SlideShare a Scribd company logo
1 of 24
Protocol Suits
Imranul Hasan
Greenwich University, UK
Static IP Addressing
• You have to go to each individual
device
Meticulous records must be kept
No duplicate IP addresses
DHCP
DHCP – Getting more than the IP Address
The ARP Table
• The ARP table is stored in area of Random-Access Memory on each
host.
• Such an area of memory is often called a cache. The ARP table is
often referred to as an ARP cache.
• Entries in the ARP table “age out.” They are removed from the table
after a period of inactivity.
Aging Out
• For Microsoft Windows hosts:
– Initial mappings have a 2-minute time-to-live.
– An entry that is used twice in 2 minutes is automatically given a 10-
minute time-to-live.
• For Unix/Linux hosts:
– Initial mappings have a 20 minute time-to-live.
Default Gateway
• The IP address of the router interface is stored
in the network configuration of the host.
• The source host compares the destination IP
address and its own IP address to determine if
the two IP addresses are located on the same
segment.
• If the receiving host is not on the same segment,
the source host sends the data using the actual
IP address of the destination and the MAC
address of the router.
• Either Proxy ARP or the Default Gateway must
be configured, or no traffic can leave the LAN.
Using a default gateway
• If the destination IP address is not on the same subnet (or network),
a computer must use the services of a router.
• Routers are sometimes called gateways for this reason.
• Sending computer checks for a default gateway in its TCP/IP
configuration.
• If no default gateway is installed, the sending computer cannot send
the message.
198.189.232.1
DNS: Client Settings
Web and HTTP
First some jargon
• Web page consists of objects
• Object can be HTML file, JPEG image, Java applet, audio file,…
• Most Web sites have a base HTML-file which includes several
referenced objects
• Each object is addressable by a URL
• Example URL:
http://www.cs.sfu.ca/CC/371/jcliu/index.htm
host name path name
HTTP overview
HTTP: hypertext transfer protocol
• Web’s application layer
protocol
• client/server model
– client: browser that
requests, receives,
“displays” Web objects
– server: Web server sends
objects in response to
requests
• HTTP 1.0: RFC 1945
• HTTP 1.1: RFC 2068
PC running
Explorer
Server
running
Apache Web
server
Mac running
Navigator
Cookies: keeping “state”
Many Web sites use
cookies
Example:
– You access Internet
always from same PC
– You visit a specific e-
commerce site for first
time
– When initial HTTP
requests arrives at site,
site creates a unique
ID and creates an
entry in backend
database for ID
Cookies: keeping “state”
Many major Web sites use
cookies
Four components:
1) cookie header line in the
HTTP response message
2) cookie header line in HTTP
request message
3) cookie file kept on user’s
host and managed by
user’s browser
4) back-end database at Web
site
Cookies: Enable/Disable
Cookies: Delete
Client-side Caching
Consistency of Cached Objects
• Solution 2:
Manually update
Killer applications - FTP
FTP Client Software
Port 21 ?
Killer applications - Email
Killer applications – WWW 1990-
Killer applications – P2P 2000-
THANKS!!!!!

More Related Content

Similar to L9 Protocol Suits

Networking Chapter 9
Networking Chapter 9Networking Chapter 9
Networking Chapter 9
mlrbrown
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
AmitDeshai
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
How the internet works
How the internet worksHow the internet works
How the internet works
ftcim
 

Similar to L9 Protocol Suits (20)

09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Networking Chapter 9
Networking Chapter 9Networking Chapter 9
Networking Chapter 9
 
Denial of Service Mitigation Tactics in FreeBSD
Denial of Service Mitigation Tactics in FreeBSDDenial of Service Mitigation Tactics in FreeBSD
Denial of Service Mitigation Tactics in FreeBSD
 
Networking Basics with Linux
Networking Basics with LinuxNetworking Basics with Linux
Networking Basics with Linux
 
Unit05
Unit05Unit05
Unit05
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
Apache HTTPd Server 2.2 Presentation
Apache HTTPd Server 2.2 PresentationApache HTTPd Server 2.2 Presentation
Apache HTTPd Server 2.2 Presentation
 
Web technology Unit I Part C
Web technology Unit I  Part CWeb technology Unit I  Part C
Web technology Unit I Part C
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Lec 1 intro to internet
Lec 1 intro to internetLec 1 intro to internet
Lec 1 intro to internet
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 
Networking.ppt
Networking.pptNetworking.ppt
Networking.ppt
 
LACNOG - Logging in the Post-IPv4 World
LACNOG - Logging in the Post-IPv4 WorldLACNOG - Logging in the Post-IPv4 World
LACNOG - Logging in the Post-IPv4 World
 
How the internet works
How the internet worksHow the internet works
How the internet works
 
«Scrapy internals» Александр Сибиряков, Scrapinghub
«Scrapy internals» Александр Сибиряков, Scrapinghub«Scrapy internals» Александр Сибиряков, Scrapinghub
«Scrapy internals» Александр Сибиряков, Scrapinghub
 
Byte Ordering - Unit 2.pptx
Byte Ordering - Unit 2.pptxByte Ordering - Unit 2.pptx
Byte Ordering - Unit 2.pptx
 
Basic network training2
Basic network training2Basic network training2
Basic network training2
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise Services
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise Services
 

More from ImranulHasan6 (15)

Bios, processorand motherboard
Bios, processorand  motherboardBios, processorand  motherboard
Bios, processorand motherboard
 
WHAT is Wireless LAN
WHAT is Wireless LANWHAT is Wireless LAN
WHAT is Wireless LAN
 
System Troubleshooting
System TroubleshootingSystem Troubleshooting
System Troubleshooting
 
Subnetting Mechanics
Subnetting MechanicsSubnetting Mechanics
Subnetting Mechanics
 
Storage System and Backup Media
Storage System and Backup MediaStorage System and Backup Media
Storage System and Backup Media
 
Numbering Systems
Numbering SystemsNumbering Systems
Numbering Systems
 
Networking HMT-2
Networking HMT-2Networking HMT-2
Networking HMT-2
 
Networking HMT-1
Networking HMT-1Networking HMT-1
Networking HMT-1
 
Network Cabling
Network CablingNetwork Cabling
Network Cabling
 
Memory System
Memory SystemMemory System
Memory System
 
IPv4 Addressing
IPv4 AddressingIPv4 Addressing
IPv4 Addressing
 
Installation of Hard Disk
Installation of Hard DiskInstallation of Hard Disk
Installation of Hard Disk
 
Windows XP Installation
Windows XP InstallationWindows XP Installation
Windows XP Installation
 
Fundamental of Office
Fundamental of OfficeFundamental of Office
Fundamental of Office
 
Bus & Interface
Bus & InterfaceBus & Interface
Bus & Interface
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

L9 Protocol Suits

  • 2. Static IP Addressing • You have to go to each individual device Meticulous records must be kept No duplicate IP addresses
  • 4. DHCP – Getting more than the IP Address
  • 5. The ARP Table • The ARP table is stored in area of Random-Access Memory on each host. • Such an area of memory is often called a cache. The ARP table is often referred to as an ARP cache. • Entries in the ARP table “age out.” They are removed from the table after a period of inactivity.
  • 6. Aging Out • For Microsoft Windows hosts: – Initial mappings have a 2-minute time-to-live. – An entry that is used twice in 2 minutes is automatically given a 10- minute time-to-live. • For Unix/Linux hosts: – Initial mappings have a 20 minute time-to-live.
  • 7. Default Gateway • The IP address of the router interface is stored in the network configuration of the host. • The source host compares the destination IP address and its own IP address to determine if the two IP addresses are located on the same segment. • If the receiving host is not on the same segment, the source host sends the data using the actual IP address of the destination and the MAC address of the router. • Either Proxy ARP or the Default Gateway must be configured, or no traffic can leave the LAN.
  • 8. Using a default gateway • If the destination IP address is not on the same subnet (or network), a computer must use the services of a router. • Routers are sometimes called gateways for this reason. • Sending computer checks for a default gateway in its TCP/IP configuration. • If no default gateway is installed, the sending computer cannot send the message. 198.189.232.1
  • 10. Web and HTTP First some jargon • Web page consists of objects • Object can be HTML file, JPEG image, Java applet, audio file,… • Most Web sites have a base HTML-file which includes several referenced objects • Each object is addressable by a URL • Example URL: http://www.cs.sfu.ca/CC/371/jcliu/index.htm host name path name
  • 11. HTTP overview HTTP: hypertext transfer protocol • Web’s application layer protocol • client/server model – client: browser that requests, receives, “displays” Web objects – server: Web server sends objects in response to requests • HTTP 1.0: RFC 1945 • HTTP 1.1: RFC 2068 PC running Explorer Server running Apache Web server Mac running Navigator
  • 12. Cookies: keeping “state” Many Web sites use cookies Example: – You access Internet always from same PC – You visit a specific e- commerce site for first time – When initial HTTP requests arrives at site, site creates a unique ID and creates an entry in backend database for ID
  • 13. Cookies: keeping “state” Many major Web sites use cookies Four components: 1) cookie header line in the HTTP response message 2) cookie header line in HTTP request message 3) cookie file kept on user’s host and managed by user’s browser 4) back-end database at Web site
  • 17. Consistency of Cached Objects • Solution 2: Manually update