SlideShare a Scribd company logo
1 of 30
TCP/IP
MANAGEMENT INFORMATION SYSTEM
PRESENTED BY:
MAHWISH SHAIKH
REHAN ALI KANGO
ASSIGNED BY:
SIR NAVEED GHANI
Title and Content Layout with List
• TCP SLIDING WINDOW
• USER DATAGRAM PROTOCOL
• THE APPLICATION LAYER
• DNS
• NETWORK SECURITY EXPATIATION AND
THREATS IN TCP/IP
• FIREWALL
• Internet Protocol (IP)
• IP Packet Format
• IP addressing
• IP subnet
• Address Resolution Protocol
(ARP)
• Internet Routing
• ICMP
• TCP
Internet Protocol
• Internet protocol is a system protocol at (layer 3)
• Contain addressing data
• connectionless service
• No acknowledgement
• Datagrams transfer measured through (MTU)
IP packet Format
IP addressing
Procedure of routing IP datagrams
IT has two primary parts
1 the network number (allocated by Nic)
2Host number (delegated by LNA)
ISP provides the network service
Address assign to Isp is by (IANA) Internet assigned number authority
IP Address Format
IP subnet Addressing
• Two parts
• Subnet
• Host
• Public or Global IP
• Private or local
• IP subnet Mask ( binary number )
Broadcast Address
Directed broadcast address
• At the point when a packet is sent to a system's network broadcast address, a single duplicate of
it goes to network, and after that the packet is sent to each host on that system or subnet work
Limited Broadcast address
• On the off chance that the IP location is all ones (255.255.255.255), this is a restricted broadcast
address; the packet is meant to all hosts on the current (sub) network.
• A routerswitch won't forward to other (sub) networks this sort of broadcast
Address Resolution Protocol (ARP)
• ARP (corresponding MAC address )
• MAC ( physical address )
• IP ( logical address )
• Assigned by the ISP
ARP
RARP
Internet routing
• Called gateways
• Routing protocols is used by the routers to determine appropriate
path
• At application Layer protocol
• Two Types
• Interior routing ( neighboring )
• Rip: Routing Information Protocol (periodic updates)
• IGP: interior gateway protocol (fast convergence)
• OSPF: open shortest path first ( directly connected)
Exterior routing
• BGP : border gateway protocol (multithoming)
Also provide services
• Fragmentation
• Time outs ( specifies age )
• Options (mark packets)
ICMP : Internet Control Message Protocol
Purpose
To provide informational messages considering the routing of IP
datagram.
Two types of information messages
1- control messages
2-Error messages
ICMP
• Echo request
• Echo reply
• Connectivity between N1 and R1
TCP
Reliable transmission f information
Controls abnormality
Relies at (layer 4) of OSI model
Consist of 4 layers
Three way handshake
• The first (Host A) starts an connection by sending a data packets
with the initial number sequence (X) and SYN bit set to
demonstrate an association demand.
• The second (Host B) gets the SYN, records the acknowledging so as
to group number X, and SYN . (with an ACK = X + 1). Host B insert
its own initial sequence number (SEQ = Y). An ACK = 20 implies the
host has gotten bytes 0 through 19 and expects byte 20 next. This
strategy is called forward acknowledgment. Host A then recognizes
all bytes Host B sent with a forward acknowledgment showing the
following byte Host A hopes to get (ACK = Y + 1).
Internet Protocol
• Internet protocol is a system protocol at (layer 3)
• Contain addressing data
• Ip is connectionless service
• Best delivery of data
• Datagrams transfer measured through (MTU)
TCP SLIDING WINDOW
• A sliding window protocol is a feature of packet-based data
transmission protocols. Sliding window protocols are used where
reliable in-order delivery of packets is required, such as in the Data
Link Layer (OSI model) as well as in the Transmission Control
Protocol (TCP)
USER DATAGRAM PROTOCOL
• The User Datagram Protocol (UDP) is one of the core members of
the Internet protocol suite. The protocol was designed by David P.
Reed in 1980 and formally defined in RFC 768. UDP uses a simple
connectionless transmission model with a minimum of protocol
mechanism.
• Core member of IP
• Small packet size
• Does not guarantee packet delivery
USER DATAGRAM PROTOCOL
THE APPLICATION LAYER
• The application layer is a layer in the Open Systems
Interconnection (OSI) seven-layer model and in the TCP/IP protocol
suite.
• It consists of protocols that focus on process-to-process
communication across an IP network
• It is service that provides communication application from one end
to another
• Provides a firm communication interface and end-user services
• Example: HTTP, FTP SMTP
DNS
• The Domain Name System (DNS) is a hierarchical distributed
naming system for computers, services, or any resource connected
to the Internet or a private network.
• It associates various information with domain names assigned to
each of the participating entities.
• www.google.com.
NETWORK SECURITY EXPATIATION AND THREATS IN
TCP/IP
• Data is very confidential an precious
• Business associations and government
• Data security
• Network Security
• Initial a safe system must have trusted and secured data against intruders
• Adjustments while in case of threats
• Accessibility of data to its essential beneficiaries
CERT
• CERT is an open association whose objective is to "study Internet
security vulnerabilities,
• Give episode reaction administrations to locales that have been the
casualties of assault
• Distribute an assortment of security alarms,
• Research in wide-territory arranged figuring, and create data and
preparing to enhance security
How attacker Attacks the data
1-Passive Reconnaissance
Passive reconnaissance is an attempt to gain information about
targeted computers and networks without actively engaging with the
systems.
2-Active Resonance
In active Reconnaissance in contrast, the attacker engages with the
target system, typically conducting a port scan to determine find any
open ports.
IF a system detects you , it can block your IP
Firewalls
• firewall is a network security system that monitors and controls the
incoming and outgoing network traffic based on predetermined
security rules
• Interconnects networks with differing trust
• Imposes restrictions on network services
• only authorized traffic is allowed
• Auditing and controlling access
• can implement alarms for abnormal behavior
• Provides perimeter defence
Firewalls
Characterized by protocol level it controls in
• Packet filtering
• Application gateways
• Combination of above is dynamic packet filter
Packet filtering
• Simplest of components
• Uses transport-layer information only
• Filtering with incoming or outgoing interfaces
• Permits or denies certain services
Application gateways
• Firewall runs set of proxy programs
• Proxies filter incoming, outgoing packets
• All incoming traffic directed to firewall
• All outgoing traffic appears to come from firewall
• Policy embedded in proxy programs
Intrusion Detection System (IDS)
• intrusion detection system (IDS) is a device or software application
that monitors network or system for malicious activities or policy
violations and produces reports to a management station
• IDS is used to recognize and alarm on malicious events that occur
within the networks.
• IDS arrangements are intended to screen occasions in an IT system,
hence supplementing the first line of defense (behind firewall)
against attacks
Thank you

More Related Content

What's hot

Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesRubal Sagwal
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5suddenven
 
Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol AnalysisKrishbathija
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_01Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_01Dhananja Kariyawasam
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7suddenven
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6suddenven
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDaniel Vinyar
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8suddenven
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
communication-protocols
 communication-protocols communication-protocols
communication-protocolsAli Kamil
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkYoram Orzach
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li Inmhaviv
 

What's hot (20)

Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol Analysis
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_01Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Wireshark
WiresharkWireshark
Wireshark
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Wireshark
Wireshark Wireshark
Wireshark
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
 

Similar to TCP/IP

Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferenceCengage Learning
 
Network protocol
Network protocolNetwork protocol
Network protocolOnline
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalKarthikeyan Dhayalan
 
Basic networking
Basic networkingBasic networking
Basic networkingajeeshr3
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22Techvilla
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnectionKingPinYT
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxRonoh Kennedy
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 

Similar to TCP/IP (20)

TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Basic networking
Basic networkingBasic networking
Basic networking
 
tcp.pptx
tcp.pptxtcp.pptx
tcp.pptx
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
 
IP Security
IP SecurityIP Security
IP Security
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
TCP.pdf
TCP.pdfTCP.pdf
TCP.pdf
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

TCP/IP

  • 1. TCP/IP MANAGEMENT INFORMATION SYSTEM PRESENTED BY: MAHWISH SHAIKH REHAN ALI KANGO ASSIGNED BY: SIR NAVEED GHANI
  • 2. Title and Content Layout with List • TCP SLIDING WINDOW • USER DATAGRAM PROTOCOL • THE APPLICATION LAYER • DNS • NETWORK SECURITY EXPATIATION AND THREATS IN TCP/IP • FIREWALL • Internet Protocol (IP) • IP Packet Format • IP addressing • IP subnet • Address Resolution Protocol (ARP) • Internet Routing • ICMP • TCP
  • 3. Internet Protocol • Internet protocol is a system protocol at (layer 3) • Contain addressing data • connectionless service • No acknowledgement • Datagrams transfer measured through (MTU)
  • 5. IP addressing Procedure of routing IP datagrams IT has two primary parts 1 the network number (allocated by Nic) 2Host number (delegated by LNA) ISP provides the network service Address assign to Isp is by (IANA) Internet assigned number authority
  • 7. IP subnet Addressing • Two parts • Subnet • Host • Public or Global IP • Private or local • IP subnet Mask ( binary number )
  • 8. Broadcast Address Directed broadcast address • At the point when a packet is sent to a system's network broadcast address, a single duplicate of it goes to network, and after that the packet is sent to each host on that system or subnet work Limited Broadcast address • On the off chance that the IP location is all ones (255.255.255.255), this is a restricted broadcast address; the packet is meant to all hosts on the current (sub) network. • A routerswitch won't forward to other (sub) networks this sort of broadcast
  • 9. Address Resolution Protocol (ARP) • ARP (corresponding MAC address ) • MAC ( physical address ) • IP ( logical address ) • Assigned by the ISP ARP RARP
  • 10. Internet routing • Called gateways • Routing protocols is used by the routers to determine appropriate path • At application Layer protocol • Two Types • Interior routing ( neighboring ) • Rip: Routing Information Protocol (periodic updates) • IGP: interior gateway protocol (fast convergence) • OSPF: open shortest path first ( directly connected)
  • 11. Exterior routing • BGP : border gateway protocol (multithoming) Also provide services • Fragmentation • Time outs ( specifies age ) • Options (mark packets)
  • 12. ICMP : Internet Control Message Protocol Purpose To provide informational messages considering the routing of IP datagram. Two types of information messages 1- control messages 2-Error messages
  • 13. ICMP • Echo request • Echo reply • Connectivity between N1 and R1
  • 14. TCP Reliable transmission f information Controls abnormality Relies at (layer 4) of OSI model Consist of 4 layers
  • 15. Three way handshake • The first (Host A) starts an connection by sending a data packets with the initial number sequence (X) and SYN bit set to demonstrate an association demand. • The second (Host B) gets the SYN, records the acknowledging so as to group number X, and SYN . (with an ACK = X + 1). Host B insert its own initial sequence number (SEQ = Y). An ACK = 20 implies the host has gotten bytes 0 through 19 and expects byte 20 next. This strategy is called forward acknowledgment. Host A then recognizes all bytes Host B sent with a forward acknowledgment showing the following byte Host A hopes to get (ACK = Y + 1).
  • 16. Internet Protocol • Internet protocol is a system protocol at (layer 3) • Contain addressing data • Ip is connectionless service • Best delivery of data • Datagrams transfer measured through (MTU)
  • 17. TCP SLIDING WINDOW • A sliding window protocol is a feature of packet-based data transmission protocols. Sliding window protocols are used where reliable in-order delivery of packets is required, such as in the Data Link Layer (OSI model) as well as in the Transmission Control Protocol (TCP)
  • 18. USER DATAGRAM PROTOCOL • The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. UDP uses a simple connectionless transmission model with a minimum of protocol mechanism. • Core member of IP • Small packet size • Does not guarantee packet delivery
  • 20. THE APPLICATION LAYER • The application layer is a layer in the Open Systems Interconnection (OSI) seven-layer model and in the TCP/IP protocol suite. • It consists of protocols that focus on process-to-process communication across an IP network • It is service that provides communication application from one end to another • Provides a firm communication interface and end-user services • Example: HTTP, FTP SMTP
  • 21. DNS • The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. • It associates various information with domain names assigned to each of the participating entities. • www.google.com.
  • 22. NETWORK SECURITY EXPATIATION AND THREATS IN TCP/IP • Data is very confidential an precious • Business associations and government • Data security • Network Security • Initial a safe system must have trusted and secured data against intruders • Adjustments while in case of threats • Accessibility of data to its essential beneficiaries
  • 23. CERT • CERT is an open association whose objective is to "study Internet security vulnerabilities, • Give episode reaction administrations to locales that have been the casualties of assault • Distribute an assortment of security alarms, • Research in wide-territory arranged figuring, and create data and preparing to enhance security
  • 24. How attacker Attacks the data 1-Passive Reconnaissance Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems. 2-Active Resonance In active Reconnaissance in contrast, the attacker engages with the target system, typically conducting a port scan to determine find any open ports. IF a system detects you , it can block your IP
  • 25. Firewalls • firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules • Interconnects networks with differing trust • Imposes restrictions on network services • only authorized traffic is allowed • Auditing and controlling access • can implement alarms for abnormal behavior • Provides perimeter defence
  • 26. Firewalls Characterized by protocol level it controls in • Packet filtering • Application gateways • Combination of above is dynamic packet filter
  • 27. Packet filtering • Simplest of components • Uses transport-layer information only • Filtering with incoming or outgoing interfaces • Permits or denies certain services
  • 28. Application gateways • Firewall runs set of proxy programs • Proxies filter incoming, outgoing packets • All incoming traffic directed to firewall • All outgoing traffic appears to come from firewall • Policy embedded in proxy programs
  • 29. Intrusion Detection System (IDS) • intrusion detection system (IDS) is a device or software application that monitors network or system for malicious activities or policy violations and produces reports to a management station • IDS is used to recognize and alarm on malicious events that occur within the networks. • IDS arrangements are intended to screen occasions in an IT system, hence supplementing the first line of defense (behind firewall) against attacks