McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Chapter 23
Upper OSI
Layers
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-1
Session Layer Dialog
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-2
Session-to-Transport Layer Communication
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-3
Synchronization Points
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-4
SPDU
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-5
Presentation Layer Functions
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-6
Direct and Indirect Methods of Translation
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-7
Concept of Encryption and Decryption
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-8
Encryption/Decryption Methods
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-9
Monoalphabetic Substitution
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-10
Polyalphabetic Substitution
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-11
Transpositional Encryption
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-12
Encoding/Decoding
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-13
Permutation
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-14
Substitution
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-15
Product
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-16
Exclusive OR
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-17
Rotation
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-18
DES
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-19
Subkey Generation in DES
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-20
One of the 16Steps in DES
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-21
Public Key Encryption
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-22
RSA
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-23
RSA Encryption and Decryption
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-24
Security of RSA
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-25
Signature Authentication
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-26
Data Compression Methods
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-27
Run-Length Encoding
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-28
MHS
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-29
Message Format in MHS
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-30
Virtual File Storage
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-31
Local Access
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-32
Remote Access
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2001
Figure 23-33
Virtual Terminal