Understanding Networking Protocols | part of Cybersecurity Essentials | Wiley Data and Cybersecurity books | IEEE Xplore

Understanding Networking Protocols

; ; ;

Chapter Abstract:

This chapter discusses the basic network protocols. It explores the components associated with different internet protocol (IP) addressing standards. The chapter also dis...Show More

Chapter Abstract:

This chapter discusses the basic network protocols. It explores the components associated with different internet protocol (IP) addressing standards. The chapter also discusses the security issues associated with media access control (MAC) addressing. It also explores the components and operation of the transmission control protocol/internet protocol (TCP/IP) suite and identify its vulnerabilities. The chapter provides examples of network subnetting and its uses. It describes the functions and structure of the Ethernet networking standard. The chapter focuses on peer‐to‐peer and client/server network access control methods. Sections of the network can be grouped together into subnets that share a range of IP addresses. A protective gateway is employed to act as an entry and exit point for the segmented subnet. The Ethernet family of standards has become the dominant force in hardware and electrical signaling interfacing as well as for providing media access control.
Page(s): 297 - 326
Copyright Year: 2018
Edition: 1
ISBN Information:

Contact IEEE to Subscribe