Session Presentation Application Layers
Session Presentation Application Layers
OSI Model
LAYER 5: SESSION
Data Data
Presentation Presentation
encoding decoding
■ ■■
Message Message Message
Presentation Layer
Specific responsibilities of presentation
layer:
➢ Data Representation
➢ Data Compression
➢ Encryption
DATA
REPRESENTATION
Data Representation
Different computers have different
representations for characters.
If two dissimilar computers are to exchange
text, say e-mail, they must agree on the
representation to be used in the exchange.
Then one must translate from, or into, the
agreed upon representation.
Data Representation
Converting the complex data structures
used by an application (strings, integers,
structures, etc. ) into a byte stream
transmitted across the network.
Representing information in such a way
that communicating peers agree to the
format of the data being exchanged.
E.g., How many bits does an integer
contain?,ASCII or EBCDIC character set?
Data Representation
Popular network data representations
include:
◦ ASN.1 - an ISO standard
◦ XDR - used with SunRPC
DATA
COMPRESSION
Data Compression
Reduces the number of bits contained in the
information.
Lossless Compression -- data is
compressed and can be uncompressed
without loss of information.These are
referred to as bit-preserving or reversible
compression systems.
Lossy Compression – aim to obtain the
best possible fidelity for a given bit-rate or
minimizing the bit-rate to achieve a given
fidelity measure. Most suited to video and
audio compression techniques
Why Compression?
Sometimes programs need to send more
data in a timely fashion than the bandwidth
of the network supports. (For example,a
video stream that needs 10Mbps to transmit
on a 1 Mbps network).
It’s hard to move data on the Internet at
>1Mbps.
The Internet does not allow applications to
use more than their “fair share” of the
bandwidth on a congested link.
Need to compress the data at the sender
and decompress it at the receiver.
Why Compression?
In terms of storage, the capacity of a
storage device can be effectively
increased with methods that compresses
a body of data on its way to a storage
device and decompresses it when it is
retrieved.
In terms of communications, the
bandwidth of a digital communication link
can be effectively increased by
compressing data at the sending end and
decompressing data at the receiving end.
ENCRYPTION
Encryption
• To carry sensitive information, a system must
be able to assure privacy.
• As the number of attacks increase and as the
public Internet is used to transmit private
data, it is increasingly difficult to protect
information.
• One way to safeguard data from attacks is
encrypting the data.
• Practically, encryption is suitably done in
presentation layer besides transport and
physical layer.
Encryption
Encryption – sender transform original
information (plaintext) to another form
(ciphertext) by a function that is
parameterised by a key.
Decryption – reverses the original process to
transform the message (ciphertext) back to
its original form (plaintext).
Encryption
Basic Terms and Concepts
Cryptography – the science of transforming
information so that it is secure while it is being
transmitted or stored. Data is scrambled so that
it cannot viewed by unauthorized users.
Cryptosystem – a disguises message that allows
only selected people to see through the disguise.
Cryptanalysis – the science of breaking a
crptosystem
Key – a value that is used by an algorithm to
encrypt and decrypt a message.
Cipher – an encryption/decryption algorithm tool
that is used to create encrypted/decrypted text
Encrytption/Decryption Keys
Symmetric Keys – use same key to
encrypt and decrypt a message.
Eg.: Data Encryption Standard (DES),
Triple DES (3DES),Advanced
Encryption Standard (AES)
Asymmetric Keys -2 keys are needed
(public key and private key); 1 key to
encrypt, another key to decrypt and
vice versa.
Eg.: RSA and Diffie-Hellman
How Encryption Protects
Because cryptography is concerned with
the storage or transmission of information,
five key security functions need to be
fulfilled:
Protection Description
Confidentiality Allow only authorized users to access
information.
Authentication Verify who the sender was and trust the
sender is who they claim to be.
Integrity Trust the information has not been altered
Nonrepudiation Ensure that the sender or receiver cannot
deny that a message was sent or received.
Access Control Restrict availability to information.
Application Layer
Introduction to Networks
▪ Presentation layer
▪ Coding and conversion of application layer data
▪ Data compression
▪ Data encryption for the transmission and decryption of
data upon receipt by the destination
▪ Session layer
▪ Functions, creates, and maintains dialogs between source
and destination applications
▪ Handles the exchange of information to initiate dialogs,
keep them active, and to restart sessions
Application, Session and Presentation
Presentation and Session Layers (cont.)
Application, Session and Presentation
TCP/IP Application Layer Protocols
▪ Domain Name Service Protocol (DNS) – used to resolve Internet
names to IP addresses
▪ Telnet – a terminal emulation protocol used to provide remote access
to servers and networking devices
▪ Bootstrap Protocol (BOOTP) – a precursor to the DHCP protocol, a
network protocol used to obtain IP address information during bootup
▪ Dynamic Host Control Protocol (DHCP) – used to assign an IP
address, subnet mask, default gateway and DNS server to a host
▪ Hypertext Transfer Protocol (HTTP) – used to transfer files that
make up the Web pages of the World Wide Web
Application, Session and Presentation
TCP/IP Application Layer Protocols (cont.)
▪ MDA accepts a piece of email from MTA and performs the actual
delivery.
▪ MDA receives all the inbound mail from the MTA and places it into
mailboxes.
▪ MDA can also resolve final delivery issues, such as virus scanning,
spam filtering, and return-receipt handling.
Common Application Layer Protocols
SMTP, POP, and IMAP (cont.)
A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol.
Providing IP Addressing Services
Domain Name Service (cont.)
A human legible
name is resolved
to its numeric
network device
address by the
DNS protocol.
Providing IP Addressing Services
Domain Name Service (cont.)
Providing IP Addressing Services
DNS Message Format
▪ DNS server stores different types of resource records used to resolve
names
▪ Contains the name, address, and type of record.
▪ Record types are:
▪ A – An end device address
▪ NS – An authoritative name server
▪ CNAME – The canonical name for an alias; used when multiple
services have the single network address, but each service has its
own entry in DNS
▪ MX – Mail exchange record; maps a domain name to a list of mail
exchange servers
▪ Unable to resolve the name using its stored records, contacts other
servers.
▪ Server temporarily stores the numbered address that matches the name
in cache memory.
▪ Windows ipconfig /displaydns displays all cached DNS.
Providing IP Addressing Services
DNS Hierarchy
Examples top-
level domains:
.au - Australia
.co - Colombia
.com - business
or industry
.jp - Japan
.org - non-profit
organization
Providing IP Addressing Services
Dynamic Host Configuration Protocol
▪ DHCP used for general purpose hosts such as end user devices,
and static addressing is used for network devices such as gateways,
switches, servers and printers.
Providing IP Addressing Services
Dynamic Host Configuration Protocol (cont.)
Providing File Sharing Services
File Transfer Protocol
▪ FTP allow data transfers between a client and a server.