You are here: Resources > FIDIS Deliverables > HighTechID > D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication > 

D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication

References  Title:
APPENDICES
 List of Tables

 

Appendices

List of Figures

 

Figure 1: Example illustrating the involved layers of the TCP/IP model on various stages of and end-to-end communication    8

Figure 2: Example illustrating the protocols involved in an e-mail transmission    14

Figure 3: Architecture of the Domain Name System    17

Figure 4: Sample DNS query    17

Figure 5: Encryption of the RTP payload    22

Figure 6: RTCP encryption    23

Figure 7: Three-way handshake in TCP    24

Figure 8: TLS handshake protocol (“*” marks optional fields)    26

Figure 9: Illustration of the TLS hop-by-hop protection    26

Figure 10: UDP data transfer    27

Figure 11: Data encapsulation over the four layers    31

Figure 12: Subnet with three hosts connected to the Internet by a router    31

Figure 13: The extension header (the middle fields (green)) of IPv6    34

Figure 14: Packet structure of IPSec ESP packets in transport and tunnel mode    37

Figure 15: Illustration of an Ethernet frame with a change of MAC addresses    39

Figure 16: ADSL communication between client and ISP    41

Figure 17: A schematic of the most common components of a wireless LAN    42

Figure 18: Layers as they are covered by the 802.11 resp. 802.2 protocol suites    43

Figure 19: Components of a cable network with Internet access    52

Figure 20: Basic principle of Mixes    56

Figure 21: AN.ON architecture    57

Figure 22: User interface of JAP    58

Figure 23: Pseudonym types    60

Figure 24: Web single sign-on    69

Figure 25: SAML components    69

 

References  fidis-wp3-del3.8_Study_on_protocols_with_respect_to_identity_and_identification.sxw  List of Tables
schulte 28 / 30