AUP
Acceptable Use Policy of a network
eg JANET AUP for academic hotspots
JANET
private gov funded org providing network services to uk research and HE institutions
WLAN
Wireless Local Area Network
MAC address
Media Access Control address
NIC
Network Interface Controller (network card)
EHA
Ethernet Hardware Address
DHCP
Dynamic Host Configuration Protocol
Application layer
DNS
Domain Name System
Application layer
FTP
File Transfer Protocol
Application layer
HTTP
HyperText Transfer Protocol
Application layer
IMAP
Internet Message Access Protocol
email retrieval and storage
(Application layer)
Mainly for retrieving from server to user
POP
Post Office Protocol
(Application layer)
Mainly for retrieving from server to user
SMTP
Simple Mail Transfer Protocol
(Application layer)
Mainly for sending from user to server for relaying
SOCKS
Socket Secure
Routes network packets btwn client & server through a proxy server
Although application layer, in OSI model, at Layer 5, session layer
OSI Model
Open Systems Interconnection Model Layers 1. Physical Layer (802.11, bltth) 2. Data Link Layer (btwn nodes) 3. Network Layer (IPv4/6) 4. Transport Layer (TCP, UDP) 5. Session Layer (PPTP, SOCKS) 6. Presentation Layer (MIME, XDR) 7. Application Layer (DNS, FTP, SMTP, Telnet, DHCP)
TCP/IP Model
Internet Protocol Suite Transmission Control P./Internet P. 1. Link (Frame data - MAC) 2. Internet (IP data) 3. Transport (TCP/UDP data) 4. Application (DHCP DNS HTTP etc data)
UDP
User Datagram Protocol
messages (datagrams) sent by computer applications to other hosts on an IP network without prior communications to set up special transmission channels or data paths
connectionless
UDP use
where error checking/correction not needed or performed by application
dropping packets over delayed packets
1. transaction oriented - simple query-response protocol suited
2. simple, suitable for bootstrapping
3. stateless - suitable for large numbers of clients - streaming media
4. lack of retransmission delays makes it suitable for real time applications - VOIP, online games
5. good for unidirectional communication, such as broadcast info, like service discovery
TCP
Transmission Control Protocol
connection oriented protocol
requires handshaking to set up end to end comms
once set up, user data can be sent bi-directionally
TCP characteristics
SSH
Secure Shell - Cryptographic network protocol for secure data communication, remote command line login, remote command exe and other secure network services between two networked computers.
Secure channel, SSH server and SSH client
SSID
Service Set Identification
802.11 network
Service set - all devices associated with a WLAN
SS can be local, independent, extended or mesh
Basic service set - access point + station
Mesh stations only participate in mesh functionalities, mesh formation, path selection and forwarding
Independent BSS - ad hoc network of client devices without a controlling AP
SSID hiding or network cloaking
some access points allow a user to inhibit the broadcasting of their SSIDs
station can only join a BSS after the associated SSID has been specified explicitly
Deters casual wireless snooping
WEP
Wired Equivalent Privacy
1997
40 or 104-bit key & 24-bit initialisation vector
lots of free software to break it like - aircrack
mitigated a little by using dynamic WEP