SlideShare una empresa de Scribd logo
1 de 63
Damian Gordon
 This presentation contains
some mild *spoilers* for
“Skyfall” and major *spoilers*
for network transmission
protocols. Proceed with
caution.
James Bond has had many faces
And now…
YOU are James Bond
You have been summoned
to Vauxhall House (Home of
MI5) for a new mission.
The building says “Universal
Exports Ltd.” on the outside,
that’s the cover business.
Here’s a plan of the building:
7th Floor – M.
6th Floor – Q Branch
5th Floor – Bill Tanner
4th Floor – Ms. Moneypenny
3rd Floor – Loelia Ponsonby
1st Floor – Garage
2nd Floor – John Strangways
You head straight up to the
7th floor, to M.’s office.
You knock at the door, and
M. says “Come in”.
This is M,
your boss.
He can be
grumpy.
 M. says “Ah, Bond, this is a secret
message that you must get through to
the US Embassy across town”
XXXXXXX
XXXXXXX
XXXXXXX
XXXXXXX
 M. says “Ah, Bond, this is a secret
message that you must get through to
the US Embassy across town”
 You say “Yes, sir.”
XXXXXXX
XXXXXXX
XXXXXXX
XXXXXXX
 M. says “Ah, Bond, this is a secret
message that you must get through to
the US Embassy across town”
 You say “Yes, sir.”
 M. says “Now pop downstairs to Q
Branch”.
XXXXXXX
XXXXXXX
XXXXXXX
XXXXXXX
 M. says “Ah, Bond, this is a secret
message that you must get through to
the US Embassy across town”
 You say “Yes, sir.”
 M. says “Now pop downstairs to Q
Branch”.
 You say “Yes, sir.”
XXXXXXX
XXXXXXX
XXXXXXX
XXXXXXX
This is Q, your
quartermaster.
He provides
you with
gadgets.
 Q says “Pay attention, 007. I’ve
translated the message into an
intermediary language, and also,
encrypted and miniaturized the
message.”
Codecode
Codecode
Codecode
Codecode
Code
Code
Code
 Q says “Pay attention, 007. I’ve
translated the message into an
intermediary language, and also,
encrypted and miniaturized the
message.”
 You say “Thank you, Q, I’m
familiar with standard message
conversion protocol”.
Codecode
Codecode
Codecode
Codecode
Code
Code
Code
This is Bill
Tanner, the
Chief-of-staff
at MI5.
He’s a good
mate and
golfing buddy.
 Bill Tanner says “James, I’ve done all
the security checks on the message,
and checked it to be sure it’s all
there. I’ve also put in some
checkpoints in the message so your
counterpart at the US end can be
sure he’s got the whole message”. Code[x]
Code[x]
Code[x]
Code
Code
Code
 Bill Tanner says “James, I’ve done all
the security checks on the message,
and checked it to be sure it’s all
there. I’ve also put in some
checkpoints in the message so your
counterpart at the US end can be
sure he’s got the whole message”.
 You say “Cheers, Bill. Let’s have a
round of golf this weekend at
Sunningdale”.
Code[x]
Code[x]
Code[x]
Code
Code
Code
This is Eve
Moneypenny,
M.’s secretary.
 Miss Moneypenny: “James, why are
you so late?”
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
 Miss Moneypenny: “James, why are
you so late?”
 You: “I fell out of an airplane
without a parachute”.
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
 Miss Moneypenny: “James, why are
you so late?”
 You: “I fell out of an airplane
without a parachute”.
 Miss Moneypenny: “James, I’ve
analysed the message to see if it
could be combined with some
other small messages that need to
go to the US end. And it’s been
combined with two others”.
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
Code[x]
This is Loelia
Ponsonby,
your secretary.
She is also
secretary to
008 and 0011.
 Loelia: “James, I’ve checked the
address on the message to
determine the addressee, and
here’s my advice on the fastest
route to the Embassy”.
 Loelia: “James, I’ve checked the
address on the message to
determine the addressee, and
here’s my advice on the fastest
route to the Embassy”.
 You: “Thank you, Loelia”.
This is John
Strangways,
Chief Secret
Service agent
in the
Caribbean.
 John Strangways: “James, I’ve put
your messages into a special MI5
courier pouch. It contains the
messages, the sender, and
destination ID. The pouch also
warns the recipient if other pieces
are still coming”.
 John Strangways: “James, I’ve put
your messages into a special MI5
courier pouch. It contains the
messages, the sender, and
destination ID. The pouch also
warns the recipient if other pieces
are still coming”.
 You: “Thanks, John”.
This is you car.
It’s cool
 Q has prepared your Aston Martin for the
trip to the Embassy. You depart for the US
Embassy with the secret packet in hand.
7th Floor: M.’s Office
6th Floor: Q Branch
Headquarters
5th Floor: Chief-of-
Staff, Bill Tanner
4th Floor: Ms.
Moneypenny
3rd Floor: Loelia
Ponsonby
2nd Floor: John
Strangways
1st Floor: Garage
7th Floor: M.’s Office
6th Floor: Q Branch
Headquarters
5th Floor: Chief-of-
Staff, Bill Tanner
4th Floor: Ms.
Moneypenny
3rd Floor: Loelia
Ponsonby
2nd Floor: John
Strangways
1st Floor: Garage
Send the message
Encryption and Miniaturisation
Checkpoints and Checks
Combining messages
Finding the best route
Packaging the message
Conveying the message
You, James Bond,
will return in…
 The Open Systems Interconnection (OSI)
Model is a 7-layer model that allows us to
picture what happens when we send a
message from one computer to another.
 Let’s imagine we are sending an e-mail
from one machine to another.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Application Layer Application Layer
 When you send an e-mail, it looks like it
goes from your application (e.g.
Thunderbird), to their application.
Application Layer Application Layer
 When you send an e-mail, it looks like it
goes from your application (e.g.
Thunderbird), to their application.
 But in reality it’s sent as a series of binary
values, 1s and 0s.
Application Layer Application Layer
 When you send an e-mail, it looks like it
goes from your application (e.g.
Thunderbird), to their application.
 But in reality it’s sent as a series of binary
values, 1s and 0s.
11001001 11001001 1100100111001001
Physical LayerPhysical Layer
Application Layer Application Layer
 When you send an e-mail, it looks like it
goes from your application (e.g.
Thunderbird), to their application.
 But in reality it’s sent as a series of binary
values, 1s and 0s.
 And there are layers in between.
11001001 11001001 1100100111001001
Physical LayerPhysical Layer
Application Layer Application Layer
11001001 11001001 1100100111001001
Physical LayerPhysical Layer
Intermediate
Layers
Intermediate
Layers
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
11001001 11001001 1100100111001001
Physical LayerPhysical Layer
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Application, e.g. Thunderbird, Chrome
Presentation, e.g. HTTPS, encryption
Starts and ends sessions
Defines Ports and Reliability
IP Addressing and best route
Switches and MAC Addressing
Cable and Network cards.
 The Application Layer
 This layer is at the same layer as the user
sending the e-mail (or using the e-mail
application), this layer focuses on
identifying communication partners,
determining resource availability, and
synchronizing communication.
 The Presentation Layer
 This layer provides independence from data
representation (e.g., encryption) by
translating between application and
network formats. The presentation layer
transforms data into the form that the
application accepts. This layer formats and
encrypts data to be sent across a network.
 The Session Layer
 This layer establishes, manages and
terminates the connections between the
applications. It establishes checkpointing,
adjournment, termination, and restart
procedures.
 The Transport Layer
 This layer controls the reliability of a given
link through flow control, segmentation,
and error control. Some protocols are state-
and connection-oriented. This means that
the transport layer can keep track of the
segments and retransmit those that fail.
 The Network Layer
 This layer helps the nodes in the network
that are connected to it to transfer
messages to other nodes by providing the
content of a message and the address of
the destination node and letting the
network find the way to deliver ("route") the
message to the destination node.
 The Data Link Layer
 This layer provides a reliable link between
two directly connected nodes, by detecting
and possibly correcting errors that may
occur in the lower layer.
 The Physical Layer
 This layer defines the electrical and physical
specifications of the data connection. It
defines the relationship between a device
and a physical transmission medium (e.g., a
copper or fiber optical cable).

Más contenido relacionado

La actualidad más candente

Azure Networking: Innovative Features and Multi-VNet Topologies
Azure Networking: Innovative Features and Multi-VNet TopologiesAzure Networking: Innovative Features and Multi-VNet Topologies
Azure Networking: Innovative Features and Multi-VNet TopologiesMarius Zaharia
 
Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system modelsAbDul ThaYyal
 
Flipkart's Hybrid Cloud Infrastructure Strategy for Optimal Cost Efficiency a...
Flipkart's Hybrid Cloud Infrastructure Strategy for Optimal Cost Efficiency a...Flipkart's Hybrid Cloud Infrastructure Strategy for Optimal Cost Efficiency a...
Flipkart's Hybrid Cloud Infrastructure Strategy for Optimal Cost Efficiency a...discoversudhir
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computingDivyesh Shah
 
Sys ml helperprofile-rhapsody813-obtainandinstall-v1
Sys ml helperprofile-rhapsody813-obtainandinstall-v1Sys ml helperprofile-rhapsody813-obtainandinstall-v1
Sys ml helperprofile-rhapsody813-obtainandinstall-v1Fraser Chadburn
 
Secure your applications with Azure AD and Key Vault
Secure your applications with Azure AD and Key VaultSecure your applications with Azure AD and Key Vault
Secure your applications with Azure AD and Key VaultDavide Benvegnù
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureAptera Inc
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Rajendra Dangwal
 
Azure Introduction
Azure IntroductionAzure Introduction
Azure Introductionbrunoterkaly
 
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...Simplilearn
 
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...Amazon Web Services
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with FogAchu Anna
 

La actualidad más candente (20)

Azure Networking: Innovative Features and Multi-VNet Topologies
Azure Networking: Innovative Features and Multi-VNet TopologiesAzure Networking: Innovative Features and Multi-VNet Topologies
Azure Networking: Innovative Features and Multi-VNet Topologies
 
Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system models
 
Microsoft Azure
Microsoft AzureMicrosoft Azure
Microsoft Azure
 
Flipkart's Hybrid Cloud Infrastructure Strategy for Optimal Cost Efficiency a...
Flipkart's Hybrid Cloud Infrastructure Strategy for Optimal Cost Efficiency a...Flipkart's Hybrid Cloud Infrastructure Strategy for Optimal Cost Efficiency a...
Flipkart's Hybrid Cloud Infrastructure Strategy for Optimal Cost Efficiency a...
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
Sys ml helperprofile-rhapsody813-obtainandinstall-v1
Sys ml helperprofile-rhapsody813-obtainandinstall-v1Sys ml helperprofile-rhapsody813-obtainandinstall-v1
Sys ml helperprofile-rhapsody813-obtainandinstall-v1
 
Secure your applications with Azure AD and Key Vault
Secure your applications with Azure AD and Key VaultSecure your applications with Azure AD and Key Vault
Secure your applications with Azure AD and Key Vault
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft Azure
 
Cloud slide
Cloud slideCloud slide
Cloud slide
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
 
Azure Introduction
Azure IntroductionAzure Introduction
Azure Introduction
 
OCI Overview
OCI OverviewOCI Overview
OCI Overview
 
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
 
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Azure migration
Azure migrationAzure migration
Azure migration
 

Destacado

Operating Systems: Network Management
Operating Systems: Network ManagementOperating Systems: Network Management
Operating Systems: Network ManagementDamian T. Gordon
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Operating Systems: Virtual Memory
Operating Systems: Virtual MemoryOperating Systems: Virtual Memory
Operating Systems: Virtual MemoryDamian T. Gordon
 
Operating Systems: Memory Management
Operating Systems: Memory ManagementOperating Systems: Memory Management
Operating Systems: Memory ManagementDamian T. Gordon
 
Operating Systems: A History of MacOS
Operating Systems: A History of MacOSOperating Systems: A History of MacOS
Operating Systems: A History of MacOSDamian T. Gordon
 
Operating Systems: File Management
Operating Systems: File ManagementOperating Systems: File Management
Operating Systems: File ManagementDamian T. Gordon
 
Operating Systems: Device Management
Operating Systems: Device ManagementOperating Systems: Device Management
Operating Systems: Device ManagementDamian T. Gordon
 
Operating Systems: History of Windows
Operating Systems: History of WindowsOperating Systems: History of Windows
Operating Systems: History of WindowsDamian T. Gordon
 
Operating Systems: Data Structures
Operating Systems: Data StructuresOperating Systems: Data Structures
Operating Systems: Data StructuresDamian T. Gordon
 
Operating Systems: Process Scheduling
Operating Systems: Process SchedulingOperating Systems: Process Scheduling
Operating Systems: Process SchedulingDamian T. Gordon
 
Operating Systems: Processor Management
Operating Systems: Processor ManagementOperating Systems: Processor Management
Operating Systems: Processor ManagementDamian T. Gordon
 
Operating Systems: Linux in Detail
Operating Systems: Linux in DetailOperating Systems: Linux in Detail
Operating Systems: Linux in DetailDamian T. Gordon
 
Operating Systems: Versions of Linux
Operating Systems: Versions of LinuxOperating Systems: Versions of Linux
Operating Systems: Versions of LinuxDamian T. Gordon
 
Operating Systems: A History of Linux
Operating Systems: A History of LinuxOperating Systems: A History of Linux
Operating Systems: A History of LinuxDamian T. Gordon
 
Operating Systems: The Little-Man Computer
Operating Systems: The Little-Man ComputerOperating Systems: The Little-Man Computer
Operating Systems: The Little-Man ComputerDamian T. Gordon
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Operating Systems: What happen in 2016?
Operating Systems: What happen in 2016?Operating Systems: What happen in 2016?
Operating Systems: What happen in 2016?Damian T. Gordon
 

Destacado (20)

Simple Data Compression
Simple Data CompressionSimple Data Compression
Simple Data Compression
 
Operating Systems: Network Management
Operating Systems: Network ManagementOperating Systems: Network Management
Operating Systems: Network Management
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Operating Systems: Virtual Memory
Operating Systems: Virtual MemoryOperating Systems: Virtual Memory
Operating Systems: Virtual Memory
 
Operating Systems: Memory Management
Operating Systems: Memory ManagementOperating Systems: Memory Management
Operating Systems: Memory Management
 
Operating Systems: A History of MacOS
Operating Systems: A History of MacOSOperating Systems: A History of MacOS
Operating Systems: A History of MacOS
 
Operating Systems: File Management
Operating Systems: File ManagementOperating Systems: File Management
Operating Systems: File Management
 
Operating Systems: Device Management
Operating Systems: Device ManagementOperating Systems: Device Management
Operating Systems: Device Management
 
Operating Systems: History of Windows
Operating Systems: History of WindowsOperating Systems: History of Windows
Operating Systems: History of Windows
 
Operating Systems: Data Structures
Operating Systems: Data StructuresOperating Systems: Data Structures
Operating Systems: Data Structures
 
Operating Systems: Process Scheduling
Operating Systems: Process SchedulingOperating Systems: Process Scheduling
Operating Systems: Process Scheduling
 
Operating Systems: Processor Management
Operating Systems: Processor ManagementOperating Systems: Processor Management
Operating Systems: Processor Management
 
Operating Systems: Linux in Detail
Operating Systems: Linux in DetailOperating Systems: Linux in Detail
Operating Systems: Linux in Detail
 
Operating Systems: Versions of Linux
Operating Systems: Versions of LinuxOperating Systems: Versions of Linux
Operating Systems: Versions of Linux
 
Operating Systems: A History of Linux
Operating Systems: A History of LinuxOperating Systems: A History of Linux
Operating Systems: A History of Linux
 
Operating Systems: The Little-Man Computer
Operating Systems: The Little-Man ComputerOperating Systems: The Little-Man Computer
Operating Systems: The Little-Man Computer
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Software Testing 1/5
Software Testing 1/5Software Testing 1/5
Software Testing 1/5
 
Inventing Iron Man
Inventing Iron ManInventing Iron Man
Inventing Iron Man
 
Operating Systems: What happen in 2016?
Operating Systems: What happen in 2016?Operating Systems: What happen in 2016?
Operating Systems: What happen in 2016?
 

Similar a James Bond and the OSI Model

How to Trace an E-mail Part 1
How to Trace an E-mail Part 1How to Trace an E-mail Part 1
How to Trace an E-mail Part 1Lebowitzcomics
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
Jipdec 20131216-english
Jipdec 20131216-englishJipdec 20131216-english
Jipdec 20131216-englishKazunori Ando
 
Handwriting Paper Numbered Lined Paper - Numbered Lin
Handwriting Paper Numbered Lined Paper - Numbered LinHandwriting Paper Numbered Lined Paper - Numbered Lin
Handwriting Paper Numbered Lined Paper - Numbered LinJacqueline Donovan
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.comEyal Doron
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped futureMichael Renner
 
Network security notes
Network security notesNetwork security notes
Network security notesnetlabacademy
 
DSEShield_User_Manual_Android
DSEShield_User_Manual_AndroidDSEShield_User_Manual_Android
DSEShield_User_Manual_AndroidDusan Krstic
 

Similar a James Bond and the OSI Model (11)

How to Trace an E-mail Part 1
How to Trace an E-mail Part 1How to Trace an E-mail Part 1
How to Trace an E-mail Part 1
 
Email
EmailEmail
Email
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
Jipdec 20131216-english
Jipdec 20131216-englishJipdec 20131216-english
Jipdec 20131216-english
 
Handwriting Paper Numbered Lined Paper - Numbered Lin
Handwriting Paper Numbered Lined Paper - Numbered LinHandwriting Paper Numbered Lined Paper - Numbered Lin
Handwriting Paper Numbered Lined Paper - Numbered Lin
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped future
 
Network security notes
Network security notesNetwork security notes
Network security notes
 
DSEShield_User_Manual_Android
DSEShield_User_Manual_AndroidDSEShield_User_Manual_Android
DSEShield_User_Manual_Android
 
Lecture 11 B Security
Lecture 11 B SecurityLecture 11 B Security
Lecture 11 B Security
 

Más de Damian T. Gordon

Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.Damian T. Gordon
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to MicroservicesDamian T. Gordon
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingDamian T. Gordon
 
Evaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONSEvaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONSDamian T. Gordon
 
Evaluating Teaching: MERLOT
Evaluating Teaching: MERLOTEvaluating Teaching: MERLOT
Evaluating Teaching: MERLOTDamian T. Gordon
 
Evaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson RubricEvaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson RubricDamian T. Gordon
 
Designing Teaching: Pause Procedure
Designing Teaching: Pause ProcedureDesigning Teaching: Pause Procedure
Designing Teaching: Pause ProcedureDamian T. Gordon
 
Designing Teaching: ASSURE
Designing Teaching: ASSUREDesigning Teaching: ASSURE
Designing Teaching: ASSUREDamian T. Gordon
 
Designing Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning TypesDesigning Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning TypesDamian T. Gordon
 
Designing Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of InstructionDesigning Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of InstructionDamian T. Gordon
 
Designing Teaching: Elaboration Theory
Designing Teaching: Elaboration TheoryDesigning Teaching: Elaboration Theory
Designing Teaching: Elaboration TheoryDamian T. Gordon
 
Universally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some ConsiderationsUniversally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some ConsiderationsDamian T. Gordon
 

Más de Damian T. Gordon (20)

Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
REST and RESTful Services
REST and RESTful ServicesREST and RESTful Services
REST and RESTful Services
 
Serverless Computing
Serverless ComputingServerless Computing
Serverless Computing
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
Containers and Docker
Containers and DockerContainers and Docker
Containers and Docker
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Introduction to ChatGPT
Introduction to ChatGPTIntroduction to ChatGPT
Introduction to ChatGPT
 
How to Argue Logically
How to Argue LogicallyHow to Argue Logically
How to Argue Logically
 
Evaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONSEvaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONS
 
Evaluating Teaching: MERLOT
Evaluating Teaching: MERLOTEvaluating Teaching: MERLOT
Evaluating Teaching: MERLOT
 
Evaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson RubricEvaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson Rubric
 
Evaluating Teaching: LORI
Evaluating Teaching: LORIEvaluating Teaching: LORI
Evaluating Teaching: LORI
 
Designing Teaching: Pause Procedure
Designing Teaching: Pause ProcedureDesigning Teaching: Pause Procedure
Designing Teaching: Pause Procedure
 
Designing Teaching: ADDIE
Designing Teaching: ADDIEDesigning Teaching: ADDIE
Designing Teaching: ADDIE
 
Designing Teaching: ASSURE
Designing Teaching: ASSUREDesigning Teaching: ASSURE
Designing Teaching: ASSURE
 
Designing Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning TypesDesigning Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning Types
 
Designing Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of InstructionDesigning Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of Instruction
 
Designing Teaching: Elaboration Theory
Designing Teaching: Elaboration TheoryDesigning Teaching: Elaboration Theory
Designing Teaching: Elaboration Theory
 
Universally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some ConsiderationsUniversally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some Considerations
 

Último

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Último (20)

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

James Bond and the OSI Model

  • 2.  This presentation contains some mild *spoilers* for “Skyfall” and major *spoilers* for network transmission protocols. Proceed with caution.
  • 3. James Bond has had many faces And now…
  • 5. You have been summoned to Vauxhall House (Home of MI5) for a new mission.
  • 6.
  • 7. The building says “Universal Exports Ltd.” on the outside, that’s the cover business.
  • 8.
  • 9. Here’s a plan of the building:
  • 10.
  • 11. 7th Floor – M. 6th Floor – Q Branch 5th Floor – Bill Tanner 4th Floor – Ms. Moneypenny 3rd Floor – Loelia Ponsonby 1st Floor – Garage 2nd Floor – John Strangways
  • 12. You head straight up to the 7th floor, to M.’s office.
  • 13. You knock at the door, and M. says “Come in”.
  • 14.
  • 15. This is M, your boss. He can be grumpy.
  • 16.  M. says “Ah, Bond, this is a secret message that you must get through to the US Embassy across town” XXXXXXX XXXXXXX XXXXXXX XXXXXXX
  • 17.  M. says “Ah, Bond, this is a secret message that you must get through to the US Embassy across town”  You say “Yes, sir.” XXXXXXX XXXXXXX XXXXXXX XXXXXXX
  • 18.  M. says “Ah, Bond, this is a secret message that you must get through to the US Embassy across town”  You say “Yes, sir.”  M. says “Now pop downstairs to Q Branch”. XXXXXXX XXXXXXX XXXXXXX XXXXXXX
  • 19.  M. says “Ah, Bond, this is a secret message that you must get through to the US Embassy across town”  You say “Yes, sir.”  M. says “Now pop downstairs to Q Branch”.  You say “Yes, sir.” XXXXXXX XXXXXXX XXXXXXX XXXXXXX
  • 20.
  • 21. This is Q, your quartermaster. He provides you with gadgets.
  • 22.  Q says “Pay attention, 007. I’ve translated the message into an intermediary language, and also, encrypted and miniaturized the message.” Codecode Codecode Codecode Codecode Code Code Code
  • 23.  Q says “Pay attention, 007. I’ve translated the message into an intermediary language, and also, encrypted and miniaturized the message.”  You say “Thank you, Q, I’m familiar with standard message conversion protocol”. Codecode Codecode Codecode Codecode Code Code Code
  • 24.
  • 25. This is Bill Tanner, the Chief-of-staff at MI5. He’s a good mate and golfing buddy.
  • 26.  Bill Tanner says “James, I’ve done all the security checks on the message, and checked it to be sure it’s all there. I’ve also put in some checkpoints in the message so your counterpart at the US end can be sure he’s got the whole message”. Code[x] Code[x] Code[x] Code Code Code
  • 27.  Bill Tanner says “James, I’ve done all the security checks on the message, and checked it to be sure it’s all there. I’ve also put in some checkpoints in the message so your counterpart at the US end can be sure he’s got the whole message”.  You say “Cheers, Bill. Let’s have a round of golf this weekend at Sunningdale”. Code[x] Code[x] Code[x] Code Code Code
  • 28.
  • 30.  Miss Moneypenny: “James, why are you so late?” Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x]
  • 31.  Miss Moneypenny: “James, why are you so late?”  You: “I fell out of an airplane without a parachute”. Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x]
  • 32.  Miss Moneypenny: “James, why are you so late?”  You: “I fell out of an airplane without a parachute”.  Miss Moneypenny: “James, I’ve analysed the message to see if it could be combined with some other small messages that need to go to the US end. And it’s been combined with two others”. Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x] Code[x]
  • 33.
  • 34. This is Loelia Ponsonby, your secretary. She is also secretary to 008 and 0011.
  • 35.  Loelia: “James, I’ve checked the address on the message to determine the addressee, and here’s my advice on the fastest route to the Embassy”.
  • 36.  Loelia: “James, I’ve checked the address on the message to determine the addressee, and here’s my advice on the fastest route to the Embassy”.  You: “Thank you, Loelia”.
  • 37.
  • 38. This is John Strangways, Chief Secret Service agent in the Caribbean.
  • 39.  John Strangways: “James, I’ve put your messages into a special MI5 courier pouch. It contains the messages, the sender, and destination ID. The pouch also warns the recipient if other pieces are still coming”.
  • 40.  John Strangways: “James, I’ve put your messages into a special MI5 courier pouch. It contains the messages, the sender, and destination ID. The pouch also warns the recipient if other pieces are still coming”.  You: “Thanks, John”.
  • 41.
  • 42. This is you car. It’s cool
  • 43.  Q has prepared your Aston Martin for the trip to the Embassy. You depart for the US Embassy with the secret packet in hand.
  • 44. 7th Floor: M.’s Office 6th Floor: Q Branch Headquarters 5th Floor: Chief-of- Staff, Bill Tanner 4th Floor: Ms. Moneypenny 3rd Floor: Loelia Ponsonby 2nd Floor: John Strangways 1st Floor: Garage
  • 45. 7th Floor: M.’s Office 6th Floor: Q Branch Headquarters 5th Floor: Chief-of- Staff, Bill Tanner 4th Floor: Ms. Moneypenny 3rd Floor: Loelia Ponsonby 2nd Floor: John Strangways 1st Floor: Garage Send the message Encryption and Miniaturisation Checkpoints and Checks Combining messages Finding the best route Packaging the message Conveying the message
  • 46. You, James Bond, will return in…
  • 47.
  • 48.  The Open Systems Interconnection (OSI) Model is a 7-layer model that allows us to picture what happens when we send a message from one computer to another.  Let’s imagine we are sending an e-mail from one machine to another.
  • 49. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer
  • 50. Application Layer Application Layer  When you send an e-mail, it looks like it goes from your application (e.g. Thunderbird), to their application.
  • 51. Application Layer Application Layer  When you send an e-mail, it looks like it goes from your application (e.g. Thunderbird), to their application.  But in reality it’s sent as a series of binary values, 1s and 0s.
  • 52. Application Layer Application Layer  When you send an e-mail, it looks like it goes from your application (e.g. Thunderbird), to their application.  But in reality it’s sent as a series of binary values, 1s and 0s. 11001001 11001001 1100100111001001 Physical LayerPhysical Layer
  • 53. Application Layer Application Layer  When you send an e-mail, it looks like it goes from your application (e.g. Thunderbird), to their application.  But in reality it’s sent as a series of binary values, 1s and 0s.  And there are layers in between. 11001001 11001001 1100100111001001 Physical LayerPhysical Layer
  • 54. Application Layer Application Layer 11001001 11001001 1100100111001001 Physical LayerPhysical Layer Intermediate Layers Intermediate Layers
  • 55. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer 11001001 11001001 1100100111001001 Physical LayerPhysical Layer
  • 56. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application, e.g. Thunderbird, Chrome Presentation, e.g. HTTPS, encryption Starts and ends sessions Defines Ports and Reliability IP Addressing and best route Switches and MAC Addressing Cable and Network cards.
  • 57.  The Application Layer  This layer is at the same layer as the user sending the e-mail (or using the e-mail application), this layer focuses on identifying communication partners, determining resource availability, and synchronizing communication.
  • 58.  The Presentation Layer  This layer provides independence from data representation (e.g., encryption) by translating between application and network formats. The presentation layer transforms data into the form that the application accepts. This layer formats and encrypts data to be sent across a network.
  • 59.  The Session Layer  This layer establishes, manages and terminates the connections between the applications. It establishes checkpointing, adjournment, termination, and restart procedures.
  • 60.  The Transport Layer  This layer controls the reliability of a given link through flow control, segmentation, and error control. Some protocols are state- and connection-oriented. This means that the transport layer can keep track of the segments and retransmit those that fail.
  • 61.  The Network Layer  This layer helps the nodes in the network that are connected to it to transfer messages to other nodes by providing the content of a message and the address of the destination node and letting the network find the way to deliver ("route") the message to the destination node.
  • 62.  The Data Link Layer  This layer provides a reliable link between two directly connected nodes, by detecting and possibly correcting errors that may occur in the lower layer.
  • 63.  The Physical Layer  This layer defines the electrical and physical specifications of the data connection. It defines the relationship between a device and a physical transmission medium (e.g., a copper or fiber optical cable).