- Wireshark 2 Quick Start Guide
- Charit Mishra
- 186字
- 2021-06-25 20:45:47
A brief overview of the TCP/IP model
The world of network communication is governed by a set of protocols (rules and regulations) in order to function as intended. Protocols govern the transmission of network packets/segments/frames over a communication channel between endpoints. In order to understand how network packets stick together, forming a stream of traffic, we need to understand the basics of the networking that is the TCP/IP model. The TCP/IP model was originally known as the DoD model, a project that was regulated by the United States Department of Defense. All of the communication that we witness over the internet and other networks happens only through TCP/IP.
The TCP/IP model takes care of every part of packet's life cycle, namely, how a packet comes to life, how a packet is generated, how information pertaining to packet gets attached data payload (PDU), how it is routed through intermediary nodes, linking with other packets and so on.
It is strongly recommended to do some self-study on TCP/IP and how it functions, before you proceed ahead, as this book requires decent amount of familiarity with protocols.
- Metasploit Penetration Testing Cookbook(Second Edition)
- 白帽子講Web安全(紀念版)
- 特種木馬防御與檢測技術研究
- 電子支付的規制結構配置研究
- 同態密碼學原理及算法
- 防火墻技術與應用(第2版)
- 移動APT:威脅情報分析與數據防護
- Learning Devise for Rails
- 云原生安全技術實踐指南
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 黑客攻防實戰從入門到精通
- 構建新型網絡形態下的網絡空間安全體系
- Cybersecurity Threats,Malware Trends,and Strategies
- Android Application Security Essentials
- 黑客攻防從入門到精通:命令版