Networking Protocols

Networking Protocols - TCP/IP Vulnerabilities The TCP/IP...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Protocols, Holes and Firewalls Oh My!!! … it’s a scary place out there. Original slides prepared by K. Liszka, The University of Akron for 3460:453/553, Fall 2007 TCP/IP Vulnerabilities • The TCP/IP protocol stack was developed in a “trusting” environment. • Passwords for telnet, ftp, mail, etc. are sent over the network in the clear or with a known encoding. • Many of the communications protocols rely on the participants being well behaved and “truthful”. TCP Protocol Stack Application Transport Network Link Application protocol TCP protocol IP protocol Data Link IP Network Access IP protocol Data Link Application Transport Network Link Data Formats Application Transport (TCP, UDP) Network (IP) Link Layer Application message - data TCP data TCP data TCP data TCP Header data TCP IP IP Header data TCP IP ETH ETF Link (Ethernet) Header Link (Ethernet) Trailer segment packet frame message Internet Protocol Version Header Length Type of Service Total Length Identification Flags Time to Live Protocol Header Checksum Source Address of Originating Host Destination Address of Target Host Options Padding IP Data Fragment Offset • Connectionless – Unreliable – Best effort • Transfer datagram – Header – Data • Responsible for moving data across Internet • Send and forget • Does not guarantee – Delivery – Packets delivered in order sent – Packets delivered undamaged • Employed on various networking technologies IP Specifics
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Internet routing uses numeric IP address. Typical route uses several hops. ISP Office gateway 5 Source Destination Sequence Packet Basic IP Protocol Functions Routing – IP host knows location of router (gateway) – IP gateway must know route to other networks Fragmentation and reassembly – If max-packet-size less than the user-data-size Error reporting – ICMP packet to source if packet is dropped. User Datagram Protocol (UDP)
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/21/2011 for the course CS 567 taught by Professor Dr.shambooupadhyay during the Fall '09 term at SUNY Buffalo.

Page1 / 6

Networking Protocols - TCP/IP Vulnerabilities The TCP/IP...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online