Ch23

34
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

Transcript of Ch23

Page 1: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Chapter 23

Upper OSI

Layers

Page 2: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-1

Session Layer Dialog

Page 3: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-2

Session-to-Transport Layer Communication

Page 4: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-3

Synchronization Points

Page 5: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-4

SPDU

Page 6: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-5

Presentation Layer Functions

Page 7: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-6

Direct and Indirect Methods of Translation

Page 8: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-7

Concept of Encryption and Decryption

Page 9: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-8

Encryption/Decryption Methods

Page 10: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-9

Monoalphabetic Substitution

Page 11: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-10

Polyalphabetic Substitution

Page 12: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-11

Transpositional Encryption

Page 13: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-12

Encoding/Decoding

Page 14: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-13

Permutation

Page 15: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-14

Substitution

Page 16: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-15

Product

Page 17: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-16

Exclusive OR

Page 18: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-17

Rotation

Page 19: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-18

DES

Page 20: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-19

Subkey Generation in DES

Page 21: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-20

One of the 16Steps in DES

Page 22: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-21

Public Key Encryption

Page 23: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-22

RSA

Page 24: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-23

RSA Encryption and Decryption

Page 25: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-24

Security of RSA

Page 26: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-25

Signature Authentication

Page 27: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-26

Data Compression Methods

Page 28: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-27

Run-Length Encoding

Page 29: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-28

MHS

Page 30: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-29

Message Format in MHS

Page 31: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-30

Virtual File Storage

Page 32: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-31

Local Access

Page 33: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-32

Remote Access

Page 34: Ch23

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-33

Virtual Terminal