17
Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316

Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Embed Size (px)

Citation preview

Page 1: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Niveles 4, 5, 6, y 7 del Modelo OSI

COMP 316

Page 2: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Layer 4 – Transport

• This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

Page 3: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Host • A computer system that is accessed by a user working at a remote

location. Typically, the term is used when there are two computer systems connected by modems and telephone lines. The system that contains the data is called the host, while the computer at which the user sits is called the remote terminal.

• A computer that is connected to a TCP/IP network, including the Internet. Each host has a unique IP address.

• To provide the infrastructure for a computer service. For example, there are many companies that host files, programs, applications or even a Web server for companies and individuals. In the case of a Web server, it means that they provide the hardware, software, and communications lines required by the server, but the content on the server may be controlled by someone else.

Page 4: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Flow Control• In communications, the process of adjusting the flow of data from

one device to another to ensure that the receiving device can handle all of the incoming data. This is particularly important where the sending device is capable of sending data much faster than the receiving device can receive it.

• There are many flow control mechanisms. One of the most common flow control protocols for asynchronous communication is called xon-xoff. In this case, the receiving device sends a an xoff message to the sending device when its buffer is full. The sending device then stops sending data. When the receiving device is ready to receive more data, it sends an xon signal.

• Flow control can be implemented in hardware or software, or a combination of both.

Page 5: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Layer 5- Session

• This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination

Page 6: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Applications• A program or group of programs designed for

end users. Application software can be divided into two general classes: systems software and applications software. Systems software consists of low-level programs that interact with the computer at a very basic level. This includes operating systems, compilers, and utilities for managing computer resources.

• In contrast, applications software (also called end-user programs) includes database programs, word processors, and spreadsheets. Figuratively speaking, applications software sits on top of systems software because it is unable to run without the operating system and system utilities.

Page 7: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

System Software vs. Applications Software

Page 8: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Layer 6 - Presentation

• This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

Page 9: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Data encryption

• The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.

• There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.

Page 10: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Name Method Plaintext Ciphertext

Transposition Switch the order of characters

SOFTWARE OSTFAWER

Expansion Insert characters between existing characters

USER UYSYEYRY

Substitution Replace characters with other characters

INFORMATION WLDIMXQUWIL

Compaction Remove characters and store elsewhere

ACTIVATION ACIVTIN

Some Encryption Methods

Page 11: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Public-key encryption• A cryptographic system that uses two keys -- a public key known to everyone and a

private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it.

• An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Moreover, it is virtually impossible to deduce the private key if you know the public key.

• Public-key systems, such as Pretty Good Privacy (PGP), are becoming popular for transmitting information via the Internet. They are extremely secure and relatively simple to use. The only difficulty with public-key systems is that you need to know the recipient's public key to encrypt a message for him or her. What's needed, therefore, is a global registry of public keys, which is one of the promises of the new LDAP technology.

• Public key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman. For this reason, it is sometime called Diffie-Hellman encryption. It is also called asymmetric encryption because it uses two keys instead of one key (symmetric encryption).

Page 12: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

LDAP• Short for Lightweight Directory Access Protocol, a set of

protocols for accessing information directories. LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. Because it's a simpler version of X.500, LDAP is sometimes called X.500-lite.

• Although not yet widely implemented, LDAP should eventually make it possible for almost any application running on virtually any computer platform to obtain directory information, such as email addresses and public keys. Because LDAP is an open protocol, applications need not worry about the type of server hosting the directory.

Page 13: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

symmetric encryption

• A type of encryption where the same key is used to encrypt and decrypt the message. This differs from asymmetric (or public-key) encryption, which uses one key to encrypt a message and another to decrypt the message.

Page 14: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Layer 7- Application• This layer supports application and end-user

processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.

Page 15: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

Telnet• (tel´net) (n.) A terminal emulation program for

TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network. You can then enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console. This enables you to control the server and communicate with other servers on the network. To start a Telnet session, you must log in to a server by entering a valid username and password. Telnet is a common way to remotely control Web servers.

Page 16: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

FTP

• Short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user's browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable data transfer.

• FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).

Page 17: Niveles 4, 5, 6, y 7 del Modelo OSI COMP 316. Layer 4 – Transport This layer provides transparent transfer of data between end systems, or hosts, and

E-mail

• Short for electronic mail, the transmission of messages over communications networks. The messages can be notes entered from the keyboard or electronic files stored on disk. Most mainframes, minicomputers, and computer networks have an e-mail system. Some electronic-mail systems are confined to a single computer system or network, but others have gateways to other computer systems, enabling users to send electronic mail anywhere in the world. Companies that are fully computerized make extensive use of e-mail because it is fast, flexible, and reliable