ch23
TRANSCRIPT
![Page 1: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/1.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Chapter 23
Upper OSI
Layers
![Page 2: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/2.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-1
Session Layer Dialog
![Page 3: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/3.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-2
Session-to-Transport Layer Communication
![Page 4: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/4.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-3
Synchronization Points
![Page 5: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/5.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-4
SPDU
![Page 6: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/6.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-5
Presentation Layer Functions
![Page 7: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/7.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-6
Direct and Indirect Methods of Translation
![Page 8: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/8.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-7
Concept of Encryption and Decryption
![Page 9: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/9.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-8
Encryption/Decryption Methods
![Page 10: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/10.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-9
Monoalphabetic Substitution
![Page 11: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/11.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-10
Polyalphabetic Substitution
![Page 12: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/12.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-11
Transpositional Encryption
![Page 13: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/13.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-12
Encoding/Decoding
![Page 14: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/14.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-13
Permutation
![Page 15: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/15.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-14
Substitution
![Page 16: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/16.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-15
Product
![Page 17: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/17.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-16
Exclusive OR
![Page 18: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/18.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-17
Rotation
![Page 19: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/19.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-18
DES
![Page 20: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/20.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-19
Subkey Generation in DES
![Page 21: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/21.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-20
One of the 16Steps in DES
![Page 22: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/22.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-21
Public Key Encryption
![Page 23: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/23.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-22
RSA
![Page 24: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/24.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-23
RSA Encryption and Decryption
![Page 25: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/25.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-24
Security of RSA
![Page 26: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/26.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-25
Signature Authentication
![Page 27: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/27.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-26
Data Compression Methods
![Page 28: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/28.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-27
Run-Length Encoding
![Page 29: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/29.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-28
MHS
![Page 30: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/30.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-29
Message Format in MHS
![Page 31: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/31.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-30
Virtual File Storage
![Page 32: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/32.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-31
Local Access
![Page 33: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/33.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-32
Remote Access
![Page 34: Ch23](https://reader036.vdocuments.mx/reader036/viewer/2022062319/5564131bd8b42a130c8b546d/html5/thumbnails/34.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-33
Virtual Terminal