SlideShare a Scribd company logo
1 of 20
Download to read offline
Internet Protocol Overview
Unit 2
By
Deep Raj Bhujel
Internet Protocol Suite:
• The Internet protocol
suite is the set
of communications
protocols used for
the Internet and similar
networks, and generally
the most
popular protocol
stack for wide area
networks is commonly
known as TCP/IP
From lowest to highest, the layers are:
• The link layer (commonly Ethernet) contains
communication technologies for a local network.
• The internet layer (IP) connects local networks, thus
establishing internetworking.
• The transport layer (TCP) handles host-to-host
communication.
• The application layer (for example HTTP) contains all
protocols for specific data communications services on
a process-to-process level (for example how a web
browser communicates with a web server).
Application layer (process-to-
process):
• These services are end user-related: authentication,
data handling, and compression.
• Data coded according to application layer protocols are
then encapsulated into one or (occasionally) more
transport layer protocols (such as TCP or UDP), which
in turn use lower layer protocols to effect actual data
transfer.
• Since the IP stack defines no layers between the
application and transport layers, the application layer
must include any protocols that act like the OSI's
presentation and session layer protocols.
• E.g. SMTP, FTP, SSH, HTTP etc.
Transport layer (host-to-host):
• This is where flow-control, error-correction, and
connection protocols exist, such as TCP.
• Its responsibility includes end-to-end message
transfer independent of the underlying network,
along with error control, segmentation, flow
control, congestion control, and application
addressing (port numbers).
• End to end message transmission or connecting
applications at the transport layer can be
categorized as connection-oriented, implemented
in TCP, or connectionless, implemented in UDP.
Internet layer (internetworking):
• The internet layer has the task of exchanging datagrams
across network boundaries.
• This layer defines the addressing and routing structures
used for the TCP/IP protocol suite. The primary protocol in
this scope is the Internet Protocol, which defines IP
addresses.
• In the Internet protocol suite, the Internet Protocol
performs two basic functions:
 Host addressing and identification: This is accomplished with a
hierarchical addressing system (see IP address).
 Packet routing: This is the basic task of sending packets of data
(datagrams) from source to destination by sending them to the
next network node (router) closer to the final destination.
Link layer:
• The link layer is used to move packets
between the Internet layer interfaces of two
different hosts on the same link.
• The processes of transmitting and receiving
packets on a given link can be controlled both
in the software device driver for the network
card, as well as on firmware or
specialized chipsets.
Transmission Control Protocol (TCP):
• Transmission Control Protocol accepts data from a data
stream, segments it into chunks, and adds a TCP header
creating a TCP segment. The TCP segment is
then encapsulated into an Internet Protocol (IP) datagram.
• A TCP segment consists of a segment header and
a data section. The TCP header contains 10 mandatory
fields, and an optional extension field. The data section
follows the header. Its contents are the payload data
carried for the application.
• Connections must be properly established in a multi-step
handshake process (connection establishment) before
entering the data transfer phase. After data transmission is
completed, the connection termination closes established
virtual circuits and releases all allocated resources.
TCP Header
Source Port Number (16 bits) Destination Port Number (16 bits)
Sequence Number (32 bits)
Acknowledgement Number (32 bits)
Header
Length
(4 bits)
Reserved
(6 bits)
Unused
U
R
G
A
C
K
P
S
H
R
S
T
S
Y
N
F
I
N
Window Size
(16 bits)
Checksum (16 bits) Urgent Pointer (16 bits)
Options + Padding
Data
Internet Protocol (IP):
• Principal communication protocol used for
relaying datagrams across an internetwork using
the Internet Protocol Suite.
• IP manages how packets are delivered to and from
servers and clients. IP defines datagram structures
that encapsulate the data to be delivered.
• It also defines addressing methods that are used to
label the datagram source and destination.
• The Internet Protocol is responsible for addressing
hosts and routing datagrams (packets) from a source
host to the destination host across one or more IP
networks.
IP Header
Version (4) IHL (4) TOS (8) Total Length (16)
Identification (16) Flags (3) Fragment Offset (13)
TTL (8) Protocol (8) Header Checksum (16)
Source IP address (32)
Destination IP address (32)
Options or Padding not always
Data (variable)
IP address (IPv4)
• Class A = 0.0.0.0 – 127.255.255.255
• Class B = 128.0.0.0 – 191.255.255.255
• Class C = 192.0.0.0 – 223.255.255.255
• Class D = 224.0.0.0 – 239.255.255.255
• Class E = 240.0.0.0 – 255.255.255
Private IP addresses
• 10.0.0.0 to 10.255.255.255
• 172.16.0.0 to 172.31.255.255
• 192.168.0.0 to 192.168.255.255
Subnet Mask
(Network-1, Host-0)
• Class A: 11111111.00000000.00000000.00000000
(255.0.0.0) / 8
• Class B: 11111111.11111111.00000000.00000000
(255.255.0.0) / 16
• Class C: 11111111.11111111.11111111.00000000
(255.255.255.0) / 24
IPv6 (Internet Protocol version 6)
IPV6 includes the following enhancements over
IPV4:
• Expanded Address Space:
• Address auto configuration:
• Increased addressing flexibility:
• Security capabilities:
• Support for resource allocation:
• Improved option mechanism:
IPv6 Header
IPv6: types and formats
• In next slide
Internet RFCs:
• In computer network engineering, a Request
for Comments (RFC) is
a memorandum published by the Internet
Engineering Task Force (IETF) describing
methods, behaviors, research, or innovations
applicable to the working of the Internet and
Internet-connected systems.
• It began in 1969 as a set of working notes
about ARPAnet research and development.
RFC Categories
Each RFC has a "category" or "status" designation. The possible
categories are:
1. STANDARD, DRAFT STANDARD, PROPOSED STANDARD
• These are standards-track documents, official specifications of the
Internet protocol suite defined by the Internet Engineering Task
Force (IETF) and its steering group the IESG.
2. BEST CURRENT PRACTICE
• These are official guidelines and recommendations, but not
standards, from the IETF.
3. INFORMATIONAL, EXPERIMENTAL
• These non-standards documents may originate in the IETF or may
be independent submissions.
4. HISTORIC
• These are former standards that have been actively deprecated.

More Related Content

What's hot

What's hot (20)

TCP/IP Introduction
TCP/IP Introduction TCP/IP Introduction
TCP/IP Introduction
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Assingment 2
Assingment 2Assingment 2
Assingment 2
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ip
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
Dc ch02 : protocol architecture
Dc ch02 : protocol architectureDc ch02 : protocol architecture
Dc ch02 : protocol architecture
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP Model
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Protocol architecture TCP IP
Protocol architecture TCP IPProtocol architecture TCP IP
Protocol architecture TCP IP
 
Tcp ip-ppt
Tcp ip-pptTcp ip-ppt
Tcp ip-ppt
 
Understanding TCP/IP
Understanding TCP/IPUnderstanding TCP/IP
Understanding TCP/IP
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 

Similar to Unit 2 - Internet Protocol Overview - IT

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Лекц 7
Лекц 7Лекц 7
Лекц 7Muuluu
 
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eChapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eadpeer
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Travis Leong Ping
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
02 coms 525 tcpip - introduction to tcpip
02   coms 525 tcpip -  introduction to tcpip02   coms 525 tcpip -  introduction to tcpip
02 coms 525 tcpip - introduction to tcpipPalanivel Kuppusamy
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesRhydham Joshi
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1Roman Brovko
 
OSI Model.pptx
OSI Model.pptxOSI Model.pptx
OSI Model.pptxmilon24
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1Techglyphs
 

Similar to Unit 2 - Internet Protocol Overview - IT (20)

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
unit2-210710110327.pptx
unit2-210710110327.pptxunit2-210710110327.pptx
unit2-210710110327.pptx
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Лекц 7
Лекц 7Лекц 7
Лекц 7
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eChapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013
 
Web technology unit I - Part B
Web technology unit I - Part BWeb technology unit I - Part B
Web technology unit I - Part B
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
02 coms 525 tcpip - introduction to tcpip
02   coms 525 tcpip -  introduction to tcpip02   coms 525 tcpip -  introduction to tcpip
02 coms 525 tcpip - introduction to tcpip
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
Internetworking
InternetworkingInternetworking
Internetworking
 
OSI Model.pptx
OSI Model.pptxOSI Model.pptx
OSI Model.pptx
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
 

More from Deepraj Bhujel

Unit 7 - Internet and Intranet Applications - IT
Unit 7 - Internet and Intranet Applications - ITUnit 7 - Internet and Intranet Applications - IT
Unit 7 - Internet and Intranet Applications - ITDeepraj Bhujel
 
Unit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - ITUnit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - ITDeepraj Bhujel
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITDeepraj Bhujel
 
Unit 4 - HTTP and the Web Services - IT
Unit 4 - HTTP and the Web Services - ITUnit 4 - HTTP and the Web Services - IT
Unit 4 - HTTP and the Web Services - ITDeepraj Bhujel
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITDeepraj Bhujel
 
Unit 1 - Introduction - IT
Unit 1 - Introduction - ITUnit 1 - Introduction - IT
Unit 1 - Introduction - ITDeepraj Bhujel
 

More from Deepraj Bhujel (7)

Unit 7 - Internet and Intranet Applications - IT
Unit 7 - Internet and Intranet Applications - ITUnit 7 - Internet and Intranet Applications - IT
Unit 7 - Internet and Intranet Applications - IT
 
Unit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - ITUnit 6 - Internet and Intranet Systems Development - IT
Unit 6 - Internet and Intranet Systems Development - IT
 
Unit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - ITUnit 5 - Designing Internet Systems and Servers - IT
Unit 5 - Designing Internet Systems and Servers - IT
 
Unit 4 - HTTP and the Web Services - IT
Unit 4 - HTTP and the Web Services - ITUnit 4 - HTTP and the Web Services - IT
Unit 4 - HTTP and the Web Services - IT
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
Unit 1 - Introduction - IT
Unit 1 - Introduction - ITUnit 1 - Introduction - IT
Unit 1 - Introduction - IT
 
IPv6
IPv6IPv6
IPv6
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Unit 2 - Internet Protocol Overview - IT

  • 1. Internet Protocol Overview Unit 2 By Deep Raj Bhujel
  • 2. Internet Protocol Suite: • The Internet protocol suite is the set of communications protocols used for the Internet and similar networks, and generally the most popular protocol stack for wide area networks is commonly known as TCP/IP
  • 3. From lowest to highest, the layers are: • The link layer (commonly Ethernet) contains communication technologies for a local network. • The internet layer (IP) connects local networks, thus establishing internetworking. • The transport layer (TCP) handles host-to-host communication. • The application layer (for example HTTP) contains all protocols for specific data communications services on a process-to-process level (for example how a web browser communicates with a web server).
  • 4. Application layer (process-to- process): • These services are end user-related: authentication, data handling, and compression. • Data coded according to application layer protocols are then encapsulated into one or (occasionally) more transport layer protocols (such as TCP or UDP), which in turn use lower layer protocols to effect actual data transfer. • Since the IP stack defines no layers between the application and transport layers, the application layer must include any protocols that act like the OSI's presentation and session layer protocols. • E.g. SMTP, FTP, SSH, HTTP etc.
  • 5. Transport layer (host-to-host): • This is where flow-control, error-correction, and connection protocols exist, such as TCP. • Its responsibility includes end-to-end message transfer independent of the underlying network, along with error control, segmentation, flow control, congestion control, and application addressing (port numbers). • End to end message transmission or connecting applications at the transport layer can be categorized as connection-oriented, implemented in TCP, or connectionless, implemented in UDP.
  • 6. Internet layer (internetworking): • The internet layer has the task of exchanging datagrams across network boundaries. • This layer defines the addressing and routing structures used for the TCP/IP protocol suite. The primary protocol in this scope is the Internet Protocol, which defines IP addresses. • In the Internet protocol suite, the Internet Protocol performs two basic functions:  Host addressing and identification: This is accomplished with a hierarchical addressing system (see IP address).  Packet routing: This is the basic task of sending packets of data (datagrams) from source to destination by sending them to the next network node (router) closer to the final destination.
  • 7. Link layer: • The link layer is used to move packets between the Internet layer interfaces of two different hosts on the same link. • The processes of transmitting and receiving packets on a given link can be controlled both in the software device driver for the network card, as well as on firmware or specialized chipsets.
  • 8. Transmission Control Protocol (TCP): • Transmission Control Protocol accepts data from a data stream, segments it into chunks, and adds a TCP header creating a TCP segment. The TCP segment is then encapsulated into an Internet Protocol (IP) datagram. • A TCP segment consists of a segment header and a data section. The TCP header contains 10 mandatory fields, and an optional extension field. The data section follows the header. Its contents are the payload data carried for the application. • Connections must be properly established in a multi-step handshake process (connection establishment) before entering the data transfer phase. After data transmission is completed, the connection termination closes established virtual circuits and releases all allocated resources.
  • 9. TCP Header Source Port Number (16 bits) Destination Port Number (16 bits) Sequence Number (32 bits) Acknowledgement Number (32 bits) Header Length (4 bits) Reserved (6 bits) Unused U R G A C K P S H R S T S Y N F I N Window Size (16 bits) Checksum (16 bits) Urgent Pointer (16 bits) Options + Padding Data
  • 10. Internet Protocol (IP): • Principal communication protocol used for relaying datagrams across an internetwork using the Internet Protocol Suite. • IP manages how packets are delivered to and from servers and clients. IP defines datagram structures that encapsulate the data to be delivered. • It also defines addressing methods that are used to label the datagram source and destination. • The Internet Protocol is responsible for addressing hosts and routing datagrams (packets) from a source host to the destination host across one or more IP networks.
  • 11. IP Header Version (4) IHL (4) TOS (8) Total Length (16) Identification (16) Flags (3) Fragment Offset (13) TTL (8) Protocol (8) Header Checksum (16) Source IP address (32) Destination IP address (32) Options or Padding not always Data (variable)
  • 13.
  • 14. • Class A = 0.0.0.0 – 127.255.255.255 • Class B = 128.0.0.0 – 191.255.255.255 • Class C = 192.0.0.0 – 223.255.255.255 • Class D = 224.0.0.0 – 239.255.255.255 • Class E = 240.0.0.0 – 255.255.255 Private IP addresses • 10.0.0.0 to 10.255.255.255 • 172.16.0.0 to 172.31.255.255 • 192.168.0.0 to 192.168.255.255
  • 15. Subnet Mask (Network-1, Host-0) • Class A: 11111111.00000000.00000000.00000000 (255.0.0.0) / 8 • Class B: 11111111.11111111.00000000.00000000 (255.255.0.0) / 16 • Class C: 11111111.11111111.11111111.00000000 (255.255.255.0) / 24
  • 16. IPv6 (Internet Protocol version 6) IPV6 includes the following enhancements over IPV4: • Expanded Address Space: • Address auto configuration: • Increased addressing flexibility: • Security capabilities: • Support for resource allocation: • Improved option mechanism:
  • 18. IPv6: types and formats • In next slide
  • 19. Internet RFCs: • In computer network engineering, a Request for Comments (RFC) is a memorandum published by the Internet Engineering Task Force (IETF) describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems. • It began in 1969 as a set of working notes about ARPAnet research and development.
  • 20. RFC Categories Each RFC has a "category" or "status" designation. The possible categories are: 1. STANDARD, DRAFT STANDARD, PROPOSED STANDARD • These are standards-track documents, official specifications of the Internet protocol suite defined by the Internet Engineering Task Force (IETF) and its steering group the IESG. 2. BEST CURRENT PRACTICE • These are official guidelines and recommendations, but not standards, from the IETF. 3. INFORMATIONAL, EXPERIMENTAL • These non-standards documents may originate in the IETF or may be independent submissions. 4. HISTORIC • These are former standards that have been actively deprecated.