SlideShare una empresa de Scribd logo
1 de 63
Damian Gordon
 This presentation contains
some mild *spoilers* for
“Skyfall” and major *spoilers*
for network transmission
protocols. Proceed with
caution.
James Bond has had many faces
And now…
YOU are James Bond
You have been summoned
to Vauxhall House (Home of
MI5) for a new mission.
The building says “Universal
Exports Ltd.” on the outside,
that’s the cover business.
Here’s a plan of the building:
7th Floor – M.
6th Floor – Q Branch
5th Floor – Bill Tanner
4th Floor – Ms. Moneypenny
3rd Floor – Loelia Ponsonby
1st Floor – Garage
2nd Floor – John Strangways
You head straight up to the
7th floor, to M.’s office.
You knock at the door, and
M. says “Come in”.
This is M,
your boss.
He can be
grumpy.
 M. says “Ah, Bond, this is a secret
message that you must get through to
the US Embassy across town”
XXXXXXX
XXXXXXX
XXXXXXX
XXXXXXX
 M. says “Ah, Bond, this is a secret
message that you must get through to
the US Embassy across town”
 You say “Yes, sir.”
XXXXXXX
XXXXXXX
XXXXXXX
XXXXXXX
 M. says “Ah, Bond, this is a secret
message that you must get through to
the US Embassy across town”
 You say “Yes, sir.”
 M. says “Now pop downstairs to Q
Branch”.
XXXXXXX
XXXXXXX
XXXXXXX
XXXXXXX
 M. says “Ah, Bond, this is a secret
message that you must get through to
the US Embassy across town”
 You say “Yes, sir.”
 M. says “Now pop downstairs to Q
Branch”.
 You say “Yes, sir.”
XXXXXXX
XXXXXXX
XXXXXXX
XXXXXXX
This is Q, your
quartermaster.
He provides
you with
gadgets.
 Q says “Pay attention, 007. I’ve
translated the message into an
intermediary language, and also,
encrypted and miniaturized the
message.”
Codecode
Codecode
Codecode
Codecode
Code
Code
Code
 Q says “Pay attention, 007. I’ve
translated the message into an
intermediary language, and also,
encrypted and miniaturized the
message.”
 You say “Thank you, Q, I’m
familiar with standard message
conversion protocol”.
Codecode
Codecode
Codecode
Codecode
Code
Code
Code
This is Bill
Tanner, the
Chief-of-staff
at MI5.
He’s a good
mate and
golfing buddy.
 Bill Tanner says “James, I’ve done all
the security checks on the message,
and checked it to be sure it’s all
there. I’ve also put in some
checkpoints in the message so your
counterpart at the US end can be
sure he’s got the whole message”. Code[x]
Code[x]
Code[x]
Code
Code
Code
 Bill Tanner says “James, I’ve done all
the security checks on the message,
and checked it to be sure it’s all
there. I’ve also put in some
checkpoints in the message so your
counterpart at the US end can be
sure he’s got the whole message”.
 You say “Cheers, Bill. Let’s have a
round of golf this weekend at
Sunningdale”.
Code[x]
Code[x]
Code[x]
Code
Code
Code
This is Eve
Moneypenny,
M.’s secretary.
 Miss Moneypenny: “James, why are
you so late?”
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
 Miss Moneypenny: “James, why are
you so late?”
 You: “I fell out of an airplane
without a parachute”.
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
 Miss Moneypenny: “James, why are
you so late?”
 You: “I fell out of an airplane
without a parachute”.
 Miss Moneypenny: “James, I’ve
analysed the message to see if it
could be combined with some
other small messages that need to
go to the US end. And it’s been
combined with two others”.
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
This is Loelia
Ponsonby,
your secretary.
She is also
secretary to
008 and 0011.
 Loelia: “James, I’ve checked the
address on the message to
determine the addressee, and
here’s my advice on the fastest
route to the Embassy”.
 Loelia: “James, I’ve checked the
address on the message to
determine the addressee, and
here’s my advice on the fastest
route to the Embassy”.
 You: “Thank you, Loelia”.
This is John
Strangways,
Chief Secret
Service agent
in the
Caribbean.
 John Strangways: “James, I’ve put
your messages into a special MI5
courier pouch. It contains the
messages, the sender, and
destination ID. The pouch also
warns the recipient if other pieces
are still coming”.
 John Strangways: “James, I’ve put
your messages into a special MI5
courier pouch. It contains the
messages, the sender, and
destination ID. The pouch also
warns the recipient if other pieces
are still coming”.
 You: “Thanks, John”.
This is you car.
It’s cool
 Q has prepared your Aston Martin for the
trip to the Embassy. You depart for the US
Embassy with the secret packet in hand.
7th Floor: M.’s Office
6th Floor: Q Branch
Headquarters
5th Floor: Chief-of-
Staff, Bill Tanner
4th Floor: Ms.
Moneypenny
3rd Floor: Loelia
Ponsonby
2nd Floor: John
Strangways
1st Floor: Garage
7th Floor: M.’s Office
6th Floor: Q Branch
Headquarters
5th Floor: Chief-of-
Staff, Bill Tanner
4th Floor: Ms.
Moneypenny
3rd Floor: Loelia
Ponsonby
2nd Floor: John
Strangways
1st Floor: Garage
Send the message
Encryption and Miniaturisation
Checkpoints and Checks
Combining messages
Finding the best route
Packaging the message
Conveying the message
You, James Bond,
will return in…
 The Open Systems Interconnection (OSI)
Model is a 7-layer model that allows us to
picture what happens when we send a
message from one computer to another.
 Let’s imagine we are sending an e-mail
from one machine to another.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Application Layer Application Layer
 When you send an e-mail, it looks like it
goes from your application (e.g.
Thunderbird), to their application.
Application Layer Application Layer
 When you send an e-mail, it looks like it
goes from your application (e.g.
Thunderbird), to their application.
 But in reality it’s sent as a series of binary
values, 1s and 0s.
Application Layer Application Layer
 When you send an e-mail, it looks like it
goes from your application (e.g.
Thunderbird), to their application.
 But in reality it’s sent as a series of binary
values, 1s and 0s.
11001001 11001001 1100100111001001
Physical LayerPhysical Layer
Application Layer Application Layer
 When you send an e-mail, it looks like it
goes from your application (e.g.
Thunderbird), to their application.
 But in reality it’s sent as a series of binary
values, 1s and 0s.
 And there are layers in between.
11001001 11001001 1100100111001001
Physical LayerPhysical Layer
Application Layer Application Layer
11001001 11001001 1100100111001001
Physical LayerPhysical Layer
Intermediate
Layers
Intermediate
Layers
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
11001001 11001001 1100100111001001
Physical LayerPhysical Layer
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Application, e.g. Thunderbird, Chrome
Presentation, e.g. HTTPS, encryption
Starts and ends sessions
Defines Ports and Reliability
IP Addressing and best route
Switches and MAC Addressing
Cable and Network cards.
 The Application Layer
 This layer is at the same layer as the user
sending the e-mail (or using the e-mail
application), this layer focuses on
identifying communication partners,
determining resource availability, and
synchronizing communication.
 The Presentation Layer
 This layer provides independence from data
representation (e.g., encryption) by
translating between application and
network formats. The presentation layer
transforms data into the form that the
application accepts. This layer formats and
encrypts data to be sent across a network.
 The Session Layer
 This layer establishes, manages and
terminates the connections between the
applications. It establishes checkpointing,
adjournment, termination, and restart
procedures.
 The Transport Layer
 This layer controls the reliability of a given
link through flow control, segmentation,
and error control. Some protocols are state-
and connection-oriented. This means that
the transport layer can keep track of the
segments and retransmit those that fail.
 The Network Layer
 This layer helps the nodes in the network
that are connected to it to transfer
messages to other nodes by providing the
content of a message and the address of
the destination node and letting the
network find the way to deliver ("route") the
message to the destination node.
 The Data Link Layer
 This layer provides a reliable link between
two directly connected nodes, by detecting
and possibly correcting errors that may
occur in the lower layer.
 The Physical Layer
 This layer defines the electrical and physical
specifications of the data connection. It
defines the relationship between a device
and a physical transmission medium (e.g., a
copper or fiber optical cable).

Más contenido relacionado

Destacado

Destacado (20)

Simple Data Compression
Simple Data CompressionSimple Data Compression
Simple Data Compression
 
Operating Systems: Network Management
Operating Systems: Network ManagementOperating Systems: Network Management
Operating Systems: Network Management
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Operating Systems: Virtual Memory
Operating Systems: Virtual MemoryOperating Systems: Virtual Memory
Operating Systems: Virtual Memory
 
Operating Systems: Memory Management
Operating Systems: Memory ManagementOperating Systems: Memory Management
Operating Systems: Memory Management
 
Operating Systems: A History of MacOS
Operating Systems: A History of MacOSOperating Systems: A History of MacOS
Operating Systems: A History of MacOS
 
Operating Systems: File Management
Operating Systems: File ManagementOperating Systems: File Management
Operating Systems: File Management
 
Operating Systems: Device Management
Operating Systems: Device ManagementOperating Systems: Device Management
Operating Systems: Device Management
 
Operating Systems: History of Windows
Operating Systems: History of WindowsOperating Systems: History of Windows
Operating Systems: History of Windows
 
Operating Systems: Data Structures
Operating Systems: Data StructuresOperating Systems: Data Structures
Operating Systems: Data Structures
 
Operating Systems: Process Scheduling
Operating Systems: Process SchedulingOperating Systems: Process Scheduling
Operating Systems: Process Scheduling
 
Operating Systems: Processor Management
Operating Systems: Processor ManagementOperating Systems: Processor Management
Operating Systems: Processor Management
 
Operating Systems: Linux in Detail
Operating Systems: Linux in DetailOperating Systems: Linux in Detail
Operating Systems: Linux in Detail
 
Operating Systems: Versions of Linux
Operating Systems: Versions of LinuxOperating Systems: Versions of Linux
Operating Systems: Versions of Linux
 
Operating Systems: A History of Linux
Operating Systems: A History of LinuxOperating Systems: A History of Linux
Operating Systems: A History of Linux
 
Operating Systems: The Little-Man Computer
Operating Systems: The Little-Man ComputerOperating Systems: The Little-Man Computer
Operating Systems: The Little-Man Computer
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Software Testing 1/5
Software Testing 1/5Software Testing 1/5
Software Testing 1/5
 
Inventing Iron Man
Inventing Iron ManInventing Iron Man
Inventing Iron Man
 
Operating Systems: What happen in 2016?
Operating Systems: What happen in 2016?Operating Systems: What happen in 2016?
Operating Systems: What happen in 2016?
 

Similar a James Bond and the OSI Model

How to Trace an E-mail Part 1
How to Trace an E-mail Part 1How to Trace an E-mail Part 1
How to Trace an E-mail Part 1
Lebowitzcomics
 
Network security notes
Network security notesNetwork security notes
Network security notes
netlabacademy
 
DSEShield_User_Manual_Android
DSEShield_User_Manual_AndroidDSEShield_User_Manual_Android
DSEShield_User_Manual_Android
Dusan Krstic
 

Similar a James Bond and the OSI Model (11)

How to Trace an E-mail Part 1
How to Trace an E-mail Part 1How to Trace an E-mail Part 1
How to Trace an E-mail Part 1
 
Email
EmailEmail
Email
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
Jipdec 20131216-english
Jipdec 20131216-englishJipdec 20131216-english
Jipdec 20131216-english
 
Handwriting Paper Numbered Lined Paper - Numbered Lin
Handwriting Paper Numbered Lined Paper - Numbered LinHandwriting Paper Numbered Lined Paper - Numbered Lin
Handwriting Paper Numbered Lined Paper - Numbered Lin
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped future
 
Network security notes
Network security notesNetwork security notes
Network security notes
 
DSEShield_User_Manual_Android
DSEShield_User_Manual_AndroidDSEShield_User_Manual_Android
DSEShield_User_Manual_Android
 
Lecture 11 B Security
Lecture 11 B SecurityLecture 11 B Security
Lecture 11 B Security
 

Más de Damian T. Gordon

Más de Damian T. Gordon (20)

Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
REST and RESTful Services
REST and RESTful ServicesREST and RESTful Services
REST and RESTful Services
 
Serverless Computing
Serverless ComputingServerless Computing
Serverless Computing
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
Containers and Docker
Containers and DockerContainers and Docker
Containers and Docker
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Introduction to ChatGPT
Introduction to ChatGPTIntroduction to ChatGPT
Introduction to ChatGPT
 
How to Argue Logically
How to Argue LogicallyHow to Argue Logically
How to Argue Logically
 
Evaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONSEvaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONS
 
Evaluating Teaching: MERLOT
Evaluating Teaching: MERLOTEvaluating Teaching: MERLOT
Evaluating Teaching: MERLOT
 
Evaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson RubricEvaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson Rubric
 
Evaluating Teaching: LORI
Evaluating Teaching: LORIEvaluating Teaching: LORI
Evaluating Teaching: LORI
 
Designing Teaching: Pause Procedure
Designing Teaching: Pause ProcedureDesigning Teaching: Pause Procedure
Designing Teaching: Pause Procedure
 
Designing Teaching: ADDIE
Designing Teaching: ADDIEDesigning Teaching: ADDIE
Designing Teaching: ADDIE
 
Designing Teaching: ASSURE
Designing Teaching: ASSUREDesigning Teaching: ASSURE
Designing Teaching: ASSURE
 
Designing Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning TypesDesigning Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning Types
 
Designing Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of InstructionDesigning Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of Instruction
 
Designing Teaching: Elaboration Theory
Designing Teaching: Elaboration TheoryDesigning Teaching: Elaboration Theory
Designing Teaching: Elaboration Theory
 
Universally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some ConsiderationsUniversally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some Considerations
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

James Bond and the OSI Model

  • 2.  This presentation contains some mild *spoilers* for “Skyfall” and major *spoilers* for network transmission protocols. Proceed with caution.
  • 3. James Bond has had many faces And now…
  • 5. You have been summoned to Vauxhall House (Home of MI5) for a new mission.
  • 6.
  • 7. The building says “Universal Exports Ltd.” on the outside, that’s the cover business.
  • 8.
  • 9. Here’s a plan of the building:
  • 10.
  • 11. 7th Floor – M. 6th Floor – Q Branch 5th Floor – Bill Tanner 4th Floor – Ms. Moneypenny 3rd Floor – Loelia Ponsonby 1st Floor – Garage 2nd Floor – John Strangways
  • 12. You head straight up to the 7th floor, to M.’s office.
  • 13. You knock at the door, and M. says “Come in”.
  • 14.
  • 15. This is M, your boss. He can be grumpy.
  • 16.  M. says “Ah, Bond, this is a secret message that you must get through to the US Embassy across town” XXXXXXX XXXXXXX XXXXXXX XXXXXXX
  • 17.  M. says “Ah, Bond, this is a secret message that you must get through to the US Embassy across town”  You say “Yes, sir.” XXXXXXX XXXXXXX XXXXXXX XXXXXXX
  • 18.  M. says “Ah, Bond, this is a secret message that you must get through to the US Embassy across town”  You say “Yes, sir.”  M. says “Now pop downstairs to Q Branch”. XXXXXXX XXXXXXX XXXXXXX XXXXXXX
  • 19.  M. says “Ah, Bond, this is a secret message that you must get through to the US Embassy across town”  You say “Yes, sir.”  M. says “Now pop downstairs to Q Branch”.  You say “Yes, sir.” XXXXXXX XXXXXXX XXXXXXX XXXXXXX
  • 20.
  • 21. This is Q, your quartermaster. He provides you with gadgets.
  • 22.  Q says “Pay attention, 007. I’ve translated the message into an intermediary language, and also, encrypted and miniaturized the message.” Codecode Codecode Codecode Codecode Code Code Code
  • 23.  Q says “Pay attention, 007. I’ve translated the message into an intermediary language, and also, encrypted and miniaturized the message.”  You say “Thank you, Q, I’m familiar with standard message conversion protocol”. Codecode Codecode Codecode Codecode Code Code Code
  • 24.
  • 25. This is Bill Tanner, the Chief-of-staff at MI5. He’s a good mate and golfing buddy.
  • 26.  Bill Tanner says “James, I’ve done all the security checks on the message, and checked it to be sure it’s all there. I’ve also put in some checkpoints in the message so your counterpart at the US end can be sure he’s got the whole message”. Code[x] Code[x] Code[x] Code Code Code
  • 27.  Bill Tanner says “James, I’ve done all the security checks on the message, and checked it to be sure it’s all there. I’ve also put in some checkpoints in the message so your counterpart at the US end can be sure he’s got the whole message”.  You say “Cheers, Bill. Let’s have a round of golf this weekend at Sunningdale”. Code[x] Code[x] Code[x] Code Code Code
  • 28.
  • 30.  Miss Moneypenny: “James, why are you so late?” Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x]
  • 31.  Miss Moneypenny: “James, why are you so late?”  You: “I fell out of an airplane without a parachute”. Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x]
  • 32.  Miss Moneypenny: “James, why are you so late?”  You: “I fell out of an airplane without a parachute”.  Miss Moneypenny: “James, I’ve analysed the message to see if it could be combined with some other small messages that need to go to the US end. And it’s been combined with two others”. Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x]
  • 33.
  • 34. This is Loelia Ponsonby, your secretary. She is also secretary to 008 and 0011.
  • 35.  Loelia: “James, I’ve checked the address on the message to determine the addressee, and here’s my advice on the fastest route to the Embassy”.
  • 36.  Loelia: “James, I’ve checked the address on the message to determine the addressee, and here’s my advice on the fastest route to the Embassy”.  You: “Thank you, Loelia”.
  • 37.
  • 38. This is John Strangways, Chief Secret Service agent in the Caribbean.
  • 39.  John Strangways: “James, I’ve put your messages into a special MI5 courier pouch. It contains the messages, the sender, and destination ID. The pouch also warns the recipient if other pieces are still coming”.
  • 40.  John Strangways: “James, I’ve put your messages into a special MI5 courier pouch. It contains the messages, the sender, and destination ID. The pouch also warns the recipient if other pieces are still coming”.  You: “Thanks, John”.
  • 41.
  • 42. This is you car. It’s cool
  • 43.  Q has prepared your Aston Martin for the trip to the Embassy. You depart for the US Embassy with the secret packet in hand.
  • 44. 7th Floor: M.’s Office 6th Floor: Q Branch Headquarters 5th Floor: Chief-of- Staff, Bill Tanner 4th Floor: Ms. Moneypenny 3rd Floor: Loelia Ponsonby 2nd Floor: John Strangways 1st Floor: Garage
  • 45. 7th Floor: M.’s Office 6th Floor: Q Branch Headquarters 5th Floor: Chief-of- Staff, Bill Tanner 4th Floor: Ms. Moneypenny 3rd Floor: Loelia Ponsonby 2nd Floor: John Strangways 1st Floor: Garage Send the message Encryption and Miniaturisation Checkpoints and Checks Combining messages Finding the best route Packaging the message Conveying the message
  • 46. You, James Bond, will return in…
  • 47.
  • 48.  The Open Systems Interconnection (OSI) Model is a 7-layer model that allows us to picture what happens when we send a message from one computer to another.  Let’s imagine we are sending an e-mail from one machine to another.
  • 49. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer
  • 50. Application Layer Application Layer  When you send an e-mail, it looks like it goes from your application (e.g. Thunderbird), to their application.
  • 51. Application Layer Application Layer  When you send an e-mail, it looks like it goes from your application (e.g. Thunderbird), to their application.  But in reality it’s sent as a series of binary values, 1s and 0s.
  • 52. Application Layer Application Layer  When you send an e-mail, it looks like it goes from your application (e.g. Thunderbird), to their application.  But in reality it’s sent as a series of binary values, 1s and 0s. 11001001 11001001 1100100111001001 Physical LayerPhysical Layer
  • 53. Application Layer Application Layer  When you send an e-mail, it looks like it goes from your application (e.g. Thunderbird), to their application.  But in reality it’s sent as a series of binary values, 1s and 0s.  And there are layers in between. 11001001 11001001 1100100111001001 Physical LayerPhysical Layer
  • 54. Application Layer Application Layer 11001001 11001001 1100100111001001 Physical LayerPhysical Layer Intermediate Layers Intermediate Layers
  • 55. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer 11001001 11001001 1100100111001001 Physical LayerPhysical Layer
  • 56. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application, e.g. Thunderbird, Chrome Presentation, e.g. HTTPS, encryption Starts and ends sessions Defines Ports and Reliability IP Addressing and best route Switches and MAC Addressing Cable and Network cards.
  • 57.  The Application Layer  This layer is at the same layer as the user sending the e-mail (or using the e-mail application), this layer focuses on identifying communication partners, determining resource availability, and synchronizing communication.
  • 58.  The Presentation Layer  This layer provides independence from data representation (e.g., encryption) by translating between application and network formats. The presentation layer transforms data into the form that the application accepts. This layer formats and encrypts data to be sent across a network.
  • 59.  The Session Layer  This layer establishes, manages and terminates the connections between the applications. It establishes checkpointing, adjournment, termination, and restart procedures.
  • 60.  The Transport Layer  This layer controls the reliability of a given link through flow control, segmentation, and error control. Some protocols are state- and connection-oriented. This means that the transport layer can keep track of the segments and retransmit those that fail.
  • 61.  The Network Layer  This layer helps the nodes in the network that are connected to it to transfer messages to other nodes by providing the content of a message and the address of the destination node and letting the network find the way to deliver ("route") the message to the destination node.
  • 62.  The Data Link Layer  This layer provides a reliable link between two directly connected nodes, by detecting and possibly correcting errors that may occur in the lower layer.
  • 63.  The Physical Layer  This layer defines the electrical and physical specifications of the data connection. It defines the relationship between a device and a physical transmission medium (e.g., a copper or fiber optical cable).