34
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers

Chapter 23

Embed Size (px)

DESCRIPTION

Chapter 23. Upper OSI Layers. Figure 23-1. Session Layer Dialog. Figure 23-2. Session-to-Transport Layer Communication. Figure 23-3. Synchronization Points. Figure 23-4. SPDU. Figure 23-5. Presentation Layer Functions. Figure 23-6. Direct and Indirect Methods of Translation. - PowerPoint PPT Presentation

Citation preview

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Chapter 23

Upper OSI

Layers

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-1

Session Layer Dialog

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-2

Session-to-Transport Layer Communication

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-3

Synchronization Points

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-4

SPDU

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-5

Presentation Layer Functions

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-6

Direct and Indirect Methods of Translation

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-7

Concept of Encryption and Decryption

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-8

Encryption/Decryption Methods

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-9

Monoalphabetic Substitution

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-10

Polyalphabetic Substitution

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-11

Transpositional Encryption

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-12

Encoding/Decoding

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-13

Permutation

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-14

Substitution

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-15

Product

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-16

Exclusive OR

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-17

Rotation

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-18

DES

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-19

Subkey Generation in DES

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-20

One of the 16Steps in DES

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-21

Public Key Encryption

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-22

RSA

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-23

RSA Encryption and Decryption

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-24

Security of RSA

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-25

Signature Authentication

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-26

Data Compression Methods

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-27

Run-Length Encoding

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-28

MHS

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-29

Message Format in MHS

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-30

Virtual File Storage

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-31

Local Access

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-32

Remote Access

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001

Figure 23-33

Virtual Terminal