SlideShare a Scribd company logo
Ethical Hacking 
CHAPTER 2 – TCP/IP CONCEPTS 
ERIC VANDERBURG
Objectives 
 Describe the TCP/IP protocol stack 
 Explain the basic concepts of IP addressing 
 Explain the binary, octal, and hexadecimal numbering systems
Overview of TCP/IP 
 Protocol 
 Common language used by computers for speaking 
 Transmission Control Protocol/Internet Protocol (TCP/IP) 
 Most widely used protocol 
 TCP/IP stack 
 Contains four different layers 
 Network 
 Internet 
 Transport 
 Application
The Application Layer 
 Front end to the lower-layer protocols 
 What you can see and touch
The Transport Layer 
 Encapsulates data into segments 
 Segments can use TCP or UDP to reach a destination host 
 TCP is a connection-oriented protocol 
 TCP three-way handshake 
 Computer A sends a SYN packet 
 Computer B replies with a SYN-ACK packet 
 Computer A replies with an ACK packet
TCP Segment Headers 
 Critical components: 
 TCP flags 
 Initial Sequence Number (ISN) 
 Source and destination port 
 Abused by hackers finding vulnerabilities
TCP Flags 
 Each flag occupies one bit 
 Can be set to 0 (off) or 1 (on) 
 Six flags 
 SYN: synthesis flag 
 ACK: acknowledge flag 
 PSH: push flag 
 URG: urgent flag 
 RST: reset flag 
 FIN: finish flag
Initial Sequence Number (ISN) 
 32-bit number 
 Tracks packets received 
 Enables reassembly of large packets 
 Sent on steps 1 and 2 of the TCP three-way handshake
TCP Ports 
 Port 
 Logical, not physical, component of a TCP connection 
 Identifies the service that is running 
 Example: HTTP uses port 80 
 A 16-bit number 
 TCP packets has source and destination port fields 
 Helps you stop or disable services that are not needed 
 Open ports are an invitation for an attack
TCP Ports (continued) 
 Only the first 1023 ports are considered well-known 
 List of well-known ports 
 Available at the Internet Assigned Numbers Authority (IANA) Web site 
(www.iana.org) 
 Ports 20 and 21 
 File Transfer Protocol (FTP) 
 Use for sharing files over the Internet 
 Requires a logon name and password 
 More secure than Trivial File Transfer Protocol (TFTP)
TCP Ports (continued) 
 Port 25 
 Simple Mail Transfer Protocol (SMTP) 
 E-mail servers listen on this port 
 Port 53 
 Domain Name Service (DNS) 
 Helps users connect to Web sites using URLs instead of IP addresses 
 Port 69 
 Trivial File Transfer Protocol 
 Used for transferring router configurations
TCP Ports (continued) 
 Port 80 
 Hypertext Transfer Protocol (HTTP) 
 Used when connecting to a Web server 
 Port 110 
 Post Office Protocol 3 (POP3) 
 Used for retrieving e-mail 
 Port 119 
 Network News Transfer Protocol 
 For use with newsgroups
TCP Ports (continued) 
 Port 135 
 Remote Procedure Call (RPC) 
 Critical for the operation of Microsoft Exchange Server and Active Directory 
 Port 139 
 NetBIOS 
 Used by Microsoft’s NetBIOS Session Service 
 Port 143 
 Internet Message Access Protocol 4 (IMAP4) 
 Used for retrieving e-mail 
 Better than POP3
User Datagram Protocol (UDP) 
 Fast but unreliable protocol 
 Operates on transport layer 
 Does not need to verify whether the receiver is listening 
 Higher layers of the TCP/IP stack handle reliability problems 
 Connectionless protocol
The Internet Layer 
 Responsible for routing packets to their destination address 
 Uses a logical address, called an IP address 
 IP addressing packet delivery is connectionless 
 Internet Control Message Protocol (ICMP) 
 Used to send messages related to network operations 
 Helps in troubleshooting a network 
 Some commands include 
 Ping 
 Traceroute
IP Addressing 
 Consists of four bytes 
 Two components 
 Network address 
 Host address 
 Classes 
 Class A 
 Class B 
 Class C
IP Addressing (continued) 
 Class A 
 First byte is reserved for network address 
 Last three bytes are for host address 
 Supports more than 16 million host computers 
 Limited number of Class A networks 
 Reserved for large corporations and governments 
 Format: network.node.node.node
IP Addressing (continued) 
 Class B 
 First two bytes are reserved for network address 
 Last two bytes are for host address 
 Supports more than 65,000 host computers 
 Assigned to large corporations and Internet Service Providers (ISPs) 
 Format: network.network.node.node
IP Addressing (continued) 
 Class C 
 First three bytes are reserved for network address 
 Last byte is for host address 
 Supports up to 254 host computers 
 Usually available for small business and home networks 
 Format: network.network.network.node
IP Addressing (continued) 
 Subnetting 
 Each network can be assigned a subnet mask 
 Helps identify the network address bits from the host address bits
Planning IP Address Assignments 
 Each network segment must have a unique network address 
 Address cannot contain all 0s or all 1s 
 Accessing entities and services on other networks 
 Each computer needs IP address of gateway 
 TCP/IP uses subnet mask to determine destination computer’s network address 
 If addresses are different, relays packet to gateway 
 Gateway forwards packet to its next destination 
 Packet eventually reaches destination
Overview of Numbering Systems 
 Binary 
 Octal 
 Hexadecimal
Reviewing the Binary Numbering 
System 
 Uses the number 2 as its base 
 Binary digits (bits): 0 and 1 
 Byte 
 Group of 8 bits 
 Can represent 28 = 256 different values 
 File permissions are represented with bits 
 0 means removing the permission 
 1 means granting the permission 
 111 (rwx) means all permissions apply
Examples of Determining Binary Values 
 Each position represents a power of 2 value 
 Usually the bit on the right is the less significant bit 
 Converting 1011 to decimal 
 1 x 20 = 1 
 1 x 21 = 2 
 0 x 22 = 0 
 1 x 23 = 8 
 1 + 2 + 8 = 11 (decimal value)
Understanding Nibbles 
 Half a byte or four bits 
 Helps with reading the number by separating the byte 
 1111 1010 
 Components 
 High-order nibble (left side) 
 Low-order nibble (right side)
Understanding Nibbles (continued) 
 Converting 1010 1010 to decimal 
 Low-order nibble 
 1010 = 10 (base 10) 
 Multiply high-order nibble by 16 
 1010 = 10 x 16 = 160 (base 10) 
 160 + 10 = 170 (base 10)
Reviewing the Octal Numbering 
System 
 Uses 8 as its base 
 Supports digits from 0 to 7 
 Octal digits can be represented with three bits 
 Permissions on UNIX 
 Owner permissions (rwx) 
 Group permissions (rwx) 
 Other permissions (rwx) 
 Example: 111 101 001 
 Octal representation 751
Reviewing the Hexadecimal 
Numbering System 
 Uses 16 as its base 
 Support numbers from 0 to 15 
 Hex number consists of two characters 
 Each character represents a nibble 
 Value contains alphabetic letters (A … F) 
 A representing 10 and F representing 15 
 Sometimes expressed with “0x” in front 
 Represent hex number in binary or decimal 
 Convert each nibble to binary 
 Convert binary value to decimal
Summary 
 TCP/IP 
 Most widely used communication protocol over the Internet 
 TCP/IP stack consists of four layers 
 Network 
 Internet 
 Transport 
 Application 
 Application layer 
 Front end
Summary (continued) 
 Transport layer 
 Encapsulation 
 TCP 
 Connection-oriented protocol 
 TCP header 
 TCP flags 
 Initial Sequence Number (ISN) 
 Source and destination ports 
 Internet layer 
 Packet routing
Summary (continued) 
 IP addressing 
 Four bytes 
 Classes: A, B, and C 
 Binary numbering system 
 Uses 2 as its base 
 Octal numbering system 
 Uses 8 as its base 
 Hexadecimal numbering system 
 Uses 16 as its base

More Related Content

What's hot

Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
Geethu Jose
 
SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
EILLEN IVY PORTUGUEZ
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
Bisrat Girma
 
Network software
Network softwareNetwork software
Network software
Md Saylab
 
Ipv6^ new
Ipv6^ newIpv6^ new
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IP
Sukh Sandhu
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
Vi Tính Hoàng Nam
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
junnubabu
 
Ip addressing...
Ip addressing... Ip addressing...
Ip addressing...
CYBERINTELLIGENTS
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
Jayesh Chauhan
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
sweta dargad
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
Adeel Rasheed
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
Rajat Kumar
 
IP Address
IP AddressIP Address
IP Address
Rahul P
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
IPV6
IPV6IPV6
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
urooj ehsan
 
Firewall Facts
Firewall FactsFirewall Facts
Firewall Facts
DAVID RAUDALES
 
Addressing in Computer Networks
Addressing in Computer NetworksAddressing in Computer Networks
Addressing in Computer Networks
Janki Shah
 

What's hot (20)

Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
 
SET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEMSET UP INTERNET CONNECTION USING MODEM
SET UP INTERNET CONNECTION USING MODEM
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
 
Network software
Network softwareNetwork software
Network software
 
Ipv6^ new
Ipv6^ newIpv6^ new
Ipv6^ new
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IP
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 
Ip addressing...
Ip addressing... Ip addressing...
Ip addressing...
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
 
IP Address
IP AddressIP Address
IP Address
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
IPV6
IPV6IPV6
IPV6
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
Network security at_osi_layers
Network security at_osi_layersNetwork security at_osi_layers
Network security at_osi_layers
 
Firewall Facts
Firewall FactsFirewall Facts
Firewall Facts
 
Addressing in Computer Networks
Addressing in Computer NetworksAddressing in Computer Networks
Addressing in Computer Networks
 

Viewers also liked

Aacte Junio 2008
Aacte Junio 2008Aacte Junio 2008
Aacte Junio 2008
roke
 
Eventi GEOWEB
Eventi GEOWEBEventi GEOWEB
Eventi GEOWEB
GEOWEB
 
Madres y blogs
Madres y blogsMadres y blogs
Madres y blogs
IdoiaJurdan
 
Serious Games und Social Media: Ein Zukunftsmarkt
Serious Games und Social Media: Ein ZukunftsmarktSerious Games und Social Media: Ein Zukunftsmarkt
Serious Games und Social Media: Ein Zukunftsmarkt
Johannes Konert
 
CFW Domestic Sprinkler Regulations - Bafsa Fire Sprinkler Wales
CFW Domestic Sprinkler Regulations - Bafsa Fire Sprinkler WalesCFW Domestic Sprinkler Regulations - Bafsa Fire Sprinkler Wales
CFW Domestic Sprinkler Regulations - Bafsa Fire Sprinkler Wales
Rae Davies
 
Aprendiendo A Ver La Escultura
Aprendiendo A Ver La EsculturaAprendiendo A Ver La Escultura
Aprendiendo A Ver La Esculturacarolinaperez_76
 
Hoja de afiliación
Hoja de afiliaciónHoja de afiliación
Hoja de afiliación
fontaine18
 
Syllabus propedéutica y terapéutica ocular ciclo 2 2015
Syllabus propedéutica y terapéutica ocular ciclo 2 2015Syllabus propedéutica y terapéutica ocular ciclo 2 2015
Syllabus propedéutica y terapéutica ocular ciclo 2 2015
Universidad Técnica de Manabí
 
Skills Portfolio 2010
Skills Portfolio 2010Skills Portfolio 2010
Skills Portfolio 2010JacquiBIUK
 
Presentación Progestion Occidente 2009 Gcv Mp3
Presentación Progestion Occidente 2009   Gcv   Mp3Presentación Progestion Occidente 2009   Gcv   Mp3
Presentación Progestion Occidente 2009 Gcv Mp3
GECIVI
 
Ameet Talwalkar, assistant professor of Computer Science, UCLA at MLconf SF
Ameet Talwalkar, assistant professor of Computer Science, UCLA at MLconf SFAmeet Talwalkar, assistant professor of Computer Science, UCLA at MLconf SF
Ameet Talwalkar, assistant professor of Computer Science, UCLA at MLconf SF
MLconf
 
De conversation manager extended oct 10
De conversation manager extended oct 10De conversation manager extended oct 10
De conversation manager extended oct 10
Steven Van Belleghem
 
Diagnóstico y tratamiento del acné
Diagnóstico y tratamiento del acnéDiagnóstico y tratamiento del acné
Diagnóstico y tratamiento del acné
Universidad Autónoma de Durango Campus Zacatecas
 
Hw09 Terapot Email Archiving With Hadoop
Hw09   Terapot  Email Archiving With HadoopHw09   Terapot  Email Archiving With Hadoop
Hw09 Terapot Email Archiving With HadoopCloudera, Inc.
 
El desamor
El desamorEl desamor
El desamor
Myrna Rodriguez
 
Germania e Austria - Matteo T.
Germania e Austria - Matteo T.Germania e Austria - Matteo T.
Germania e Austria - Matteo T.
Mara Beber
 
Vibrands catalog - Primeros Brand
Vibrands catalog - Primeros BrandVibrands catalog - Primeros Brand
Vibrands catalog - Primeros Brand
golden-circle.com.ua
 

Viewers also liked (20)

Aacte Junio 2008
Aacte Junio 2008Aacte Junio 2008
Aacte Junio 2008
 
Eventi GEOWEB
Eventi GEOWEBEventi GEOWEB
Eventi GEOWEB
 
Madres y blogs
Madres y blogsMadres y blogs
Madres y blogs
 
Serious Games und Social Media: Ein Zukunftsmarkt
Serious Games und Social Media: Ein ZukunftsmarktSerious Games und Social Media: Ein Zukunftsmarkt
Serious Games und Social Media: Ein Zukunftsmarkt
 
CFW Domestic Sprinkler Regulations - Bafsa Fire Sprinkler Wales
CFW Domestic Sprinkler Regulations - Bafsa Fire Sprinkler WalesCFW Domestic Sprinkler Regulations - Bafsa Fire Sprinkler Wales
CFW Domestic Sprinkler Regulations - Bafsa Fire Sprinkler Wales
 
Aprendiendo A Ver La Escultura
Aprendiendo A Ver La EsculturaAprendiendo A Ver La Escultura
Aprendiendo A Ver La Escultura
 
Hoja de afiliación
Hoja de afiliaciónHoja de afiliación
Hoja de afiliación
 
Syllabus propedéutica y terapéutica ocular ciclo 2 2015
Syllabus propedéutica y terapéutica ocular ciclo 2 2015Syllabus propedéutica y terapéutica ocular ciclo 2 2015
Syllabus propedéutica y terapéutica ocular ciclo 2 2015
 
Skills Portfolio 2010
Skills Portfolio 2010Skills Portfolio 2010
Skills Portfolio 2010
 
EXPEDIA.ES
EXPEDIA.ESEXPEDIA.ES
EXPEDIA.ES
 
Presentación Progestion Occidente 2009 Gcv Mp3
Presentación Progestion Occidente 2009   Gcv   Mp3Presentación Progestion Occidente 2009   Gcv   Mp3
Presentación Progestion Occidente 2009 Gcv Mp3
 
Paseo Por Granada
Paseo Por GranadaPaseo Por Granada
Paseo Por Granada
 
Ameet Talwalkar, assistant professor of Computer Science, UCLA at MLconf SF
Ameet Talwalkar, assistant professor of Computer Science, UCLA at MLconf SFAmeet Talwalkar, assistant professor of Computer Science, UCLA at MLconf SF
Ameet Talwalkar, assistant professor of Computer Science, UCLA at MLconf SF
 
De conversation manager extended oct 10
De conversation manager extended oct 10De conversation manager extended oct 10
De conversation manager extended oct 10
 
Plan de convivencia nebrija
Plan de convivencia nebrijaPlan de convivencia nebrija
Plan de convivencia nebrija
 
Diagnóstico y tratamiento del acné
Diagnóstico y tratamiento del acnéDiagnóstico y tratamiento del acné
Diagnóstico y tratamiento del acné
 
Hw09 Terapot Email Archiving With Hadoop
Hw09   Terapot  Email Archiving With HadoopHw09   Terapot  Email Archiving With Hadoop
Hw09 Terapot Email Archiving With Hadoop
 
El desamor
El desamorEl desamor
El desamor
 
Germania e Austria - Matteo T.
Germania e Austria - Matteo T.Germania e Austria - Matteo T.
Germania e Austria - Matteo T.
 
Vibrands catalog - Primeros Brand
Vibrands catalog - Primeros BrandVibrands catalog - Primeros Brand
Vibrands catalog - Primeros Brand
 

Similar to Ethical hacking Chapter 2 - TCP/IP - Eric Vanderburg

Chapter 01 - Overview
Chapter 01 - OverviewChapter 01 - Overview
Chapter 01 - Overviewphanleson
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
Emertxe Information Technologies Pvt Ltd
 
Osi model
Osi modelOsi model
Osi model
Anuj Kumar
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in java
Amol Gaikwad
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
Raja Waseem Akhtar
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
SMC Networks Europe
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
sanjoysanyal
 
TCP Model
TCP ModelTCP Model
TCP Model
manojkum22
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
Blaqray1998
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
Blaqray1998
 
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts ReviewCh02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Review
phanleson
 
TCP/IP basics
TCP/IP basicsTCP/IP basics
TCP/IP basics
SecurityTube.Net
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
Vikas Gupta
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
adam_merritt
 

Similar to Ethical hacking Chapter 2 - TCP/IP - Eric Vanderburg (20)

Chapter 01 - Overview
Chapter 01 - OverviewChapter 01 - Overview
Chapter 01 - Overview
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
Osi model
Osi modelOsi model
Osi model
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in java
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
TCP Model
TCP ModelTCP Model
TCP Model
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts ReviewCh02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Review
 
TCP/IP basics
TCP/IP basicsTCP/IP basics
TCP/IP basics
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Sem 1 Ch 11
Sem 1 Ch 11Sem 1 Ch 11
Sem 1 Ch 11
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Tcp
TcpTcp
Tcp
 

More from Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
Eric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
Eric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
Eric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Ethical hacking Chapter 2 - TCP/IP - Eric Vanderburg

  • 1. Ethical Hacking CHAPTER 2 – TCP/IP CONCEPTS ERIC VANDERBURG
  • 2. Objectives  Describe the TCP/IP protocol stack  Explain the basic concepts of IP addressing  Explain the binary, octal, and hexadecimal numbering systems
  • 3. Overview of TCP/IP  Protocol  Common language used by computers for speaking  Transmission Control Protocol/Internet Protocol (TCP/IP)  Most widely used protocol  TCP/IP stack  Contains four different layers  Network  Internet  Transport  Application
  • 4. The Application Layer  Front end to the lower-layer protocols  What you can see and touch
  • 5. The Transport Layer  Encapsulates data into segments  Segments can use TCP or UDP to reach a destination host  TCP is a connection-oriented protocol  TCP three-way handshake  Computer A sends a SYN packet  Computer B replies with a SYN-ACK packet  Computer A replies with an ACK packet
  • 6. TCP Segment Headers  Critical components:  TCP flags  Initial Sequence Number (ISN)  Source and destination port  Abused by hackers finding vulnerabilities
  • 7. TCP Flags  Each flag occupies one bit  Can be set to 0 (off) or 1 (on)  Six flags  SYN: synthesis flag  ACK: acknowledge flag  PSH: push flag  URG: urgent flag  RST: reset flag  FIN: finish flag
  • 8. Initial Sequence Number (ISN)  32-bit number  Tracks packets received  Enables reassembly of large packets  Sent on steps 1 and 2 of the TCP three-way handshake
  • 9. TCP Ports  Port  Logical, not physical, component of a TCP connection  Identifies the service that is running  Example: HTTP uses port 80  A 16-bit number  TCP packets has source and destination port fields  Helps you stop or disable services that are not needed  Open ports are an invitation for an attack
  • 10. TCP Ports (continued)  Only the first 1023 ports are considered well-known  List of well-known ports  Available at the Internet Assigned Numbers Authority (IANA) Web site (www.iana.org)  Ports 20 and 21  File Transfer Protocol (FTP)  Use for sharing files over the Internet  Requires a logon name and password  More secure than Trivial File Transfer Protocol (TFTP)
  • 11. TCP Ports (continued)  Port 25  Simple Mail Transfer Protocol (SMTP)  E-mail servers listen on this port  Port 53  Domain Name Service (DNS)  Helps users connect to Web sites using URLs instead of IP addresses  Port 69  Trivial File Transfer Protocol  Used for transferring router configurations
  • 12. TCP Ports (continued)  Port 80  Hypertext Transfer Protocol (HTTP)  Used when connecting to a Web server  Port 110  Post Office Protocol 3 (POP3)  Used for retrieving e-mail  Port 119  Network News Transfer Protocol  For use with newsgroups
  • 13. TCP Ports (continued)  Port 135  Remote Procedure Call (RPC)  Critical for the operation of Microsoft Exchange Server and Active Directory  Port 139  NetBIOS  Used by Microsoft’s NetBIOS Session Service  Port 143  Internet Message Access Protocol 4 (IMAP4)  Used for retrieving e-mail  Better than POP3
  • 14. User Datagram Protocol (UDP)  Fast but unreliable protocol  Operates on transport layer  Does not need to verify whether the receiver is listening  Higher layers of the TCP/IP stack handle reliability problems  Connectionless protocol
  • 15. The Internet Layer  Responsible for routing packets to their destination address  Uses a logical address, called an IP address  IP addressing packet delivery is connectionless  Internet Control Message Protocol (ICMP)  Used to send messages related to network operations  Helps in troubleshooting a network  Some commands include  Ping  Traceroute
  • 16. IP Addressing  Consists of four bytes  Two components  Network address  Host address  Classes  Class A  Class B  Class C
  • 17. IP Addressing (continued)  Class A  First byte is reserved for network address  Last three bytes are for host address  Supports more than 16 million host computers  Limited number of Class A networks  Reserved for large corporations and governments  Format: network.node.node.node
  • 18. IP Addressing (continued)  Class B  First two bytes are reserved for network address  Last two bytes are for host address  Supports more than 65,000 host computers  Assigned to large corporations and Internet Service Providers (ISPs)  Format: network.network.node.node
  • 19. IP Addressing (continued)  Class C  First three bytes are reserved for network address  Last byte is for host address  Supports up to 254 host computers  Usually available for small business and home networks  Format: network.network.network.node
  • 20. IP Addressing (continued)  Subnetting  Each network can be assigned a subnet mask  Helps identify the network address bits from the host address bits
  • 21. Planning IP Address Assignments  Each network segment must have a unique network address  Address cannot contain all 0s or all 1s  Accessing entities and services on other networks  Each computer needs IP address of gateway  TCP/IP uses subnet mask to determine destination computer’s network address  If addresses are different, relays packet to gateway  Gateway forwards packet to its next destination  Packet eventually reaches destination
  • 22. Overview of Numbering Systems  Binary  Octal  Hexadecimal
  • 23. Reviewing the Binary Numbering System  Uses the number 2 as its base  Binary digits (bits): 0 and 1  Byte  Group of 8 bits  Can represent 28 = 256 different values  File permissions are represented with bits  0 means removing the permission  1 means granting the permission  111 (rwx) means all permissions apply
  • 24. Examples of Determining Binary Values  Each position represents a power of 2 value  Usually the bit on the right is the less significant bit  Converting 1011 to decimal  1 x 20 = 1  1 x 21 = 2  0 x 22 = 0  1 x 23 = 8  1 + 2 + 8 = 11 (decimal value)
  • 25. Understanding Nibbles  Half a byte or four bits  Helps with reading the number by separating the byte  1111 1010  Components  High-order nibble (left side)  Low-order nibble (right side)
  • 26. Understanding Nibbles (continued)  Converting 1010 1010 to decimal  Low-order nibble  1010 = 10 (base 10)  Multiply high-order nibble by 16  1010 = 10 x 16 = 160 (base 10)  160 + 10 = 170 (base 10)
  • 27. Reviewing the Octal Numbering System  Uses 8 as its base  Supports digits from 0 to 7  Octal digits can be represented with three bits  Permissions on UNIX  Owner permissions (rwx)  Group permissions (rwx)  Other permissions (rwx)  Example: 111 101 001  Octal representation 751
  • 28. Reviewing the Hexadecimal Numbering System  Uses 16 as its base  Support numbers from 0 to 15  Hex number consists of two characters  Each character represents a nibble  Value contains alphabetic letters (A … F)  A representing 10 and F representing 15  Sometimes expressed with “0x” in front  Represent hex number in binary or decimal  Convert each nibble to binary  Convert binary value to decimal
  • 29. Summary  TCP/IP  Most widely used communication protocol over the Internet  TCP/IP stack consists of four layers  Network  Internet  Transport  Application  Application layer  Front end
  • 30. Summary (continued)  Transport layer  Encapsulation  TCP  Connection-oriented protocol  TCP header  TCP flags  Initial Sequence Number (ISN)  Source and destination ports  Internet layer  Packet routing
  • 31. Summary (continued)  IP addressing  Four bytes  Classes: A, B, and C  Binary numbering system  Uses 2 as its base  Octal numbering system  Uses 8 as its base  Hexadecimal numbering system  Uses 16 as its base