Wireless Network
Student ID : 410921317
Name : Thanongsak Khumpa
https://hackmd.io/@Lince/S1WOtT5Xo
is a long-standing protocol used together with IP for sending data when transmission speed and efficiency matter more than security and reliability.
UDP uses a simple connectionless communication model with a minimum of protocol mechanism. UDP provides checksums for data integrity, and port numbers for addressing different functions at the source and destination of the datagram. It has no handshaking dialogues, and thus exposes the user's program to any unreliability of the underlying network; There is no guarantee of delivery, ordering, or duplicate protection. If error-correction facilities are needed at the network interface level, an application may use the Transmission Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP) which are designed for this purpose.
UDP is suitable for purposes where error checking and correction are either not necessary or are performed in the application; UDP avoids the overhead of such processing in the protocol stack. Time-sensitive applications often use UDP because dropping packets is preferable to waiting for packets delayed due to etransmission, which may not be an option in a real-time system.
provides unreliable, connectionless packet delivery for the Internet. IP is connectionless because it treats each packet of information independently. It is unreliable because it does not guarantee delivery, meaning, it does not require acknowledgments from the sending host, the receiving host, or intermediate hosts.
IP provides the interface to the network interface level protocols. The physical connections of a network transfer information in a frame with a header and data. The header contains the source address and the destination address. IP uses an Internet datagram that contains information similar to the physical frame. The datagram also has a header ontaining Internet Protocol addresses of both source and destination of the data. IP defines the format of all the data sent over the Internet.
is a set of acketswitching and packet-sequencing protocols designed to function in small and large networks. In the OSI model, IPX is the network layer protocol in the Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) protocol stack, which is primarily used on Novell Netware operating systems.
PX follows a layered structure of protocols. These layers allow applications to control the application layer, presentation, and session layer. Each layer services the layer above it and is provided by the layer below it.
IPX/SPX is similar to TCP/IP and other Internet protocols, but IPX/SPX was designed as a TCP/IP alternative. IPX/SPX is ideal for local area networks or private networks with different protocol and communication functions. Like IP, IPX is connectionless and contains end user data, such as IP and network addresses. SPX is connectionoriented and is used for connection-related functions and data routing.
is a service that allows devices on the same local network to discover each other and automatically connect through standard networking protocols (such as TCP/IP HTTP, and DHCP). Some examples of UPnP devices are printers, gaming consoles, WiFi devices, IP cameras, routers, mobile devices, and Smart TVs.
UPnP can also modify router settings to open ports into a firewall to facilitate the connection of devices outside of a network.
This service reduces the complexity of networking devices by automatically forwarding router ports to new devices, removing the hassle of manual forwarding. But this convenience could come at significant security risks.
is a hierarchical and decentralized naming system for Internet connected resources. DNS maintains a list of domain names along with the resources,such as IP addresses, that are associated with them.
The most prominent function of DNS is the translation of human-friendly domain names (such as mozilla.org) to a numeric IP address (such as 151.106.5.172); this process of mapping a domain name to the appropriate IP address is known as a DNS lookup. By contrast, a reverse DNS lookup (rDNS) is used to determine the domain name associated with an IP address
is a network layer protocol used by network devices to diagnose network communication issues. ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner. Commonly, the ICMP protocol is used on network devices, such as routers. ICMP is crucial for error reporting and testing, but it can also be used in distributed denial-of-service (DDoS) attacks.
ICMP is not associated with a transport layer protocol such as TCP or UDP. This makes ICMP a connectionless protocol: one device does not need to open a connection with another device before sending an ICMP message. Normal IP traffic is sent using TCP, which means any two devices that exchange data will first carry out a TCP handshake to ensure both devices are ready to receive data. ICMP does not open a connection in this way. The ICMP protocol also does not allow for targeting a specific port on a device.
combines PPP, which typically runs over broadband connections, with the Ethernet link-layer protocol that allows users to connect to a network of hosts over a bridge or access concentrator. PPPoE enables service providers to maintain access control through PPP connections and also manage multiple hosts at a remote site.
PPPoE connects multiple hosts on an Ethernet LAN to a remote site through a single customer premises equipment (CPE) device—a Juniper Networks device. Hosts share a common digital subscriber line (DSL), a cable modem, or a wireless connection to the Internet.