Time
7 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
12

Video Transcription

00:01
Hey, guys. Welcome to another episode of the S S C P Exam prep.
00:05
I'm your host, Peter. Simple of this is going to be the sixth domain Lesson one, and it's all about networking.
00:14
So in this lesson, our first thing that will take a look at are the O S I and D o d models. These models are the ones that are best described, um, for how to describe a network. These are the ones that will be used to understand how to transmit
00:33
and send data from one host to the other.
00:37
Let's get started.
00:39
This is the OS I model, the open system interconnect model.
00:44
This model is that describes the process off sending information over network from one host to the other.
00:53
Now this is sometimes considered a really complex, but it's the most widely accepted way to describe networking.
01:00
So how it works is
01:03
one user
01:03
sends data
01:06
from their computer and it travels
01:08
down every single layer of the OS I model
01:12
across the physical link to that's like the Ethernet cord or anything like that,
01:19
and then back up every single layer off the OS I model till reaches thesis unde person's computer.
01:29
Now there are seven layers of the OS eyeball. They are the application layer,
01:36
the presentation wire, recession layer,
01:38
the transport layer network, layer, the data link layer and the physical layer.
01:45
Let's look at all of these in a little bit more detail.
01:49
Fire one is the physical layer.
01:51
Networked apologies, which we'll get a little bit later. This lesson are defined here.
01:57
Most visible devices are also at this level.
02:00
This level is very simple, very straightforward. It is simply just
02:06
bits on a wire. This is where the signal and binary transmission happens. She goes across the wire in the physical link,
02:16
now the leg above it.
02:20
The layer above it is the data link layer.
02:23
This receives the packets. It gives fromthe wire and formats, then for the network.
02:30
The data link layer has two main functions. They have the Logical Link Control,
02:36
which manages connections between two piers.
02:38
And it has the media access control, which transmits and receives frames from peers,
02:45
hardware addresses or defined at this layer. That's where you hear the phrase the Mac address. That's just the media access control. These two functions maintained that the bits are put on the wire when transmitting,
03:01
and that they are pulled off the wire and formed into packets when they're being received.
03:07
Liar three is the network layer.
03:09
This liar moves information between two hosts. Uses logical address ING and the Internet protocols.
03:20
There are two main functions of the network. Leg.
03:23
Worst is addressing. This used the destination I P addresses
03:28
to send packets.
03:30
Ah, the second is fragmentation, so this sub divides packets if its size is greater than the maximum size allowed
03:38
on a network.
03:39
Routers work at this level, and they send packets from place to place based on the I P address.
03:47
Now, writers work by tables.
03:51
There are static routing tables and dynamic routing tables. Thes ratting tables are used to tell the packet where they should go to get to the next place on their way to getting to the destination.
04:06
Now, with static routing tables, they're updated manually. This has to be done by hand by a person
04:13
through ads in the information on how to send packets to where they go. There's also dynamic ratting tables. Everyone sit awhile. Routers were share information and say an address that where they can send packets to on a network. They can talk about
04:30
what they see their network pictures like.
04:33
And that's how the writing tables get updated
04:40
network routing protocols. There are two main ones. There is the I. C N P Internet Control Message protocol and the Eye GMP Internet group Management Protocol.
04:50
Now that I see MP does things like managed network errors,
04:55
congestion and trouble shoots any problems on the network. So if packets are being congested, it will find a way around them. If packets are getting lost or taking too long or if they're packing their timing out, then the ICMP will send messages. The letter. You know what has happened?
05:15
I GMP really just manages multicasting groups.
05:19
There are several layer three protocols that work here. You have the IBD four and I P V six.
05:28
You have the D. V M or P,
05:30
I, P, sec,
05:30
IBX,
05:32
GDP and SPB.
05:38
Layer four is the transport layer. This creates an end end connection between two hosts.
05:44
Two major protocols that work of this player are TCP,
05:47
which is the transmission control protocol on the UDP,
05:53
which is the user data graham control protocol.
05:58
So these air to protocol True protocols that are used to send data from the network up to the host.
06:06
So there are several layers.
06:09
Uh, Blair four protocols at work here There is the f c p r d p
06:15
s c T p as p X
06:17
on the SST
06:21
by your five is the session later.
06:25
The goal of this layer is to provide a consistent connection between two hosts. This layer
06:32
deals with setting up maintaining a connection and then at the end, tearing down. There are three different types of sessions which can be created at this layer. There is the full duplex or both. Host can pass information at the same time, back and forth to each other.
06:49
There is the half duplex where both hosts can pass information, but only one at a time.
06:57
And then there is the simplex were on Lee Won Ho's consent information to appear in one direction only.
07:05
Other protocols that work at theseventies layer include h 0.245 I s s
07:14
P a p
07:15
p p t p
07:16
rpc
07:18
arti c p and S N a P P.
07:24
Liar six is the presentation Liar This layer provides service is to ensure that all the applications use a common format to represent data. So if the data coming from a host is not in the proper format, that application can read
07:42
that the presentation layer
07:44
will convert that format into a readable format.
07:48
So, for example, if an application can only read askyou values
07:53
and receives Unicode data, then the presentation liar will convert it to ask
08:01
application Liar. This is the applications portal to network based service is this is where it all starts. So this is where the data, when it gets sent to start from here and goes down into the wire. And also when data is being received, it comes all the way back up
08:20
and ends there in the application layer
08:24
where it is then shown to the user.
08:28
There are many protocols that work in this layer, and these are the most popular once you have D H c p,
08:33
you have d N s. You have http.
08:39
I'm at
08:39
El Bab,
08:41
SMTP
08:43
and FTP.
08:45
We'll be going over many of these protocols later in the lesson.
08:50
So now that we've taken a look at the O S I model, we will look at the T c P i p model. This is also known as the D O D Department of Defense model or the TCP I P model. It really doesn't matter. This model on Lee has
09:09
four layers in 77 so it has the network in her face the intern that layer, the transport layer and the application layer. Now some of these layers are
09:22
combined together, so, such as the session layer, the presentational layer and the application layer in the OS I model
09:30
are all combined just into the application layer in the TCP I p model.
09:37
In today's lecture, we discussed the O S I and the T C T I P model
09:43
TCP and UDP protocols are associated with which OS I model
09:50
a special player
09:52
be network layer
09:54
sea transport layer or D presentation wire.
10:03
If you said c transport layer that you are correct, remember TCP and UDP our protocols which set up the information to pass through from the network to the application.
10:20
Thanks for watching guys. I hope you learned a lot in this video and I'll see you next time

Up Next

Systems Security Certified Professional (SSCP)

Obtaining your SSCP certification signifies that you possess the ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor