Information Assurance Class

Introduction

Layer four (4), which is the transport layer, is a very important layer in the process of transferring information from one source to another. It features on the factor of information availability and reliability; thus, it should be put under consideration. The Open System Interconnection (OSI) model consists of five layers that interrelate. Each layer is served by the layer below it; this makes the process continuous.

Transport Layer

The transport layer is below the network layer; as a consequence, it is employed to serve the network layer. After it serves the network layer, it is, in turn, served by the session layer. The network layer is the third in the protocol. Its functions are to provide procedures of transferring data from one network to another without interfering with the quality of the information delivered to the destination host network. The network layer works in collaboration with the transport layer in delivering the information to the required destination without interfering with the information.

The session layer that serves the transport layer focuses on managing, establishing and terminating connection between the gadgets applied in the transmission of information. This is possible when remote calls take place. It is very imprtant for making successful calls with computers and other remote gadgets, such as handsets, which use the remote procedures during their operation.

The transport layer gives finality to the session layer by providing a way through to the required destination. This becomes possible through the flow control, division and controlling all errors that occur during the process of transmission. The transport layer gives elaborate way to pass information from one source to another like a post office operates to relay its information, although it does not use the open system interconnections models. This model is very appropriate if the information to be relayed has no errors because it can relay a lot of information within a short period of time.

Best custom writing service

Chat Now

Attacks

There are certain attacks that are prevalent in this phase of data transmission. These are land attack, UDP flood attack, port scan attack, TCP connecting hijacking and the SSL man-in-the-middle-attacks. TCP connecting hijacking is a desynchronization that takes place between the two communication ends where the attacker is located between them. UDP flood attack is possible when the attacker puts the UDP packet on the port of the victim. This reduces the connectivity of the ports of the persons under connection. Land attack occurs when the attacker sends a forged stream of TCP SYN packet that blockks the first source and the destination source. Port Scan Attack makes elaborate ports available for TCP and UDP devices that use certain networks, hence they send messages to weaken the ports connectivity. There is also the TCP SYN attack which takes privilege on the TCP three way handshakes. This attack sends malicious queues that harbor the duration of call waiting to multiple SYN requests that hinder connection.

Controls

Proper control will come from the improvement of wireless connections which are rather vulnerable currently. The improvements of the Wi-Fi system will help reduce leakage to the wireless system by imposter radio waves. In addition, there should be management uncast frames that should be adequately protected from forgery by the attackers. Wireless users should give a try to the screening window to be screened on the RF leakages for them to be turned off.

Vip Services
  • Extended Revision

    The proper revision is one more step to make your paper perfect!

  • Top Editor

    Your paper is going to be edited by our best and precise editors!

  • VIP Support

    As our VIP Client you will get the best support from our Top Specialists!

  • Top Writer

    Our best writers are going to offer you the highest quality of paper written!

  • SMS Notification

    You will be provided with the instantaneous SMS notifications about your order!

  • Additional Plagiarism Check

    To be sure we provide you the best quality paper we perform the additional plagiarism check!

Conclusion

All network users should be well informed on the proper ways of using networks to avoid harm from attackers. For security enhancement there should be frequent audit testing for all wireless networks. These give the actual damage of the RF leakages for some adjustments and will fall in place only if there is awareness among wireless users.            

Related Free Informative Essays

 
Special offer! Get 20% OFF your first order! Prices start from $12.99/page
X
example