1 / 5

Internet protocol stack

Internet protocol stack. users. network. Application. HTTP, SMTP, FTP, TELNET, DNS, …. Transport. TCP, UDP. Network. IP. Physical. Point-to-point links, LANs, radios,. Network Layer (partial). Basics Link-state vs Distance Vector (know which one is which) Intra AS vs Inter AS

ballari-taj
Download Presentation

Internet protocol stack

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet protocol stack users network Application HTTP, SMTP, FTP, TELNET, DNS, … Transport TCP, UDP. Network IP Physical Point-to-point links, LANs, radios, ... 2: Application Layer

  2. Network Layer (partial) • Basics • Link-state vs Distance Vector (know which one is which) • Intra AS vs Inter AS • Hierarchical Routing • Specifics • RIP, OSPF, BGP • Router Internals • Hands-on • Internet Topology • Configuring Routers (couldn’t do ) 2: Application Layer

  3. Network Layer Extensions • What might we want to add to the basic network layer functionality of getting a datagram from source to destination • Basics • IP Encapsulation and Tunneling • Specifics • IPv6 • Multicast • VPN • MobileIP • NAT 2: Application Layer

  4. Link Layer • Basics • Error Detection/Correction • Multiple Access Protocols • Specifics • TDMA, CSMA/CD, CSMA/CA, Polling, Token Ring • Ethernet • PPP • ATM, X.25, FrameRelay – why in this layer? • Hands-on • arp 2: Application Layer

  5. Security • Basics • Symmetric vs Public Key • Digital Signatures • Authentication • Key Distribution Centers and Certification Authorities • Specifics • Dynamic Routing or ICMP attacks • IP Spoofing • Replacing rsh or telnet with ssh • PGP (Distributed Trust) • Denial of Service, Buffer Overflows • SSL, IPSec • Hands-on • TCP Session Stealing 2: Application Layer

More Related