Assignment: Information Security
Assignment: Information Security
Assignment: Information Security
Information Security
Submitted to:
Mam Ammarah Maqbool
Submitted by:
Rameeza Sarwar
Roll no (15-227)
Section ‘B’ (morning)
Semester 7th
Department:
Computer Science
Define Network
A network consists of two or more computers that are linked in order to share resources
(such as printers and CDs), exchange files, or allow electronic communications. The
computers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams.
Two very common types of networks include:
1. Local Area Network(LAN)
2. Wide Area Network(WAN)
The model is broken into seven subcomponents, or layers, each of which represents a
conceptual collection of services provided to the layers above and below it. The OSI
Model also defines a logical network and effectively describes computer packet transfer
by using different layer protocols.
Layer 6 – Presentation
The presentation layer is where the operating system lies.This operating system could
be Windows,OS X,a UNIX based operating system or one of the many others available.
Where the human user interacts with the application layer described above,the
application layer interacts with the presentation layer. This may be done directly, or
through a runtime environment such as the Java Runtime Environment (JRE).
Layer 5 – Session
Operating system on the presentation layer and other, third party machines. For
example, when a user is browsing the internet, they are interacting with the application
layer, the application layer is interacting with the presentation layer and the session
layer allows the operating system to interact with the web server.
Layer 4 – Transport
The transport layer is responsible for the logistics of the session. In the example used
above, the transport layer would be responsible for determining what and how much
information is transferred between the operating system and the web server.
Layer 3 – Network
The network layer is where routers operate. A router is a hardware device that forwards
packets of information between computers on a network. This is where your IP address
comes from and in the example used above, the router is responsible for sending
packets of information out into the internet and receiving them. These packets origin
and destination is determined by the IP address of your router.
Layer 1 – Physical
The physical layer is literally the physical hardware that makes up the network. This
layer has several major functions:
Hardware such as the physical components of Ethernet cables and Bluetooth are just
some examples of the physical layer.
Use of protocols
Protocols are certain sort of rules that help us make our communication possible with
network. Here the protocols are used to helps users to communicate with different
Applications.
1. Telnet- Able to remote logging with the system. Communications are in clear text
format.
2. SSH- A more sure protocol than Telnet. Here communication are in an encrypted
format.
5.Internet Protocol (IP)- which uses a set of rules to send and receive messages at the
internet address level; and additional network protocols that include the Hypertext
Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each of which has defined
sets of rules to exchange and display information.
6- Hypertext Transfer Protocol (HTTP)- is the protocol used to transfer data over the
web. It is part of the Internet protocol suite and defines commands and services used
for transmitting webpage data. HTTP uses a server-client model. A client, for example,
may be a home computer, laptop, or mobile device.