Hey There, I'm Sourya from India and Creative World is my website, I provide services on Music production, Graphics & Web Design, UI/UX, Tshirt design, Illustration, Photography, Hardware Networking, Cyber security, Ethical Hacking, Website Vulnerability analysis, SEO, Digital Marketing, Paid ad campaign Management, also provide Tutorials and coaching on various topics, Also I'm a certified Yoga trainer and Calisthenics Instructor. B.Tech in CSE and BFA in fine art. And a freelancer.
Ethical Hacking for Beginners (Chapter-7)
A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure, or design.
Transmission Control Protocol (TCP)
Internet Protocol (IP)
User Datagram Protocol (UDP)
Post office Protocol (POP)
Simple mail transport Protocol (SMTP)
File Transfer Protocol (FTP)
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol Secure (HTTPS)
Telnet
Gopher
ARP (Address Resolution Protocol)
DHCP (Dynamic Host Configuration Protocol)
IMAP4 (Internet Message Access Protocol)
SIP (Session Initiation Protocol)
RTP (Real-Time Transport Protocol)
RLP (Resource Location Protocol)
RAP (Route Access Protocol)
L2TP (Layer Two Tunnelling Protocol)
PPTP (Point To Point Tunnelling Protocol)
SNMP (Simple Network Management Protocol)
TFTP (Trivial File Transfer Protocol)
NAT:- Network address translation (NAT) is a method of mapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.
The NAT device accepts requests to traverse the internet from an internal machine. It then records that machine's IP address in a table and converts the IP address to the external IP address of the router. When the packet returns from its destination, the NAT device looks into its saved table of the original request and forwards the packet to the internal IP address of the system that made the original request within the LAN. And this process is so fast that one can’t even realize this whole conversion is happening on the back end.
The OSI Model consists of 7 layers. They are:-
Application Layer (Application Connected to the internet)
Presentation Layer (Standard data representation for application)
Session Layer (Manage session among applications)
Transport Layer (End to end error detection and correction)
Network Layer (Handle connection to the network by a higher layer)
Data Link Layer (provide safe communication of data over the physical network)
Physical layer (Define the physical characteristics of the network)
*Where First 3 are Software Layer and Last 3 are Hardware layer and the Middle one Transport Layer is the heart of OSI Model
We will dive deep into all of these layers in another chapter.
TCP/IP model consists of 4 layers only.
Application Layer (In this layer App and processes running on the network.)
Transport layer (Provides end to end data delivery service)
Internet Layer (Make datagram and handles data routines)
Network Layer (Provides routines allowing access to the physical network)
Will discuss all of these layers in detail in the future.
0 Comments:
Post a Comment