{"version":"1.0","provider_name":"GCSE Computer Science Theory","provider_url":"https:\/\/learnlearn.uk\/gcsecs","author_name":"learnlearnadmin","author_url":"https:\/\/learnlearn.uk\/gcsecs\/author\/learnlearnadmin\/","title":"Network Layers and Protocols - GCSE Computer Science Theory","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"prAgv5IuAD\"><a href=\"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/\">Network Layers and Protocols<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/learnlearn.uk\/gcsecs\/network-layers-protocols\/embed\/#?secret=prAgv5IuAD\" width=\"600\" height=\"338\" title=\"&#8220;Network Layers and Protocols&#8221; &#8212; GCSE Computer Science Theory\" data-secret=\"prAgv5IuAD\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"Network Layers and Protocols OSI Model Layer Name Purpose Protocols mnemonic Application Human Machine Interface \u2013 Where data is entered, Connects application to network DNS,HTTP,SMTP,POP3,FTP All Presentation Data coded into 1s and 0s, or decoded, depending on file format JPEG,MIDI,TIFF,SSL,SSH People Session Where secure sessions created, authentication takes place NetBIOS, Seem Transport Error checking it&hellip;&nbsp;Read More &raquo;"}