We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Network Security through the protocol - Essay Example

Comments (0) Cite this document
Summary to essay on topic "Network Security through the protocol"
All the data which are sent in the network are transferred in the form of packets. For example, when you send a mail across the internet the mail transfers in the form of packets. These packets are transferred through the protocol. Internet uses the Transmission control protocol (TCP)…
Download full paper
Polish This Essay
Network Security through the protocol
Read TextPreview

Extract of essay "Network Security through the protocol"

Download file "Network Security through the protocol" to see previous pages... DF is the flag Don't Fragment
S is the first part of three-way TCP handshake (SYN, SYN, ACK)
Seq is the sequence number
Ack is the Acknowledgement
TcpLen is the length of the TCP protocol
TcpOption Provision for optional header fields
MSS 1460 is the maximum segment size,
Let us write or edit the essay on your topic "Network Security through the protocol" with a personal 20% discount.. Try it now
or maximum IP datagram size that can be handled without using fragmentation. Both sides of the connection must agree on a value; if they are different, the lower value is used.
As we have seen the dissection of the above packet we will directly get into packet analyses for the rest of the packets.




Analyses of all the network packets:
08/16-15:27:17.820587 193.63.129.192:1843 -> 193.63.129.187:139
TCP TTL:128 TOS:0x0 ID:48195 IpLen:20 DgmLen:44 DF
******S* Seq: 0xF1908361 Ack: 0x0 Win: 0x2000 TcpLen: 24
TCP Options (1) => MSS: 1460
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
At this packet the source address is sending information to the destination through TCP. Here the initial phase of the TCP is done. Sync is done in the TCP handshake. The sequence number is given in hexadecimal.
Now the destination 193.63.129.187 would receive the packet and send an acknowledgement back to the source.

08/16-15:27:17.820656 193.63.129.187:139 -> 193.63.129.192:1843
TCP TTL:128 TOS:0x0 ID:2676 IpLen:20 DgmLen:44 DF
***A**S* Seq: 0x7CFB7BBA Ack: 0xF1908362 Win: 0x2238 TcpLen: 24
TCP Options (1) => MSS: 1460
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Here we see that the destination with port 139 has sent an acknowledgement back to the source 192.63.129.187 with an acknowledgement 0xF1908362. This Ack would be received by the 192.63.129.187.

08/16-15:27:17.820785 193.63.129.192:1843 -> 193.63.129.187:139
TCP TTL:128 TOS:0x0...
Generally these packets can be easily sniffed using different packet sniffers like wireshark, snort, capsa etc., These packet analyzers are generally used so that it can used to analyze any kind of network problem, it can be used to detect the network intrusion attempts, it can gain information for effecting a network intrusion, to monitor the network usage, to debug client and server communication. Here let us analyze and decode the network packets.
MSS 1460 is the maximum segment size, or maximum IP datagram size that can be handled without using fragmentation. Both sides of the connection must agree on a value; if they are different, the lower value is used.
At this packet the source address is sending information to the destination through TCP. Here the initial phase of the TCP is done. Sync is done in the TCP handshake. The sequence number is given in hexadecimal.
Now being familiar with all the packet information let us move forward where the actual data has been transmitted between the two IP address. In the above packet we can see the hex dump of the packet where there is a message sent to the destination here. This is where the Session Request is done.
Similarly the above packet gathers the acknowledgement of the previous packets and sends it as the sequence to the destination address where the connection has been established. ...Download file "Network Security through the protocol" to see next pagesRead More
Cite this document "Network Security through the protocol"
  • APA
  • MLA
  • CHICAGO
(“Network Security through the protocol Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Network Security through the protocol Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/miscellaneous/1508360-network-security-through-the-protocol
(Network Security through the Protocol Essay Example | Topics and Well Written Essays - 1500 Words)
Network Security through the Protocol Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/miscellaneous/1508360-network-security-through-the-protocol.
“Network Security through the Protocol Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/miscellaneous/1508360-network-security-through-the-protocol.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC "Network Security through the protocol"
Network Security
This essay mainly focuses on five parts, that are describing the topic of network security, such as introduction and terminology used, business continuity planning (BCP) analysis, disaster recovery planning analysis, social engineering and an acceptable use policy (AUP), that is an important policy defined for a network.
5 Pages(1250 words)Essay
Network Protocol
In the past few years, the field of information technology has experienced an amazing pace of advancement. In fact, these developments and advancements of information technology have caused a considerable transformation in the understanding, thoughts and ways of thinking of the people.
17 Pages(4250 words)Essay
Network Security
Lacking data integrity and security of information, no company can survive attempts of organized intrusion and related cyber crimes like information theft and spamming. Moreover, network security is highly necessary to protect the computers from malware like Trojan Horse and Phishing software that are capable of recording and sending out sensitive inputs directly to the hackers when connected with Internet.
4 Pages(1000 words)Essay
Network Security
In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security.
24 Pages(6000 words)Essay
Protecting Information through Network Security
The paper in detail looks into the one of the least protected and most vulnerable form of usage of internet in the form of proxy servers. A proxy server can be defined as one that is developed on remote basis for purpose of connection, and it may not make use of the detailed technical specifications for the purpose of fulfilling the requirements of a complete internet network. Proxy servers use the special password and I.D for access to a specific data bases.
7 Pages(1750 words)Book Report/Review
Network and Internet Security
As the author of the essay states, session keys are used to ensure that communication between two parties can be initiated when needed and terminated when there is no use of it. Besides, on of the main benefit of the session keys is that they limit the number of attacks on a system by making it difficult to attack a system.
6 Pages(1500 words)Essay
Computer Network Security Methods
All existing technical mechanisms like, cryptography, network security applications and network security systems, related to network security, are briefly explained (not physical measures). Finally, an approach to device a typical network security setup is covered before concluding the paper.
24 Pages(6000 words)Essay
Internet protocol and VoIP security
These new techniques will lay the foundation for solving the mentioned issues from a different angle, which is expected to improve the security and QoS of the existing approach.The paper will involve an understanding of the current security implications of VoIP, and to run VoIP in a safe, secure manner.
15 Pages(3750 words)Essay
Network security
This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. Technical security controls are used to provide control mechanisms within systems to as to mitigate potential security
2 Pages(500 words)Essay
Network security
The components include large flat panel televisions and surround sound systems of varying scale and complexity and huge range of peripheral devices that are with the system. As of now, the VAC has internal chain of supply, which is networked using
3 Pages(750 words)Essay
Let us find you another Essay on topic Network Security through the protocol for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us