Hacker Highschool_ Lesson 3 Ports and Protocols.pdf

(491 KB) Pobierz
LESSON 3
PORTS AND PROTOCOLS
LESSON 3 – PORTS AND PROTOCOLS
“License for Use” Information
The following lessons and workbooks are open and publicly available under the following
terms and conditions of ISECOM:
All works in the Hacker Highschool project are provided for non-commercial use with
elementary school students, junior high school students, and high school students whether in a
public institution, private institution, or a part of home-schooling. These materials may not be
reproduced for sale in any form. The provision of any class, course, training, or camp with
these materials for which a fee is charged is expressly forbidden without a license including
college classes, university classes, trade-school classes, summer or computer camps, and
similar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page at
www.hackerhighschool.org/license.
The HHS Project is a learning tool and as with any learning tool, the instruction is the influence
of the instructor and not the tool. ISECOM cannot accept responsibility for how any
information herein is applied or abused.
The HHS Project is an open community effort and if you find value in this project, we do ask
you support us through the purchase of a license, a donation, or sponsorship.
All works copyright ISECOM, 2004.
2
LESSON 3 – PORTS AND PROTOCOLS
Table of Contents
“License for Use” Information............................................................................................................... 2
Contributors..............................................................................................................................................4
3.1 Introduction........................................................................................................................................5
3.2 Basic concepts of networks.............................................................................................................6
3.2.1 Devices .......................................................................................................................................6
3.2.2 Topologies ..................................................................................................................................6
3.3 TCP/IP model................................................................................................................................... 7
3.3.1 Introduction ...............................................................................................................................7
3.3.2 Layers ..........................................................................................................................................7
3.3.2.1 Application ....................................................................................................................... 7
3.3.2.2 Transport.............................................................................................................................7
3.3.2.3 Internet ..............................................................................................................................8
3.3.2.4 Network Access.................................................................................................................8
3.3.3 Protocols .....................................................................................................................................8
3.3.3.1 Application layer protocols ............................................................................................ 9
3.3.3.2 Transport layer Protocols ................................................................................................9
3.3.3.3 Internet layer Protocols ................................................................................................... 9
3.3.4 IP Addresses ...............................................................................................................................9
3.3.5 Ports .......................................................................................................................................... 12
3.3.6 Encapsulation ..........................................................................................................................13
3.4 Exercises............................................................................................................................................14
3.4.1 Exercise 1: Netstat ...................................................................................................................14
3.4.2 Exercise 2: Ports and Protocols ..............................................................................................15
3.4.3 Exercise 3: My First Server ....................................................................................................... 15
Further Reading.....................................................................................................................................17
3
LESSON 3 – PORTS AND PROTOCOLS
Contributors
Gary Axten, ISECOM
La Salle URL Barcelona
Kim Truett, ISECOM
Chuck Truett, ISECOM
Marta Barceló, ISECOM
Pete Herzog, ISECOM
4
LESSON 3 – PORTS AND PROTOCOLS
3.1 Introduction
The text and exercises in this lesson try to impart a basic understanding of the ports and
protocols in current use, as well as their relevance within the operating systems, Windows and
Linux.
Additionally, you will have the opportunity to become familiar with a number of useful utilities
which will allow you to properly understand the network capabilities of your computer system.
At the end of the lesson you should have a basic knowledge of:
- the concepts of networks
- IP addresses
- ports and protocols.
5
Zgłoś jeśli naruszono regulamin