PACE-IT, Security+1.4: Common Network Protocols (part 2)

13
Common network protocols II.

Transcript of PACE-IT, Security+1.4: Common Network Protocols (part 2)

Page 1: PACE-IT, Security+1.4: Common Network Protocols (part 2)

Common network protocols II.

Page 2: PACE-IT, Security+1.4: Common Network Protocols (part 2)

Page 2

Instructor, PACE-IT Program – Edmonds Community College

Areas of Expertise Industry Certification PC Hardware Network

Administration IT Project

Management

Network Design User Training IT Troubleshooting

Qualifications Summary

Education M.B.A., IT Management, Western Governor’s University B.S., IT Security, Western Governor’s University

Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.

Brian K. Ferrill, M.B.A.

Page 3: PACE-IT, Security+1.4: Common Network Protocols (part 2)

Page 3

Common network protocols II.

– The difference between ports and protocols.

– Common protocols.

PACE-IT.

Page 4: PACE-IT, Security+1.4: Common Network Protocols (part 2)

Page 4

The difference between ports and protocols.Common network protocols II.

Page 5: PACE-IT, Security+1.4: Common Network Protocols (part 2)

Page 5

The difference between ports and protocols.

– Ports.» A method of specifying what protocol or service to

access.• Protocols and services use default ports so they are

easy to locate.» There are 65,536 ports available to be used for

communication, but port 0 is reserved. So, in actuality, only ports 1 to 65,535 are available.

• The first 1024 ports are specifically assigned and are called well known ports.

• www.iana.org/assignments/port-numbers.» They can also be thought of as phone number

extensions.• The IP address is the main number you are trying to

reach.• The port is the extension (service or protocol) you

want to access.

– Protocols.» Protocols can be thought of as the language that the

two applications on either side of the connection agree to speak.

» Protocols translate requests into services.» Most protocols use pre-defined ports, but some

protocols must be user configured.

Common network protocols II.

Page 6: PACE-IT, Security+1.4: Common Network Protocols (part 2)

Page 6

Common protocols.Common network protocols II.

Page 7: PACE-IT, Security+1.4: Common Network Protocols (part 2)

Page 7

Common protocols.

– HTTP (Hypertext Transfer Protocol).» The primary protocol used to transfer data over the

Internet.• Assigned to port 80 (TCP and UDP).

– HTTPS (Hypertext Transfer Protocol Secure).

» The primary protocol to securely transfer data over the Internet using SSL (Secure Socket Layer) or TLS (Transport Layer Security) technology. In actuality, SSL should no longer be used.

• Assigned to port 443 (TCP).

– NetBIOS (Network Basic Input/Output System).

» Originally developed to allow hosts to be able to communicate with servers.

• Assigned to ports 137-139 (TCP and UDP).

Common network protocols II.

Page 8: PACE-IT, Security+1.4: Common Network Protocols (part 2)

Page 8

Common protocols.

– SMTP (Simple Mail Transfer Protocol).

» The protocol used to transfer email from a client to an email server; it is also used to transfer email between servers.

• Assigned to port 25 (TCP and UDP).

– POP3 (Post Office Protocol v3).» The protocol used by clients to retrieve email from

servers. Once engaged, POP3 downloads all messages from the servers. The user cannot access email messages until they have been downloaded.

• Assigned to port 110 (TCP).

– IMAP (Internet Message Access Protocol).

» A protocol used by clients to access email on email servers. Allows the client to administer and organize email on the server into folders.

• Assigned to port 143 (TCP).

Common network protocols II.

Page 9: PACE-IT, Security+1.4: Common Network Protocols (part 2)

Page 9

Common protocols.

– SNMP (Simple Network Management Protocol).

» A protocol used to monitor and manage local area networks.

• Assigned to port 161 (UDP).

– DNS (Domain Name System).» The protocol used to map computer names to their IP

addresses (e.g., www.google.com to 74.125.28.104).• Assigned to port 53 (TCP and UDP).

– ICMP (Internet Control Message Protocol)

» A messaging service for IP.• Packets are carried as encapsulated IP datagrams.

» ICMP also provides information about networking issues.

Common network protocols II.

Page 10: PACE-IT, Security+1.4: Common Network Protocols (part 2)

Page 10

Common protocols.

– Telnet.» A protocol used for remote access to systems; it is

unsecure. It is a bidirectional terminal service.• Assigned to port 23 (TCP and UDP).

– SSH (Secure Shell).» A protocol used to encrypt data traffic on a network; it

can be used in place of Telnet to provide a secure bidirectional terminal connection.

• Assigned to port 22 (TCP and UDP).

– TLS (Transport Layer Security).» A cryptographic protocol used to encrypt online

communications. • It uses certificates and asymmetrical cryptography to

authenticate hosts and exchange security keys.• It is a better option than SSL (Secure Socket Layer),

which functions in a similar manner.

Common network protocols II.

Page 11: PACE-IT, Security+1.4: Common Network Protocols (part 2)

Page 11

What was covered.Common network protocols II.

Ports are a method of specifying what protocol or service a requestor is seeking access to. They can be thought of as being the specific location of that protocol or service. Protocols translate the request into a specific service. Many protocols use pre-determined ports, but some must be user defined.

Topic

The difference between ports and protocols.

Summary

Common protocols include: HTTP (80), HTTPS (443), NetBIOS (137-139), SMTP (25), POP3 (110), IMAP (143), SNMP (161), DNS (53), ICMP, Telnet (23), SSH (22), and TLS.

Common protocols.

Page 12: PACE-IT, Security+1.4: Common Network Protocols (part 2)

Page 12

THANK YOU!

Page 13: PACE-IT, Security+1.4: Common Network Protocols (part 2)

This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53.PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.