Osi Model: Presented By:-Karan Mehta

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

OSI MODEL

PRESENTED BY:- KARAN MEHTA


POSSIBLE
NO OSI LAYER UNIT PROTOCOL FUNCTION SOLUTION
ATTACK

Transmitting bits over a Wired equivalent Restricted


10BaseT, attacks,
PHYSICAL medium using physical public access,
1 BITS 100BaseT Unauthorized
LAYER devices access of Open Block open
Eathernet
EX. cables, NIC, Hubs, etc. ports. ports.

Organize bits into frames and


adding headers.
ARP spoofing, Private
it also known as Host-to-Host
DATA LINK Ethernet, MAC flooding, VLANs,
2 FRAMES Layer.
LAYER ARP Other addressing Statics ARP
Error Detection, Error spoofing attacks. entry.
Correction & Flow Control.
EX. Switch/Bridge

Convert frames into packets. IP spoofing VPNs,


(MITM) Improve
IPV4, Provide IP address.
NETWORK Content
3 PACKETS IPV6, ICMP, Routing- best way to send
LAYER Unauthorized filtering &
IPSEC, ARP. packets from Source-to- access to internal detection
Destination. EX. Router. system. system.
PROTOC POSSIBLE
NO OSI LAYER UNIT FUNCTION SOLUTION
OL ATTACK

Segments and
Firewalls,
TRANSPORT TCP, resembles data into UDP & TCP
4 SEGMENT Access
LAYER UDP data stream flooding
control list.
(TCP, UDP).

It allows users on
different machines to
establish active
Session
communication Encryptions,
Hijacking,
SESSION NetBIOS, sessions between Multi factor
5 DATA
LAYER SAP them. Authenticati
Session
ons.
Sniffing.
Establish connections.
Synchronizing &
Dialog initiations.
POSSIBLE
NO OSI LAYER UNIT PROTOCOL FUNCTION SOLUTION
ATTACK

Encryption,
Translation, Encryption
Compression attacks,
PRESENTATION SSL, of data Detecting,
6 DATA Decryption
LAYER TLS formatting for Audit.
downgrade.
application
layer. ASCII, Viruses, worms
JPEG, etc.

User level XSS, Updated


layer. System,
APPLICATION SMTP, POP3, SQL injections,
7 DATA
HTTP, FTP It allows users
Anti-virus
LAYER DDOs, software,
to access
resources. HTTP floods.
4. TRANSPORT LAYER(Process-to-Process Layer)
Function:- Segments and resembles data into data stream (TCP, UDP).
Unit:- Segmented Packets
Protocol:- TCP, UDP
Possible Attack:- UDP & TCP flooding.
5. SESSION LAYER (Login to Logout Process, Session Cookies)
Function:-It’s establish active communication sessions.Synchronizing & Dialog initiations.
Unit :- DATA
Protocol:- NetBIOS, SAP
Possible Attack:- Session Hijacking, Session Sniffing.
6. PRESENTATION LAYER (User Window Presentation Layout, Themes, Etc.)
Function :- Encryption, Translation, Compression of data formatting for application layer.
Unit:- DATA
Protocol:- SSL, TLS
Possible Attack :- Encryption attacks, Decryption downgrade, Viruses, worms
7.APPLICATION LAYER (Ex.Facebook Interface)
Function:- User level layer. It allows users to access resources.
Unit:- DATA
Protocol:- SMTP, HTTP,POP3,FTP.
Possible Attack:- SQL Injection, XSS, DDoS.
TCP/IP Model
• The OSI Model we just looked at is just a reference/logical model. It was designed to
describe the functions of the communication system by dividing the communication
procedure into smaller and simpler components.
• TCP/IP Model stands for Transmission Control Protocol/Internet Protocol. It was
developed by ARPANET (Advanced Research Project Agency Network). The TCP/IP
model is a concise version of the OSI model. It contains four layers, unlike seven layers in
the OSI model.
• TCP/IP uses the client-server model of communication ( Describes How A Server Provides
Resources And Services To One Or More Clients. )
• TCP/IP specifies how data is exchanged over the internet by providing end-to-end
communications that identify how it should be broken into packets, addressed, transmitted,
routed and received at the destination.

Network Internet Transport Application


1. Network Access Layer (Data Link Layer + Physical Layer):

✓This layer corresponds to the combination of Data Link Layer and Physical
Layer of the OSI model. It looks out for hardware addressing and the protocols
present in this layer allows for the physical transmission of data.

2.Internet Layer:

✓This layer parallels the functions of OSI’s Network layer. It defines the
protocols which are responsible for logical transmission of data over the entire
network.
3.Host-to-Host Layer:
✓This layer is analogous to the transport layer of the OSI model. It is responsible
for end-to-end communication and error-free delivery of data. The purpose
of Transport layer is to permit devices on the source and destination hosts to carry on
a conversation. Transport layer defines the level of service and status of the
connection used when transporting data.
4.Application Layer (Session Layer + Presentation + Application):
✓This layer performs the functions of top three layers of the OSI model: Application,
Presentation and Session Layer. It is responsible for node-to-node communication
and controls user-interface specifications. It contains all the higher-level protocols.
TCP/IP Protocol
SMTP : Simple Mail Transfer Protocol Sending And Receiving E-mail.

SSH : Secure Shell Securing Network Services Over An Unsecured Network.

FTP : File Transfer Protocol Sending And Receiving File Transfers

SFTP : Secure File Transfer protocol Provide A High Level Of Security For Sending And Receiving File Transfers.

SCP : Secure Copy Protocol Securely Transferring Computer Files Between A Local Host And A Remote
Host Or Between Two Remote Hosts.
DHCP : Dynamic Host Configuration protocol A Network Server That Automatically Provides And Assigns IP Addresses,
Default Gateways And Other Network Parameters To Client Devices.
HTTP : Hyper Text Transfer Protocol Used To Access The Data On The World Wide Web (Www)

POP : Post Office Protocol (POP3) Transferring Messages From An E-mail Server To An E-mail Client

IMAP : Internet Message Access Protocol An Internet Protocol That Lets You Sync Your Email Inbox Across Multiple
Devices.
What is a Port in Networking?
✓A port is a virtual point where network connections start and end.
Ports are software-based and managed by a computer's operating
system. Each port is associated with a specific process or service.

✓A port is a number used to uniquely identify a transaction over a


network by specifying both the host, and the service.
Port
Usage
Number
20,21 File Transfer Protocol (FTP)
22 Secure Shell (SSH)
23 Telnet - Remote login service, unencrypted text messages

25 Simple Mail Transfer Protocol (SMTP) E-mail Routing


53 Domain Name System (DNS) service
80 Hypertext Transfer Protocol (HTTP) used in World Wide Web

110 Post Office Protocol (POP3) used by e-mail clients to retrieve e-mail from a server

143 Internet Message Access Protocol (IMAP) Management of Digital Mail


443 HTTP Secure (HTTPS) HTTP over TLS/SSL
THANK-YOU

You might also like