Network protocol stack and TCP hacking

Wednesday, 3 March 2004, 12:09 PM EST

The network protocol stack, which forms the carrier and pipeline of data from one host to another is designed in such a way that we can interact with different layers at desired level. This article is a small attempt to describe the movement of data through these stacked layers and at the end we will try to implement a linux kernel module which helps us to capture the data flowing out to TCP layer and display it. I think to talk about all those really basic network communication is not necessary here. So I will straight away talk about the implementation of TCP/IP communication.

Network devices form the bottom layer of the protocol stack. they use a link layer protocol (usually Ethernet) to communicate with other devices to send and receive traffic. The interface put up by the network device driver copy packets from a physical medium, perform some error checks,Then puts up the packet to the network layer. Output interfaces receive packets from the network layer, perform some error checks, and then send them out over the physical medium. Here we shall talk about the IP which is the standard standard network layer protocol. The main functionality of IP is routing , it checks incoming packets to see if they are for the host computer or if they need to be forwarded. It defragments packets if necessary and delivers them to the transport protocols. It has a dynamic database of routes for outgoing packets; it addresses and fragments them if necessary before sending them down to the link layer.

By shyamjith at Linux Gazette.

[ Read more ]

Related items


Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts

Whether you like it or not, the Internet of Things is happening. This book paints a clear picture of the current situation, and what we can learn from it in order to create a safer future for all of us.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Tue, Oct 13th