Networking part 5 Protocols & Transmission

December 24, 2018 | Views: 1019

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Protocols & Transmission

User Datagram Protocol
Transporting packages from one place to another like a stream of water.
UDP is a transmission protocol that doesn’t check if the data got there- it is a connectionless protocol.

UDP does not offer validation or any verification of data packets, which makes it very vulnerable to data corruption. This means that it’s very necessary that the packets sizes/byte indexes are small and that they have to make sense in the right order. It is used for real-time services like watching streams and talking on voice. It utilizes an 8-byte packet header.

Transmission Control Protocol
Transporting packages from one place to another in a secure and safe way
TCP is a transmission protocol that supports «acknowledgement of delivery» (verification of packets) and puts a load number on each packet- which makes it a connection-oriented protocol. It has a larger package size and usually has additional info to identify the packet in the 20-byte header. If a packet is lost during a TCP stream, it will automatically resend it and verify again.

Three-way-handshake

The negotiation of connection to make sure I can hear you and you can hear me

Initiating side ← whoever starts the connection

In addition to be a better way of transmitting data, it also offers a three-way-handshake for security. A three-way-handshake enables Comp1 to send a SYN(synchronized message) as a “hey, I need to sync and make sure we can talk before sending data.”,  if the connection is accepted Comp2 sends a SYN ACK(synchronizes acknowledge), after that comp1 will send an ACK(acknowledge) to reply “Ok, cool. I heard your SYN ACK”, and then a connection is established.

-Host A sends a TCP SYNchronize packet to Host B

-Host B receives A’s SYN

-Host B sends a SYNchronize-ACKnowledgement

-Host A receives B’s SYN-ACK

-Host A sends ACKnowledge

-Host B receives ACK.

TCP socket connection is ESTABLISHED.

Address Resolution Protocol

Determines MAC addresses and translates network layer to datalink layer

The Address Resolution Protocol is a communication protocol used for discovering physical addresses associated with their given network addresses. Usually when surfing the web, we interact with our IP address, and together with our transmission protocols we get our packets delivered. However, in order for the network to know which device to contact, we need the physical address of the destination machine. ARP is used to get the physical address (MAC) of that destination machine.

“which IP is associated with which MAC?” “Where is X, tell X”
“What specific NIC, which cable this packet goes to”

Can also be used to show if someone is using a computer to find objects in our network. This is because ARP-discovery packets are broadcasted across the whole network, causing every computer to get this message. It also enables a huge vulnerability when it comes to Man-in-the-middle attacks.

Internet Control Message Protocol
Tracert and pinging requests
Delivers errors/query to determine if the service is available → Pinging.
If sending echo to target computer, asks: “can you hear or see me?”

Smurf attacks- forged ICMP requests sent on broadcast to DOS other hosts

Internet Group Management
Protocol for multicasting
Multicasting ← “One to many”
Manages the multicast group membership to neighboring switches and routers in a network

File Transfer Protocol

File transfers

21: TCP
When transferring standard files through a FTP server and a FTP client
No encoding or overhead
A bit insecure caused by the wireless attack “FTP bouncing”

Secure File Transfer Protocol

Secure file transfers

22: TCP
Encrypted with SSH
More secure than FTP

Remote Desktop Protocol

Remote connections

33389: TCP/UDP

Remote desktop connections through RDP client software
Firewalls can block RDP Protocols for security measures

Simple mail transfer protocol

Emailing

25: TCP

Describes and manages how an e-mail is sent from one computer to another
Email client > SMTP Server > Internet >POP/IMAP server > Email client

Post Office Protocol 3

110: TCP
A “Client download” from the internet to get emails
by default typically copies from server > then deletes file from server (Can be changed)

Internet Message Access Protocol

Emailing
143: TCP
More robust version of POP3
More configuration ability
Keeps copy of message on server

Hypertext transfer protocol

Web page formatting

80: TCP
HTTP transfers the HTML/programming
Web browsers sends a “get” request to a web server
All in clear text/nothing hidden or encrypted

HTTP Secure

Web page formatting securely
443: TCP
Encrypted HTTP over SSL
Certificate between client/server
Info not cleartext

Secure Shell

Secure connections

22: TCP
Encrypted connection between ports
May work with other protocols such as Telnet, rlogin and RSH

Transport Layer Security

Secure connections

/varies from program that uses it/
Successor to SSL- Small differences, but they’re mainly alike
Used on different ports depending on which protocol they are securing

Telnet

Remote connections

23: UDP/TCP
Remote terminal connection to another computer/device
Unencrypted logins to connections/networks
SSH is replacing Telnet or other encrypted connections caused by the non-secure sessions

Session Initiation Protocol

Session establish
5060: UDP/TCP
SIP is an application-layer control protocol that can establish, modify, and terminate multimedia sessions (conferences) such as Internet telephony calls.

-Opens the door for RTP:
-Only initiates a session, but sends no data
-Indicates to remote computer to open port for communication
-“please open this port that we set up for this device”

Real Time Protocol

real time Information sending

/varies depending on customization/

Initiated between communicating peers such as SIP
A network protocol for delivering Stream/ video/audio/voice
Detects out of sequence arrival (Can be detected if some packets are out of sequence and adjust for that)

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel