Risks and Security of Internet and Systems by Slim Kallel & Frédéric Cuppens & Nora Cuppens-Boulahia & Ahmed Hadj Kacem

Risks and Security of Internet and Systems by Slim Kallel & Frédéric Cuppens & Nora Cuppens-Boulahia & Ahmed Hadj Kacem

Author:Slim Kallel & Frédéric Cuppens & Nora Cuppens-Boulahia & Ahmed Hadj Kacem
Language: eng
Format: epub
ISBN: 9783030415686
Publisher: Springer International Publishing


2 Background

In order to introduce the terms used in this paper and lay the groundwork for what follows, we will briefly explore the main fields and options in the IP protocol header [11]. The IP protocol is the most commonly used protocol in the network layer today, and is used for almost all traffic moving across the Internet. Upon receiving a TCP, UDP or ICMP packet, the IP protocol generates an IP header, which includes the fields shown in Fig. 1. Then, the IP header is added to the front of the TCP, UDP or ICMP packet to create the resulting IP packet, which will be used to carry the entire packet’s contents (IP header, TCP/UDP/ICMP header, and application-level data) across the network.

Fig. 1.The IP header structure



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.