Unit V CSS
Unit V CSS
Unit V CSS
some relevant steps you can take to protect yourself, your data, and your business.
1. Ransomware Attack
2. Code Injection (Remote Code Execution)
3. Cross-Site Scripting (XSS) Attack
4. Data Breach
5. Malware and Virus Infection
6. DDoS Attack
7. Credential Stuffing Attack
8. Brute Force Attack
9. Weak Passwords and Authentication Issues
10. Social Engineering
11. SPAM and Phishing
12. Insider Threat
13. Sensitive Data Leak
14. No Backups
15. Not Updating or Patching Regularly
Unfortunately, many business owners are profoundly unaware of the weaknesses and
vulnerabilities that exist within their business. The good news is, with your help, and a proactive
approach, you can work together to close most of those exploitable openings.
The data link layer is the protocol layer in a program that handles the moving of data into and out
of a physical link in a network. The data link layer is Layer 2 in the Open Systems
Interconnection (OSI) architecture model for a set of telecommunication protocols.
Data bits are encoded, decoded and organized in the data link layer, before they are transported
as frames between two adjacent nodes on the same LAN or WAN. The data link layer also
determines how devices recover from collisions that may occur when nodes attempt to send
frames at the same time.
The data link layer has two sublayers: the logical link control (LLC) sublayer and the media
access control (MAC) sublayer.
As described by the IEEE 802 LAN specification, the role of the LLC sublayer is to control data
flow among various applications and services, as well as provide acknowledgement and error
notification mechanisms. The LLC sublayer can then talk to a number of IEEE 802 MAC
sublayers, which control access to the physical media for transport. It is also responsible for the
physical addressing of frames.
Two common MAC layer types include Ethernet and 802.11 wireless specifications.
Functions of the data link layer
The data link layer has three main functions:
The data link layer ensures an initial connection has been set up, divides output data into data
frames and handles the acknowledgements from a receiver that the data arrived successfully. It
also ensures incoming data has been received successfully by analyzing bit patterns at special
places in the frames.
If an error occurs, the data link layer notifies higher-level protocols that something has happened
to the physical link. Frame sequencing capabilities within the data link layer permit the receiving
device to reorder frames that might have been transmitted out of sequence. The data link layer
verifies the packet is unimpaired.
The data link layer also manages flows by enabling devices on a link to detect congestion.
Nearby devices then transmit congestion information, so traffic can be rerouted accordingly.
The data link layer in action
You may be imagining that the data link layer on one device communicates directly with the data
link layer on another device. However, the connection is via the physical media.
The network layer in one device wants to send some data to the network layer in another
device, across some type of connection.
On the sending device, the network layer passes the data to the appropriate data link
layer. This layer encapsulates the data to create a frame, and passes the frame to the
media.
The final part of the data link layer converts the bits of the frames into the electrical,
wireless, or optical signals that are sent along the link medium.
When the frame is received, the receiving device’s data link layer decapsulates the data
from the frame and passes it up to the receiver’s network layer.
We say that the data link layer is providing a service to the network layer by transporting its
data in frames across the link.
TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is a set of
conventions or rules and methods that are used to interconnect network devices on the Internet.
The internet protocol suite is commonly known as TCP/IP, as the foundational protocols in the
suite are Transmission Control Protocol and Internet Protocol.
It chooses how the information will be traded over the web through end-to-end communications
that incorporate how the information ought to be organized into bundles (bundles of data),
addressed, sent, and received at the goal.
This communication protocol can also be utilized to interconnect organize devices in a private
network such as an intranet or an extranet.
History of TCP/IP:
The Defense Advanced Research Projects Office (DARPA), the investigation department of the
U.S. Department of Defense, made the TCP/IP shown in the 1970s for utilization in ARPANET,
a wide zone organize that gone before the web.
TCP/IP was initially planned for the Unix working framework, and it has been built into all of
the working frameworks that came after it.
Characteristics of TCP/IP:
Share Data Transfer: The TCP allows applications to create channels of
communications across a network. It also permits a message to be separated into smaller
packets before they are transmitted over the web and after that collected in the right order
at the destination address. So, it guarantees the solid transmission of data across the
channel.
Internet Protocol: The IP address tells the packets the address and route so that they
reach the proper destination. It includes a strategy that empowers portal computers on the
internet-connected to arrange forward the message after checking the IP address.
Reliability: The most vital feature of TCP is solid data delivery. In arrange to supply
unwavering quality, TCP must recover information that’s harmed, misplaced, copied, or
conveyed out of arranging by the Arrange Layer.
Multiplexing: Multiplexing can be achieved through the number of ports.
Connections: Before application forms can send information by utilizing TCP, the
devices must set up a connection. The associations are made between the harbor numbers
of the sender and the collector devices.
TCP/IP Layers
Application Layer An application layer is the topmost layer within the TCP/IP model.
When one application layer protocol needs to communicate with another application
layer, it forwards its information to the transport layer.
Transport Layer It is responsible for the reliability, flow control, and correction of data
that is being sent over the network. There are two protocols used in this layer are User
Datagram Protocol and Transmission control protocol.
Internet/Network Layer It is the third layer of the TCP/IP Model and also known as the
Network layer. The main responsibility of this layer is to send the packets from any
network, and they arrive at the goal irrespective of the route they take.
Network Access Layer It is the lowest layer of the TCP/IP Model. It is the combination
of the Physical Layer and the Data link layer which present in the OSI Model. Its main
responsibility is to the transmission of information over the same network between two
devices.
How TCP/ IP works?
TCP/IP employs the client-server demonstration of communication in which a client or
machine (a client) is given a benefit (like sending a webpage) by another computer (a
server) within the network.
Collectively, the TCP/IP suite of conventions is classified as stateless, which suggests
each client request is considered new since it is irrelevant to past requests. Being stateless
liberates up network paths so they can be utilized continuously.
The transport layer itself, is stateful. It transmits a single message, and its connection
remains open until all the packets in a message have been received and reassembled at
the destination.
The TCP/IP model differs from the seven-layer Open System Interconnection (OSI)
model designed after it.
Application/Uses of TCP/IP
Some Real-Time Applications are:
Simple Mail Transfer Protocol(SMTP): It helps to send email to another email address.
File Transfer Protocol(FTP): It is used for sending large files.
Dynamic Host Configure Protocol(DHCP): It assigns the IP address.
Telnet: Bi-directional text communication via a terminal application.
HyperText Transfer Protocol(HTTP): Used to transfer the web pages.
Domain Name System(DNS): It translates the website name to IP addresses.
Simple Network Time Protocol(SNTP): It provides the time of a day to the network
devices.
Benefits of TCP/IP
It is an industry–standard demonstrate that can be viably deployed in commonsense
organizing problems.
It is interoperable, i.e., it permits cross-platform communications among heterogeneous
networks.
It is an open convention suite. It isn’t claimed by any specific established and so can be
utilized by any individual or organization.
It may be versatile, client-server engineering. This permits systems to be included
without disturbing the current services.
It allots an IP address to each computer on the organize, hence making each device to
be identifiable over the arrange. It allots each location a space title. It gives the title and
addresses determination administrations.
Challenges of TCP/IP:
It is not generic in nature. So, it comes up short to represent any protocol stack other
than the TCP/IP suite. For the case, it cannot depict the Bluetooth connection.
It does not clearly isolate the concepts of services, interfacing, and protocols. So, it isn’t
appropriate to portray unused advances in modern networks.
It does not recognize between the data link and the physical layers, which has
exceptionally distinctive functionalities.
The information interface layer ought to concern with the transmission of outlines. On
the other hand, the physical layer ought to lay down the physical characteristics of the
transmission.
In this, model the transport layer does not guarantee delivery of packets.
It can be compared with a security guard standing at the entrance of a minister’s home. He keeps
an eye on everyone and physically checks every person who wishes to enter the house. It won’t
allow a person to enter if he/she is carrying a harmful object like a knife, gun, etc. Similarly,
even if the person doesn’t possess any banned object but appears suspicious, the guard can still
prevent that person’s entry.
The firewall acts as a guard. It guards a corporate network acting as a shield between the inside
network and the outside world. All the traffic in either direction must pass through the firewall. It
then decides whether the traffic is allowed to flow or not. The firewall can be implemented as
hardware and software, or a combination of both.
Packet Filters –