network-sec - e xevw 09dx~ w | v GG|f e|rtdIr}s |uet|u{zm...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: e xevw 09dx~ w | v GG|f e|rtdIr}s |uet|u{zm fxyx ur x k k h w xGexuxjigfvGeuxr tu tdrCupqs rnyGofy IuGt nmxr l &GxAusq ywv tr i g ec a W X W T T TR P H DB @ 8 6 ph Sfdb`Y$V 99USQIGFECA975 3 4 1 ( % ! 20) '&$# " )S b C t QCb 9 C 7 Uh F D iV Bh pP cc B x)w b7' 9 C w dy 9 C ׮{weѲ Ge e bus ring CG HUB dual bus star CG u )w Ud )w )w UQb u)w cH 3 GPDSe 0fc f3 pIrh P h ghB FhP cH 3 GPDSe 0fc f3 hoPD 3 B` ph eBD P D 5 P H 3 GPSe 0oPD 3 B`5 c D D )w )w u)w Bh ih h D h iBcP EpbCpP pi 6 P bEtQi Aeh Bc@ Bcc Aeh Q0c 3 D c fc F G@Ci 6 Ah Ah B c @ g 6B B P Bc@ cBc @ c c D B i cB c c B P 3 tGPCH 3 c 3 0s`V "p x Up&A9 9 C 2&U &9 layer i+1 provides services layer i obtains services z layer i-1 ! i 6 jrh 3 DSW DP 8 8 i 6 jrQc 9W DPhP i cB i D6 c W P 6 ih B 8 pB W B `e f9W 6 Pc a iD rh R hP W @H W ph 3 D Q99 9b u & D c VWT 6 IFD`9 D 6 Uh 3 joPeD 9W % ih D # pehD 3 pei$W " OSI Reference Architecture Layers 7 - Application - underlying OS security - interoperation - multiple applications - common formatting, utilities - session managment - end-to-end, process-to-process - host identification only - per-packet OH if datagram service - higher level entities are treated same - only useful for immediate neighbors - electrical, mechanical modulation/detection 6- Presentation 5 - Session 4 - Transport 3 - Network 2 - Link 1 - Physical z 3 20( 1) ' 4 98 protocol C protocol B protocol A 7ڧ 6 5 z IJ i 6 jreh yh 3 c DP 8 i @ A BcAeh wtIX @ i c 6P i Aeh ip`5 Bc@ c DhH application presentation session transport network datalink physical SH TH SH NH TH SH DH NH TH SH PH DH NH TH SH DT DT PT FD E CC DB GȲ application presentation session transport network datalink physical host p relay p dl p relay dl p' n dl p router relay n dl' p' application presentation session transport network datalink physical host end-to-end chained repeater D 1) ' P IH (20G e bridge oݲ u S R ෪ p' 9 u x Q FTP BGP TCP telnet UDP IP MIME SMTP IGMP SNMP ICMP ARP RIP RARP OSPF DHCP IW`1XXVC ! YWUT a medium access 9 c pbph 3 IU6 W ghi DF 9W W 9R aW 9 W yU&bcbd$ x෪ b yyicb ෪ ! u Ydy&"pS U ෪ ' b )Q u b x e 2d f S 9 C 9& pYdy&"pU bUigb b Bc8Cyh jPB W 8 g 68 a W V 9R VW V$9 W 94 pY Y& R h u s U U ଫ h bC rQb p h q i Q' w byr 9& 9 C 8 w b7y$x dp u e q YUd w d b e d iU&vbu t UYU 9 C )w )w u)w x)w w c jտ D giSe e6 D c pH 3 pA 6 Fih h h pA 6 c jGPjQph D DPi B `e fi 6 Pc c 3 { tQiD B `e fi h BcP 6 Pc P H 6 P 6 B 8 i 6 jrbijP c Uh c 3 B 6 DPh D i dy u"& 9 p U&y7 t YU"9 u e b yb7d x & pYd u"{pY ) bp b ...
View Full Document

This note was uploaded on 01/17/2012 for the course CIS 6930 taught by Professor Staff during the Fall '08 term at University of Florida.

Ask a homework question - tutors are online