Preview

IS3220 FINAL STUDY GUIDE

Powerful Essays
Open Document
Open Document
1708 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3220 FINAL STUDY GUIDE
IS3220 FINAL STUDY GUIDE
1.) Know how NetWitness/Wireshark investigator work
Investigator provides security operations staff, auditors, and fraud and forensics investigators the power to perform unprecedented free-form contextual analysis of raw network data captured and reconstructed

2.) Know what type of information can be detected from a packet header
Control Information

3.) Know how TCP established a connection
To establish a connection, TCP uses a three-way handshake. Before a client attempts to connect with a server, the server must first bind to and listen at a port to open it up for connections: this is called a passive open. Once the passive open is established, a client may initiate an active open. To establish a connection, the three-way (or 3-step) handshake occurs:
a. SYN: The active open is performed by the client sending a SYN to the server. The client sets the segment's sequence number to a random value .
b. SYN-ACK: In response, the server replies with a SYN-ACK. The acknowledgment number is set to one more than the received sequence number, and the sequence number that the server chooses for the packet is another random number.
c. ACK: Finally, the client sends an ACK back to the server. The sequence number is set to the received acknowledgement value, and the acknowledgement number is set to one more than the received sequence number

4.) Know what a connection oriented protocol is
A network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred, and where a stream of data is delivered in the same order as it was sent

5.) Know what promiscuous mode is
Is a mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is

You May Also Find These Documents Helpful

  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and functions of each of these.…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    4. The client accept the connection and send data to server and the server to replay the…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    It331 Unit 5 Essay

    • 593 Words
    • 3 Pages

    a) An analogy of this type of connection would be the transmission of a large text document. Before the document is transferred across the synchronous line, it is first broken into blocks of sentences or paragraphs. The blocks are then sent over the communication link to the remote site. With other transmission modes, the text is organized into long strings of letters (or characters) that make up the words within the sentences and paragraphs. These characters are sent over the communication link one at a time and reassembled at the remote location.…

    • 593 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab assign

    • 276 Words
    • 2 Pages

    How long from the time the client issued the initial SYN did it take the server to answer with the SYN-ACK?…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The frame’s destination address of a broadcast frame is a value of all binary 0s.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    “Tell me and I forget. Show me and I remember. Involve me and I understand.” Chinese proverb One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    7. Find a TCP 3-way handshake for a TELNET session. What is the significance of the TCP 3-way handshake?…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    2. What is promiscuous mode and how does this allow tcpdump, Wireshark, and Netwitness Investigator to perform protocol capture off a live network? Promiscuous mode causes the controller to pass all traffic it receives to the CPU rather than passing only the frames that the controller is intended to receive. It allows them to perform protocol captures because it is using the network traffic from the system network.…

    • 2612 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    function in Wireshark provides you with a breakdown of the different protocol types on the LAN…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    Information is passed from one computer to another in either clock-wise direction or counter clock-wise direction and after receiving the information, the receiver must send the “acknowledgement” message (ACK message) back to the sender to complete the transmission.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 5

    • 440 Words
    • 2 Pages

    Promiscuous mode is for a wired network interface controller or wireless network interface controller that causes the controller to pass all traffic to the CPU instead of passing only through the frames the controller is supposed to receive. It allows tcpdump, Wireshark, and NetWitness Investigator to perform protocol capture off a live network because it’s made for packet sniffing, which all these applications perform.…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Networking - Task 3

    • 354 Words
    • 2 Pages

    The 1st line shows the time, the second column shows the IP address of the data source, the 3rd shows the destination to where the data is pushed, the fourth shows the communication model used.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This document has been written as a tutorial, not a reference. It is probably at its best when read by…

    • 9611 Words
    • 39 Pages
    Good Essays
  • Powerful Essays

    Osi Model

    • 2118 Words
    • 9 Pages

    process, which can then act as a framework for understanding the details of computer networking. Also…

    • 2118 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    When Referring to Clocking

    • 1273 Words
    • 6 Pages

    m) A communication link that is outside the normal IP network, like a console cable or phone cal between to modems and the AUX port. Out-of-band Management…

    • 1273 Words
    • 6 Pages
    Powerful Essays