Download presentation
Presentation is loading. Please wait.
Published byNorah Jenkins Modified over 9 years ago
1
Chapter 12 End-to-End Networking
2
FIGURE 12.0.F01: UDP packet fields.
3
FIGURE 12.0.F02: UDP header displayed in Wireshark. © Wireshark Foundation
4
FIGURE 12.0.F03: Routing and internet protocol layering.
5
FIGURE 12.0.F04: Major TCP packet fields.
6
FIGURE 12.0.F05: TCP header displayed in Wireshark. © Wireshark Foundation
7
FIGURE 12.0.F06: A TCP connection summarized by Wireshark. © Wireshark Foundation
8
FIGURE 12.0.F07: TCP flags displayed by Wireshark. © Wireshark Foundation
9
FIGURE 12.0.F08: A “ping” packet shown in Wireshark. © Wireshark Foundation
10
FIGURE 12.0.F09: Domain name hierarchy.
11
TABLE 12.0.T01: Common top-level domain acronyms
12
FIGURE 12.0.F10: Example format of a three-part domain name.
13
FIGURE 12.0.F11: Nslookup list of “any” DNS records found for einsec.com.
14
FIGURE 12.0.F12: Wireshark display of a DNS response. © Wireshark Foundation
15
FIGURE 12.0.F13: Looking up a domain name.
16
FIGURE 12.0.F14: Whois response for stthomas.edu.
17
FIGURE 12.0.F15: A small LAN connects to its ISP through a single gateway.
18
FIGURE 12.0.F16: Network address translation: Processing the first packet.
19
FIGURE 12.0.F17: Configuring a simple gateway product. © Linksys
20
FIGURE 12.0.F18: Application filtering on a software firewall. Screen shot reprinted with permission from Apple Inc.
21
FIGURE 12.0.F19: Cell phone tower. Courtesy of Dr. Richard Smith
22
TABLE 12.0.T02: Dedicated versus dial-up lines
23
FIGURE 12.0.F20: Tower with a microwave antenna. Courtesy of Dr. Richard Smith
24
FIGURE 12.0.F21: Reachability problem.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.