mcgraw-hill©the mcgraw-hill companies, inc., 2001 chapter 23 upper osi layers
TRANSCRIPT
![Page 1: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/1.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Chapter 23
Upper OSI
Layers
![Page 2: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/2.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-1
Session Layer Dialog
![Page 3: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/3.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-2
Session-to-Transport Layer Communication
![Page 4: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/4.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-3
Synchronization Points
![Page 5: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/5.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-4
SPDU
![Page 6: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/6.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-5
Presentation Layer Functions
![Page 7: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/7.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-6
Direct and Indirect Methods of Translation
![Page 8: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/8.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-7
Concept of Encryption and Decryption
![Page 9: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/9.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-8
Encryption/Decryption Methods
![Page 10: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/10.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-9
Monoalphabetic Substitution
![Page 11: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/11.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-10
Polyalphabetic Substitution
![Page 12: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/12.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-11
Transpositional Encryption
![Page 13: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/13.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-12
Encoding/Decoding
![Page 14: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/14.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-13
Permutation
![Page 15: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/15.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-14
Substitution
![Page 16: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/16.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-15
Product
![Page 17: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/17.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-16
Exclusive OR
![Page 18: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/18.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-17
Rotation
![Page 19: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/19.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-18
DES
![Page 20: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/20.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-19
Subkey Generation in DES
![Page 21: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/21.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-20
One of the 16Steps in DES
![Page 22: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/22.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-21
Public Key Encryption
![Page 23: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/23.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-22
RSA
![Page 24: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/24.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-23
RSA Encryption and Decryption
![Page 25: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/25.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-24
Security of RSA
![Page 26: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/26.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-25
Signature Authentication
![Page 27: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/27.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-26
Data Compression Methods
![Page 28: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/28.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-27
Run-Length Encoding
![Page 29: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/29.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-28
MHS
![Page 30: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/30.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-29
Message Format in MHS
![Page 31: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/31.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-30
Virtual File Storage
![Page 32: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/32.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-31
Local Access
![Page 33: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/33.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-32
Remote Access
![Page 34: McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649eec5503460f94bfdacd/html5/thumbnails/34.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-33
Virtual Terminal