Category: Education

  • 8.8 Questions-Chapter 8

    You can take this quiz online at http://www.net-intro.com/quiz/ How do we indicate that we want a secure connection when using a web browser? a) Use https:// in the URL b) Use a secure web browser c) Open an incognito windowd) Manually encode the address of the server using SHA1 Why is a shared-secret approach not…

  • 8.6 Summary-Chapter 8

    Since the Internet was nearly 20 years old before we needed broadly deployed security, we had to find a way to add security to the already existing four-layer model. The perfect place to add security was as an option in the Transport layer. This is why we call secure connections on the Internet “Secure Sockets…

  • 8.5 Certificates and Certificate Authorities

    While public/private key encryption works to allow the distribution of encryption keys across insecure networks and the use of those keys to encrypt transmissions, there is still a problem of knowing if the public key that you have received when you connected to a server is really from the organization it claims to be from.…

  • 8.4 Encrypting Web Browser Traffic

    Since web browsers and web servers operate at the application layer, we barely notice whether we are using encrypted or unencrypted connections. Web browsers use the URL convention of replacing “http:” with “https:” to indicate that the browser is to communicate with the web server using the Secure Transport Layer instead of the unencrypted Transport…

  • 8.3 Secure Sockets Layer (SSL)

    Since network engineers decided to add security nearly 20 years after the Internet protocols were developed, it was important not to break any existing Internet protocols or architecture. Their solution was to add an optional partial layer between the Transport layer and the Application layer. They called this partial layer the Secure Sockets Layer (SSL)…

  • 8.2 Two Kinds of Secrets

    The traditional way to encrypt transmissions is using a shared secret (a password, a sentence, a number) that only the sending and receiving parties know. With the secret, it is easy to decrypt the received data, but if you received the data without possessing the secret, it would be effectively impossible to decrypt the message.…

  • 8.1 Encrypting and Decrypting Data

    The concept of protecting information so it cannot be read while it is being transported over an insecure medium is thousands of years old. The leaders in Roman armies sent coded messages to each other using a code called the “Caesar Cipher”. The simplest version of this approach is to take each of the characters…

  • 8 Secure Transport Layer

    In the early days of the Internet, networks were small and all of the routers were in secure locations. As long as each computer connected to the Internet protected itself from unwanted incoming connections, it was felt that there was no need to protect data from prying eyes while it was crossing the network. So…

  • 7.9 Questions-Chapter 7

    You can take this quiz online at http://www.net-intro.com/quiz/ Which layer is right below the Application layer? a) Transport b) Internetworking c) Link Layer d) Obtuse layer What kind of document is used to describe widely used Application layer protocols?86 a) DHCP b) RFC c) APPDOC d) ISO 9000 Which of these is an idea that…

  • 7.8 Glossary-Chapter 7

    HTML: HyperText Markup Language. A textual format that marks up text using tags surrounded by less-than and greater-than characters. Example HTML looks like: <p> This is <strong>nice</strong></p> HTTP: HyperText Transport Protocol. An Application layer protocol that allows web browsers to retrieve web documents from web servers. IMAP: Internet Message Access Protocol. A protocol that allows…

  • 7.7 Summary-Chapter 7

    The entire purpose of the lower three layers (Transport, Internetwork, and Link) is to make it so that applications running in the Application layer can focus the application problem that needs to be solved and leave virtually all of the complexity of moving data across a network to be handled by the lower layers of…

  • 7.6 Writing Networked Applications

    The applications which send and receive data over the network are written in one or more programming languages. Many programming languages have libraries of code that make it quite simple to write application code to send and receive data across the network. With a good programming library, making a connection to an application running on…

  • 7.5 Flow Control

    When we looked at the Transport layer, we talked about the “window size”, which was the amount of data that the Transport layer on the sending computer will send before pausing to wait for an acknowledgement. In this figure, we see a message broken into packets, with some of the packets sent and acknowledged. Six…

  • 7.4 The IMAP Protocol for Retrieving Mail

    The HTTP protocol is only one of many client/server application protocols used on the Internet. Another common protocol is used so that a mail application running on your computer can retrieve mail from a central server. Since your personal computer might not be turned on at all times, when mail is sent to you it…

  • 7.3 Exploring the HTTP Protocol

    In this section we will manually exercise the HTTP protocol by pretending to be a web browser and sending HTTP commands to a web server to retrieve data. To play with the HTTP protocol, we will use one of the earliest Internet applications ever built. The “telnet” application was first developed in 1968, and was…