Network Models
Namesh Sanjitha
Overview
Why do we need one…..?
OSI - Open Systems Interconnect
1. Physical Layer
Bit Stream
Electrical Pulses
1. Physical
Layer
● Defines the physical aspects
■ Cables
■ NICs
■
2. Data Link Layer
Two sub layers:
1. MAC - Media Access Control Layer
i. Physical Addressing
ii. Accessing Shared Medium
2. LLC - Logical Link Control Layer
i. Error Control
ii. Data Framing
iii. Frame Sync
3. Network Layer
● Logical Addressing
● Host to Host Communication
● Routing
4. Transport Layer
● End to End Communication
● QoS
● Error Control
● Flow Control
5. Session Layer
● Creating,
● Managing and
● Terminating
of Sessions
6. Presentation Layer
● Data Formating
○ Provides independence from compatibility problems
● Data Encryption
7. Application Layer
Provides Services required by applications
● File Transfer
● E-mail
● Web
TCP/IP
No need to study separately,
we have seen it all in OSI……...
Attacks
Let’s go with OSI, since it is more
abstract
Physical Layer
● Eavesdropping
● Replay Attack
● DoS :)
Data Link Layer
● MAC Address Spoofing
● ARP Poisoning
● MAC Flooding
Network Layer
● Ip spoofing
● DoS
● Twin Access Point
● Ping of Death
● ICMP MITM
Transport Layer
● Syn Flood
● Smurf
Session Layer
● Session Hijacking
● Phishing
Presentation Layer
● SSL stripping
● Malicious SSL Requests
Application Layer
● DNS Spoofing
● Injection Attacks
● Browser Exploitation
● Brute Force Attacks
Q&A
Thank you!

Network models and Attacks