Detect or prevent network security breaches you must


Question:

In order to detect or prevent network security breaches, you must understand the Internet protocols as well as the attacker does. The protocols originate from publicly available Requests for Comments, or RFCs. The official repository and publisher of all RFCs is the RFC editor. The purpose of this short research paper is to practice locating and referring to RFCs

Read the page, find the in-text "RFC SEARCH". In the search field "Title/Keyword," type in the complete name of the protocol (eg. "Internet Protocol"). By default, the search results are displayed by RFC number (ascending).

Understanding Internet and TCP Protocols

1. Find and identify the RFCs for IP and TCP.

RFC _______ - Internet Protocol
RFC _______- Transmission Control Protocol

2. Refer to the RFCs to answer the following questions.

Questions about IP

1. What two basic functions does IP implement?

2. What four key mechanisms does IP use to provide its service?

3. Via what protocol does IP communicate errors?

4. In the IP header, what is the Identification field used for?

5. A number of bits within the IP header are designated reserved or optional; why would these be important in network security?

Questions about TCP

1. What is the difference between a socket and a connection?

2. What are the five calls the TCP/user interface provides for?

3. What is a passive OPEN request?

4. Describe the three-way handshake.

5. At a workstation, open some web pages.

Identify the ports your machine is listening on and the state of the various connections it is holding

Solution Preview :

Prepared by a verified Expert
Computer Networking: Detect or prevent network security breaches you must
Reference No:- TGS02499965

Now Priced at $20 (50% Discount)

Recommended (93%)

Rated (4.5/5)