Time
5 hours 49 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:00
Hello, everybody. And welcome to the I T Security Episode number. Tree will be talking about the awesome model.
00:08
My name is Han Dragan, and I'll be your instructor for today's session.
00:14
Uh, learning objectives of the session is to understand the different layers of the acid model how the contract with each other in order to same data across the Internet.
00:26
So, uh, the awesome model has seven layers. Nowadays, you can also use the TCP model, which contains four layers. But, you know, in order to better explain how your package is built and send over the wire,
00:44
are, you know, to the Internet
00:47
um, it is better to use the asthma because it contains more details about how the package is created.
00:53
So we first stop start at the top of the stock with the obligation later. This is where you know, entered your information in human readable format.
01:03
Uh, sometime in protocols used over here are now H t t p
01:11
ftp. You know all that, all that you know, coming protocols
01:15
The year of familiar with telnet, for example, SS age.
01:21
Uh, Then we go down to the presentation layer,
01:26
which is later number six
01:29
in this layer. We You know, the name suggests we give some presentation. We form
01:37
form it into the package. You know, like, get their pictures move for months now asking a ll that kind of particles that you use, uh, ut f, for example to, you know, given order and a presentation to to your data.
01:56
And then we go down to the session there. This is where communication is, you know, kept,
02:01
um, sip, for example, Where when you're using bows, boys over I, p,
02:08
uh, sit is a particle that you use
02:14
human chains and the sessions, but you can help produce a different are perceived. For example,
02:21
this is another
02:23
protocol they use here. This is where you maintain decisions in the communications,
02:28
and then we go down another layer to layer number four, and he's a transport layer. This is in charge off how it sounds transport package. And we have seen main protocol fury, which is TCP and ODP.
02:45
The main difference between these two protocols is that TCP eyes connection oriented. This means that
02:54
you a packet she's lost. Did you have a way to know that you have a way to re sent a package to reveal the package.
03:01
There's a way to you. Can you don't maintain some kind of quality in the communications. So, um
03:09
but But you tippy doesn't have these capability. You can send you to send a package and you forget about the rest. Uh, whether it's, you know, actually received at the other end or not that doesn't you know,
03:23
you tippy doesn't care about that. So you know
03:28
which one's better. I can really say you can use TP when you have Ah, good bandwidth, for example. And you know, quality of service is the main issue for you. You can use that. But you know, when the banquet is the constrain or you don't have too much man with
03:46
or maybe you will have millions of connections
03:49
being perform against your server, you might want to save some bang with. So you end up using UDP. I mean, it's not that one particle is better than the other. They're just different.
04:01
Uh, then we go down to the neck or layer over here.
04:06
Um,
04:08
this is where you actually, you know, have the route your packet throughout her too. You know, the internet are you know, You know, you give directions to your package. This is mainly used
04:20
when you use that key protocol. Um,
04:25
you give a route to to your package.
04:29
Uh, this is the member layer, and then you go down to the Linklater. This,
04:33
in my opinion, is the most complicated layer of the ultra model. Why? Because it works as a translator. If you allow that work
04:45
because he has to translate. You know, i, p and all the all the data that we built before, remember, from the from the
04:54
application presentations section, transport and Networx layers, he has to come for all of that into bits and bytes and, you know, are into, you know, actually, data that, you know, the cable can understand. Maybe if you're using, um uh,
05:11
I don't know, beams of light to do. Send the data. You have to It has to translate that into, you know, something that they wire will understand. So for me is that must complicate a layer of the awesome model. Um, here, you can use a Mac, uh, mac protocol.
05:30
Um,
05:32
but, you know, that's the translator I'm talking about. You know,
05:38
for example, your rounder
05:42
works in Slayer. Burt, you're I don't know
05:46
You have Maybe
05:48
are your foot
05:53
works at this later because, you know, at the end, half since riches works worked with my father says, and writer war with I p addresses Just be just to be black and white before, like, I don't know, maybe 5 to 10 years ago. You know, with technology today, some routers can perform
06:13
my resolution at rest, you know,
06:16
And some switches can actually understanding you some routing tables, you know, using the i p potable. So
06:25
no,
06:26
that's where we are right now. And then we have physical layer. This is where we go to after AnAnd WiFi optical, for example. HD mine off particles. You know that they use wire to to send data,
06:44
and that's basically it. I mean, that's how you can build a package from scratch
06:49
and send it over the instrument. And once the package arrives, Thio destination it goes backwards, goes from from the physical layer to the dawdling layers, who has to again translate from, um, Elektronik transmission
07:08
or the wife, for example, to from from
07:11
wife of to the netherworld layer he has translated
07:15
and young goes down, she goes to the stack that goes up to the stock to resolve the package.
07:24
Uh, so what's the most complicated layer off the *** model? What we discussed that, in my opinion, is the data link layer because he had to. He has to translate.
07:33
Ah, from what we understand are you know what we write, what, what we put in the machine to, what is going to going to be traveling in the wires and the routers. And you know all that, all those hopes
07:50
in the in the Internet and,
07:54
well there. Do we perform encryption and decryption? That's uninterested in question. Well, there's no one quick one answer for this cause. Every type of encryption works a different layer. For example,
08:11
daily encryption you can't encrypt. You know Heather's,
08:16
for example, in the battling layer, you can also print in in the Napa bore layer, meaning that your package will be encrypted
08:24
on the protocol encryption. For example, in the transport layer, you can use SSL, for example. You can also improvement in the presentation in session layers, even in the application layer encryption works. It depends on the protocol you're using, for example, curb Rose. I know
08:43
you can creep in every layer. I'm guessing the layer. You cannot apply encryption. Although there's, um, plans is that claim that they do? You can encrypt at the physical layer. But, you know, that's something that we can put it to this cash in in the fort
09:00
sessions that will have We will actually talk about encryption in a whole whole session
09:05
to dedicate it to encryption. So
09:09
what Verticals are used in the transfer layer? Remember that you're the P and TCP. Go on. What's the different between you, Tippy? Anticipate he will visit his connection rented, meaning that you can actually know if a package which was believer a man
09:26
and you didn't He doesn't care about that. So
09:28
you know, that's the May Prince.
09:31
Well, in today, in today's brief lecture with this cost different layers off the *** model,
09:37
what protocols are used on each layer
09:41
and how those layers interact with each other in our to send data, you know, over the Internet are over the wires.
09:48
Some materials I can recommend you to use, uh, here's camp young member. Plus it's always Cisco ccn A. You know, a couple of other books.
10:00
Looking forward on this, you know,
10:05
we will discuss in the next video what's the difference? And, you know, similarities between cybersex and I had to security.
10:15
So I hope you enjoyed the video and talk to you soon.

Up Next

IoT Security

The IoT Security training course is designed to help IT professionals strengthen their knowledge about the Internet of Things (IoT) and the security platforms related to it. You’ll also be able to identify the security, privacy and safety concerns related to the implementation of an IoT infrastructure.

Instructed By

Instructor Profile Image
Alejandro Guinea
CERT Regional Director
Instructor