Rarp reverse address resolution protocol n use the

Info icon This preview shows pages 10–12. Sign up to view the full content.

View Full Document Right Arrow Icon
RARP – Reverse Address Resolution Protocol n Use the MAC Address to get the IP Address n RARP Server tells diskless machines IP Address ICMP – Internet Control Message Protocol n Management Protocol and messaging service provider for IP. n Sends messages between network devices regarding the health of the network. n Ping is ICMP packet n Ping checks if a host is up and operational TCP/IP Does not define Physical Standards it uses existing ones Other TCP/IP Protocols n Telnet – Terminal Emulation (No File Transfer) n FTP – File Transfer Protocol – (Can not execute files) n TFTP – Trivial FTP – no directory browsing capabilities, no authentication (it is unsecure), can only send and receive files. n Some sites choose not to implement TFTP due to the inherent security risks. n TFTP is an UDP-based file transfer program that provides no security. n NFS – Network File Sharing n SMTP – Delivers emails n LDP – Line Printer Daemon – with LPR enables print spooling n X-Windows – for writing graphical interface application n SNMP – Simple Network Management Protocol n Provides for the collection of network information by polling the devices on the network from a management station. n Sends SNMP traps (notification) to MIBS Management Information Bases n Bootstrap (BootP) protocol – Diskless boot up. BootP server hears the request and looks up the client’s MAC address in its BootP file. It’s an internet layer protocol. Security Enhanced Protocols (Two types) Security enhancements to telnet such as remote terminal access and secure telnet Security enhancements to Remote Procedure Call such as Secure RPC Authentication Following Security Protocols: At the Application Layer (OSI Model) SET – Secure Electronic Transaction n Originated by Visa and MasterCard n Being overtaken by SSL
Image of page 10

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
SHTTP - Secure HTTP n Early standard for encrypting HTTP documents n Also being overtaken by SSL At the Transport Layer (OSI Model) SSH-2 n SSH has RSA Certificates n Supports authentication, compression, confidentiality, and integrity n DES Encryption n Because Secure Shell (SSH-2) supports authentication, compression, confidentiality, and integrity, SSH is used frequently for Encrypted File Transfer SSL – Secure Socket Layer n Contains SSL record protocol and SSL Handshake Protocol n Uses symmetric encryption and public key for authentication n MAC – Message Authentication Code for Integrity SKIP – Simple Key Management for Internet Protocol Similar to SSL – no prior communication required Firewalls Packet Filtering Firewall - First Generation n Screening Router n Operates at Network and Transport level n Examines Source and Destination IP Address n Can deny based on ACLs n Can specify Port Application Level Firewall - Second Generation n Proxy Server n Copies each packet from one network to the other n Masks the origin of the data n Operates at layer 7 (Application Layer) n Reduces Network performance since it has do analyze each packet and decide what to do with it.
Image of page 11
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern