More on this book
Community
Kindle Notes & Highlights
by
Mike Chapple
Started reading
December 21, 2019
Ethernet (IEEE 802.3)
Token Ring (IEEE 802.5)
Fiber Distributed Data Interface (FDDI)
Copper DDI (CDDI).
Point-to-Point Protocol (PPP)
Address Resolution Protocol (ARP)
Point-to-Point Tunneling Protocol (PPTP)
Integrated Services Digital Network (ISDN)
Media Access Control (MAC) address, which is a 6-byte (48-bit) binary address written in hexadecimal notation (for example, 00-13-02-1F-58-F5). The first 3 bytes (24 bits) of the address denote the vendor or manufacturer of the physical network interface. This is known as the Organizationally Unique Identifier (OUI). OUIs are registered with the Institute of Electrical and Electronics Engineers (IEEE), which controls their issuance.
Address Resolution Protocol (ARP)
Traffic on a network segment is directed from its source system to its destination system using MAC addresses.
ARP is also not truly a full layer 2 protocol
Data Link layer contains two sublayers: the Logical Link Control (LLC) sublayer and the MAC sublayer.
Network hardware devices that function at layer 2, the Data Link layer, are switches and bridges.
Internet Control Message Protocol (ICMP) Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Border Gateway Protocol (BGP) Internet Group Management Protocol (IGMP)
Internet Protocol (IP) Internet Protocol Security (IPSec)
Internetwork Packet Exch...
This highlight has been truncated due to consecutive passage length restrictions.
Network Address Transla...
This highlight has been truncated due to consecutive passage length restrictions.
Simple Key Management for Internet Pr...
This highlight has been truncated due to consecutive passage length restrictions.
The Network layer also manages error detection and node data traffic (in other words, traffic control).
(a dead zone is a network segment using an alternative
Network layer protocol instead of IP).
Server Message Block (SMB)
Routers and bridge routers (brouters) are among the network hardware devices that function at layer 3.
Routing Information Protocol (RIP) and Interior Gateway Routing Protocol (IGRP), while common examples of link state routing protocols are Open Shortest Path First (OSPF) and OSI’s Intermediate System - Intermediate System (IS-IS).
The Transport layer (layer 4) is responsible for managing the integrity of a connection and controlling the session.
The Transport layer establishes a logical connection between two devices and provides end-to-end transport services to ensure data delivery.
segmentation, sequencing, error checking, controlling the flow of data, error correction, multiplexing, and network service optimization.
Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Sequenced Packet Exchange (SPX) Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
The Session layer (layer 5) is responsible for establishing, maintaining, and terminating communication sessions between two computers.
It manages dialogue discipline or dialogue control (simplex, half-duplex, full-duplex), establishes checkpoints for grouping and recovery, and retransmits PDUs that have failed or been lost since the last verified checkpoint.
Network File System (NFS) Structured Query Language (SQL) Remote Procedure Call (RPC)
Simplex One-way communication Half-Duplex Two-way communication, but only one direction can send data at a time Full-Duplex Two-way communication, in which data can be sent in both directions simultaneously
The Presentation layer (layer 6) is responsible for transforming data received from the Application layer into a format that any system following the OSI model can understand. It imposes common or standardized structure and formatting rules onto the data.
The Presentation layer is also responsible for encryption and compression.
American Standard Code for Information Interchange (ASCII) Extended Binary-Coded Decimal Interchange Mode (EBCDICM) Tagged Image File Format (TIFF) Joint Photographic Experts Group (JPEG) Moving Picture Experts Group (MPEG)
Musical Instrument Digital Interface (MIDI)
Hypertext Transfer Protocol (HTTP) File Transfer Protocol (FTP) Line Print Daemon (LPD) Simple Mail Transfer Protocol (SMTP) Telnet Trivial File Transfer Protocol (TFTP) Electronic Data Interchange (EDI) Post Office Protocol version 3 (POP3) Internet Message Access Protocol (IMAP) Simple Network Management Protocol (SNMP) Network News Transport Protocol (NNTP)
Secure Remote Procedure Call (S-RPC) Secure Electronic Transaction (SET)
TCP/IP Model The TCP/IP model (also called the DARPA or the DOD model) consists of only four layers, as opposed to the OSI Reference Model’s seven.
it was designed for ease of use rather than for security.
TCP/IP can be secured using virtual private network (VPN) links between systems. VPN links are encrypted to add privacy, confidentiality, and authentication and to maintain data integrity. Protocols used to establish VPNs are Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), Secure Shell (SSH), OpenVPN (SSL/TLS VPNs), and Internet Protocol Security (IPSec). Another method to provide protocol-level security is to employ TCP wrappers. A TCP wrapper is an application that can serve as a basic firewall by restricting access to ports and resources based on user IDs or
...more
TCP and UDP each have 65,536 ports.
ports is 2^16,
or 65,536, numbered from 0 thr...
This highlight has been truncated due to consecutive passage length restrictions.
The combination of an IP address and a port number is known as a socket.
The first 1,024 of these ports (0–1,023) are called the well-known ports or the service ports.

