Osi Model: Presented By:-Karan Mehta
Osi Model: Presented By:-Karan Mehta
Osi Model: Presented By:-Karan Mehta
Segments and
Firewalls,
TRANSPORT TCP, resembles data into UDP & TCP
4 SEGMENT Access
LAYER UDP data stream flooding
control list.
(TCP, UDP).
It allows users on
different machines to
establish active
Session
communication Encryptions,
Hijacking,
SESSION NetBIOS, sessions between Multi factor
5 DATA
LAYER SAP them. Authenticati
Session
ons.
Sniffing.
Establish connections.
Synchronizing &
Dialog initiations.
POSSIBLE
NO OSI LAYER UNIT PROTOCOL FUNCTION SOLUTION
ATTACK
Encryption,
Translation, Encryption
Compression attacks,
PRESENTATION SSL, of data Detecting,
6 DATA Decryption
LAYER TLS formatting for Audit.
downgrade.
application
layer. ASCII, Viruses, worms
JPEG, etc.
✓This layer corresponds to the combination of Data Link Layer and Physical
Layer of the OSI model. It looks out for hardware addressing and the protocols
present in this layer allows for the physical transmission of data.
2.Internet Layer:
✓This layer parallels the functions of OSI’s Network layer. It defines the
protocols which are responsible for logical transmission of data over the entire
network.
3.Host-to-Host Layer:
✓This layer is analogous to the transport layer of the OSI model. It is responsible
for end-to-end communication and error-free delivery of data. The purpose
of Transport layer is to permit devices on the source and destination hosts to carry on
a conversation. Transport layer defines the level of service and status of the
connection used when transporting data.
4.Application Layer (Session Layer + Presentation + Application):
✓This layer performs the functions of top three layers of the OSI model: Application,
Presentation and Session Layer. It is responsible for node-to-node communication
and controls user-interface specifications. It contains all the higher-level protocols.
TCP/IP Protocol
SMTP : Simple Mail Transfer Protocol Sending And Receiving E-mail.
SFTP : Secure File Transfer protocol Provide A High Level Of Security For Sending And Receiving File Transfers.
SCP : Secure Copy Protocol Securely Transferring Computer Files Between A Local Host And A Remote
Host Or Between Two Remote Hosts.
DHCP : Dynamic Host Configuration protocol A Network Server That Automatically Provides And Assigns IP Addresses,
Default Gateways And Other Network Parameters To Client Devices.
HTTP : Hyper Text Transfer Protocol Used To Access The Data On The World Wide Web (Www)
POP : Post Office Protocol (POP3) Transferring Messages From An E-mail Server To An E-mail Client
IMAP : Internet Message Access Protocol An Internet Protocol That Lets You Sync Your Email Inbox Across Multiple
Devices.
What is a Port in Networking?
✓A port is a virtual point where network connections start and end.
Ports are software-based and managed by a computer's operating
system. Each port is associated with a specific process or service.
110 Post Office Protocol (POP3) used by e-mail clients to retrieve e-mail from a server