You are on page 1of 52

Prasoon Mishra

content

• OSI Layer Design

• Transport layer

• Connection Management

• Session Layer Design


• Presentation Layer

• Data Compression

• Cryptography
OSI is stands for
open system
interconnection .
it is 7 layer
architecture .
Transport Layer Design
1)Process to Process delivery
2)Flow control
3)Error control
4)UDP
5)Header Format of UDP
6)TCP
Process to Process Delivery
 The real communication takes place between
two process -to-process application programs
for which we need to the process to process
delivery .
• In this a packet from one process is delivered to
the other process .
• the relationship between the process the
communicating process is the client -server
relationship .
Process to Process Data Transfer
Flow control is performed end to end in this layer .

Erroris a performed end to end in this layer to ensure that the


complete message arrives at the receiveing transport layer without
any error .

Error correction idone through retransmission .


UDP
1)User Datagram protocol provides a connectionless packet service that offers
unreliable 'best effort' delivery .

2)applications that do not require an acknowledgement of reciept data , audio and


video broadcasting uses UDP .

3)UDP packets are called as user datagram .


4)UDP provides a protocol port numbers to distinguish between multiple programs
executing on single device .

5)Each UDP message contains both a destination port numbers and a source port
number . this makes it possible for th UDP at the destination to deliver the message
to the correct application programs .

6)example - simple network management protocol , audio or video broadcasting


uses UDP .
TCP (Transmission Protocol)
• It is connection-oriented protocol .
• The TCP provides reliable transmission of data in an IP
environment .
• TCP supports a full duplex operation means that TCP process
can send and receive both at a same time .
• program to program reliable packet delivery through an
internetwork .
• TCP offeres efficient flow control, when sending
acknowledgement back to source , the receiving tcp process
indicates the highest sequence number that it can receive
without overflowing its internal buffers.
UDP have fixed size header of 8-bytes .
Source Port - it is an optional field , which indicates that port of the sending process and
may be assumed to be the port to which a reply should be addressed in the absence of
any other information .
if not used , avalue of zero is inserted .

Destination Port - Destination port has a meaning within th e context of a particular


internet address .

Length - this is the size in bytes of the UDP packets including the header and data . The
minimum length of the header is 8 -Byte .

Checksum - This is used to verify the integrity of a the UDP header . The checksum is
performed on a “pseudo header “ consisting of information obtained from the IP
header as well as UDP Header .
Connection Management
1.Connection Oriented service b/w
Add yue

Connectionless service
2.3 way handshaking protocol
3.TCP header
4.Congestion control algorithm
5.TCP preferred over UDP in some
TITLE TITE

applications
Connection oriented || Connection less
• In this authentication is • it does not need
needed . authentication .
• this is more reliable • this is less reliable
• it is stream based • it is message based .
• Packets travels • Packets travel randomly .
sequentially
• it makes connection and • it does not guarantee a
checks whether message
delivery .
received or not sends again if
an error occurs .
3 Way Handshake Protocol
Connection establishment in TCP

• TO establish a connection tcp uses 3 way handshake .


• Before a client attempts to connect with a server, the server
must first bind to and listen at a port to open it up for
connection, this is called a passive open .
• once the passive open is established,a client may intiate
an active open .
a). SYN - the active open is performed by the client sending
a SYN to the server . The client sets the segments's
Sequence number to a random value A .
b) SYN-ACK In response , the server replies with a
SYN-ACK . The ack number is set to
one more than the recived sequence number (A+1) and the
sequence number that the server chooses for the packet is
another random number B.

c) ACK - finally , the client an ack back to the server . The


sequence number is set to the recieved acknowledgement
value .
TCP header

• The segment of a 20 to 60 byte header followed by the


data from the application program .
• 20 Bytes - no option<min>
• 60 Bytes - if contains option <max>
- this field defines the size of the window i
bytes . it maintain the other party .
• The length of this field is 16 bits .
• the maximum size of the window is 65,535 bytes .
TCP header
• This is the layout of TCP headers:

• Source TCP port number (2 bytes)


• Destination TCP port number (2 bytes)
• Sequence number (4 bytes)
• Acknowledgment number (4 bytes)
• TCP data offset (4 bits)
• Reserved data (3 bits)
• Control flags (up to 9 bits)
• Window size (2 bytes)
• TCP checksum (2 bytes)
• Urgent pointer (2 bytes)
• TCP optional data (0-40 bytes)
TCP Congestion Control
Congestion control

• TCP uses a congestion window and a congestion policy that


avoid congestion .
• Network congestion may occur when a sender overflows
the network with too many packets.
• At the time of congestion, the network cannot handle this
traffic properly, which results in a degraded quality of
service (QoS).
• The typical symptoms of a congestion are: excessive packet
delay, packet loss and retransmission
Control

• URG: Urgent Pointer field significant


• ACK: Acknowledgment field significant
• PSH: Push Function
• RST: Reset the connection
• SYN: Synchronize sequence numbers
• FIN: No more data from sender

• Reserved for future use. Must be zero


Session Layer

1)Design issue with Session control


2)Authentication
3)Permissions or access control
4)Checkpoints
5)Dialog control
6)Session Restoration
7)RPC(remote procedure call)
Session Layer - Design issue
The Session Layer allows users on
different machines to establish active
communication sessions between them.

It's main aim is to establish, maintain


and synchronize the interaction between
communicating systems.

Session layer manages and synchronize


the conversation between two different
applications.

In Session layer, streams of data are


marked and are resynchronized properly,
so that the ends of the messages are not
cut prematurely and data loss is avoided.
Remote Procedure Control
when machine-1 calls
machine-2 ,then the calling
process on machine 1 is suspended
and execution of the called procedure
takes place on machine-2 and no
message passing is visible to the
programmer .
this technique is RPC

the calling procedure is known as Client


&
and the called procedure is known as the
Server .

The principle behind RPC is look like as a


local
call .
Presentation Layer
Encryption
Layer

Translation Compression
Layer Layer

Presentation
Layer
Design Issue in Presentation Layer
1)To manage and maintain
the syntax and semantics of
the information transmitted
.
2)The presentation layer
then prepares this data in
the most appropriate format
the receiving application can
understand.
Translation Layer

It translates data between the formats the networks


requires and the format the computer the computer
expects .

ASCII EBCDIC
Data Compression

1
Data compression is the way of
downloading the compressed
form of the text,audio, video
data using the computer . 2 Lossy
Compression
DATA compression
• Data compression is a reduction in the number of bits
needed to represent data.

• Compressing data can save storage capacity, speed up


file transfer, and decrease costs for storage hardware
and network bandwidth.

• Data compression can dramatically decrease the


amount of storage a file takes up. For example, in a
2:1 compression ratio, a 20 megabyte (MB) file takes
up 10 MB of space. As a result of compression,
administrators spend less money and less time on
storage.
RUN length encoding
Data Compression
Compress

Digital Audio Streaming


audio compression audio
AUDIO COMPRESSION

Predictive Compression

Perceptual Compression
Predictive encoding
In predictive encoding, the differences between samples are
encoded instead of encoding all the sampled values. This
type of compression is normally used for speech. Several
standards have been defined such as GSM (13 kbps), G.729
(8 kbps), and G.723.3 (6.4 or 5.3 kbps). Detailed discussions
of these techniques are beyond the scope of this book.
Perceptual encoding: MP3
The most common compression technique used to create
CD-quality audio is based on the perceptual encoding
technique. This type of audio needs at least 1.411 Mbps,
which cannot be sent over the Internet without compression.
MP3 (MPEG audio layer 3) uses this technique.
15.37
Streaming Audio
a)Using a web server
b)using a web server with a metafile
c) using a media server
d)using a media derver and RTSP
Streaming audio using Media Server
JPEG compression
1.Tranformation
2.Down sampling
3.Oraganizing in groups
4.Discrete cosine Transform
5.Quantiazation
6.Encoding
7.Adding header
JPEG Compression

JPEG is a lossy compression


format conceived explicitly for
making photo files smaller and it
exploits the imperfect
characteristics of our perception.
JPEG files are more correctly
described as being in JFIF (JPEG
File Interchange Format), which is
a limited expression of the full
JPEG standard
 Cryptography is a study of secret writing .
 encryption is a transform plain text to cipher text .
 decryption is change non readable into plain text .
 02algorithm is used to secure information .
complex

Add your words


here,according to your
need to draw the text
box size
Symmetric key cryptography

In symmetric-key cryptography, the same key is used by the sender


(for encryption)
and the receiver (for decryption).
The key is shared.
In Asymmetric key , there are two keys
1. Private Key
2. Public key

The private key is kept receiver . The public key is


announced to the public

Public key is used for encryption and


private key is used for decryption
Asymmetric key
• Difference b/w

Symmetric Key Asymmetric key


• Same key is used for encryption one key is used for encryption and another
and decryption different key is used for decryption .

very fast lest fast than symmetric key

usually same or less than original clear text size . More than the original clear text size .

key exchange is big problem . no problem

not used for Digital Signatures it is used in Digital Signatures .


The symmetric (shared) key in the
Diffie-Hellman protocol is
K = gxy mod p.
Example
Assume g = 7 and
p = 23. The steps are as follows:

1. Alice chooses x = 3 and calculates R1 = 73 mod 23 = 21.


2. Bob chooses y = 6 and calculates R2 = 76 mod 23 = 4.
3. Alice sends the number 21 to Bob.
4. Bob sends the number 4 to Alice.
5. Alice calculates the symmetric key K = 43 mod 23 = 18.
6. Bob calculates the symmetric key K = 216 mod 23 = 18.
The value of K is the same for both Alice and Bob;
gxy mod p = 718 mod 23 = 18.
MAN IN THE MIDDLE ATTACK
Voice over IP

a) voice over IP is technology used for delivering different


kinds of data from a source to destination using a IP
(internet protocol .

b) This may be in many forms , including files , voice


communication , pictures , fax or multimedia messages
.

c) VOIP is most a often used for telephone calls , which


are almost free of charge .
VOIP

VOIP uses codes to encapsulate audio


into packets, transmit the packet across an
IP networks for voice ,VOIP reduces
network infrastructure costs , enables
providers to deliver vice services over
thier broadband and private networks ,
and allows enterprises to operate to single
voice and data network .
Thank You
EveryOne

You might also like