Chapter 2. TCP/IP Overview

This chapter provides a very brief introduction to TCP/IP protocol for readers not familiar with the concepts of TCP/IP.[1] We then go on to discuss the advantages and disadvantages of implementing security at various layers in the stack. This is necessary to understand the reasons to implement security at various layers. This also provides the framework to discuss IP security in the following chapters.

Introduction to TCP/IP

In this section, we briefly discuss the protocols used in the TCP/IP stack, the addressing architecture, the Domain Name System (DNS), and the socket interface.

In the early 1960s, DARPA (Defense Advanced Research Project Agency) funded a project that connected universities and research agencies through ...

Get IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.