mcgraw-hill©the mcgraw-hill companies, inc., 2001 chapter 23 upper osi layers

34
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

Upload: martha-russell

Post on 02-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Chapter 23

Upper OSI

Layers

Page 2: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-1

Session Layer Dialog

Page 3: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-2

Session-to-Transport Layer Communication

Page 4: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-3

Synchronization Points

Page 5: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-4

SPDU

Page 6: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-5

Presentation Layer Functions

Page 7: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-6

Direct and Indirect Methods of Translation

Page 8: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-7

Concept of Encryption and Decryption

Page 9: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-8

Encryption/Decryption Methods

Page 10: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-9

Monoalphabetic Substitution

Page 11: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-10

Polyalphabetic Substitution

Page 12: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-11

Transpositional Encryption

Page 13: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-12

Encoding/Decoding

Page 14: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-13

Permutation

Page 15: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-14

Substitution

Page 16: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-15

Product

Page 17: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-16

Exclusive OR

Page 18: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-17

Rotation

Page 19: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-18

DES

Page 20: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-19

Subkey Generation in DES

Page 21: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-20

One of the 16Steps in DES

Page 22: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-21

Public Key Encryption

Page 23: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-22

RSA

Page 24: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-23

RSA Encryption and Decryption

Page 25: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-24

Security of RSA

Page 26: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-25

Signature Authentication

Page 27: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-26

Data Compression Methods

Page 28: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-27

Run-Length Encoding

Page 29: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-28

MHS

Page 30: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-29

Message Format in MHS

Page 31: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-30

Virtual File Storage

Page 32: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-31

Local Access

Page 33: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-32

Remote Access

Page 34: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-33

Virtual Terminal