{"json_modified": "2016-07-03T05:14:36.428486", "uuid": "291abf7f-cc72-4601-b7a8-c1082e27039e", "title": "TCP/IP Security", "url": "/en-US/docs/Web/Security/Information_Security_Basics/TCP_IP_Security", "tags": ["Security", "Beginner", "Tutorial", "Networking"], "translations": [{"uuid": "e580488f-abf6-4443-bd06-80134deadb99", "title": "TCP/IP Security", "url": "/fa/docs/Web/Security/Information_Security_Basics/Armita93", "tags": [], "summary": "Kjn", "localization_tags": ["inprogress"], "locale": "fa", "last_edit": "2016-07-03T05:14:33", "review_tags": []}, {"uuid": "c43eb85b-adc4-4ce5-8727-df755edbc754", "title": "S\u00e9curit\u00e9 TCP/IP", "url": "/fr/docs/Apprendre/S%C3%A9curit%C3%A9_TCP_IP", "tags": ["Security", "Beginner", "Tutorial", "Networking"], "summary": "TCP/IP est tr\u00e8s largement utilis\u00e9 afin de transmettre les communications sur le r\u00e9seau. Les communications TCP/IP se composent de quatre couches qui fonctionnent ensemble. Lorsqu'un utilisateur souhaite transf\u00e9rer des donn\u00e9es sur un/des r\u00e9seau(x), les donn\u00e9es sont pass\u00e9es de la couche la plus haute \u00e0 la couche la plus basse et chaque couche ajouter des informations. \u00c0 chaque niveau, l'unit\u00e9 logique qui est manipul\u00e9e est g\u00e9n\u00e9ralement compos\u00e9es d'un en-t\u00eate et d'une charge utile. La charge utile correspond \u00e0 l'information pass\u00e9e depuis la couche pr\u00e9c\u00e9dente. L'en-t\u00eate contient des informations sp\u00e9cifiques \u00e0 la couche courante (telles que les adresses utilis\u00e9es). Au niveau de la couche applicative, la charge utile correspond aux donn\u00e9es transmises. La couche la plus basse envoie les diff\u00e9rentes donn\u00e9es via le r\u00e9seau physique. Une fois arriv\u00e9e \u00e0 destination, les donn\u00e9es repassent vers les couches les plus hautes. En r\u00e9sum\u00e9, les donn\u00e9es produites par une couche sont encapsul\u00e9es dans un conteneur plus grand dans la couche inf\u00e9rieure. Les quatres couches qui permettent \u00e0 TCP/IP de fonctionner sont pr\u00e9sent\u00e9es ci-apr\u00e8s, de la plus haute \u00e0 la plus basse :", "localization_tags": [], "locale": "fr", "last_edit": "2015-10-11T07:29:13", "review_tags": []}], "modified": "2016-03-02T11:06:31", "label": "TCP/IP Security", "localization_tags": [], "locale": "en-US", "id": 145815, "last_edit": "2015-03-19T17:16:43", "summary": "TCP/IP\u00a0is widely used throughout the world to provide network communications.\u00a0 TCP/IP communications are composed of four layers that work together.\u00a0 When a user wants to transfer data across networks, the data is passed from the highest layer through intermediate layers to the lowest layer, with each layer adding information.\u00a0 At each layer, the logical units are typically composed of a header and a payload.\u00a0 The payload\u00a0consists of the information passed down from the previous layer, while the header\u00a0contains layer-specific information such as addresses.\u00a0 At the application layer, the payload is the actual application data.\u00a0 The lowest layer sends the accumulated data through the physical network; the data is then passed up through the layers to its destination.\u00a0 Essentially, the data produced by a layer is encapsulated in a larger container by the layer below it.\u00a0 The four TCP/IP layers, from highest to lowest, are shown below.", "sections": [{"id": "Original_Document_Information", "title": "Original Document Information"}], "slug": "Web/Security/Information_Security_Basics/TCP_IP_Security", "review_tags": []}