Module A.  This is a module that some teachers will cover while others will not  This module is a refresher on networking concepts, which are important.

Slides:



Advertisements
Similar presentations
TCP/IP Christopher Zacky. lolwut Decimal Numbers.
Advertisements

1 Copyright © 2014 M. E. Kabay. All rights reserved. DATACOMM CSH6 Chapter 5 “Data Communications & Information Security” Raymond Panko.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Chapter 5: TCP/IP and OSI Business Data Communications, 5e.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
Chapter 4 : TCP/IP and OSI Business Data Communications, 4e.
1 TCP/IP Internetworking (February 1, 2012) © Abdou Illia – Spring 2012.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Networking and Internetworking: Standards and Protocols i206 Fall 2010 John Chuang Some slides adapted from Coulouris, Dollimore and Kindberg.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
Transport Layer TCP and UDP IS250 Spring 2010
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
Gursharan Singh Tatla Transport Layer 16-May
Module A Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson.
CS 350 Chapter-6. A brief history of TCP/IP 1983 TCP/IP came to ARPAnet ARPAnet and MILNET dissolved in 1990 BSD UNIX.
1 Standards Chapter 2 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition.
A Closer Look at HTTP, TCP, IP, and PPP Chapter 3 Copyright 2001 Prentice Hall Revision 2: July 2001.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1 Chapter 1 OSI Architecture The OSI 7-layer Model OSI – Open Systems Interconnection.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Networking Concepts Module A Copyright Pearson Prentice Hall 2013.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Network Architecture Models: Layered Communications School of Business Eastern Illinois University © Abdou Illia, Fall 2015 (September 14, 2015 ) Encapsulation.
Networking Concepts Module A Copyright Pearson Prentice Hall 2013.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
TCP: A Closer Look Transmission Control Protocol.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
1 Figure 3-2: TCP/IP Standards (Study Figure) Origins  Defense Advanced Research Projects Agency (DARPA) created the ARPANET  An internet connects multiple.
© Introduction to Internetworking – Alex Kooijman 04/04/2000 Introduction to internetworking Part Two.
Transmission Control Protocol
More on TCP Acknowledgements Sequence Number Field Initial Sequence Number Acknowledgement Number Field.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Internet 1) Internet basic concepts 2) The IP protocol stack 3) The IP datagram header (IPv4 and IPv6) 4) Addressing and routing 5) Example: downloading.
Module A. Copyright Pearson Prentice-Hall 2010  Octet ◦ A Byte (collection of 8 bits)  8 bits = 1 Character ◦ Bit  Is the basic unit of IT represented.
Networked Graphics Building Networked Virtual Environments and Networked Games Chapter 3: Overview of the Internet.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
Hands-On Ethical Hacking and Network Defense
1 Figure 3-5: IP Packet Total Length (16 bits) Identification (16 bits) Header Checksum (16 bits) Time to Live (8 bits) Flags Protocol (8 bits) 1=ICMP,
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
Point-to-Point Protocol
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Chapter 5 Network and Transport Layers
Introduction to TCP/IP networking
Multiplexing.
Introduction to TCP/IP
Review of TCP/IP Internetworking
TCP/IP Internetworking
© 2003, Cisco Systems, Inc. All rights reserved.
Standards Basics.
TCP/IP Internetworking
Review of TCP/IP Internetworking
Networking Concepts Module A Copyright Pearson Prentice Hall 2013.
Overview of Networking & Operating System Security
Networking Concepts Module A Copyright Pearson Prentice Hall 2013.
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Process-to-Process Delivery:
Figure 3-23: Transmission Control Protocol (TCP) (Study Figure)
Layered Standards Architectures
Review For Exam 1 (February 18, 2013) © Abdou Illia – Spring 2013.
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
Protocol Application TCP/IP Layer Model
Kyle Broussard, Alexandra Mikolai,
Network Architecture Models: Layered Communications
Transport Layer 9/22/2019.
Electrical Communications Systems ECE
Presentation transcript:

Module A

 This is a module that some teachers will cover while others will not  This module is a refresher on networking concepts, which are important in information security  If your teacher does not cover networking, you might want to cover it yourself, to “get the rust out” of your networking knowledge Copyright Pearson Prentice-Hall

3

4

5

6

7

8 Network Browser Packet Router Packet Router Packet Route Webserver Software Router The global Internet has thousands of networks connected by routers The global Internet has thousands of networks connected by routers

Copyright Pearson Prentice-Hall Packet travels in a different frame in each network Packet travels in a different frame in each network

Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall Super LayerDescription ApplicationCommunication between application programs on different hosts attached to different networks on an internet. InternetworkingTransmission of packets across an internet. Packets contain application layer messages. NetworkTransmission of frames across a network. Frames contain packets.

Copyright Pearson Prentice-Hall Super LayerTCP/IPOSIHybrid TCP/IP-OSI Application Presentation Session InternetTransport InternetNetworkInternet Single NetworkSubnet AccessData Link Physical

Copyright Pearson Prentice-Hall Switched Network 1 Data Link Physical LinkFrame In a single network, a physical link connects adjacent devices. A data link is the path that a frame takes across a single network. One data link; three physical links.

Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall Total Length (16 bits) Identification (16 bits) Header Checksum (16 bits) Time to Live (8 bits) Flags Protocol (8 bits) 1=ICMP, 6=TCP, 17=TCP Bit 0Bit 31 IP Version 4 Packet Source IP Address (32 bits) Fragment Offset (13 bits) Diff-Serv (8 bits) Header Length (4 bits) Version (4 bits) Destination IP Address (32 bits) Options (if any)Padding Data Field 0100

Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall Source Port Number (16 bits)Destination Port Number (16 bits) Acknowledgment Number (32 bits) Sequence Number (32 bits) TCP Checksum (16 bits) Window Size (16 bits) Flag Fields (6 bits) Reserved (6 bits) Header Length (4 bits) Urgent Pointer (16 bits)

Copyright Pearson Prentice-Hall PC Transport Process Webserver Transport Process 1. SYN (Open) 2. SYN, ACK (1) (Acknowledgement of 1) 3. ACK (2) Open (3) 3-Way Open

Copyright Pearson Prentice-Hall PC Transport Process Webserver Transport Process 1. SYN (Open) 2. SYN, ACK (1) (Acknowledgement of 1) 3. ACK (2) 4. Data = HTTP Request 5. ACK (4) 6. Data = HTTP Response 7. ACK (6) Open (3) Carry HTTP Req & Resp (4)

Copyright Pearson Prentice-Hall PC Transport Process Webserver Transport Process 8. Data = HTTP Request (Error) Carry HTTP Req & Resp (4) 9. Data = HTTP Request (No ACK so Retransmit) 10. ACK (9) 11. Data = HTTP Response 12. ACK (11) Error Handling

Copyright Pearson Prentice-Hall PC Transport Process Webserver Transport Process Close (4) 13. FIN (Close) 14. ACK (13) 15. FIN 16. ACK (15) Note: An ACK may be combined with the next message if the next message is sent quickly enough Normal Four-Way Close

Copyright Pearson Prentice-Hall PC Transport Process Webserver Transport Process Close (1) RST Abrupt Close Either side can send A Reset (RST) Segment At Any Time Ends the Session Immediately

Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall Source Port Number (16 bits)Destination Port Number (16 bits) UDP Length (16 bits)UDP Checksum (16 bits) Data Field

Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall

 Application Exploits ◦ By taking over applications, hackers gain the permissions of the exploited program ◦ A multitude of application standards ◦ Consequently, there is a multitude of security issues at the application level Copyright Pearson Prentice-Hall

 Many Applications Need Two Types of Standards ◦ One for the transmission of messages, one for the content of application documents ◦ For the World Wide Web, these are HTTP and HTML, respectively ◦ For transmission, uses SMTP, POP, and IMAP ◦ For message content, uses RFC 2822 (all- text), HTML, and MIME Copyright Pearson Prentice-Hall

 FTP and Telnet ◦ Have no security ◦ Passwords are transmitted in the clear so can be captured by sniffers ◦ Secure Shell (SSH) can replace both securely Copyright Pearson Prentice-Hall

 Many Other Application Standards Have Security Issues ◦ Voice over IP ◦ Service-oriented architecture (SOA); web services ◦ Peer-to-peer applications Copyright Pearson Prentice-Hall

Copyright Pearson Prentice-Hall