CITA 352 Chapter 2 TCP/IP Concepts Review. Overview of TCP/IP Protocol –Language used by computers –Transmission Control Protocol/Internet Protocol (TCP/IP)

Slides:



Advertisements
Similar presentations
Cisco 2 - Routers Perrine. J Page 14/30/2015 Chapter 10 TCP/IP Protocol Suite The function of the TCP/IP protocol stack is to transfer information from.
Advertisements

CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
Ethical Hacking and Network Defense
Communication Protocols II Ninth Meeting. TCP/IP family.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
Lecture 5: TCP/IP OSI layers 3 (IP) and 4 (TCP/UDP) IPv4 – addresses and routing, “best-effort” service Ethernet, Appletalk, etc wrap IP packets with their.
Chapter 7 – Transport Layer Protocols
CCNA 1 v3.1 Module 11 Review.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 2: Internet Protocols.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Lesson 7 – THE BUSINESS OF NETWORKING. TCP/IP and UDP Other Internet protocols Important Internet protocols OVERVIEW.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Chapter 2 Internet Protocol DoD Model Four layers: – Process/Application layer – Host-to-Host layer – Internet layer – Network Access layer.
Institute of Technology Sligo - Dept of Computing Semester 2 Chapter 9 The TCP/IP Protocol Suite Paul Flynn.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Chapter Overview TCP/IP Protocols IP Addressing.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Process-to-Process Delivery:
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Forensic and Investigative Accounting
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 9.
Chapter 6: Packet Filtering
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
Semester 2v2 Chapter 9:  TCP/IP.
CCNA1 v3 Module 11 v3 CCNA 1 Module 11 JEOPARDY S Dow.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
1 Version 3.0 Module 11 TCP Application and Transport.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
TCP/IP Transport and Application (Topic 6)
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
11 TRANSPORT LAYER PROTOCOLS Chapter 6 TCP and UDP SPX and NCP.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 6 The Transport Layer.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Networking Basics CCNA 1 Chapter 11.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
Linux Operations and Administration Chapter Eight Network Communications.
Hands-On Ethical Hacking and Network Defense
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Network Basics CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
01_NF_Ch04 – OSI Transport Layer ( 傳輸層 ) Source: CCNA Exploration.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified jw.
v3 JEOPARDY CCNA 1 Module 11 CCNA1 v3 Module 11 Galo Valencia
TCP/IP Concepts (Part 2)
Networking Theory (part 2)
PART 5 Transport Layer.
Networking Theory (part 2)
Presentation transcript:

CITA 352 Chapter 2 TCP/IP Concepts Review

Overview of TCP/IP Protocol –Language used by computers –Transmission Control Protocol/Internet Protocol (TCP/IP) Most widely used TCP/IP stack –Four distinct layers Network Internet Transport Application

Figure 2-1 The TCP/IP protocol stack

The Application Layer Front end to the lower-layer protocols –Layer you can see and touch Table 2-1 Application layer programs

Table 2-1 Application layer programs (cont’d.)

The Transport Layer Encapsulates data into segments –Use TCP or UDP to reach a destination host TCP is a connection-oriented protocol TCP three-way handshake –Computer A sends computer B a SYN packet –Computer B replies with a SYN-ACK packet –Computer A replies with an ACK packet

TCP Segment Headers Critical components: –TCP flags –Initial sequence number (ISN) –Source and destination port numbers Abused by hackers –You need to know hacking basics to protect a network

TCP Flags Each flag occupies one bit of the TCP segment –Can be set to 0 (off) or 1 (on) Six TCP segment flags –URG flag: urgent flag –ACK flag: acknowledgment flag –PSH flag: push flag –RST flag: reset flag –SYN flag: synch flag –FIN flag: finish flag

Initial Sequence Number (ISN) 32-bit number –Tracks packets received by a node –Allows reassembly of large packets –Sent on steps one and two of TCP three-way handshake Sending node ISN is sent with SYN packet Receiving node ISN is sent back to sending node with SYN-ACK packet

TCP Ports TCP packet –Two 16-bit fields Contains source and destination port numbers Port –Logical, not physical, TCP connection component –Identifies running service Example: HTTP uses port 80 Helps you stop or disable unneeded services –More running services, more ports open for attack

TCP Ports (cont’d.) Only the first 1023 ports are considered well-known –List of well-known ports Internet Assigned Numbers Authority: Ports 20 and 21 –File Transfer Protocol (FTP) –Was the standard for moving or copying large files Used today to a lesser extent Popularity of HTTP –Requires a logon name and password –More secure than Trivial File Transfer Protocol (TFTP)

Figure 2-2 Connecting to an FTP site

TCP Ports (cont’d.) Port 25 –Simple Mail Transfer Protocol (SMTP) servers listen on this port Port 53 –Domain Name Service (DNS) Connects to Web sites using URLs instead of IP addresses Port 69 –Trivial File Transfer Protocol Used for transferring router configurations

TCP Ports (cont’d.) Port 80 –Hypertext Transfer Protocol (HTTP) Used when connecting to a Web server Port 110 –Post Office Protocol 3 (POP3) Used for retrieving Port 119 –Network News Transfer Protocol Used to connect to a news server for use with newsgroups

TCP Ports (cont’d.) Port 135 –Remote Procedure Call (RPC) Critical for operation of Microsoft Exchange Server and Active Directory Port 139 –NetBIOS Used by Microsoft’s NetBIOS Session Service Port 143 –Internet Message Access Protocol 4 (IMAP4) Used for retrieving

User Datagram Protocol (UDP) Fast but unreliable delivery protocol –Operates on Transport layer –Used for speed Does not need to verify receiver is listening or ready Depends on higher layers of TCP/IP stack handle problems –Referred to as a connectionless protocol

The Internet Layer Routes packets to destination address –Uses a logical address (i.e., IP address) –IP addressing packet delivery is connectionless Internet Control Message Protocol (ICMP) –Sends messages related to network operations –Helps troubleshoot network connectivity problems Ping command –Tracks the route a packet traverses Traceroute command

Table 2-2 ICMP type codes

Table 2-2 ICMP type codes (cont’d.)

IP Addressing Consists of four bytes –Divided into two components Network address Host address Classes –Class A –Class B –Class C

Table 2-3 TCP/IP address classes

IP Addressing (cont’d.) Class A –First byte is reserved for network address –Last three bytes are available for host computers –Supports more than 16 million host computers –Limited number of Class A networks Reserved for large corporations and governments –Format: network.node.node.node

IP Addressing (cont’d.) Class B –Divided evenly Two-octet network address Two-octet host address –Supports more than 65,000 hosts Assigned to large corporations and Internet Service Providers (ISPs) –Format: network.network.node.node

IP Addressing (cont’d.) Class C –Three-octet network address and one-octet host address More than two million Class C addresses –Supports up to 254 host computers Usually available for small business and home use –Format: network.network.network.node

IP Addressing (cont’d.) Subnet mask –Each network must be assigned a subnet mask Helps distinguish network from host address bits –Subnetting concepts are important Utilities return information based on IP address and subnet information May be useful when penetration testing

Planning IP Address Assignments Each network segment must have a unique network address –Address cannot contain all 0s or all 1s Accessing entities and services on other networks –Each computer needs IP address of gateway –TCP/IP Internet layer uses subnet mask to determine destination computer’s network address If addresses are different, relays packet to gateway Gateway forwards packet to its next destination Packet eventually reaches destination

IPv6 Addressing Internet Protocol version 6 (IPv6) –Wasn’t designed with security in mind Many current network vulnerabilities –Developed to increase IP address space and provide additional security Uses 16 bytes, or a 128-bit address available addresses –Many OSs are configured to enable IPv6 Many router filtering devices, firewalls, and intrusion detection systems are not –Hackers bypass security systems

Overview of Numbering Systems As a security professional, knowledge of numbering systems will come into play –Binary –Octal –Hexadecimal

Reviewing the Binary Numbering System Uses number 2 as its base –Binary digits (bits) represented by 0 or 1 Byte –Group of 8 bits Can represent 2 8 (256) different colors File permissions are represented with bits –1 represents having permission 111 (rwx): all permissions apply –0 removes permission 101 (r-x): user can read and execute but not write

Understanding Nibbles Half a byte or four bits –Helps with reading numbers by separating the byte Example: versus Components –High-order nibble: left side –Low-order nibble: right side

Understanding Nibbles (cont’d.) Converting to decimal –Low-order nibble 1010 = 10 (base 10) –Multiply high-order nibble by = 10 x 16 = 160 (base 10) = 160

Reviewing the Octal Numbering System Uses 8 as its base –Supports values from 0 to 7 Octal digits can be represented with only three bits UNIX permissions –Owner permissions (rwx) –Group permissions (rwx) –Other permissions (rwx) Setting permission (rwxrwxrwx) means they all have read, write, and execute permissions

Reviewing the Hexadecimal Numbering System Uses 16 as its base –Supports numbers from 0 to 15 Hex number consists of two characters –Each character represents a nibble –Value contains alphabetic letters A representing 10 and F representing 15 –Sometimes expressed with “0x” in front Hex number in binary or decimal –Convert each nibble to binary –Convert binary value to decimal