Page 759 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 759
https://www.cymru.com/jtk/misc/ephemeralports.html. The key
is that other than the lower 0-1,023 ports being reserved for server
use only, any other port can be used as a client source port as long
as it is not already in use on that local system.
Transmission Control Protocol (TCP) operates at layer 4 (the
Transport layer) of the OSI model. It supports full-duplex
communications, is connection oriented, and employs reliable
sessions. TCP is connection oriented because it employs a handshake
process between two systems to establish a communication session.
Upon completion of this handshake process, a communication session
that can support data transmission between the client and server is
established. The three-way handshake process (Figure 11.7) is as
follows:
1. The client sends a SYN (synchronize) flagged packet to the server.
2. The server responds with a SYN/ACK (synchronize and
acknowledge) flagged packet back to the client.
3. The client responds with an ACK (acknowledge) flagged packet
back to the server.

