5 hours 49 minutes
Hello, everybody. And welcome to the I T Security Episode number. Tree will be talking about the awesome model.
My name is Han Dragan, and I'll be your instructor for today's session.
Uh, learning objectives of the session is to understand the different layers of the acid model how the contract with each other in order to same data across the Internet.
So, uh, the awesome model has seven layers. Nowadays, you can also use the TCP model, which contains four layers. But, you know, in order to better explain how your package is built and send over the wire,
are, you know, to the Internet
um, it is better to use the asthma because it contains more details about how the package is created.
So we first stop start at the top of the stock with the obligation later. This is where you know, entered your information in human readable format.
Uh, sometime in protocols used over here are now H t t p
ftp. You know all that, all that you know, coming protocols
The year of familiar with telnet, for example, SS age.
Uh, Then we go down to the presentation layer,
which is later number six
in this layer. We You know, the name suggests we give some presentation. We form
form it into the package. You know, like, get their pictures move for months now asking a ll that kind of particles that you use, uh, ut f, for example to, you know, given order and a presentation to to your data.
And then we go down to the session there. This is where communication is, you know, kept,
um, sip, for example, Where when you're using bows, boys over I, p,
uh, sit is a particle that you use
human chains and the sessions, but you can help produce a different are perceived. For example,
this is another
protocol they use here. This is where you maintain decisions in the communications,
and then we go down another layer to layer number four, and he's a transport layer. This is in charge off how it sounds transport package. And we have seen main protocol fury, which is TCP and ODP.
The main difference between these two protocols is that TCP eyes connection oriented. This means that
you a packet she's lost. Did you have a way to know that you have a way to re sent a package to reveal the package.
There's a way to you. Can you don't maintain some kind of quality in the communications. So, um
but But you tippy doesn't have these capability. You can send you to send a package and you forget about the rest. Uh, whether it's, you know, actually received at the other end or not that doesn't you know,
you tippy doesn't care about that. So you know
which one's better. I can really say you can use TP when you have Ah, good bandwidth, for example. And you know, quality of service is the main issue for you. You can use that. But you know, when the banquet is the constrain or you don't have too much man with
or maybe you will have millions of connections
being perform against your server, you might want to save some bang with. So you end up using UDP. I mean, it's not that one particle is better than the other. They're just different.
Uh, then we go down to the neck or layer over here.
this is where you actually, you know, have the route your packet throughout her too. You know, the internet are you know, You know, you give directions to your package. This is mainly used
when you use that key protocol. Um,
you give a route to to your package.
Uh, this is the member layer, and then you go down to the Linklater. This,
in my opinion, is the most complicated layer of the ultra model. Why? Because it works as a translator. If you allow that work
because he has to translate. You know, i, p and all the all the data that we built before, remember, from the from the
application presentations section, transport and Networx layers, he has to come for all of that into bits and bytes and, you know, are into, you know, actually, data that, you know, the cable can understand. Maybe if you're using, um uh,
I don't know, beams of light to do. Send the data. You have to It has to translate that into, you know, something that they wire will understand. So for me is that must complicate a layer of the awesome model. Um, here, you can use a Mac, uh, mac protocol.
but, you know, that's the translator I'm talking about. You know,
for example, your rounder
works in Slayer. Burt, you're I don't know
You have Maybe
are your foot
works at this later because, you know, at the end, half since riches works worked with my father says, and writer war with I p addresses Just be just to be black and white before, like, I don't know, maybe 5 to 10 years ago. You know, with technology today, some routers can perform
my resolution at rest, you know,
And some switches can actually understanding you some routing tables, you know, using the i p potable. So
that's where we are right now. And then we have physical layer. This is where we go to after AnAnd WiFi optical, for example. HD mine off particles. You know that they use wire to to send data,
and that's basically it. I mean, that's how you can build a package from scratch
and send it over the instrument. And once the package arrives, Thio destination it goes backwards, goes from from the physical layer to the dawdling layers, who has to again translate from, um, Elektronik transmission
or the wife, for example, to from from
wife of to the netherworld layer he has translated
and young goes down, she goes to the stack that goes up to the stock to resolve the package.
Uh, so what's the most complicated layer off the *** model? What we discussed that, in my opinion, is the data link layer because he had to. He has to translate.
Ah, from what we understand are you know what we write, what, what we put in the machine to, what is going to going to be traveling in the wires and the routers. And you know all that, all those hopes
in the in the Internet and,
well there. Do we perform encryption and decryption? That's uninterested in question. Well, there's no one quick one answer for this cause. Every type of encryption works a different layer. For example,
daily encryption you can't encrypt. You know Heather's,
for example, in the battling layer, you can also print in in the Napa bore layer, meaning that your package will be encrypted
on the protocol encryption. For example, in the transport layer, you can use SSL, for example. You can also improvement in the presentation in session layers, even in the application layer encryption works. It depends on the protocol you're using, for example, curb Rose. I know
you can creep in every layer. I'm guessing the layer. You cannot apply encryption. Although there's, um, plans is that claim that they do? You can encrypt at the physical layer. But, you know, that's something that we can put it to this cash in in the fort
sessions that will have We will actually talk about encryption in a whole whole session
to dedicate it to encryption. So
what Verticals are used in the transfer layer? Remember that you're the P and TCP. Go on. What's the different between you, Tippy? Anticipate he will visit his connection rented, meaning that you can actually know if a package which was believer a man
and you didn't He doesn't care about that. So
you know, that's the May Prince.
Well, in today, in today's brief lecture with this cost different layers off the *** model,
what protocols are used on each layer
and how those layers interact with each other in our to send data, you know, over the Internet are over the wires.
Some materials I can recommend you to use, uh, here's camp young member. Plus it's always Cisco ccn A. You know, a couple of other books.
Looking forward on this, you know,
we will discuss in the next video what's the difference? And, you know, similarities between cybersex and I had to security.
So I hope you enjoyed the video and talk to you soon.