Chapter 3 Covert Channels in the TCP/IP Stack

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 3 Covert Channels in the TCP/IP Stack Defending the Right to Communicate: Anonymity and Filter Traversal & Fair Validation of Database Replies Der Technischen Fakultät der Universität Erlangen–Nürnberg zur Erlangung des Grades Doktor – Ingenieur vorgelegt von Dipl. math. Matthias Bauer Erlangen – 2004 Als Dissertation genehmigt von der Technischen Fakultät der Universität Erlangen–Nürnberg Tag der Einreichung: 16. September 2004 Tag der Promotion: 3. Juni 2005 Dekan: Prof. Dr. rer. nat. A. Winnacker Berichterstatter: Prof. Dr-Ing. R. German Dr-Ing. M. Kaiserswerth Das Recht auf Kommunikation verteidigen: Anonymität und Filter–Unterwanderung & Gerechte Überprüfung von Datenbank–Antworten Der Technischen Fakultät der Universität Erlangen–Nürnberg zur Erlangung des Grades Doktor – Ingenieur vorgelegt von Dipl. math. Matthias Bauer Erlangen – 2004 Als Dissertation genehmigt von der Technischen Fakultät der Universität Erlangen–Nürnberg Tag der Einreichung: 16. September 2004 Tag der Promotion: 3. Juni 2005 Dekan: Prof. Dr. rer. nat. A. Winnacker Berichterstatter: Prof. Dr-Ing. R. German Dr-Ing. M. Kaiserswerth Inhaltsverzeichnis I Freie Kommunikation in Gegenwart eines starken Angreifers 9 1 Einleitung 11 1.1 Freie Kommunikation im Internet: eine Utopie? . 11 1.1.1 Beispiel: E–Mail . 17 1.2 Struktur dieses Teils der Arbeit . 17 2 Anonymität und verwandte Konzepte 19 2.1 Terminologie . 19 2.1.1 Definition des Angreifers . 20 2.2 Methoden . 21 2.2.1 Verschlüsselter Rundfunk . 21 2.2.2 Chaums Mixe und verwandte Protokolle . 21 2.2.3 Erweiterungen von Chaums Mixen . 23 2.2.4 Implementationen von Mixen . 25 2.2.5 Onion Routing . 26 2.2.6 Chaums Dining Cryptographers Netzwerke . 27 2.3 Anti–Zensur Techniken . 29 2.4 Protokolle für unzuverlässige Medien . 31 2.4.1 Multicast als scheinbar attraktiver Rundfunk Kanal . 32 2.4.2 Multicast und Empfänger–Anonymität . 33 2.5 Ergebnisse dieses Kapitels . 37 3 Verdeckte Kanäle im TCP/IP Stack 39 3.1 Überblick . 39 3.2 Tunneln . 39 3.3 Verdeckte und Sublime Kanäle . 40 3.3.1 Verdeckte Kanäle . 40 3.3.2 Sublime Kanäle . 41 3.3.3 Verwandtes . 43 3.4 Neue Perspektiven auf Kanäle . 44 3.5 Verdeckte Kanäle in TCP/IP Protokollen . 45 3.5.1 Klassifijation von Kanälen . 46 3.5.2 Blockieren von ausgewählten Kanälen . 46 3.6 Schlussfolgerungen . 59 3 4 4 Bewegliche Begegnungspunkte 61 4.1 Einleitung . 61 4.1.1 Übliche Vorgehensweisen . 61 4.1.2 Struktur dieses Kapitels . 62 4.2 Begegnungspunkte . 62 4.2.1 Grundsätzlicher Ansatz . 62 4.3 Beispiel mit Freenet . 63 4.4 Mit etablierten Protokollen . 64 4.4.1 Kurzer Exkurs: das Domain Name System . 64 4.4.2 Beispiel mit Dynamic DNS Diensten . 65 4.4.3 Mit offenen Relais zur Kommunikation anstelle von Spam 66 4.4.4 Leichte Verschlechterung des Angebots . 67 4.4.5 ICMP Push und Pull . 68 4.5 Verwandte Methoden . 70 4.6 Ergebnisse dieses Kapitels . 70 5 Das gedämpfte Posthorn 71 5.1 Motivation . 71 5.2 Verwandte Arbeiten . 73 5.3 Bedrohungs–Modell . 73 5.4 Hintergrund . 74 5.5 Server–zu–Server Kanäle . 75 5.6 Das gedämpfte Posthorn . 78 5.6.1 Der Aufbau . 78 5.6.2 Eine erste Version . 79 5.6.3 Verbesserte Version . 80 5.6.4 Eigenschaften des Protokolls . 81 5.7 Verbleibende Probleme und Vorschläge . 82 5.8 Die Implementation . 82 5.9 Ergebnisse dieses Kapitels . 84 6 Schlussfolgerungen 85 6.1 Ist Filtern überhaupt möglich? . 85 II Gerechte Überprüfung von Databank–Antworten 87 7 Gerechte Überprüfung von Databank–Antworten 89 7.1 Motivation . 89 7.1.1 Angriffe bemerken . 90 7.2 Zustands–Credentials . 93 7.2.1 Bloom Filter . 92 7.2.2 Einfache Hashes . 92 7.2.3 Hash Ketten . 92 7.2.4 Hash Bäume . 93 7.3 Hash Bäume mit Schlüsseln . 94 7.4 Ausgedünnte Hash Baum Algorithmen . 95 2 7.4.1 Berechnung von Paaren entlang von Pfaden . 96 7.4.2 Einfügen eines Eintrags . 97 7.4.3 Löschen eines Eintrags . 97 7.4.4 Eigenschaften . 97 7.5 Verwandte Arbeiten . 98 7.5.1 Undeniable Attesters . 98 7.5.2 Zero-Knowledge Sets . 101 7.6 Schlussfolgerungen . 104 Bibliographie 109 3 Die Arbeit besteht aus zwei Teilen. Die Hauptaussage des ersten Teils besteht darin, dass geheime Zwei–Wege–Kommunikation im Internet nicht verhindert werden kann, unabhängig von etwaigen Filtermethoden. Wir zeigen wie Part- ner Kanäle für spätere Kommunikation auch unter aktiver Filterung anlegen können. Wir untersuchen verdeckte Kanäle auf allen Schichten des TCP/IP Schichtmodells und der wichtigsten Anwendungsprotokolle. Wir beschreiben Anonymisierungstechniken und ihre Beschränkungen in bestimmten Szenar- ien. Durch Kombination von verdeckten Kanälen in einem verbreiteten Pro- tokoll und Anonymisierung entwickeln wir ein Nachrichtenprotokoll das unbeobachtbare Kommunikation erlaubt. Im zweiten Teil der Dissertation stellen wir ein Protokoll zur interaktiven Überprüfung von Datenbank–Antworten vor. Das Protokoll ist effizient in der Anzahl und Größe der ausgetauschten Nachrichten. Eine besondere Eigen- schaft ist, dass sogar die Nicht–Existenz von Einträgen effizient verifiziert wer- den kann. 4 This dissertation consists of two parts. The main thesis of the first part is that secret, two–party communication cannot be prevented on the Internet, regard- less of filtering methods. We show how partners can arrange a channel for further communication despite active filtering. We examine covert channels on all layers of the TCP/IP stack and its main application protocols. We de- scribe anonymizing techniques and their limits in certain scenarios. By com- bining covert channels in a popular protocol and anonymization we develop a messaging protocol which allows unobservable communication. In the second part of the dissertation we present a protocol for the inter- active validation of database replies. The protocol is efficient in the number and size of the messages exchanged. A special property is that even the non– existence of records can be verified efficiently. Contents I Free Communication in Presence of strong Adversaries 9 1 Introduction 11 1.1 Free Communication on the Internet: a Utopia? . 11 1.1.1 Example: E–Mail . 17 1.2 Structure of this part of the Thesis . 17 2 Anonymity and related Concepts 19 2.1 Terminology . 19 2.1.1 Definition of Attackers . 20 2.2 Methods . 21 2.2.1 Encrypted Broadcast . 21 2.2.2 Chaumian Mixes and related protocols . 21 2.2.3 Extensions of Chaum's Mixes . 23 2.2.4 Implementations of Mixes . 25 2.2.5 Onion Routing . 26 2.2.6 Chaum's Dining Cryptographers Networks . 27 2.3 Anti–Censorship Techniques . 29 2.4 Protocols for unreliable Media . 31 2.4.1 Multicast as seemingly attractive broadcast channel . 32 2.4.2 Multicast and receiver–anonymity . 33 2.5 Results of this chapter . 37 3 Covert Channels in the TCP/IP Stack 39 3.1 Overview . 39 3.2 Tunneling . 39 3.3 Covert and Subliminal Channels . 40 3.3.1 Covert Channels . 40 3.3.2 Subliminal Channels . 41 3.3.3 Related Topics . 43 3.4 New perspectives on channels . 44 3.5 Covert Channels in TCP/IP Protocols . 45 3.5.1 Classification of Channels . 46 3.5.2 Blocking of selected Channels . 46 3.6 Conclusion . 59 5 6 CONTENTS 4 Moving Points of Rendezvous 61 4.1 Introduction . 61 4.1.1 Common practice . 61 4.1.2 Structure of this Chapter . 62 4.2 Points of Rendezvous . 62 4.2.1 Basic Approach . 62 4.3 Example using Freenet . 63 4.4 Using established Protocols . 64 4.4.1 Short excursion: the Domain Name System . 64 4.4.2 Example using Dynamic DNS Services . 65 4.4.3 Using open relays for communication instead of spam- ming . 66 4.4.4 Slight Degradation of Service . 67 4.4.5 ICMP Push and Pull . 68 4.5 Related Methods . 70 4.6 Results of this chapter . 70 5 The Muted Post–horn 71 5.1 Motivation . 71 5.2 Related Work . 73 5.3 Threat Model . 73 5.4 Background . 74 5.5 Server–to–Server Channels . ..
Recommended publications
  • Maximum Internet Security: a Hackers Guide - Networking - Intrusion Detection
    - Maximum Internet Security: A Hackers Guide - Networking - Intrusion Detection Exact Phrase All Words Search Tips Maximum Internet Security: A Hackers Guide Author: Publishing Sams Web Price: $49.99 US Publisher: Sams Featured Author ISBN: 1575212684 Benoît Marchal Publication Date: 6/25/97 Pages: 928 Benoît Marchal Table of Contents runs Pineapplesoft, a Save to MyInformIT consulting company that specializes in Internet applications — Now more than ever, it is imperative that users be able to protect their system particularly e-commerce, from hackers trashing their Web sites or stealing information. Written by a XML, and Java. In 1997, reformed hacker, this comprehensive resource identifies security holes in Ben co-founded the common computer and network systems, allowing system administrators to XML/EDI Group, a think discover faults inherent within their network- and work toward a solution to tank that promotes the use those problems. of XML in e-commerce applications. Table of Contents I Setting the Stage 1 -Why Did I Write This Book? 2 -How This Book Will Help You Featured Book 3 -Hackers and Crackers Sams Teach 4 -Just Who Can Be Hacked, Anyway? Yourself Shell II Understanding the Terrain Programming in 5 -Is Security a Futile Endeavor? 24 Hours 6 -A Brief Primer on TCP/IP 7 -Birth of a Network: The Internet Take control of your 8 -Internet Warfare systems by harnessing the power of the shell. III Tools 9 -Scanners 10 -Password Crackers 11 -Trojans 12 -Sniffers 13 -Techniques to Hide One's Identity 14 -Destructive Devices IV Platforms
    [Show full text]
  • Usenet News HOWTO
    Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6
    [Show full text]
  • NBAR2 Standard Protocol Pack 1.0
    NBAR2 Standard Protocol Pack 1.0 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 © 2013 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Release Notes for NBAR2 Standard Protocol Pack 1.0 1 CHAPTER 2 BGP 3 BITTORRENT 6 CITRIX 7 DHCP 8 DIRECTCONNECT 9 DNS 10 EDONKEY 11 EGP 12 EIGRP 13 EXCHANGE 14 FASTTRACK 15 FINGER 16 FTP 17 GNUTELLA 18 GOPHER 19 GRE 20 H323 21 HTTP 22 ICMP 23 IMAP 24 IPINIP 25 IPV6-ICMP 26 IRC 27 KAZAA2 28 KERBEROS 29 L2TP 30 NBAR2 Standard Protocol Pack 1.0 iii Contents LDAP 31 MGCP 32 NETBIOS 33 NETSHOW 34 NFS 35 NNTP 36 NOTES 37 NTP 38 OSPF 39 POP3 40 PPTP 41 PRINTER 42 RIP 43 RTCP 44 RTP 45 RTSP 46 SAP 47 SECURE-FTP 48 SECURE-HTTP 49 SECURE-IMAP 50 SECURE-IRC 51 SECURE-LDAP 52 SECURE-NNTP 53 SECURE-POP3 54 SECURE-TELNET 55 SIP 56 SKINNY 57 SKYPE 58 SMTP 59 SNMP 60 SOCKS 61 SQLNET 62 SQLSERVER 63 SSH 64 STREAMWORK 65 NBAR2 Standard Protocol Pack 1.0 iv Contents SUNRPC 66 SYSLOG 67 TELNET 68 TFTP 69 VDOLIVE 70 WINMX 71 NBAR2 Standard Protocol Pack 1.0 v Contents NBAR2 Standard Protocol Pack 1.0 vi CHAPTER 1 Release Notes for NBAR2 Standard Protocol Pack 1.0 NBAR2 Standard Protocol Pack Overview The Network Based Application Recognition (NBAR2) Standard Protocol Pack 1.0 is provided as the base protocol pack with an unlicensed Cisco image on a device.
    [Show full text]
  • The Design, Implementation and Operation of an Email Pseudonym Server
    The Design, Implementation and Operation of an Email Pseudonym Server David Mazieres` and M. Frans Kaashoek MIT Laboratory for Computer Science 545 Technology Square, Cambridge MA 02139 Abstract Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. Much existing work concentrates on withstanding the former, but the threat of the latter is equally real. One particularly effective attack against anonymous servers is to abuse them and stir up enough trouble that they must shut down. This paper describes the design, implementation, and operation of nym.alias.net, a server providing untraceable email aliases. We enumerate many kinds of abuse the system has weath- ered during two years of operation, and explain the measures we enacted in response. From our experiences, we distill several principles by which one can protect anonymous servers from similar attacks. 1 Introduction Anonymous on-line speech serves many purposes ranging from fighting oppressive government censorship to giving university professors feedback on teaching. Of course, the availability of anonymous speech also leads to many forms of abuse, including harassment, mail bombing and even bulk emailing. Servers providing anonymity are particularly vulnerable to flooding and denial-of-service attacks. Concerns for the privacy of legitimate users make it impractical to keep usage logs. Even with logs, the very design of an anonymous service generally makes it difficult to track down attackers. Worse yet, attempts to block problematic messages with manually-tuned filters can easily evolve into censorship—people unhappy with anonymous users will purposefully abuse a server if by doing so they can get legitimate messages filtered.
    [Show full text]
  • A Proposed Technique for Tracing Origin of Spam on the Usenet
    A proposed technique for tracing origin of spam on the Usenet by Dirk Bertels, BComp A dissertation submitted to the School of Computing in partial fulfillment of the requirements for the degree of Bachelor of Computing with Honours University of Tasmania June 2006 This thesis contains no material which has been accepted for the award of any other degree or diploma in any tertiary institution. To the candidate’s knowledge and belief, the thesis contains no material previously published or written by another person except where due reference is made in the text of the thesis. Signed Dirk Bertels Hobart, June 2006 Abstract The Usenet, a worldwide distributed decentralized conferencing system, is widely targeted by spammers who use a variety of techniques in order to obscure their identity. One of these techniques is called path preload, in which the path header is spoofed by means of attaching a false section at the beginning of this path. The process of detecting and confirming path preload is laborious and requires a thorough understanding of the Usenet. A technique which downloads a particular article from several servers, and compares their path headers is explored as to its usefulness regarding path preload detection. This document begins with a general background on the Usenet, highlighting those aspects that are relevant to the research, especially the topics of Usenet headers and spam. This leads to a description of the proposed technique and the development of a tool capable of implementing this technique. The tool essentially downloads a spam article from different servers, and analyses their headers.
    [Show full text]
  • Technical and Legal Analysis of Comcast's Network Management
    Technical and Legal Analysis of Comcast’s Network Management Practices by Satish Sunder Rajan Gopal B.Tech., Pondicherry University, 2009 A thesis submitted to the Faculty of the Graduate School of the University of Colorado in partial fulfillment of the requirement for the degree of Master of Science Department of Interdisciplinary Telecommunications 2011 This thesis entitled: Technical and Legal Analysis of Comcast’s Network Management Practices written by Satish Sunder Rajan Gopal has been approved for the Interdisciplinary Telecommunication Program Paul Ohm Dale Hatfield Preston Padden Date The final copy of this thesis has been examined by the signatories, and we Find that both the content and the form meet acceptable presentation standards Of scholarly work in the above mentioned discipline. Satish Sunder Rajan Gopal (M.S, Telecommunications) Technical and Legal Analysis of Comcast’s Network Management Practices Thesis directed by associate professor Paul Ohm Comcast took a controversial decision by targeting P2P (peer to peer) specific protocols to control congestion in upstream traffic over its network. In 2008, FCC required Comcast to stop and reveal details of their current network management practices that violated Network Neutrality obligations. Many concluded that Comcast’s actions were against Internet Engineering Task Force (IETF) standard. However, rules of network neutrality, a policy statement architected by FCC cannot be enforced. And IETF, a standards body does not control Comcast’s actions. This research focuses on a hypothetical infringement suit which shows how an internet service provider could be liable for infringement, when it deviates from IETF’s protocol standards and while controlling copyrighted material over its network.
    [Show full text]
  • Netizens: an Anthology
    Netizens: An Anthology Table of Contents Foreword: By Tom Truscott Preface: What is a Netizen? Introduction: Participatory Networks Part I - The Present: What Has Been Created and How? Chapter 1 - The Net and the Netizens: The Impact the Net has on People’s Lives Chapter 2 - The Evolution of Usenet: The Poor Man’s ARPANET Chapter 3 - The Social Forces Behind the Development of Usenet Chapter 4 - The World of Usenet Part II - The Past: Where Has It All Come From? Chapter 5 - The Vision of Interactive Computing and the Future Chapter 6 - Cybernetics, Time-sharing, Human-Computer Symbiosis and On-line Communities: Creating a Super-community of On-line Communities Chapter 7 - Behind the Net: Computer Science and the Untold Story of the ARPANET Chapter 8 - The Birth and Development of the ARPANET Chapter 9 - On the Early History and Impact of UNIX: Tools to Build the Tools for a New Millennium Chapter 10 - On the Early Days of Usenet: The Roots of the Cooperative Online Culture Part III - And the Future? Chapter 11 - The NTIA Conference on the Future of the Net Creating a Prototype for a Democratic Decision Making Process Chapter 12 - “Imminent Death of the Net Predicted!” Chapter 13 - The Effect of the Net on the Professional News Media: The Usenet News Collective and Man-Computer News Symbiosis Chapter 14 - The Net and the Future of Politics: The Ascendancy of the Commons Chapter 15 - Exploring New York City’s On-Line Community: A Snapshot of NYC.General Part IV - Contributions Toward Developing a Theoretical Framework Chapter 16 - The Expanding Commonwealth of Learning: Printing and the Net Chapter 17 - ‘Arte’: An Economic Perspective Chapter 18 - The Computer as Democratizer Bibliography Glossary of Acronyms Appendix Proposed draft Declaration of the Rights of Netizens Foreword Netizens: On the Impact and History of Usenet and the Internet is an ambitious look at the social aspects of computer networking.
    [Show full text]
  • Network Working Group G. Malkin Request for Comments: 1325 Xylogics FYI: 4 A
    Network Working Group G. Malkin Request for Comments: 1325 Xylogics FYI: 4 A. Marine Obsoletes: RFC 1206 SRI May 1992 FYI on Questions and Answers Answers to Commonly asked "New Internet User" Questions Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. Abstract This FYI RFC is one of two FYI's called, "Questions and Answers" (Q/A), produced by the User Services Working Group of the Internet Engineering Task Force (IETF). The goal is to document the most commonly asked questions and answers in the Internet. New Questions and Answers In addition to updating information contained in the previous version of this FYI RFC, the following new questions have been added: Questions About the Internet: How do I get a list of all the hosts on the Internet? Questions About Internet Documentation: What is the RFC-INFO service? What is an FYI? What is an STD? What is the Internet Monthly Report? Questions About Internet Organizations: What is the Internet Society? Questions About Internet Services: What is "archie"? How do I Connect to archie? Mailing Lists and Sending Mail How Do I Send Mail to Other Networks? User Services Working Group [Page 1] RFC 1325 FYI Q/A - for New Internet Users May 1992 Table of Contents 1. Introduction................................................. 2 2. Acknowledgements............................................. 3 3. Questions About the Internet................................. 3 4. Questions About TCP/IP....................................... 5 5. Questions About the Domain Name System....................... 6 6. Questions About Internet Documentation....................... 6 7. Questions about Internet Organizations and Contacts.........
    [Show full text]
  • Handling Information Overload on Usenet
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by NORA - Norwegian Open Research Archives UNIVERSITY OF OSLO Department of Informatics Handling Information Overload on Usenet Advanced Caching Methods for News Jan Ingvoldstad Cand Scient Thesis 4th August 2001 Abstract Usenet is the name of a world wide network of servers for group communica- tion between people. From 1979 and onwards, it has seen a near exponential growth in the amount of data transported, which has been a strain on band- width and storage. There has been a wide range of academic research with focus on the WWW, but Usenet has been neglected. Instead, Usenet’s evolu- tion has been dominated by practical solutions. This thesis describes the history of Usenet in a growth perspective, and introduces methods for collection and analysis of statistical data for testing the usefulness of various caching strategies. A set of different caching strategies are proposed and examined in light of bandwidth and storage demands as well as user perceived performance. I have shown that advanced caching methods for news offers relief for reading servers’ storage and bandwidth capacity by exploiting usage patterns for fetching or prefetching articles the users may want to read, but it will not solve the problem of near exponential growth nor the problems of Usenet’s backbone peers. Preface When I first started my studies at the University in Oslo in the autumn of 1991, I thought I was going to be a mathematician, and followed my first class in university level mathematics with vigor.
    [Show full text]
  • U.S. Government Publishing Office Style Manual
    Style Manual An official guide to the form and style of Federal Government publishing | 2016 Keeping America Informed | OFFICIAL | DIGITAL | SECURE [email protected] Production and Distribution Notes This publication was typeset electronically using Helvetica and Minion Pro typefaces. It was printed using vegetable oil-based ink on recycled paper containing 30% post consumer waste. The GPO Style Manual will be distributed to libraries in the Federal Depository Library Program. To find a depository library near you, please go to the Federal depository library directory at http://catalog.gpo.gov/fdlpdir/public.jsp. The electronic text of this publication is available for public use free of charge at https://www.govinfo.gov/gpo-style-manual. Library of Congress Cataloging-in-Publication Data Names: United States. Government Publishing Office, author. Title: Style manual : an official guide to the form and style of federal government publications / U.S. Government Publishing Office. Other titles: Official guide to the form and style of federal government publications | Also known as: GPO style manual Description: 2016; official U.S. Government edition. | Washington, DC : U.S. Government Publishing Office, 2016. | Includes index. Identifiers: LCCN 2016055634| ISBN 9780160936029 (cloth) | ISBN 0160936020 (cloth) | ISBN 9780160936012 (paper) | ISBN 0160936012 (paper) Subjects: LCSH: Printing—United States—Style manuals. | Printing, Public—United States—Handbooks, manuals, etc. | Publishers and publishing—United States—Handbooks, manuals, etc. | Authorship—Style manuals. | Editing—Handbooks, manuals, etc. Classification: LCC Z253 .U58 2016 | DDC 808/.02—dc23 | SUDOC GP 1.23/4:ST 9/2016 LC record available at https://lccn.loc.gov/2016055634 Use of ISBN Prefix This is the official U.S.
    [Show full text]
  • Chapter 11 Architecting the Internet
    chapter 11 Architecting the Internet “. barring total disaster, all elements are eventually acknowledged, even if they require retransmission.” —TCP inventor Vint Cerf, 1973 In this chapter, you will learn how to: N the previous chapter, you studied the theory behind the seven lay- ■ Define how the four layers of the Internet Architecture map Iers of the OSI Reference Model (OSI/RM). This chapter puts theory into to the seven layers of the OSI practice by showing you how the Internet implements the OSI/RM Reference Model. through a suite of protocols called TCP/IP. Because it powers the Internet, TCP/IP is the most famous protocol suite in the world. ■ Explain the Internet addressing rules and configure TCP/IP on a This chapter begins by explaining the process through which TCP/IP personal computer. implements the OSI/RM protocols for packet creation, addressing, and routing. Then you learn how to configure TCP/IP on PCs and ■ List the network utilities workstations and optimize them for maximum network performance. used to analyze, troubleshoot, and optimize Web sites for Every network must have one or more servers to respond to requests and maximum performance. provide the services that are the reason why you created the network in the first place. The Internet has many kinds of servers. Web servers, for exam- ■ Explain how domain names map ple, respond to requests from browsers. Mail servers, news servers, FTP to IP addresses and define the roles that different kinds of servers, and streaming media servers provide communication, entertain- Internetworking servers play ment, and information resources that are very popular among end users.
    [Show full text]
  • Computer Programming and Cyber Security for Beginners
    Computer Programming and Cyber Security for Beginners This Book Includes : Python Machine Learning , SQL , Linux , Hacking with Kali Linux , Ethical Hacking . Coding and Cybersecurity Fundamentals Zach Codings Download the Audio Book Version of This Book for FREE If you love listening to audio books on-the-go, I have great news for you. You can download the audio book version of this book for FREE just by signing up for a FREE 30-day audible trial! See below for more details! Audible Trial Benefits As an audible customer, you will receive the below benefits with your 30- day free trial: FREE audible book copy of this book After the trial, you will get 1 credit each month to use on any audiobook Your credits automatically roll over to the next month if you don’t use them Choose from Audible’s 200,000 + titles Listen anywhere with the Audible app across multiple devices Make easy, no-hassle exchanges of any audiobook you don’t love Keep your audiobooks forever, even if you cancel your membership And much more Click the links below to get started! For Audible US For Audible UK For Audible FR For Audible DE © Copyright 2019 by Zach Codings All rights reserved. The content contained within this book may not be reproduced, duplicated or transmitted without direct written permission from the author or the publisher. Under no circumstances will any blame or legal responsibility be held against the publisher, or author, for any damages, reparation, or monetary loss due to the information contained within this book, either directly or indirectly.
    [Show full text]