legitimate connections in the network intact or undisturbed. In other words, in order to have

Size: px
Start display at page:

Download "legitimate connections in the network intact or undisturbed. In other words, in order to have"

Transcription

1 Volume 5, Issue 4, April 2015 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Special Issue on Impact of Technology on Skill Development Conference Held at IETE Amravati Center, Maharashtra, India DMRF based Active warden for Storage Covert Channel Defense D. M. Dakhane, Dr. P. R. Deshmukh Abstract Minimal Requisite Fidelity (MRF) is a measure of information or data alteration that results in the destruction of covert communication specifically for the storage covert channels, and it is acceptable to the receiver end points. Network protocols have been design with well-defined syntax and semantics and MRF factor can be precisely define for various protocol fields and an appropriate measure of modification can be introduced for preserving the functionality overt communication, but at the same time disrupting covert communication. In this context our proposed model is Definite Minimal Requisite Fidelity (DRMF). It can be measured in conjunction with the protocol normalization. In this model an active warden is design for eliminating all possible potential storage based covert channels by normalizing the packets when they arrives at the gateway system. Index Terms Covert channels, Minimal Requisite Fidelity Network Protocols, Storage Covert Channels. I. INTRODUCTION The concept of Minimal Requisite Fidelity (MRF), which we define as the degree of signal fidelity that is both acceptable to end users and destructive to covert communications [6]. MRF determines the limit of distortion we can introduce to a carrier channel in an attempt to foil any covert or subliminal channels. For the defender, it defines an upper-bound in the amount of modifications to the channel. This gives an advantage to the defender, because potentially this can greatly decrease or eliminate the capacity of the covert channel. For unstructured carriers that lack well- defined syntax or semantics, MRF is defined by human perception, but for structured carriers, well-defined semantics give us high assurance that a warden can completely eliminate certain subliminal or covert channels. Further, the MRF paradigm, as applied to network packets, includes an emerging area of research into exploiting and correcting ambiguities that create opportunities for intrusion detection evasion. Minimal Requisite Fidelity (MRF) [1] which is introduced by Fisk et al. in the context of active wardens. MRF is a measure of distortion which can be introduced to a potential steganography or covert carrier's in order to counter a covert communication while still providing legitimate end-user acceptance of the communication. This means that the MRF is an measure which gives us potential overview about up to what extend the covert communication is blocked or eliminated by keeping the legitimate connections in the network intact or undisturbed. In other words, in order to have a better and reliable system the parameter of Minimal Requisite Fidelity must be satisfied by the active warden system respectively. er the rate of Minimal Requisite Fidelity lower is the covert communication and as the consequences of these the legitimate connection or overt communication would not be disturbed. This parameter in the context of active warden is extremely important. With this concern, we are propose the Definite Minimal Requite Fidelity parameter in the context with the design of our Active warden. In context of our proposed model the Definite Minimal Requisite Fidelity (DRMF) can be measured in conjunction with the protocol normalization. In our proposed model, the active warden which we designed, is filtering or eliminating all possible potential storage based covert channels by normalizing the packets when they arrives at the gateway. Wardens have frequently been discussed as actors in a security system, but in our model, an active warden is a network service that is architecturally similar to a firewall, but functionally quite different. Like a firewall, warden is implements a site s security policy. To prevent attacks from the outside, inside, or both, the warden modifies all traffic to remove many, if not all, of the carriers that can be used for covert channels, subliminal channels, intrusion detection evasion, and even some forms of attacks. Because this warden is a network service, it must be concerned not only with the application data that it handles, but also with the network protocols used to exchange data. One way to prevent the use of covert channels and subliminal channels across a network is to drastically alter all data that passes across that network and that may be used as a carrier. An alternate technique for preventing the successful use of covert channels is, to distort potential carriers just enough that any types of covert and subliminal channels become unusable. If done carefully, the overt users of the carriers remain unaware of these modifications. We describe this modification of traffic as imposing Definite Minimal Requisite Fidelity (DRMF). This term captures the essence of both the opportunity for data embedding and a warden s defence. The basic premise is that for any communication there is some fidelity at which the data is interpreted by the recipient. II. RELATED WORK The overall effective defence mechanisms for network 2015, IJARCSSE All Rights Reserved Page 286

2 storage channels for IPv4 are protocol scrubbers[2], traffic normalization [3] and an active wardens [1,4,5,6]. The objective for protocol scrubbers and traffic normalisers is to removing the ambiguities in network traffic. Depending upon implementing the protocol stack, ambiguous network packets have different interpretation at the receiver side. When attacker are used any kind of storage base covert channels, it certainly generate ambiguous traffic. Handley and Paxson[3], describe IP, UDP, TCP, and ICMP normalizations based on protocol specification. This work on preserving the end-to-end protocol semantics so that overt communication wills not disturb. An active warden was introduced by Simmons [7] as part of the Prisoners Problem and this same approach has been subsequently used in [1, 4, 5, 6]. Active wardens, as presented by Fisk et al. [1], are network services resembling a firewall that modify all traffic under the assumption that it is carrying steganography or covert content. This approach is for modification of all the contents those are actually forge the header field which may change the semantics of TCP, UDP IP etc. III. PROPOSE MODAL A. DMRF for Proposed System Unlike the unstructured carriers where the carrier semantics are not standardized. i.e. When payloads contains audio,video or plaintext,in such cases the structural semantics of the carriers are completely implementation specific to that application domain. However when it comes to structured carriers like TCP/IP protocol stack, the entire packets follows the strict structural semantics. Which is ultimately follows the common standard specification of TCP/IP, defined in the standard RFC's {RFC Numbers, TCP, IP, ICMP} respectively. Any network packet that are not following these semantic rules or standard or somehow lost or tampered there structural semantics are treated as a suspicious or malicious. These types of network packet are analysed by the statistical based active warden system and can be identify as a malicious packets. But in some cases the potential users of covert communications follows these structured semantics in order to look like legitimate users, but intentionally making covert communication by making slight changes into the TCP/IP semantics of the network packets in such a cases it is difficult for the active warden in order to distinguish these channels from the legitimate one's respectively. Here in this proof of concept as we discussed previously we have normalized the TCP traffic at following layers Transport, Internet, Network, as a consequences of this the normal legitimate connections that carries the transport layer payload will not going to be disturbed anymore when the traffic goes through our proposed active warden system. It means that when the traffic reaches to our active warden system we are reforming the structural semantic of the TCP/IP packet in order to eliminate any possible covert channels that are exploited by the potential covert users through it. As our proof of concept suggests that we are making the on behalf connection with the intended destination of the sender in the given network so as a result of this the sender supposed that he is directly communicating with the destination system but in practice the active warden make the TCP connection with the destination system that the sender is willing to establish a connection. So as per this rule of active warden the active warden will intercept the entire transport layer payload exchanged between the sender and receiver without disturbing or modifying the semantics or data in the transport layer payload respectively. As in the case of stenographic channels the covert or steno information can be send to the user at other side by simply embedding the covert information in TCP payloads like in the image pixels or in some other multimedia contents like audio or video, etc. So in such a cases the active warden system has to apply some strict rules over such a unstructured carriers in order to filter out or detect the covert information in transport layer payloads, etc. As a consequences of this there is a possibility that some of the legitimate or overt data in the payload may be get distorted; as a result of these rules or filtration by the active warden system. So because of this the MRF factor is gets affected making the indication that the normal connection is being distorted up to some extent. But in our case we are not normalizing the protocol semantics of application layer, as a consequences of these the MRF factor is not affected and the normal communication is also not disturbed. It is not modifying any semantics in the TCP/IP packet in order to eliminate the covert information from them, so the MRF factor or the standard semantics of the TCP/IP packets are get disturbed. In other words, the MRF or other structural semantics of the transport layer payload remains untouched when the traffic passes through our active warden system. This approaches shown in following figure 1. Fig 1. Definite Minimal Requisite Fidelity An alternate technique for preventing the successful use of covert channels is to distort potential carriers just enough that any covert and subliminal channels in those carriers become unusable. If done carefully, the overt users of the carriers remain un- aware of these modifications [1]. As we have already covered in previous discussion. The basic premise is that for any communication there is some fidelity at which the data is interpreted by the recipient. The possible intended carriers for transmission of covert information can be of two types these are, unstructured carriers and structured carriers. 2015, IJARCSSE All Rights Reserved Page 287

3 carrier forms. The term unstructured carriers are generally TABLE I used in the context of steganography, or similar king of TCP/IP FIDELITY SPECTRUM TABLE Protocol Field Purpose Fidelity covert channels. But our proposed model of active Spectrum warden is not intended for IP Type of Low removing unstructured anomalies from the network Service traffic. There are several other ways of removing the covert anomalies from the unstructured based stego channels. IP IP identificat ion This field is rarely used, thus the use of this field would be suspicious when it is set to a non null value. We should also mention that the bits 6 and 7 in this field are specified to be set to 0. The values of this field are generated randomly, by the TCP/IP stack. But for packets belonging to the same connection and the same flow, the IP identification field is incremented by 1. This field contains the IP address of the source system. This field contains the IP address of the Destination system. IP Source IP Address IP Destinatio n IP Address IP Timestam The values of the timestamps p IP should increase from a jump to option another hop. IP Protocol This field contains the type of protocol present in the Internet layer payload of the TCP/IP packet. IP Padding Bits These bits are used to align the packet length to fit the requirement. IP Checksum Used to maintain the integrity of the IP datagram. TCP ISN(initia Used for three way handshake, l sequence during the initiation of TCP number) Connection. TCP Urgent Pointer The Urgent Pointer field is interpreted only if the URG bit is set. Used in some special case when the packet needs urgent delivery. Used as flags to indicate various cases at the transport layer. Used to link to application level processes over network. TCP Reserved bits TCP Source and Destinatio n Port TCP Checksum Used to maintain the integrity of the TCP datagram. Moderate Low Moderate Low 1. Unstructured Carriers: The attacker of the covert channel can intentionally obfuscate the semantics of the TCP/IP packet in kind of several steno based covert channels, the covert channels exploiting the semantics of the transport layer payload can be considered as to be unstructured carriers, which is used to transmit covert information using these unstructured carriers; the unstructured carriers are those kind of carriers which doesn't have standard specification for the semantics of such a carriers. A simple example of such unstructured carriers can be plain text that can be transmitted as transport layer payload directly. The premises of using covert channel exploiting unstructured carriers are difficult to detect covert anomalies from these carriers. As we can see from above discussion the unstructured carriers doesn't have specification for their semantics, so it is easy for covert attacker in order to exploit covert data using these 2. Structured Carriers: The structured carriers are those which follow some strict structural semantics as per the standard specifications. Unlike the unstructured carriers like plain text which doesn't follow some fixed structural semantics, the structured carriers are agreed upon some predefined standards, which is called as to be protocol. The intended attacker of the covert channels exploit these structural semantics of the carriers in such a way that they seems to be legitimate one, but contains potential covert information which is get hidden inside the structural semantics of the TCP/IP packet such a carriers are said to be structured carriers for transmitting covert information. Many techniques has been derived in order to exploit the potential covert information using such a structured carriers respectively. The covert algorithm exploiting such a carriers target the structural semantics of the carriers in such a way that they, embed covert data in these carriers without harming the other semantics of the carrier. The term structured carriers are usually used in standard protocols like TCP/IP; the TCP/IP is an standard protocol for exchanging the data over internet today, and as it is an standard it follows some structured semantics. The covert channels can be exploited in order to use these carriers in order to transfer there covert information to the other end without awareness to the rest of the network entities respectively. The structured carriers can be exploited by the various covert algorithm techniques like nushu,lathra,rowland,etc. All of these algorithms are the storage covert channels, these channels exploits the structural semantics of the TCP/IP packet respectively. In order to eliminate the anomalies of these kinds can be done by using technique like protocol normalization, which is used by the active warden design proposed in this paper respectively. This is the reason why we are imposing our focus in order to eliminate potential covert channels through such carriers; the proposed model of active warden system eliminates the covert information that can be exploited using the various fields of the TCP/IP packet headers respectively. This examination leads to a formal expression of Minimal Requisite Fidelity. Network protocols such as the TCP/IP family of Internet protocols define both syntax for network packets as well as the semantics used by systems exchanging packets. The syntax is the data format for packets that traverse the network. This syntax is not unlike the image encoding format of some unstructured carriers. What makes structured carriers different is the additional specification of semantics that describe how a packet is interpreted and what actions the end host will make based upon that packet. In order to understand the possible feudalities that can be produced by the covert anomalies in the structured carriers can be depicted in the following table, the table 2015, IJARCSSE All Rights Reserved Page 288

4 shown below depicts the potential header fields in the function is f(pnorm[itx - Tp]) which is function which TCP/IP fields through which the covert data can be does the actual working of protocol normalization on input embedded. traffic but excluding the transport layer payload therefore itx - Tp shows the input traffic excluding transport layer The above table describes the various header fields that payload Tp respectively. From above expression it is can be exploited by the potential attacker in order to clear that the active warden does it's processing but transfer the covert information over network. In above without affecting the transport layer payload respectively. table as we can see we have listed various fields and the Therefore it is clear that if the transport layer payload is possible fidelity spectrum that can be affected as a kept untouched then the MRF factor in the context of consequences of exploiting the covert channels using these legitimate user is preserved and the MRF factor is fields. The fidelity spectrum in above table is a parameter preserved as well. which describes the potential fidelity that can affect to the But there might be another case where the MRF factor legitimate user as while the covert attacker uses above can be affected. This can be happened when the packet fields as covert channels. From this we can see that the fidelity is affected during the process of protocol degree or amount of fidelity for every TCP/IP header normalization by the active warden system, this situation fields are different and affects the legitimate data of the is important, because in case where the packet headers is overt user respectively. tampered during the process of active warden The potential cause of overt data of legitimate user can normalization this case should be depicted in terms of be categorized as low, moderate and high respectively. MRF, here we are not promising any standard formulation The degree of these categories depends on the header for the term MRF, instead just trying to elaborate the term fields used by the potential attacker to transmit the covert in the context of our proposed model of active warden. data respectively. Maximized the degree of fidelity Here as stated there can be such a situation where the spectrum increases the potential probability for distorting packet header is being tampered during the process of the legitimate data of the overt user respectively. It is normalization this case can be affected by formulating it in important to minimize such distortion of legitimate data of the following way; but here ultimately we are just the overt user. But this is covered in the context of covert guessing the probability of in what case it can be channels, here we need to assume the same situation but in happened. the context of active warden which should always persist the Minimal requisite fidelity, while eliminating the potential covert channels from the TCP/IP packet by f(1) f(itx)->f(atx)->f(otx) normalizing the TCP/IP packets respectively. f(3) f(atx) = f(pnorm[itx - Tp]) B. Formulating DMRF Fill the text from your manuscript in different sections. Here as we already described we are doing the protocol normalization at Transport, Internet and Network layers respectively. We are not manipulating the transport layer payload, so as consequences of these the MRF factor in the context of legitimate user is preserved, because no processing is done on application level data respectively. This can be expressed mathematically as below; here: f(1) f(itx)->f(atx)->f(otx) f(itx) = function generating input traffic f(atx)=function reflecting active warden system f(otx)=function reflecting output traffic from active warden system therefore, f(2) f(otx) = f(a(f(pnorm[itx - Tp]))) As we can see in above expression, it represents the functioning of active warden system. Here f(otx) is the function representing output traffic generated after the active warden does the protocol level normalization in order to eliminate the possible covert channels from the input traffic. As we stated earlier the function above f(ax) represents the active warden system, the input to this f(4) f(pnorm[itx - Tp]) = [f(pnorm[th]) + f(pnorm[ih]) + f(pnorm[nh])] Tp f(5) f(oth) = f(pnorm[th]) = f(kgen[th]) f(6) f(oih) = f(pnorm[ih]) = f(kgen[ih]) f(7) f(onh) = f(pnorm[nh]) = f(kgen[nh]) As we can see above the first line f(1) is same as stated in the last section. The second line f(3) represents function of active warden is depicted as function normalizing the TCP/IP traffic excluding the transport layer payload. Next statement f(4) shows that the function of protocol normalization by the active warden is the combination of normalizing the transport layer header f(pnorm[th]) and internet layer header f(pnorm[ih]) and network layer header f(pnorm[nh]) respectively. In the next statements f(5),f(6) and f(7) shows that what these protocol normalization functions at each layers does; as we can see above the function f(kgen[th]) depicts that the kernel at active warden system regenerates the transport layer header as consequences of simple protocol normalization and then these newly generated headers are formed in TCP/IP packet and transmitted to the intended destination as per the protocol specified by the active warden system; similarly f(kgen[ih]) and f(kgen[nh]) does the same as in the case of f(5) respectively. So from the above expressions it is clear that the function of protocol normalization f(3) is entirely kernel dependent at active warden system respectively; therefore the function of active warden system always preserve MRF factor, 2015, IJARCSSE All Rights Reserved Page 289

5 because generating the transport, internet and network From above result it is clear that the function of blocking layer headers are the part of kernel level functionality or eliminating the covert information from the TCP/IP therefore the active warden system only uses the traffic doesn't affect or harm the DMRF factor predefined conventions in order to normalize the input respectively. Because as formulated in section we traffic; also the kernel generated headers follows strict seen that the DMRF factor corresponds to the amount of structural semantics as a result of this the MRF factor is fidelity the legitimate data with respect to the percentage preserved because the normalization is does by following of covert data eliminated or blocked is negligible in the standard semantics as per the W3c community. context of legitimate data for the overt users. C. DMRF Result Analysis In this section we can describe how the MRF factor can be depicted in terms of result as shown in the following figure the flowing figure depicts how the active warden system eliminates the covert data transmitted through TCP SQN reference model and IP ID reference model respectively. On the X-axis it shows percentage of blocking the covert information respectively. In the following chart it actually shows that even though the active warden system eliminates the covert data but it also preserves the factor of DMRF respectively. IV. CONCLUSION DMRF for the proposed active warden is the measure of efficiency of the active warden against different kinds of the storage covert channels. As our experimental results that the proposed an active warden is proved most efficient against the NUSHU and covert_tcp (rowlands code). Where it blocks 100% of the covert data. And against the reference model the DMRF of active warden varies depending upon the tcp / IPv4, 8/16/32 bit reference model. For NUSHU and covert_tcp the DMRF of active warden is highest. for reference model it is quite high though it is slightly lower than that of NUSHU. Fig 2. Comparison of TCP SQN and IPID Reference Model From these results we can say that as we embed more number of bits per packet for the covert communication the chances of the data getting blocked by the active warden increases. This is because the probability of occurrence of same bit on a particular position decreases with increase in the number of bits we are embedding in a packet. For example if we embed only one bit in the packet the chances of this bit remain the same even after passing through active warden is 50%. As one bit can either be 0 or 1 so after passing through active warden the bit can be 0 or 1 only. That means the probability of data bit remains the same will be 1/2 = 0.5 = 50%. Similarly if we increase the number of bits and now we are embedding two data bits the chances of both the bits remaining same will be 25 % for 8 bit data per packet it will become 1 / 256. Where 256 is the number to total combinations that can be formed out of 8 bits. In other 255 combinations at least 1 bit will be different so the actual data we want to communicate will be disturbed. For 16 bit data per packet it becomes 1 / and for 32 bit data per packet it becomes 1 / REFERENCES [1] Gina Fisk, Mike Fisk, Christos Papadopoulos, and Joshua Neil. Eliminating steganography in Internet traffic with active wardens. In Job Oostveen, editor, Information Hiding: Preproceedings of the Fifth International Workshop, pages 29 46, Noordwijkerhout, The Netherlands,October 7-9, Springer. [2] G. Robert Malan, David Watson, Farnam Jahanian, and Paul Howell. Transport and application protocol scrubbing. In Proceedings of the IEEE INFOCOM 2002 Conference, pages , Tel-Aviv, Israel, March 26-30, [3] Mark Handley and Vern Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proceeding of the 10th USENIX Security Symposium, Washington, DC, USA, August 13-17, USENIX Association [4] Ross Anderson. Stretching the limits of steganography. In Ross Anderson, editor, Information Hiding: Proceedings of the First International Workshop, pages 39 48, Cambridge, U.K., May 30-June 01, Springer. [5] Ross J. Anderson and Fabien A.P. Petitcolas. On the limits of steganography. In IEEE Journal of Selected Areas in Communications: Special Issue on Copyright and Privacy Protection, pages , May [6] Scott Craver. On public-key steganography in the presence of an active warden. In David Aucsmith, editor, Information Hiding: Proceedings of the Second International Workshop, pages , Portland, Oregon, U.S.A., April 14-17, Springer. [7] Gustavus J. Simmons. The prisoners problem and the subliminal channel. In David Chaum, editor, Advances in Cryptology, Proceedings of CRYPTO 83, pages Plenum Press, , IJARCSSE All Rights Reserved Page 290

6 AUTHOR D M Dakhane. Associate Professor, Computer Science & Engineering Department Sipna College of Engineering & Technology, Amravati. Dr. P R. Deshmukh. Professor Electronics & Tele-communication Department P D Polytechnic, Amravati. 2015, IJARCSSE All Rights Reserved Page 291

New Approach towards Covert Communication using TCP-SQN Reference Model

New Approach towards Covert Communication using TCP-SQN Reference Model ISSN 2278 0211 (Online) New Approach towards Covert Communication using TCP-SQN Reference Model Dhananjay M. Dakhane Department of Computer science & Engineering Sipna College of Engineering & Technology,

More information

Eliminating Steganography in Internet Traffic with Active Wardens

Eliminating Steganography in Internet Traffic with Active Wardens Eliminating Steganography in Internet Traffic with Active Wardens Gina Fisk, Mike Fisk, Christos Papadopoulos, and Joshua Neil Los Alamos National Laboratory University of Southern California Abstract.

More information

High Assurance Evaluations Challenges in Formal Security Policy Modeling & Covert Channel Analysis. Sai Pulugurtha September 24, 2008

High Assurance Evaluations Challenges in Formal Security Policy Modeling & Covert Channel Analysis. Sai Pulugurtha September 24, 2008 High Assurance Evaluations Challenges in Formal Security Policy Modeling & Covert Channel Analysis Sai Pulugurtha September 24, 2008 Overview Introduction and Goals SPM and CCA Requirements in Common Criteria

More information

UDP: Datagram Transport Service

UDP: Datagram Transport Service UDP: Datagram Transport Service 1 Topics Covered Introduction Transport Protocols and End-to-End Communication The User Datagram Protocol The Connectionless Paradigm Message-Oriented Interface UDP Communication

More information

CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding

CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding Xiapu Luo, Edmond W W Chan and Rocky K C Chang Department of Computing The Hong Kong Polytechnic University Hung Hom, Hong Kong,

More information

Detect Covert Channels in TCP/IP Header using Naive Bayes

Detect Covert Channels in TCP/IP Header using Naive Bayes Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.881

More information

Network Forensics and Covert Channels Analysis in Internet Protocols

Network Forensics and Covert Channels Analysis in Internet Protocols School of Computer Science North Haugh KY16 9SX Scotland, UK Network Forensics and Covert Channels Analysis in Internet Protocols #1 Covert Channels in Internet Protocols PhD Student Email david@dcs.st-andrews.ac.uk

More information

Authors: Mark Handley, Vern Paxson, Christian Kreibich

Authors: Mark Handley, Vern Paxson, Christian Kreibich Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics Authors: Mark Handley, Vern Paxson, Christian Kreibich Exploitable Ambiguities NIDS does not have full range

More information

Covert channels in TCP/IP: attack and defence

Covert channels in TCP/IP: attack and defence Covert channels in TCP/IP: attack and defence The creation and detection of TCP/IP steganography for covert channels and device fingerprinting Steven J. Murdoch and Stephen Lewis http://www.cl.cam.ac.uk/users/{sjm217,

More information

Covert TCP/IP network channels using Whitenoise protocol. Michal Rogala.

Covert TCP/IP network channels using Whitenoise protocol. Michal Rogala. Covert TCP/IP network channels using Whitenoise protocol Michal Rogala http://www.michalrogala.com/security/whitenoise michal.rogala@gmail.com 1. Introduction The goal of this paper is to describe Whitenoise

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 16 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

Goal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t

Goal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t Goal of Today s Lecture EE 122: Designing IP Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking 1 Review of TCP/IP working Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path Frame Path Chapter 3 Client Host Trunk Link Server Host Panko, Corporate

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

CLASSIFICATION OF ARTIFICIAL INTELLIGENCE IDS FOR SMURF ATTACK

CLASSIFICATION OF ARTIFICIAL INTELLIGENCE IDS FOR SMURF ATTACK CLASSIFICATION OF ARTIFICIAL INTELLIGENCE IDS FOR SMURF ATTACK N.Ugtakhbayar, D.Battulga and Sh.Sodbileg Department of Communication technology, School of Information Technology, National University of

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

THE TRANSPORT LAYER UNIT IV

THE TRANSPORT LAYER UNIT IV THE TRANSPORT LAYER UNIT IV The Transport Layer: The Transport Service, Elements of Transport Protocols, Congestion Control,The internet transport protocols: UDP, TCP, Performance problems in computer

More information

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol Transport Layer Transport Layer The transport layer is responsible for the delivery of a message from one process to another Types of Data Deliveries Client/Server Paradigm An application program on the

More information

Covert Channels in the IP Time To Live TTL Field Sebastian Zander, Grenville Armitage, Philip Branch {szander,garmitage,pbranch}@swin.edu.au http://caia.swin.edu.au ATNAC 2006 Outline What are covert channels?

More information

A Covert Channel in Packet Switching Data Networks

A Covert Channel in Packet Switching Data Networks Rochester Institute of Technology RIT Scholar Works Presentations and other scholarship 11-2005 A Covert Channel in Packet Switching Data Networks Bo Yuan Rochester Institute of Technology Peter Lutz Rochester

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

TCP/IP Transport Layer Protocols, TCP and UDP

TCP/IP Transport Layer Protocols, TCP and UDP TCP/IP Transport Layer Protocols, TCP and UDP Learning Objectives Identify TCP header fields and operation using a Wireshark FTP session capture. Identify UDP header fields and operation using a Wireshark

More information

Network Interconnection

Network Interconnection Network Interconnection Covers different approaches for ensuring border or perimeter security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Lecture

More information

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table

Introduction. IP Datagrams. Internet Service Paradigm. Routers and Routing Tables. Datagram Forwarding. Example Internet and Conceptual Routing Table Introduction Datagram Forwarding Gail Hopkins Service paradigm IP datagrams Routing Encapsulation Fragmentation Reassembly Internet Service Paradigm IP Datagrams supports both connectionless and connection-oriented

More information

In Defence of NATs. Geoff Huston APNIC. IEEE Global Internet Symposium, May 2017

In Defence of NATs. Geoff Huston APNIC. IEEE Global Internet Symposium, May 2017 In Defence of NATs Geoff Huston APNIC IEEE Global Internet Symposium, May 2017 The Architecture of the 1990 Internet Dumb Network, Smart Hosts Remove all the functionality from the network apart from forwarding

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

Sequence Number. Acknowledgment Number. Data

Sequence Number. Acknowledgment Number. Data CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Hiding Data in Wave Files

Hiding Data in Wave Files Hiding Data in Wave Files Pushpa Aigal Department of Computer Science, Shivaji University, Kolhapur, Maharashtra 416004. Pramod Vasambekar Department of Computer Science, Shivaji University, Kolhapur,

More information

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (2 nd Week) 2. Protocol Architecture, TCP/IP, and Internet-Based Applications 2.Outline The Need for a Protocol Architecture

More information

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015 Lecture 6 Internet Security: How the Internet works and some basic vulnerabilities Thursday 19/11/2015 Agenda Internet Infrastructure: Review Basic Security Problems Security Issues in Routing Internet

More information

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

CYBER ATTACKS EXPLAINED: PACKET SPOOFING CYBER ATTACKS EXPLAINED: PACKET SPOOFING Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service

More information

4 rd class Department of Network College of IT- University of Babylon

4 rd class Department of Network College of IT- University of Babylon 1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen

More information

EEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao

EEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao EEC-484/584 Computer Networks Lecture 16 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Services provided by transport layer

More information

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012 Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article

More information

Chapter 5 OSI Network Layer

Chapter 5 OSI Network Layer Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation

More information

UDP Lite for Real Time Multimedia Applications

UDP Lite for Real Time Multimedia Applications UDP Lite for Real Time Multimedia Applications Lars-Åke Larzon*, Mikael Degermark*, Stephen Pink* Extended Enterprise Laboratory HP Laboratories Bristol HPL-IRI-1999-001 April, 1999 E-mail: [11n,micke,steve]@cdt.luth.se

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

Network Control, Con t

Network Control, Con t Network Control, Con t CS 161 - Computer Security Profs. Vern Paxson & David Wagner TAs: John Bethencourt, Erika Chin, Matthew Finifter, Cynthia Sturton, Joel Weinberger http://inst.eecs.berkeley.edu/~cs161/

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

Employing Entropy in the Detection and Monitoring of Network Covert Channels

Employing Entropy in the Detection and Monitoring of Network Covert Channels RIT Scholar Works Presentations and other scholarship 7-2012 Employing Entropy in the Detection and Monitoring of Network Covert Channels Chaim Sanders Jacob Valletta Bo Yuan Daryl Johnson Peter Lutz Follow

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Chapter 7 Internet Protocol Version 4 (IPv4) Kyung Hee University

Chapter 7 Internet Protocol Version 4 (IPv4) Kyung Hee University Chapter 7 Internet Protocol Version 4 (IPv4) 1 7.1 Introduction The transmission mechanism used by the TCP/IP Unreliable and connectionless datagram protocol Best-effort delivery service IP packets can

More information

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions [MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Covert Communication & Malicious Cryptography

Covert Communication & Malicious Cryptography Computer Security Spring 2008 Covert Communication & Malicious Cryptography Aggelos Kiayias University of Connecticut Covert Channel A covert channel is a communication channel that carries information

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

Internet Engineering Task Force (IETF) Category: Informational August 2012 ISSN:

Internet Engineering Task Force (IETF) Category: Informational August 2012 ISSN: Internet Engineering Task Force (IETF) R. Asati Request for Comments: 6695 Cisco Systems Category: Informational August 2012 ISSN: 2070-1721 Abstract Methods to Convey Forward Error Correction (FEC) Framework

More information

Simulation of TCP Layer

Simulation of TCP Layer 39 Simulation of TCP Layer Preeti Grover, M.Tech, Computer Science, Uttrakhand Technical University, Dehradun ABSTRACT The Transmission Control Protocol (TCP) represents the most deployed transport protocol

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

A Performance of Embedding Process for Text Steganography Method

A Performance of Embedding Process for Text Steganography Method A Performance of Embedding Process for Text Steganography Method BAHARUDIN OSMAN 1, ROSHIDI DIN 1, TUAN ZALIZAM TUAN MUDA 2, MOHD. NIZAM OMAR 1, School of Computing 1, School of Multimedia Technology and

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

Announcements. Designing IP. Our Story So Far (Context) Goals of Today s Lecture. Our Story So Far (Context), Con t. The Internet Hourglass

Announcements. Designing IP. Our Story So Far (Context) Goals of Today s Lecture. Our Story So Far (Context), Con t. The Internet Hourglass Announcements Designing IP EE 122: Intro to Communication Networks Fall 200 (MW -:30 in Donner 1) Homework #2 out Wednesday rather than today And due Oct 11 instead of Oct We will likely shift the remaining

More information

IPv6 Technical Challenges

IPv6 Technical Challenges IPv6 Technical Challenges Peter Palúch, CCIE #23527, CCIP University of Zilina, Slovakia Academy Salute, April 15 th 16 th, Bucharest IPv6 technical challenges What challenges do I meet if I decide to

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol) : Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

OPTIMIZATION OF IPV6 PACKET S HEADERS OVER ETHERNET FRAME

OPTIMIZATION OF IPV6 PACKET S HEADERS OVER ETHERNET FRAME OPTIMIZATION OF IPV6 PACKET S HEADERS OVER ETHERNET FRAME 1 FAHIM A. AHMED GHANEM1, 2 VILAS M. THAKARE 1 Research Student, School of Computational Sciences, Swami Ramanand Teerth Marathwada University,

More information

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on IP Version 4 (IPv4) Header (Continued) Identification (16 bits): One of the parameters of any network is the maximum transmission unit (MTU) parameter. This parameter specifies the maximum size of the

More information

Using ICMP to Troubleshoot TCP/IP Networks

Using ICMP to Troubleshoot TCP/IP Networks Laura Chappell Using ICMP to Troubleshoot TCP/IP Networks Illustration: Norman Felchle Editor s Note: This article is based on Laura Chappell s upcoming book TCP/IP Analysis and Troubleshooting, which

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

DAMAGE DISCOVERY IN DISTRIBUTED DATABASE SYSTEMS

DAMAGE DISCOVERY IN DISTRIBUTED DATABASE SYSTEMS DAMAGE DISCOVERY IN DISTRIBUTED DATABASE SYSTEMS Yanjun Zuo and Brajendra Panda Abstract Damage assessment and recovery in a distributed database system in a post information attack detection scenario

More information

IP Address Assignment

IP Address Assignment IP Address Assignment An IP address does not identify a specific computer. Instead, each IP address identifies a connection between a computer and a network. A computer with multiple network connections

More information

CS UDP: User Datagram Protocol, Other Transports, Sockets. congestion worse);

CS UDP: User Datagram Protocol, Other Transports, Sockets. congestion worse); CS314-26 UDP: User Datagram Protocol, Other Transports, Sockets! IP is an unreliable datagram protocol " congestion or transmission errors cause lost packets " multiple routes may lead to out-of-order

More information

Identifying Stepping Stone Attack using Trace Back Based Detection Approach

Identifying Stepping Stone Attack using Trace Back Based Detection Approach International Journal of Security Technology for Smart Device Vol.3, No.1 (2016), pp.15-20 http://dx.doi.org/10.21742/ijstsd.2016.3.1.03 Identifying Stepping Stone Attack using Trace Back Based Detection

More information

Datagram. Source IP address. Destination IP address. Options. Data

Datagram. Source IP address. Destination IP address. Options. Data Datagram Version H. len Service Datagram length Datagram identifier FR-FR FR-FR-FR-FR Time-to-live Transp. prot. H. Checksum Source IP address Destination IP address Options Data Each line represents a

More information

Lab - Using Wireshark to Examine TCP and UDP Captures

Lab - Using Wireshark to Examine TCP and UDP Captures Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

ES623 Networked Embedded Systems

ES623 Networked Embedded Systems ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection

More information

inside: THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN

inside: THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN THE MAGAZINE OF USENIX & SAGE April 2002 Volume 27 Number 2 inside: SECURITY A Remote Active OS Fingerprinting Tool Using ICMP BY OFIR ARKIN & The Advanced Computing Systems Association & The System Administrators

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data

More information

Multimedia in the Internet

Multimedia in the Internet Protocols for multimedia in the Internet Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ > 4 4 3 < 2 Applications and protocol stack DNS Telnet

More information

Programming Assignment 3: Transmission Control Protocol

Programming Assignment 3: Transmission Control Protocol CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm

More information

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches

More information

TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far

TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far the most common of them. TCP/IP can be compared to the

More information

Implementation of a Covert Channel in the Header

Implementation of a Covert Channel in the Header Implementation of a Covert Channel in the 802.11 Header Lilia Frikha 1, Zouheir Trabelsi 2, and Wassim El-Hajj 2 1 Ecole Supérieure des Communications de Tunis (SupCom), Al Ghazala, Ariana, Tunisia 2 UAE

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

Transport Layer Marcos Vieira

Transport Layer Marcos Vieira Transport Layer 2014 Marcos Vieira Transport Layer Transport protocols sit on top of network layer and provide Application-level multiplexing ( ports ) Error detection, reliability, etc. UDP User Datagram

More information

Communication Systems DHCP

Communication Systems DHCP Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

CS 640 Introduction to Computer Networks Spring 2009

CS 640 Introduction to Computer Networks Spring 2009 CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,

More information

QUIZ: Longest Matching Prefix

QUIZ: Longest Matching Prefix QUIZ: Longest Matching Prefix A router has the following routing table: 10.50.42.0 /24 Send out on interface Z 10.50.20.0 /24 Send out on interface A 10.50.24.0 /22 Send out on interface B 10.50.20.0 /22

More information

A loss-resistant method of seismic data transmission over wireless data networks

A loss-resistant method of seismic data transmission over wireless data networks Seismic data transmission A loss-resistant method of seismic data transmission over wireless data networks Henry C. Bland ABSTRACT A recent continuous seismic monitoring effort employed a wireless network

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

IPSec. Overview. Overview. Levente Buttyán

IPSec. Overview. Overview. Levente Buttyán IPSec - brief overview - security associations (SAs) - Authentication Header (AH) protocol - Encapsulated Security Payload () protocol - combining SAs (examples) Overview Overview IPSec is an Internet

More information

Request for Comments: 2004 Category: Standards Track October Minimal Encapsulation within IP. Status of This Memo

Request for Comments: 2004 Category: Standards Track October Minimal Encapsulation within IP. Status of This Memo Network Working Group C. Perkins Request for Comments: 2004 IBM Category: Standards Track October 1996 Status of This Memo Minimal Encapsulation within IP This document specifies an Internet standards

More information

RTP/RTCP protocols. Introduction: What are RTP and RTCP?

RTP/RTCP protocols. Introduction: What are RTP and RTCP? RTP/RTCP protocols Introduction: What are RTP and RTCP? The spread of computers, added to the availability of cheap audio/video computer hardware, and the availability of higher connection speeds have

More information

Chapter 2 PROTOCOL ARCHITECTURE

Chapter 2 PROTOCOL ARCHITECTURE Chapter 2 PROTOCOL ARCHITECTURE 2.1 INTRODUCTION IPv6 is a new version of Internet protocol which is expected to substitute IPv4. It is very difficult to predict exactly when IPv4 will eventually come

More information