is an agreed upon format for exchanging information. o A protocol will define a number of t parameters: » Type of error checking » Data compression method » Mechanisms to signal reception of a transmission o There are a number of protocols that 2 have been established in the networking world.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
9/19/2007 2 OSI Reference Model o ISO standard describing 7 layers of protocols » Application : Program-level communication » Presentation : Data conversion functions, data format, data encryption » Session : Coordinates communication between endpoints. Session state maintained for security. » Transport : end-to-end transmission, controls data flow » Network : routes data from one system to the next » Data Link : Handles passing of data between nodes 3 » Physical : Manages the transmission media/HW connections o You only have to communicate with the layer directly above and below The OSI Model Application Layer Each layer serves only its Network Layer Transport Layer Session Layer Presentation Layer adjacent layers. Thus the software which implements the Transport Layer receives input from the Session Layer or the Network Layer These Layers Implemented By Software Such as an Operating System 4 Physical Layer Data-Link Layer Network Layer. Implemented By Hardware
Background image of page 2