{"id":1054,"date":"2010-10-26T15:14:46","date_gmt":"2010-10-26T19:14:46","guid":{"rendered":"http:\/\/www.acarlstein.com\/?p=1054"},"modified":"2010-10-28T13:25:02","modified_gmt":"2010-10-28T17:25:02","slug":"introduction-to-network-security-part-2","status":"publish","type":"post","link":"http:\/\/blog.acarlstein.com\/?p=1054","title":{"rendered":"Introduction to Network Security &#8211; Part 2"},"content":{"rendered":"<p><span style=\"text-decoration: underline;\"><strong>NOTIFICATION:<\/strong><\/span><strong> <\/strong>These examples are provided for  educational purposes.     The use of this code and\/or information is  under your own responsibility and risk. The information and\/or code is      given \u2018as is\u2019. I do not take responsibilities of how they are used.<\/p>\n<p><strong>Introduction To Network : <\/strong><strong>The Internet<\/strong><\/p>\n<p>The Internet is a network which connect networks around the world. Each end system (normally end users computers) obtain access thought an Internet Service Provider (ISPs).<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.elblender.com\/wordpress\/wp-content\/uploads\/2010\/10\/ISPs-Example.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1068\" title=\"ISPs Example\" src=\"http:\/\/www.elblender.com\/wordpress\/wp-content\/uploads\/2010\/10\/ISPs-Example.jpg\" alt=\"\" width=\"591\" height=\"483\" srcset=\"http:\/\/blog.acarlstein.com\/wp-content\/uploads\/2010\/10\/ISPs-Example.jpg 591w, http:\/\/blog.acarlstein.com\/wp-content\/uploads\/2010\/10\/ISPs-Example-300x245.jpg 300w\" sizes=\"auto, (max-width: 591px) 100vw, 591px\" \/><\/a><\/p>\n<p><strong>Protocols<\/strong><\/p>\n<p>A protocol is a way in which rules for communication are established. For example, in a court, there is a procedure and language that must be follow in the process. A network protocol will define a language of rules, format, order of messages, entities, actions to take, and convention in order to the message being transmitted.<\/p>\n<p>For example: A user which to see a website, therefore the browser will make a TCP request to the server. Due the TCP request form the client, the server answer with a TCP response to the client. Then the client perform a request for the page to the server. Finally, the server send the page requested by the client.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.elblender.com\/wordpress\/wp-content\/uploads\/2010\/10\/Communication-example.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1071\" title=\"Communication example\" src=\"http:\/\/www.elblender.com\/wordpress\/wp-content\/uploads\/2010\/10\/Communication-example.jpg\" alt=\"\" width=\"737\" height=\"379\" srcset=\"http:\/\/blog.acarlstein.com\/wp-content\/uploads\/2010\/10\/Communication-example.jpg 737w, http:\/\/blog.acarlstein.com\/wp-content\/uploads\/2010\/10\/Communication-example-300x154.jpg 300w\" sizes=\"auto, (max-width: 737px) 100vw, 737px\" \/><\/a><\/p>\n<p><strong>Protocol Layers<\/strong><\/p>\n<p>A protocol divided the components needed for transition of messages in modular layers (modulation of the components helps to maintain, update, and\/or perform changes to the component). The implementation of layers must be done in the way that it is transparent to the rest of the system as will be explained later. The following image provide an example of the actual layers used for the TCP\/IP protocol and the protocol layers recommended by the OSI model.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.elblender.com\/wordpress\/wp-content\/uploads\/2010\/10\/Protocol-Layers.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1073\" title=\"Protocol Layers\" src=\"http:\/\/www.elblender.com\/wordpress\/wp-content\/uploads\/2010\/10\/Protocol-Layers.jpg\" alt=\"\" width=\"679\" height=\"354\" srcset=\"http:\/\/blog.acarlstein.com\/wp-content\/uploads\/2010\/10\/Protocol-Layers.jpg 679w, http:\/\/blog.acarlstein.com\/wp-content\/uploads\/2010\/10\/Protocol-Layers-300x156.jpg 300w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/a><\/p>\n<p>As you can witness, in the actual TCP\/IP protocol, we have five well defined layers.<\/p>\n<p><span style=\"text-decoration: underline;\">This layers are:<\/span><\/p>\n<ol>\n<li><span style=\"text-decoration: underline;\">Application Layer:<\/span> This layers permit the user to access the information that is being send and\/or receive from the network through the application in used for this purpose.\n<ol>\n<li>This layer support application-layer protocols such as Hyper-Text Transfer Protocol (HTTP), File Transfer Protocol (FTP), Secure\u00a0 SHell (SSH), and others.<\/li>\n<li>The information to be transmitted is send over the application layers which is in charge to encapsulate the data into the application layer protocol and transfer the encapsulated data to the transport layer.<\/li>\n<\/ol>\n<\/li>\n<li><span style=\"text-decoration: underline;\">Transport Layer:<\/span> This layer is in charge to provide to end users a transparent transfer of data.\n<ol>\n<li>This layer provide controls of reliability of a given link through flow control segmentation\/de-segmentation plus error control.<\/li>\n<li>The most common segments used today are Transmission Control Protocol (TCP) and User Datagram Protocol.\n<ol>\n<li>Transmission Control Protocol (TCP) is know to be a reliable connector-oriented protocol. Commonly used to send data.<\/li>\n<li>User Datagram Protocol\u00a0 (UDP) is know to be a faster but unreliable connector-oriented protocol. Commonly used for streaming media such as radio, movies, clips, and TV online.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<li><span style=\"text-decoration: underline;\">Network Layer:<\/span> This layer is in charge of routing the datagrams from the source to the destination using routing protocols such as Internet Protocol (IP). All routes operate at this layer.<\/li>\n<li><span style=\"text-decoration: underline;\">Link Layer:<\/span> This layer is used for the transfer of data between network entities such as bridges and switches by providing the functional and procedural means.<\/li>\n<li><span style=\"text-decoration: underline;\">Physical Layer:<\/span> All the data is encoded and transmit as raw data over the network media by making sure that the information that is send in one side is received at the other side accurately.<\/li>\n<\/ol>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.elblender.com\/wordpress\/wp-content\/uploads\/2010\/10\/Protocol-Layers-Communications2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1080\" title=\"Protocol Layers Communications\" src=\"http:\/\/www.elblender.com\/wordpress\/wp-content\/uploads\/2010\/10\/Protocol-Layers-Communications2.jpg\" alt=\"\" width=\"816\" height=\"1056\" srcset=\"http:\/\/blog.acarlstein.com\/wp-content\/uploads\/2010\/10\/Protocol-Layers-Communications2.jpg 816w, http:\/\/blog.acarlstein.com\/wp-content\/uploads\/2010\/10\/Protocol-Layers-Communications2-231x300.jpg 231w, http:\/\/blog.acarlstein.com\/wp-content\/uploads\/2010\/10\/Protocol-Layers-Communications2-791x1024.jpg 791w\" sizes=\"auto, (max-width: 816px) 100vw, 816px\" \/><\/a><\/p>\n\n<script>\nvar zbPregResult = '0';\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>NOTIFICATION: These examples are provided for educational purposes. The use of this code and\/or information is under your own responsibility and risk. The information and\/or code is given \u2018as is\u2019. I do not take responsibilities of how they are used. Introduction To Network : The Internet The Internet is a network which connect networks around [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,264],"tags":[296,302,301,303,290,294,268,291,300,298,265,299,292,168,293,297,295],"class_list":["post-1054","post","type-post","status-publish","format-standard","hentry","category-programming","category-network-security","tag-application","tag-datagram","tag-destination","tag-frame","tag-internet","tag-ip","tag-iso","tag-isp","tag-layers","tag-link","tag-network","tag-physical","tag-protocol","tag-source","tag-tcp","tag-transport","tag-udp"],"_links":{"self":[{"href":"http:\/\/blog.acarlstein.com\/index.php?rest_route=\/wp\/v2\/posts\/1054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/blog.acarlstein.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.acarlstein.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.acarlstein.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.acarlstein.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1054"}],"version-history":[{"count":15,"href":"http:\/\/blog.acarlstein.com\/index.php?rest_route=\/wp\/v2\/posts\/1054\/revisions"}],"predecessor-version":[{"id":1070,"href":"http:\/\/blog.acarlstein.com\/index.php?rest_route=\/wp\/v2\/posts\/1054\/revisions\/1070"}],"wp:attachment":[{"href":"http:\/\/blog.acarlstein.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.acarlstein.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1054"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.acarlstein.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}