346x Filetype PPTX File size 0.55 MB Source: www.ncyte.net
Learning Objectives
Upon completion of this lesson, students will:
•be able to identify the OSI Network layers
and their functions.
•research and recognize common network
attacks.
•explain one of the network attacks and
analyze the ethical considerations and
consequences dealt to attackers.
This document is licensed with a Creative Commons Attribution 4.0 International License ©2017
www.C5colleges.org This material is based upon work supported by the National Science Foundation under
Grant No.1548315.
IP Moving Truck and The Internet
What does the moving truck have in common with the internet?
MOVING ACROSS THE COUNTRY (IP TRUCK) THE INTERNET
The IP Moving Truck traveled on a road that was built for TOPOLOGY: Data on the internet travels on DSL, Ethernet,
it. The road was made to send trucks like IP Truck across or Cable System – all “roads” intended to carry payload.
the country.
IP Moving Truck = collection of boxes Ethernet Frame = collection of packets
Box = collection of items TCP/IP or UDP Packet = collection of data
You wanted what is inside the box. If there was more Applications use what is in the packet. If there is more
than one box needed for a room, you assembled these than one packet needed, these are assembled by the
when the boxes were received. application when received.
This document is licensed with a Creative Commons Attribution 4.0 International License ©2017
www.C5colleges.org This material is based upon work supported by the National Science Foundation under
Grant No.1548315.
Some More Information about
the Truck
BEDROOM BATHROOM
Ethernet IP Traffic PayloIPa dPayload Ethernet
TCP HTTP Data
Header Trailer
This document is licensed with a Creative Commons Attribution 4.0 International License ©2017
www.C5colleges.org This material is based upon work supported by the National Science Foundation under
Grant No.1548315.
Seeing Interrelationships in
“Truck”
IP (Internet ETHERNET
TCP or UDP Protocol)
This document is licensed with a Creative Commons Attribution 4.0 International License ©2017
www.C5colleges.org This material is based upon work supported by the National Science Foundation under
Grant No.1548315.
Two ways to Transport Items
Envelops ol Boxes in IP Moving Van
o
ch
S
am
e
Dr
r
ou e
Y n
La
• Unreliable am •
e
Dr reliable
5 T
S
,
ity
C
am
e
Dr
• No return • delivery guaranteed and if
receipt something is lost, user can re-
request
TRANSMISSION CONTROL
USER DATAGRAM PROTOCOL (UDP) PROTOCOL (TCP)
• no return receipt • reliable
• no formal close/open, • delivery guaranteed and if
“connectionless” something is lost, user can re-
• no reorder, no flow control, unreliable request
This document is licensed with a Creative Commons Attribution 4.0 International License ©2017
www.C5colleges.org This material is based upon work supported by the National Science Foundation under
Grant No.1548315.
no reviews yet
Please Login to review.