Introduction to Network Security
Chapter 7 Transport Layer Protocols
1
- Dr. Doug Jacobson - Introduction to
Network Security - 2009
Introduction to Network Security Chapter 7 Transport Layer - - PowerPoint PPT Presentation
Introduction to Network Security Chapter 7 Transport Layer Protocols Dr. Doug Jacobson - Introduction to 1 Network Security - 2009 Topics TCP Layer Responsible for reliable end-to-end transfer of application data. TCP
1
Network Security - 2009
2
Network Security - 2009
3
Network Security - 2009
4
Network Security - 2009
5 RJE 68 Bootstrap Protocol Client 7 echo 69 Trivial FTP 9 Discard 75 any private dialout service 11 Active Users 77 any Private RJE service 13 daytime 79 FINGER 15 Who is up 101 NIC host name server 17 Quote of the day 102 ISO-TSAP 19 Character Generator 103 X.400 20 FTP (default data) 104 X.400-SND 21 FTP (control) 105 CSnet Name server 23 TELNET 109 Post Office Protocol Ver 2 25 SMTP 113 Authentication Service 37 Time 115 Simple FTP 42 Host name service 119 NNTP 53 Domain name server 123 NTP 67 BOOTP 161 SNMP agent 162 SNMP management station
5
Network Security - 2009
– Internal TCP resources are sufficient. – Both users have agreed to the connection.
6
Network Security - 2009
7
Network Security - 2009
associating a timeout with data submitted for transmission. If TCP detects a timeout the connection is abruptly terminated.
stream of data presented by one user to TCP will be delivered in the same order to the destination user.
designation provided by both users match.
8
Network Security - 2009
9
Network Security - 2009
10
Network Security - 2009
11
Network Security - 2009
12
Network Security - 2009
13
Network Security - 2009
14
Network Security - 2009
15
Network Security - 2009
16
Network Security - 2009
17
Network Security - 2009
18
Network Security - 2009
19
Network Security - 2009
20
Network Security - 2009
– sequence numbers – Window size
21
Network Security - 2009
22
Network Security - 2009
23
Network Security - 2009
24
Network Security - 2009
25
Network Security - 2009
26
Network Security - 2009
27
Network Security - 2009
28
Network Security - 2009
29
Network Security - 2009
30
Network Security - 2009
31
Network Security - 2009
32
Network Security - 2009
Source Port Destination Port UDP Total Length Checksum
33
Network Security - 2009
34
Network Security - 2009
35
Network Security - 2009
– Each name between the dots is called a label – Label <= 63 characters
– Supported by the client – The leftmost part of a domain name – E.g., www. Gets filled in to www.iastate.edu by the client
36
Network Security - 2009
37
Network Security - 2009
38
Network Security - 2009
39
Network Security - 2009
40
Network Security - 2009
41
Network Security - 2009
42
Network Security - 2009
43
Network Security - 2009
44
Network Security - 2009
45
Network Security - 2009
46
Network Security - 2009
47
Network Security - 2009
48
Network Security - 2009
49
Network Security - 2009
50
Network Security - 2009
51
Network Security - 2009
52
Network Security - 2009
53
Network Security - 2009
54
Network Security - 2009
55
Network Security - 2009
56
Network Security - 2009
57
Network Security - 2009
58
Network Security - 2009
59
Network Security - 2009
60
Network Security - 2009
61
Network Security - 2009
62
Network Security - 2009
63
Network Security - 2009
64
Network Security - 2009