1 00:00:02,400 --> 00:00:03,300 Hi again. 2 00:00:03,450 --> 00:00:09,450 And we have in our fifth layer a layer, which is called session. 3 00:00:11,450 --> 00:00:19,220 Well, basically in this layer, it is the same as presentation and application, which we have in our 4 00:00:19,490 --> 00:00:28,250 next module, which is DCP IP model, well, basically precision and presentation and application. 5 00:00:29,000 --> 00:00:42,080 They conclude that the the the they have the same machines, such as computers, routers, also wireless 6 00:00:42,290 --> 00:00:43,010 routers. 7 00:00:43,760 --> 00:00:47,690 I mean, the smart machines, smart phones, etc.. 8 00:00:48,990 --> 00:00:56,960 Well, indecision, it controls conversations on sessions, dialogue control entered. 9 00:00:58,450 --> 00:01:04,270 And to gritty and reliability, descriptive name. 10 00:01:07,860 --> 00:01:13,760 Then we have in the six layer that format in either. 11 00:01:15,540 --> 00:01:19,500 And as I compression and encryption. 12 00:01:21,110 --> 00:01:24,830 And then we have in the seventh layer, the application. 13 00:01:26,060 --> 00:01:32,130 It provides services, protocols to applications such as F2P service, HDB. 14 00:01:32,730 --> 00:01:38,450 Oh, I don't know as an MP for administration is empty before mailing. 15 00:01:39,700 --> 00:01:40,150 I don't know. 16 00:01:41,360 --> 00:01:48,290 FDR, before transferring it is for file transfer protocol F2P, the abbreviation for file transfer 17 00:01:48,290 --> 00:01:55,580 protocol in in the future, you will you will understand what we need protocols for and also you will 18 00:01:55,580 --> 00:01:57,740 understand why we. 19 00:01:59,120 --> 00:02:06,680 Why we use it, these protocols and revelations now for session and presentation application, what 20 00:02:06,680 --> 00:02:14,030 we call the message that this from the transport to these next layers, which are the 5th, the 6th 21 00:02:14,030 --> 00:02:16,550 and the 7th, we call it data. 22 00:02:17,870 --> 00:02:25,190 And for the message that we have here, we call it an encapsulation. 23 00:02:28,360 --> 00:02:38,380 Now what we have in the CPA IP model, it shows us in the network access, which include the physical 24 00:02:38,380 --> 00:02:43,240 and that I think it is the network interface with all these protocols here or. 25 00:02:44,620 --> 00:02:48,790 And for that and internet network. 26 00:02:50,180 --> 00:02:59,780 We have only the network, and we use the following protocols I, B, R or B and I I C MP. 27 00:03:01,510 --> 00:03:05,650 Then we have in transport was to disappear and you did this. 28 00:03:06,190 --> 00:03:12,610 This is very, very important and we are going to see in the future why then we have the obligation 29 00:03:13,540 --> 00:03:15,160 with encapsulation data. 30 00:03:15,700 --> 00:03:17,650 I'm not going to say the message anymore. 31 00:03:18,130 --> 00:03:20,710 I'm going only to say encapsulation. 32 00:03:21,430 --> 00:03:25,270 We have data and we have the other protocols such as. 33 00:03:26,240 --> 00:03:37,820 HDP as MP and MP, FTB, F2P as F2P, HDP as we have laws of protocol amid. 34 00:03:38,970 --> 00:03:41,040 Basically, there are about. 35 00:03:43,960 --> 00:03:45,480 Then thousands protocols. 36 00:03:47,170 --> 00:03:47,760 10000. 37 00:03:48,190 --> 00:03:52,420 I don't remember exactly which is 100000 or 10000 protocol, which is. 38 00:03:54,100 --> 00:03:57,070 For us, as humans, it is impossible to remember. 39 00:03:57,850 --> 00:04:01,480 And we should remember the many protocols that we use. 40 00:04:03,270 --> 00:04:14,160 And now I'm going to go back to our our main belief, which which you will see more detailed information 41 00:04:14,160 --> 00:04:18,540 about the things that I didn't explain here. 42 00:04:19,500 --> 00:04:22,470 Because we are here for not wasting time. 43 00:04:23,280 --> 00:04:25,650 We are going to see why we use it. 44 00:04:27,970 --> 00:04:36,220 Communication rules such as protocol and we call the TCP IP transmit the transmission control protocol 45 00:04:36,490 --> 00:04:37,720 internet protocol. 46 00:04:39,370 --> 00:04:45,940 We have here the protocol, as I mentioned for emailing the MPP, we have to provide transfer protocol 47 00:04:45,940 --> 00:04:46,370 A.. 48 00:04:46,930 --> 00:04:49,140 It protects transport protocol. 49 00:04:49,150 --> 00:04:53,020 They are very interested in protocols we use are going to use them a lot. 50 00:04:55,560 --> 00:05:03,300 And here in this part of our PDAF, you are going to find out everything you want to know about Ozzy 51 00:05:03,300 --> 00:05:04,740 anticipate IP model. 52 00:05:05,340 --> 00:05:13,500 And let's get in to the main part in this judge in this chapter. 53 00:05:15,360 --> 00:05:18,150 And see you in the next video.