194x Filetype PPTX File size 0.55 MB Source: www.ncyte.net
Learning Objectives Upon completion of this lesson, students will: •be able to identify the OSI Network layers and their functions. •research and recognize common network attacks. •explain one of the network attacks and analyze the ethical considerations and consequences dealt to attackers. This document is licensed with a Creative Commons Attribution 4.0 International License ©2017 www.C5colleges.org This material is based upon work supported by the National Science Foundation under Grant No.1548315. IP Moving Truck and The Internet What does the moving truck have in common with the internet? MOVING ACROSS THE COUNTRY (IP TRUCK) THE INTERNET The IP Moving Truck traveled on a road that was built for TOPOLOGY: Data on the internet travels on DSL, Ethernet, it. The road was made to send trucks like IP Truck across or Cable System – all “roads” intended to carry payload. the country. IP Moving Truck = collection of boxes Ethernet Frame = collection of packets Box = collection of items TCP/IP or UDP Packet = collection of data You wanted what is inside the box. If there was more Applications use what is in the packet. If there is more than one box needed for a room, you assembled these than one packet needed, these are assembled by the when the boxes were received. application when received. This document is licensed with a Creative Commons Attribution 4.0 International License ©2017 www.C5colleges.org This material is based upon work supported by the National Science Foundation under Grant No.1548315. Some More Information about the Truck BEDROOM BATHROOM Ethernet IP Traffic PayloIPa dPayload Ethernet TCP HTTP Data Header Trailer This document is licensed with a Creative Commons Attribution 4.0 International License ©2017 www.C5colleges.org This material is based upon work supported by the National Science Foundation under Grant No.1548315. Seeing Interrelationships in “Truck” IP (Internet ETHERNET TCP or UDP Protocol) This document is licensed with a Creative Commons Attribution 4.0 International License ©2017 www.C5colleges.org This material is based upon work supported by the National Science Foundation under Grant No.1548315. Two ways to Transport Items Envelops ol Boxes in IP Moving Van o ch S am e Dr r ou e Y n La • Unreliable am • e Dr reliable 5 T S , ity C am e Dr • No return • delivery guaranteed and if receipt something is lost, user can re- request TRANSMISSION CONTROL USER DATAGRAM PROTOCOL (UDP) PROTOCOL (TCP) • no return receipt • reliable • no formal close/open, • delivery guaranteed and if “connectionless” something is lost, user can re- • no reorder, no flow control, unreliable request This document is licensed with a Creative Commons Attribution 4.0 International License ©2017 www.C5colleges.org This material is based upon work supported by the National Science Foundation under Grant No.1548315.
no reviews yet
Please Login to review.