![]() ![]() The presentation layer takes any data transmitted by the application layer and prepares it for transmission over the session layer. It defines how two devices should encode, encrypt, and compress data so it is received correctly on the other end. The presentation layer prepares data for the application layer. ![]() A few examples of application layer protocols are the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System (DNS). It provides protocols that allow software to send and receive information and present meaningful data to users. The application layer is used by end-user software such as web browsers and email clients. We’ll describe OSI layers “top down” from the application layer that directly serves the end user, down to the physical layer. OSI was introduced in 1983 by representatives of the major computer and telecom companies, and was adopted by ISO as an international standard in 1984. However, the OSI 7-layer model is still widely used, as it helps visualize and communicate how networks operate, and helps isolate and troubleshoot networking problems. The modern Internet is not based on OSI, but on the simpler TCP/IP model. It was the first standard model for network communications, adopted by all major computer and telecommunication companies in the early 1980s Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices.The Open Systems Interconnection (OSI) model describes seven layers that computer systems use to communicate over a network. 5 An information system(s) implemented with a collection of interconnected components. Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices. Sources: NIST SP 800-63-3 under Network A system implemented with a collection of connected components. ![]() Unless otherwise stated, no assumptions are made about the network’s security it is assumed to be open and subject to active (e.g., impersonation, man-in-the-middle, session hijacking) and passive (e.g., eavesdropping) attack at any point between the parties (e.g., claimant, verifier, CSP, RP). Sources: NIST SP 800-63-3 under Network An open communications medium, typically the Internet, used to transport messages between the claimant and other parties. Unless otherwise stated, no assumptions are made about the network’s security it is assumed to be open and subject to active (e.g., impersonation, man-in-the- middle, session hijacking) and passive (e.g., eavesdropping) attack at any point between the parties (e.g., claimant, verifier, CSP, RP). 2 An open communications medium, typically the Internet, used to transport messages between the claimant and other parties. Sources: CNSSI 4009-2015 A system implemented with a collection of interconnected components. Information system(s) implemented with a collection of interconnected components.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |