Module4
Module4
layer above it
Layers 7, 6, and 5 - Data and instructions, known as
payload
Layer 4 – A Transport Layer protocol, usually TCP or
UDP, adds a header to the payload
• Includes a port number to identify the receiving app
Layer 3 - Network layer adds it own header and becomes a
packet
Layer 2 - packet is passed to Data Link layer on NIC,
which encapsulates data with its own header and trailer,
creating a frame
Three characteristics of TCP:
• Connection-oriented - TCP ensures that a connection
or session is established by using a three-step process called
a three-way handshake
Three transmissions are sent before data
transmission:
• Step 1 – a request for a connection (SYN)
• Step 2 – a response to the request (SYN/ACK)
• Step 3 – a connection is established (ACK)
Sequence numbers will be increased by the number of bits
included in each received
segment
• Confirms the correct length of message was received
• Sequencing and checksums - TCP sends a character
string called a checksum that is checked by the destination
host along with a sequence number for each segment
• Flow control - gauges rate of transmission based on
how quickly recipient can accept data
IPv6 Packets
• IPv6 uses a different packet format than IPv4
• IPv6 can accommodate the much longer IPv6
addresses
• There is no Fragment offset field
• IPv6 hosts adjust their packet sizes to fit the
requirements of the network before sending IPv6 messages
Key Encryption
A random string of characters:
Generates unique data block(ciphertext)
Created according to algorithms
Two categories:
Private uses only one key, which is secure between
sender and receiver.
Public relies on receiver that can be safe by anyone
IPsec:
-defines rules for encryption, authentication and key
management for TCP/IP transmissions
-creates secure connections in five steps
1. IPsec initiation
2. Key management
3. Security negotiations
4. Data transfer
5. Termination
Operates in two modes
Transport and Tunnel mode