Professional Documents
Culture Documents
Description
Popular
Protocols
Protocol Data
Unit
Application
+ User interface
Data
Presentatio
n
+ Data
representation,
encryption &
decryption
+ Video (WMV,
AVI)
+ Bitmap (JPG,
BMP, PNG)
+ Audio (WAV,
MP3, WMA)
.
Data
Session
+ Set up,
monitor &
terminate the
connection
session
+ SQL, RPC,
NETBIOS
names
Data
Transport
+ Flow control
(Buffering,
Windowing,
Congestion
Avoidance) helps
prevent the loss
of segments on
the network and
the need for
retransmission
+ TCP
(ConnectionOriented,
reliable)
+ UDP
(Connectionless
, unreliable)
Segment
Network
+ Path
determination
+ Source &
Destination
logical addresses
+ IP
+ IPX
+ AppleTalk
Packet/Datagra
m
Router
Data Link
+ Physical
addresses
+ LAN
+ WAN (HDLC,
PPP, Frame
Relay)
Frame
Switch,
Bridge
+ FDDI,
Ethernet
Bit (0, 1)
Hub,
Repeater
Includes 2
layers:
+ Upper layer:
Logical Link
Control (LLC)
+ Lower layer:
Media Access
Control (MAC)
Physical
Encodes and
transmits data
Devices
operate
in this
layer
bits
+ Electric signals
+ Radio signals
Basics-1
Basics-2
Reference Models-1
Reference Models-2
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Application Layer-1
Application Layer-2
DNS
Telnet-1
Telnet-2
World Wide Web
HTTP and FTP
Ethernet
Wireless LAN
WiMAX
Bluetooth
ATM and Frame Relay
Access Networks
Physical Media
Multiplexing
Topology
Packet Switching and Circuit Switching
SONET
Internet
Cryptography
Security In The Internet
Delays and Loss
Network Attacks
DHCP
SSH
SMTP-1
SMTP-2
RPC
RTP
FTP
Network Utilities
HTTP
IPv4
IPv6
Computer Security
Network Security
Advanced Cryptography I
Information Security Management
Information security is extremely easy to utilize. For protection of less sensitive material users can
simply password protect files. For the more sensitive material users can install biometric scanners,
firewalls, or detection systems.
As technology increases so will the crimes associated with it. Making the use of information
security very worth while.
For the government it keeps top secret information and cabalities out of terrorist and enemy
nation's hands.
Information security protects users valuable information both while in use and while it is being
stored.