You are on page 1of 4

Layer

Description

Popular
Protocols

Protocol Data
Unit

Application

+ User interface

HTTP, FTP, TFTP,


Telnet, SNMP,
DNS

Data

Presentatio
n

+ Data
representation,
encryption &
decryption

+ Video (WMV,
AVI)
+ Bitmap (JPG,
BMP, PNG)
+ Audio (WAV,
MP3, WMA)
.

Data

Session

+ Set up,
monitor &
terminate the
connection
session

+ SQL, RPC,
NETBIOS
names

Data

Transport

+ Flow control
(Buffering,
Windowing,
Congestion
Avoidance) helps
prevent the loss
of segments on
the network and
the need for
retransmission

+ TCP
(ConnectionOriented,
reliable)
+ UDP
(Connectionless
, unreliable)

Segment

Network

+ Path
determination
+ Source &
Destination
logical addresses

+ IP
+ IPX
+ AppleTalk

Packet/Datagra
m

Router

Data Link

+ Physical
addresses

+ LAN
+ WAN (HDLC,
PPP, Frame
Relay)

Frame

Switch,
Bridge

+ FDDI,
Ethernet

Bit (0, 1)

Hub,
Repeater

Includes 2
layers:
+ Upper layer:
Logical Link
Control (LLC)
+ Lower layer:
Media Access
Control (MAC)
Physical

Encodes and
transmits data

Devices
operate
in this
layer

bits
+ Electric signals
+ Radio signals

Basics-1
Basics-2
Reference Models-1
Reference Models-2
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Application Layer-1
Application Layer-2
DNS
Telnet-1
Telnet-2
World Wide Web
HTTP and FTP
Ethernet
Wireless LAN
WiMAX
Bluetooth
ATM and Frame Relay
Access Networks
Physical Media
Multiplexing
Topology
Packet Switching and Circuit Switching
SONET
Internet
Cryptography
Security In The Internet
Delays and Loss
Network Attacks
DHCP
SSH
SMTP-1
SMTP-2
RPC
RTP
FTP
Network Utilities
HTTP
IPv4
IPv6

Benifits of info sec


Condition of info sec in country
Learn attacks that could be performed on network
Why u want to persue info sec

Vpn and proxy difference

Computer Security
Network Security
Advanced Cryptography I
Information Security Management

Advantages of Information Security:

Information security is extremely easy to utilize. For protection of less sensitive material users can
simply password protect files. For the more sensitive material users can install biometric scanners,
firewalls, or detection systems.

As technology increases so will the crimes associated with it. Making the use of information
security very worth while.

It keeps vital private information out of the wrong hands.

For the government it keeps top secret information and cabalities out of terrorist and enemy
nation's hands.

Information security protects users valuable information both while in use and while it is being
stored.

In terms of user experience - very little.


1. A VPN will translate your source IP address into a new one provided
by the VPN.
2. A proxy will also translate your source IP into something new. It will
also perform requests on your behalf.
3. A VPN generally will always encrypt traffic between the VPN and your
own endpoint. It will not encrypt traffic over the Internet though.
4. A proxy does not provide encryption services but can proxy HTTPS
traffic - in this case you have full end to end encryption.
Unlike a Proxy, a VPN service provider(Virtual Private Network) encrypts all of
your traffic, replacing your ISP and routing ALL traffic through the VPN server,
including all programs and applications. This also will use all benefits of
the VPN server such as (Speed, Geopgraphic Location, and Security).

You might also like