Module Three

Provides n no guarantees that the packet will be

Info iconThis preview shows pages 10–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Provides: n No guarantees that the packet will be delivered n No guarantee that the packet will be delivered only once n No guarantee that it will be delivered in the order which it was sent ARP – Address Resolution Protocol n Use the IP Address to get the MAC Address n MAC address is 48 bit n IP address is 32 bit n Only broadcast to network first time, otherwise stores IP and MAC info in table RARP – Reverse Address Resolution Protocol n Use the MAC Address to get the IP Address n RARP Server tells diskless machines IP Address ICMP – Internet Control Message Protocol n Management Protocol and messaging service provider for IP. n Sends messages between network devices regarding the health of the network. n Ping is ICMP packet n Ping checks if a host is up and operational TCP/IP Does not define Physical Standards it uses existing ones Other TCP/IP Protocols n Telnet – Terminal Emulation (No File Transfer) n FTP – File Transfer Protocol – (Can not execute files) n TFTP – Trivial FTP – no directory browsing capabilities, no authentication (it is unsecure), can only send and receive files. n Some sites choose not to implement TFTP due to the inherent security risks. n TFTP is an UDP-based file transfer program that provides no security. n NFS – Network File Sharing n SMTP – Delivers emails n LDP – Line Printer Daemon – with LPR enables print spooling n X-Windows – for writing graphical interface application n SNMP – Simple Network Management Protocol n Provides for the collection of network information by polling the devices on the network from a management station. n Sends SNMP traps (notification) to MIBS Management Information Bases n Bootstrap (BootP) protocol – Diskless boot up. BootP server hears the request and looks up the client’s MAC address in its BootP file. It’s an internet layer protocol. Security Enhanced Protocols (Two types) Security enhancements to telnet such as remote terminal access and secure telnet Security enhancements to Remote Procedure Call such as Secure RPC Authentication Following Security Protocols: At the Application Layer (OSI Model) SET – Secure Electronic Transaction n Originated by Visa and MasterCard n Being overtaken by SSL
Background image of page 10

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
SHTTP - Secure HTTP n Early standard for encrypting HTTP documents n Also being overtaken by SSL At the Transport Layer (OSI Model) SSH-2 n SSH has RSA Certificates n Supports authentication, compression, confidentiality, and integrity n DES Encryption n Because Secure Shell (SSH-2) supports authentication, compression, confidentiality, and integrity, SSH is used frequently for Encrypted File Transfer SSL – Secure Socket Layer n Contains SSL record protocol and SSL Handshake Protocol n Uses symmetric encryption and public key for authentication n MAC – Message Authentication Code for Integrity SKIP – Simple Key Management for Internet Protocol Similar to SSL – no prior communication required Firewalls Packet Filtering Firewall - First Generation n Screening Router
Background image of page 11
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page10 / 22

Provides n No guarantees that the packet will be delivered...

This preview shows document pages 10 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online