Professional Documents
Culture Documents
D. The Tcp/Ip Reference Model: Protocol
D. The Tcp/Ip Reference Model: Protocol
Like the OSI model, TCP / IP also consists of different layers or sets
of standards to organize and make communication easier for vendors and
manufacturers.
The following are few of the most common Application Layer protocols used today:
HTTP: HTTP stands for Hypertext transfer protocol, it allows the user to
interact with World Wide Web through the browser application. It is used to
transfer Webpages and such resources from the Web Server or HTTP
server to the Web Client or the HTTP client. When you use a web browser
such as Internet Explorer or Firefox, you are using a web client. It uses
HTTP to transfer web pages that you request from the remote servers.
FTP: FTP stands for File Transfer Protocol. This protocol is used for
transmitting files from one system to another system. Just like telnet and
HTTP, one host runs the FTP server application (or daemon) and is called
the FTP server while the FTP client runs the FTP client application. A client
connecting to the FTP server may be required to authenticate before being
given access to the file structure. Once authenticated, the client can view
directory listings, get and send files, and perform some other file related
functions. Just like telnet, the FTP client application available in most
operating systems is called ftp.
DNS: DNS stands for Domain Name System. Each computer on a network
has different IP address, a computer is known by its IP address. DNS
provides a mapping to a name to the IP Address so a name can be used to
identify a system on network rather than IP address itself.
SMTP: SMTP stands for Simple mail transfer protocol. It is used for email
services, using this protocol a email containing data can be sent to another
email address.
Once TCP and UDP have segmented the data and have added their
headers, they send the segment down to the Network layer. The internet
layer handles the logical addresses IP address used by routers to determine
the path from sending device to the receiving device. Using the source and
destination IP addresses, routers know where to drop or where to send data
or 'packets "from the source to the destination. It is the task of the Internet
Layer to ensure that the segment is moved across the networks to the
destination network.
The Internet Protocol (IP) is the most common protocol that provides
these services. Also working at this layer are routing protocols which help
routers learn about different networks they can reach and the Internet
Control Message Protocol (ICMP) that is used to send error messages
across at this layer. Address Resolution Protocol (ARP) is a network layer
protocol which is used to find the physical address from the IP address.
The Network Access layer of the TCP/IP model corresponds with the Data
Link and Physical layers of the OSI reference model. It defines the protocols and
hardware required to connect a host to a physical network and to deliver data
across it. Packets from the Internet layer are sent down the Network Access layer
for delivery within the physical network. The destination can be another host in the
network, itself, or a router for further forwarding. So the Internet layer has a view
of the entire Internetwork whereas the Network Access layer is limited to the
physical layer boundary. It defines how the data should be sent physically through
the network. This layer is mainly responsible for the transmission of the data
between two devices on the same network.
COMPUTER NETWORK SECURITY
During initial days of internet, its use was limited to military and universities
for research and development purpose. Later when all networks merged together
and formed internet, the data used to travel through public transit network.
Common people may send the data that can be highly sensitive such as their bank
credentials, username and passwords, personal documents, online shopping
details, or confidential documents.
All security threats are intentional i.e. they occur only if intentionally
triggered. Security threats can be divided into the following categories:
Interruption
Interruption is a security threat in which availability of resources is
attacked.
For example, a user is unable to access its web-server or the web-
server is hijacked.
Privacy-Breach
In this threat, the privacy of a user is compromised. Someone, who
is not the authorized person is accessing or intercepting data sent or
received by the original authenticated user.
Integrity
This type of threat includes any alteration or modification in the
original context of communication. The attacker intercepts and receives the
data sent by the sender and the attacker then either modifies or generates
false data and sends to the receiver. The receiver receives the data
assuming that it is being sent by the original Sender.
Authenticity
This threat occurs when an attacker or a security violator poses as a
genuine person and accesses the resources or communicates with other
genuine users.
No technique in the present world can provide 100% security. But
steps can be taken to secure data while it travels in unsecured network or
internet. The most widely used technique is Cryptography.
Cryptography is a technique to encrypt the plain-text data which
makes it difficult to understand and interpret. There are several
cryptographic algorithms available present day as described below:
Secret Key
Public Key
Message Digest
Message Digest
In this method, actual data is not sent; instead a hash value is
calculated and sent. The other end user, computes its own hash
value and compares with the one just received. If both hash values
are matched, then it is accepted; otherwise rejected.
Example of Message Digest is MD5 hashing. It is mostly used
in authentication where user password is cross checked with the one
saved on the server.