Professional Documents
Culture Documents
► Higher level
► Security and reliability both can be built
► Collects information from the end user or
the network resource, wraps it
(encapsulation), addresses it to the
destination resource and passes to the
transport layer
Total Working of Layers
► Application Layer- get the info from user or from
network device and encapsulate it to destination
resource
► Transport Layer- wraps the data up and addresses
it to the target program on the destination system
► Internet Layer- wraps the data up to the particular
system in a particular network
► Network Layer- Same network (direct passing of
data), if not, to the appropriate router until
reached to destination
At Last…
► N/W layer S/W - moves chunks of data to
its destination on the same
► Internet layer S/W- moves chunks of data
b/w 2-specific computers connected to the
Internet
► Transport layer S/W – moves chunks of data
b/w two programs
► Application layer S/W – moves data chunks
b/w a user and a resource
Where the Risks are?
► Interception by the third party
► Forgery
► Modifications
Internet Security holes
A Bigger Risk
► Password strength
► Revealing of password
► Changes are always constant
Fighting Back
Remember... it is up to you!