SlideShare a Scribd company logo
1 of 30
REDES Y TELECOMUNICACIONES
Ing. CIP Jack Daniel Cáceres Meza
PROTOCOLOS TCP/IP
TEMA 7
2
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Temas a tratar
Unidad de aprendizaje 2
 Tema 7:
 ALGUNOS PROTOCOLOS TCP/IP
3
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Protocolos TCP/IP
FTP File Transfer Protocol
HTTP HyperText Transfer Protocol
SMTP Simple Mail Transfer Protocol
DNS Domain Name System
TFTP Trivial File Transfer Protocol http://www.iana.org/assignments/port-numbers
4
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
File Transfer Protocol -FTP
 RFC 959 (1985)
 Actualizaciones: RFCs 2228, 2428, 2640, 2773, 3659
 20/TCP DATA Port
 21/TCP Control Port
 The objectives of FTP are 1) to promote sharing of files
(computer programs and/or data), 2) to encourage indirect or
implicit (via programs) use of remote computers, 3) to shield a
user from variations in file storage systems among hosts, and 4)
to transfer data reliably and efficiently. FTP, though usable
directly by a user at a terminal, is designed mainly for use by
programs.
 The attempt in this specification is to satisfy the diverse needs of
users of maxi-hosts, mini-hosts, personal workstations, and
TACs, with a simple, and easily implemented protocol design.
 This paper assumes knowledge of the Transmission Control
Protocol (TCP) [2] and the Telnet Protocol [3].
5
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Modelo de funcionamiento
PI Protocol interpreter
DTP Data transfer process
6
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Esquema de conexión activo
testbox1: {/home/p-t/slacker/public_html} % ftp -d
testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
---> PORT 192,168,150,80,14,178
200 PORT command successful.
---> LIST
150 Opening ASCII mode data connection for file list.
drwx------ 3 slacker users 104 Jul 27 01:45
public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.
testbox1.slacksite.com (192.168.150.80)
testbox2.slacksite.com (192.168.150.90)
Puerto=14*256+178
7
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Esquema de conexión pasivo
testbox1: {/home/p-t/slacker/public_html} % ftp -d
testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> passive
Passive mode on.
ftp> ls
---> PASV
227 Entering Passive Mode
(192,168,150,90,195,149).
---> LIST
150 Opening ASCII mode data connection for file list
drwx------ 3 slacker users 104 Jul 27 01:45
public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.
testbox1.slacksite.com (192.168.150.80)
testbox2.slacksite.com (192.168.150.90)
8
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Ejemplo
9
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Telnet -TELecommunication NETwork
 RFC 854 (1983)
 Actualizaciones: RFC 5198
 Puerto: 23
 The purpose of the TELNET Protocol is to provide a fairly
general, bi-directional, eight-bit byte oriented communications
facility. Its primary goal is to allow a standard method of
interfacing terminal devices and terminal-oriented processes to
each other. It is envisioned that the protocol may also be used
for terminal-terminal communication ("linking") and process-
process communication (distributed computation).
 The TELNET Protocol is built upon three main ideas: first, the
concept of a "Network Virtual Terminal"; second, the principle of
negotiated options; and third, a symmetric view of terminals and
processes.
10
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Modelo
11
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
SSH -Secure SHell
 RFC 4251 (2006)
 Puerto: 22
 The SSH protocol consists of three major components: The
Transport Layer Protocol provides server authentication,
confidentiality, and integrity with perfect forward secrecy. The
User Authentication Protocol authenticates the client to the
server. The Connection Protocol multiplexes the encrypted tunnel
into several logical channels.
 Secuencia de eventos de una conexión SSH
 Primero, se crea una capa de transporte segura para que el cliente
sepa que está efectivamente comunicando con el servidor correcto.
Luego se cifra la comunicación entre el cliente y el servidor por
medio de un código simétrico.
 Después, con la conexión segura al servidor en su lugar, el cliente
se autentica ante el servidor sin preocuparse de que la información
de autenticación pudiese exponerse a peligro.
 Por último, con el cliente autenticado ante el servidor, se pueden
12
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Modelo
13
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Ejemplo
$ ssh X.X.X.X
The authenticity of host 'X.X.X.X (X.X.X.X)' can't be established.
DSA key fingerprint is
d4:dd:40:fa:0d:e4:7f:45:63:d9:e4:3f:8c:70:0f:3d.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'X.X.X.X' (DSA) to the list of known
hosts.
Password:
14
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Hypertext Transfer Protocol -HTTP
 RFC 1945 (1996)
 Actualizaciones: RFC 2068, 2616, 2774
 Puerto: 80
 The Hypertext Transfer Protocol (HTTP) is an application-level
protocol with the lightness and speed necessary for distributed,
collaborative, hypermedia information systems. It is a generic,
stateless, object-oriented protocol which can be used for many
tasks, such as name servers and distributed object management
systems, through extension of its request methods (commands).
A feature of HTTP is the typing of data representation, allowing
systems to be built independently of the data being transferred.
 HTTP has been in use by the World-Wide Web global information
initiative since 1990. This specification reflects common usage of
the protocol referred to as 'HTTP/1.0'
15
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Modelo de funcionamiento
 Most HTTP communication is initiated by a user agent and
consists of a request to be applied to a resource on some origin
server. In the simplest case, this may be accomplished via a
single connection (v) between the user agent (UA) and the origin
server (O).
request chain ------------------------>
UA -------------------v------------------- O
<----------------------- response chain
 A more complicated situation occurs when one or more
intermediaries are present in the request/response chain. There
are three common forms of intermediary: proxy, gateway, and
tunnel. A proxy is a forwarding agent, receiving requests for a
URI in its absolute form rewriting all or part of the message, and
forwarding the reformatted request toward the server identified by
the URI. A gateway is a receiving agent, acting as a layer above
some other server(s) and, if necessary, translating the requests
to the underlying server's protocol. A tunnel acts as a relay point
between two connections without changing the messages;
tunnels are used when the communication needs to pass through
16
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Simple Mail Transfer Protocol -SMTP
 RFC 788 (1981)
 Actualizaciones:RFCs 2821, reemplaza 821 y 974, y actualiza 1123
 Puerto: 25
 An important feature of SMTP is its capability to transport mail
across networks, usually referred to as "SMTP mail relaying". A
network consists of the mutually-TCP-accessible hosts on the
public Internet, the mutually-TCP-accessible hosts on a firewall-
isolated TCP/IP Intranet, or hosts in some other LAN or WAN
environment utilizing a non-TCP transport-level protocol.
 Using SMTP, a process can transfer mail to another process on
the same network or to some other network via a relay or
gateway process accessible to both networks. In this way, a mail
message may pass through a number of intermediate relay or
gateway hosts on its path from sender to ultimate recipient.
17
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Modelo de funcionamiento
18
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Ejemplo
19
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Ejemplo
20
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Domain Name System -DNS
 RFC 1035 (1987)
 Actualizaciones: 882, 883, 973, 1034, 4033, 4035
 Puerto: 53
 The goal of domain names is to provide a mechanism for naming
resources in such a way that the names are usable in different
hosts, networks,protocol families, internets, and administrative
organizations. From the user's point of view, domain names are
useful as arguments to a local agent, called a resolver, which
retrieves information associated with the domain name. Thus a
user might ask for the host address or mail information
associated with a particular domain name. To enable the user to
request a particular type of information, an appropriate query
type is passed to the resolver with the domain name. To the user,
the domain tree is a single information space; the resolver is
responsible for hiding the distribution of data among name
servers from the user.
21
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
DNS Domain Namespace
Jerarquía
Delegación
22
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Types of DNS Domain Names
Name Type Description Example
Root domain
This is the top of the tree. When used in a DNS
domain name, it is stated by a trailing period (.)
to designate that the name is located at the root
or highest level of the domain hierarchy. In this
instance, the DNS domain name is considered
to be complete and points to an exact location
in the tree of names. Names stated this way
are called fully qualified domain names
(FQDNs).
A single period (.) or a
period used at the end of a
name, such as
“example.microsoft.com.”
Top level
domain
A name used to indicate a country/region or the
type of organization using a name.
““.com”, which indicates a
name registered to a
business for commercial
use on the Internet.
Second level
domain
Variable-length names registered to an
individual or organization for use on the
Internet. These names are always based upon
an appropriate top-level domain, depending on
the type of organization or geographic location
where a name is used.
““microsoft.com. ”, which is
the second-level domain
name registered to
Microsoft by the Internet
DNS domain name
registrar.
23
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Types of DNS Domain Names
Name Type Description Example
Subdomain
Additional names that an organization
can create that are derived from the
registered second-level domain
name. These include names added to
grow the DNS tree of names in an
organization and divide it into
departments or geographic locations.
““example.microsoft.com. ”, which is
a fictitious subdomain assigned by
Microsoft for use in documentation
example names.
Host or
resource
name
Names that represent a leaf in the
DNS tree of names and identify a
specific resource. Typically, the
leftmost label of a DNS domain name
identifies a specific computer on the
network. For example, if a name at
this level is used in a host (A) RR, it
is used to look up the IP address of
computer based on its host name.
““host-a.example.microsoft.com.”,
where the first label (“host-a”) is the
DNS host name for a specific
computer on the network.
24
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Descriptio
n
Class Time To Live (TTL) Type Data
Start of
Authority
Internet
(IN)
Default TTL is 60
minutes
SOA
Owner Name
Primary Name Server DNS
Name, Serial Number
Refresh Interval
Retry Interval
Expire Time
Minimum TTL
Host
Internet
(IN)
Record-specific TTL if
present, or else zone
(SOA) TTL
A
Owner Name (Host DNS
Name)
Host IP Address
Name
Server
Internet
(IN)
Record-specific TTL if
present, or else zone
(SOA) TTL
NS
Owner Name
Name Server DNS Name
Mail
Exchanger
Internet
(IN)
Record-specific TTL if
present, or else zone
(SOA) TTL
MX
Owner Name
Mail Exchange Server DNS
Name, Preference Number
Canonical
Name
(an alias)
Internet
(IN)
Record-specific TTL if
present, or else zone
(SOA) TTL
CNAME
Owner Name (Alias Name)
Host DNS Name
Common DNS Resource Records
http://www.iana.org/assignments/dns-parameters
25
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Modelo de funcionamiento
whois
26
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Ejemplo de funcionamiento
27
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Tablas DNS -partial zone for physics department
Remember
named.conf
file
32 bit time interval,
in seconds
32 bit unsignedYYYYMMDDNNN
-formatted number
28
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Tablas DNS -glue records for physics department
29
Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza
jack_caceres@hotmail.com
Tablas DNS -in-addr.arpa records
Subnet 12
Network 149.76
REDES Y TELECOMUNICACIONES
Ing. CIP Jack Daniel Cáceres Meza

More Related Content

What's hot

introduction to security
introduction to securityintroduction to security
introduction to securityahmad amiruddin
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleHimani Singh
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer ProtocolOm Prakash
 
Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpSyaiful Ahdan
 
Surviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview QuestionsSurviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview QuestionsDuane Bodle
 
20 Common Ports and their purposes
20 Common Ports and their purposes 20 Common Ports and their purposes
20 Common Ports and their purposes MaryamAlGhaith
 
7.2.1.8 lab using wireshark to observe the tcp 3-way handshake
7.2.1.8 lab   using wireshark to observe the tcp 3-way handshake7.2.1.8 lab   using wireshark to observe the tcp 3-way handshake
7.2.1.8 lab using wireshark to observe the tcp 3-way handshakegabriel morillo
 
internetworking operation
internetworking operationinternetworking operation
internetworking operationSrinivasa Rao
 
Meeting 13. web server i
Meeting 13. web server iMeeting 13. web server i
Meeting 13. web server iSyaiful Ahdan
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisitedinbroker
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suiteYash Kotak
 

What's hot (19)

7.protocols 2
7.protocols 27.protocols 2
7.protocols 2
 
Meeting 5.2 : ssh
Meeting 5.2 : sshMeeting 5.2 : ssh
Meeting 5.2 : ssh
 
Protocols
Protocols Protocols
Protocols
 
introduction to security
introduction to securityintroduction to security
introduction to security
 
7. protocols
7. protocols7. protocols
7. protocols
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 example
 
Lession2 Xinetd
Lession2 XinetdLession2 Xinetd
Lession2 Xinetd
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
 
Surviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview QuestionsSurviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview Questions
 
20 Common Ports and their purposes
20 Common Ports and their purposes 20 Common Ports and their purposes
20 Common Ports and their purposes
 
7.2.1.8 lab using wireshark to observe the tcp 3-way handshake
7.2.1.8 lab   using wireshark to observe the tcp 3-way handshake7.2.1.8 lab   using wireshark to observe the tcp 3-way handshake
7.2.1.8 lab using wireshark to observe the tcp 3-way handshake
 
internetworking operation
internetworking operationinternetworking operation
internetworking operation
 
Curso: Redes y comunicaciones I: 07 Redes
Curso: Redes y comunicaciones I: 07 RedesCurso: Redes y comunicaciones I: 07 Redes
Curso: Redes y comunicaciones I: 07 Redes
 
Ports
PortsPorts
Ports
 
Meeting 13. web server i
Meeting 13. web server iMeeting 13. web server i
Meeting 13. web server i
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
 

Viewers also liked

Informatica basica 4. sistemas operativos
Informatica basica 4. sistemas operativosInformatica basica 4. sistemas operativos
Informatica basica 4. sistemas operativosEdward Ropero
 
telecomunicaciones
telecomunicacionestelecomunicaciones
telecomunicacionesantonioprds
 
Fundamentos de telecomunicaciones unidades completas
Fundamentos de telecomunicaciones unidades completasFundamentos de telecomunicaciones unidades completas
Fundamentos de telecomunicaciones unidades completasDany Mendz
 
Principios de Telecomunicaciones
Principios de TelecomunicacionesPrincipios de Telecomunicaciones
Principios de Telecomunicacionesdanielmiyagi
 
Curso: Planeamiento estratégico (administración): 03 Prospectiva (básica)
Curso: Planeamiento estratégico (administración): 03 Prospectiva (básica)Curso: Planeamiento estratégico (administración): 03 Prospectiva (básica)
Curso: Planeamiento estratégico (administración): 03 Prospectiva (básica)Jack Daniel Cáceres Meza
 
Curso: Control de acceso y seguridad: 01 Introducción a la seguridad de la in...
Curso: Control de acceso y seguridad: 01 Introducción a la seguridad de la in...Curso: Control de acceso y seguridad: 01 Introducción a la seguridad de la in...
Curso: Control de acceso y seguridad: 01 Introducción a la seguridad de la in...Jack Daniel Cáceres Meza
 
2011 1 administración-de_proyectos_informáticos_tema-04_caceres_meza_jack_daniel
2011 1 administración-de_proyectos_informáticos_tema-04_caceres_meza_jack_daniel2011 1 administración-de_proyectos_informáticos_tema-04_caceres_meza_jack_daniel
2011 1 administración-de_proyectos_informáticos_tema-04_caceres_meza_jack_danielJack Daniel Cáceres Meza
 
Curso: Administración de proyectos informáticos: 06 Gestión de proyectos
Curso: Administración de proyectos informáticos: 06 Gestión de proyectosCurso: Administración de proyectos informáticos: 06 Gestión de proyectos
Curso: Administración de proyectos informáticos: 06 Gestión de proyectosJack Daniel Cáceres Meza
 
Curso: Seguridad de redes e Internet: 07 Aplica los controles que son apropia...
Curso: Seguridad de redes e Internet: 07 Aplica los controles que son apropia...Curso: Seguridad de redes e Internet: 07 Aplica los controles que son apropia...
Curso: Seguridad de redes e Internet: 07 Aplica los controles que son apropia...Jack Daniel Cáceres Meza
 
Curso: Redes y comunicaciones básicas: 01 Introducción
Curso: Redes y comunicaciones básicas: 01 IntroducciónCurso: Redes y comunicaciones básicas: 01 Introducción
Curso: Redes y comunicaciones básicas: 01 IntroducciónJack Daniel Cáceres Meza
 
Curso: Administración de proyectos informáticos: 08 Métricas de proyectos
Curso: Administración de proyectos informáticos: 08 Métricas de proyectosCurso: Administración de proyectos informáticos: 08 Métricas de proyectos
Curso: Administración de proyectos informáticos: 08 Métricas de proyectosJack Daniel Cáceres Meza
 
Rolman calderin malaver
Rolman calderin malaverRolman calderin malaver
Rolman calderin malaverrolmanpaul
 
Curso: Control de acceso y seguridad: 14 Herramientas y soluciones modernas e...
Curso: Control de acceso y seguridad: 14 Herramientas y soluciones modernas e...Curso: Control de acceso y seguridad: 14 Herramientas y soluciones modernas e...
Curso: Control de acceso y seguridad: 14 Herramientas y soluciones modernas e...Jack Daniel Cáceres Meza
 
Curso: Seguridad de redes e Internet: 02 Introducción a la seguridad en una r...
Curso: Seguridad de redes e Internet: 02 Introducción a la seguridad en una r...Curso: Seguridad de redes e Internet: 02 Introducción a la seguridad en una r...
Curso: Seguridad de redes e Internet: 02 Introducción a la seguridad en una r...Jack Daniel Cáceres Meza
 
Curso: Comunicación de datos y redes: 10 Redes de área amplia
Curso: Comunicación de datos y redes: 10 Redes de área ampliaCurso: Comunicación de datos y redes: 10 Redes de área amplia
Curso: Comunicación de datos y redes: 10 Redes de área ampliaJack Daniel Cáceres Meza
 
Curso: Planeamiento estratégico (administración): 01 Introducción
Curso: Planeamiento estratégico (administración): 01 IntroducciónCurso: Planeamiento estratégico (administración): 01 Introducción
Curso: Planeamiento estratégico (administración): 01 IntroducciónJack Daniel Cáceres Meza
 
Curso: Seguridad de redes e Internet 12: Mejores prácticas que se relacionan ...
Curso: Seguridad de redes e Internet 12: Mejores prácticas que se relacionan ...Curso: Seguridad de redes e Internet 12: Mejores prácticas que se relacionan ...
Curso: Seguridad de redes e Internet 12: Mejores prácticas que se relacionan ...Jack Daniel Cáceres Meza
 

Viewers also liked (20)

Informatica basica 4. sistemas operativos
Informatica basica 4. sistemas operativosInformatica basica 4. sistemas operativos
Informatica basica 4. sistemas operativos
 
Fundamentos de redes
Fundamentos de redesFundamentos de redes
Fundamentos de redes
 
telecomunicaciones
telecomunicacionestelecomunicaciones
telecomunicaciones
 
Fundamentos de telecomunicaciones unidades completas
Fundamentos de telecomunicaciones unidades completasFundamentos de telecomunicaciones unidades completas
Fundamentos de telecomunicaciones unidades completas
 
Fundamentos de telecomunicaciones
Fundamentos de telecomunicacionesFundamentos de telecomunicaciones
Fundamentos de telecomunicaciones
 
Principios de Telecomunicaciones
Principios de TelecomunicacionesPrincipios de Telecomunicaciones
Principios de Telecomunicaciones
 
Curso: Planeamiento estratégico (administración): 03 Prospectiva (básica)
Curso: Planeamiento estratégico (administración): 03 Prospectiva (básica)Curso: Planeamiento estratégico (administración): 03 Prospectiva (básica)
Curso: Planeamiento estratégico (administración): 03 Prospectiva (básica)
 
Curso: Control de acceso y seguridad: 01 Introducción a la seguridad de la in...
Curso: Control de acceso y seguridad: 01 Introducción a la seguridad de la in...Curso: Control de acceso y seguridad: 01 Introducción a la seguridad de la in...
Curso: Control de acceso y seguridad: 01 Introducción a la seguridad de la in...
 
2011 1 administración-de_proyectos_informáticos_tema-04_caceres_meza_jack_daniel
2011 1 administración-de_proyectos_informáticos_tema-04_caceres_meza_jack_daniel2011 1 administración-de_proyectos_informáticos_tema-04_caceres_meza_jack_daniel
2011 1 administración-de_proyectos_informáticos_tema-04_caceres_meza_jack_daniel
 
Curso: Administración de proyectos informáticos: 06 Gestión de proyectos
Curso: Administración de proyectos informáticos: 06 Gestión de proyectosCurso: Administración de proyectos informáticos: 06 Gestión de proyectos
Curso: Administración de proyectos informáticos: 06 Gestión de proyectos
 
Curso: Minicomputadoras: Sílabo
Curso: Minicomputadoras: SílaboCurso: Minicomputadoras: Sílabo
Curso: Minicomputadoras: Sílabo
 
Curso: Seguridad de redes e Internet: 07 Aplica los controles que son apropia...
Curso: Seguridad de redes e Internet: 07 Aplica los controles que son apropia...Curso: Seguridad de redes e Internet: 07 Aplica los controles que son apropia...
Curso: Seguridad de redes e Internet: 07 Aplica los controles que son apropia...
 
Curso: Redes y comunicaciones básicas: 01 Introducción
Curso: Redes y comunicaciones básicas: 01 IntroducciónCurso: Redes y comunicaciones básicas: 01 Introducción
Curso: Redes y comunicaciones básicas: 01 Introducción
 
Curso: Administración de proyectos informáticos: 08 Métricas de proyectos
Curso: Administración de proyectos informáticos: 08 Métricas de proyectosCurso: Administración de proyectos informáticos: 08 Métricas de proyectos
Curso: Administración de proyectos informáticos: 08 Métricas de proyectos
 
Rolman calderin malaver
Rolman calderin malaverRolman calderin malaver
Rolman calderin malaver
 
Curso: Control de acceso y seguridad: 14 Herramientas y soluciones modernas e...
Curso: Control de acceso y seguridad: 14 Herramientas y soluciones modernas e...Curso: Control de acceso y seguridad: 14 Herramientas y soluciones modernas e...
Curso: Control de acceso y seguridad: 14 Herramientas y soluciones modernas e...
 
Curso: Seguridad de redes e Internet: 02 Introducción a la seguridad en una r...
Curso: Seguridad de redes e Internet: 02 Introducción a la seguridad en una r...Curso: Seguridad de redes e Internet: 02 Introducción a la seguridad en una r...
Curso: Seguridad de redes e Internet: 02 Introducción a la seguridad en una r...
 
Curso: Comunicación de datos y redes: 10 Redes de área amplia
Curso: Comunicación de datos y redes: 10 Redes de área ampliaCurso: Comunicación de datos y redes: 10 Redes de área amplia
Curso: Comunicación de datos y redes: 10 Redes de área amplia
 
Curso: Planeamiento estratégico (administración): 01 Introducción
Curso: Planeamiento estratégico (administración): 01 IntroducciónCurso: Planeamiento estratégico (administración): 01 Introducción
Curso: Planeamiento estratégico (administración): 01 Introducción
 
Curso: Seguridad de redes e Internet 12: Mejores prácticas que se relacionan ...
Curso: Seguridad de redes e Internet 12: Mejores prácticas que se relacionan ...Curso: Seguridad de redes e Internet 12: Mejores prácticas que se relacionan ...
Curso: Seguridad de redes e Internet 12: Mejores prácticas que se relacionan ...
 

Similar to TCP/IP Protocols Guide

Primer to Browser Netwroking
Primer to Browser NetwrokingPrimer to Browser Netwroking
Primer to Browser NetwrokingShuya Osaki
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUICFarzad Soltani
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in JavaTushar B Kute
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu Alessandro De Suoodh
 
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjjCN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjjPRADEEPERUKULLA2
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approachSarah R. Dowlath
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Softwarenilabarai
 
CN_UNIT4.ppt notre knxckvj bjbDJKVHFL jb
CN_UNIT4.ppt notre knxckvj bjbDJKVHFL jbCN_UNIT4.ppt notre knxckvj bjbDJKVHFL jb
CN_UNIT4.ppt notre knxckvj bjbDJKVHFL jbPRADEEPERUKULLA2
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in JavaTushar B Kute
 
Ports and services
Ports and servicesPorts and services
Ports and servicesIlan Mindel
 
Office Comunnications Server 2007 R2 Poster
Office Comunnications Server 2007 R2 PosterOffice Comunnications Server 2007 R2 Poster
Office Comunnications Server 2007 R2 PosterPaulo Freitas
 

Similar to TCP/IP Protocols Guide (20)

Primer to Browser Netwroking
Primer to Browser NetwrokingPrimer to Browser Netwroking
Primer to Browser Netwroking
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUIC
 
MQTT
MQTTMQTT
MQTT
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
 
Networking in Java
Networking in JavaNetworking in Java
Networking in Java
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu
 
MTCNA Show.pptx
MTCNA Show.pptxMTCNA Show.pptx
MTCNA Show.pptx
 
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjjCN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
CN_UNIT4.ppt ytutuim jykhjl fjghkhj gjjj
 
DevCon 5 (July 2013) - WebSockets
DevCon 5 (July 2013) - WebSocketsDevCon 5 (July 2013) - WebSockets
DevCon 5 (July 2013) - WebSockets
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Tutorial mikrotik step by step
Tutorial mikrotik step by stepTutorial mikrotik step by step
Tutorial mikrotik step by step
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Software
 
CN_UNIT4.ppt notre knxckvj bjbDJKVHFL jb
CN_UNIT4.ppt notre knxckvj bjbDJKVHFL jbCN_UNIT4.ppt notre knxckvj bjbDJKVHFL jb
CN_UNIT4.ppt notre knxckvj bjbDJKVHFL jb
 
Unit 8 Java
Unit 8 JavaUnit 8 Java
Unit 8 Java
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in Java
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
Office Comunnications Server 2007 R2 Poster
Office Comunnications Server 2007 R2 PosterOffice Comunnications Server 2007 R2 Poster
Office Comunnications Server 2007 R2 Poster
 
Web security
Web securityWeb security
Web security
 

More from Jack Daniel Cáceres Meza

MINEDU: Resultados de encuestas: Análisis GAP en OFIN
MINEDU: Resultados de encuestas: Análisis GAP en OFINMINEDU: Resultados de encuestas: Análisis GAP en OFIN
MINEDU: Resultados de encuestas: Análisis GAP en OFINJack Daniel Cáceres Meza
 
Consultoría y servicios TIC -nueva línea de negocio para la RCP (Red Uno)
Consultoría y servicios TIC -nueva línea de negocio para la RCP (Red Uno)Consultoría y servicios TIC -nueva línea de negocio para la RCP (Red Uno)
Consultoría y servicios TIC -nueva línea de negocio para la RCP (Red Uno)Jack Daniel Cáceres Meza
 
UPC - Soporte: Norma Instalación y configuración de equipos
UPC - Soporte: Norma Instalación y configuración de equiposUPC - Soporte: Norma Instalación y configuración de equipos
UPC - Soporte: Norma Instalación y configuración de equiposJack Daniel Cáceres Meza
 
UPC-Soporte: Norma Administración de cuentas de usuarios
UPC-Soporte: Norma Administración de cuentas de usuariosUPC-Soporte: Norma Administración de cuentas de usuarios
UPC-Soporte: Norma Administración de cuentas de usuariosJack Daniel Cáceres Meza
 
UPC - Soporte: Proceso Seguridad de información
UPC - Soporte: Proceso Seguridad de informaciónUPC - Soporte: Proceso Seguridad de información
UPC - Soporte: Proceso Seguridad de informaciónJack Daniel Cáceres Meza
 
Esan Planeamiento estratégico AFP Horizonte -ppt
Esan Planeamiento estratégico AFP Horizonte  -pptEsan Planeamiento estratégico AFP Horizonte  -ppt
Esan Planeamiento estratégico AFP Horizonte -pptJack Daniel Cáceres Meza
 
Esan Planeamiento estratégico AFP Horizonte -informe
Esan Planeamiento estratégico AFP Horizonte  -informeEsan Planeamiento estratégico AFP Horizonte  -informe
Esan Planeamiento estratégico AFP Horizonte -informeJack Daniel Cáceres Meza
 
OFIN: Proyecto seguridad del producto software
OFIN: Proyecto seguridad del producto softwareOFIN: Proyecto seguridad del producto software
OFIN: Proyecto seguridad del producto softwareJack Daniel Cáceres Meza
 

More from Jack Daniel Cáceres Meza (20)

Itil® osa capability model
Itil® osa capability modelItil® osa capability model
Itil® osa capability model
 
Itil® osa capability model
Itil® osa capability modelItil® osa capability model
Itil® osa capability model
 
Cobit(R) 5 Fundamentos
Cobit(R) 5 FundamentosCobit(R) 5 Fundamentos
Cobit(R) 5 Fundamentos
 
ITIL® SLC Fundamentos
ITIL® SLC FundamentosITIL® SLC Fundamentos
ITIL® SLC Fundamentos
 
Ciclo de vida de un servicio de TI
Ciclo de vida de un servicio de TICiclo de vida de un servicio de TI
Ciclo de vida de un servicio de TI
 
MINEDU: Resultados de encuestas: Análisis GAP en OFIN
MINEDU: Resultados de encuestas: Análisis GAP en OFINMINEDU: Resultados de encuestas: Análisis GAP en OFIN
MINEDU: Resultados de encuestas: Análisis GAP en OFIN
 
Producto alcance política-v2
Producto alcance política-v2Producto alcance política-v2
Producto alcance política-v2
 
Consultoría y servicios TIC -nueva línea de negocio para la RCP (Red Uno)
Consultoría y servicios TIC -nueva línea de negocio para la RCP (Red Uno)Consultoría y servicios TIC -nueva línea de negocio para la RCP (Red Uno)
Consultoría y servicios TIC -nueva línea de negocio para la RCP (Red Uno)
 
Curso: Unixware
Curso: UnixwareCurso: Unixware
Curso: Unixware
 
UPC - Soporte: Caracterización de soporte
UPC - Soporte: Caracterización de soporteUPC - Soporte: Caracterización de soporte
UPC - Soporte: Caracterización de soporte
 
UPC - Soporte Norma Pases a producción
UPC - Soporte Norma Pases a producciónUPC - Soporte Norma Pases a producción
UPC - Soporte Norma Pases a producción
 
UPC - Soporte Norma Control y monitoreo
UPC - Soporte Norma Control y monitoreoUPC - Soporte Norma Control y monitoreo
UPC - Soporte Norma Control y monitoreo
 
UPC - Soporte: Norma Instalación y configuración de equipos
UPC - Soporte: Norma Instalación y configuración de equiposUPC - Soporte: Norma Instalación y configuración de equipos
UPC - Soporte: Norma Instalación y configuración de equipos
 
UPC-Soporte: Norma Administración de cuentas de usuarios
UPC-Soporte: Norma Administración de cuentas de usuariosUPC-Soporte: Norma Administración de cuentas de usuarios
UPC-Soporte: Norma Administración de cuentas de usuarios
 
UPC-Soporte: Norma Mantenimiento de equipos
UPC-Soporte: Norma Mantenimiento de equiposUPC-Soporte: Norma Mantenimiento de equipos
UPC-Soporte: Norma Mantenimiento de equipos
 
UPC - Soporte: Proceso Seguridad de información
UPC - Soporte: Proceso Seguridad de informaciónUPC - Soporte: Proceso Seguridad de información
UPC - Soporte: Proceso Seguridad de información
 
Esan Planeamiento estratégico AFP Horizonte -ppt
Esan Planeamiento estratégico AFP Horizonte  -pptEsan Planeamiento estratégico AFP Horizonte  -ppt
Esan Planeamiento estratégico AFP Horizonte -ppt
 
Esan Planeamiento estratégico AFP Horizonte -informe
Esan Planeamiento estratégico AFP Horizonte  -informeEsan Planeamiento estratégico AFP Horizonte  -informe
Esan Planeamiento estratégico AFP Horizonte -informe
 
OFIN-AIT: Norma Colaboradores
OFIN-AIT: Norma ColaboradoresOFIN-AIT: Norma Colaboradores
OFIN-AIT: Norma Colaboradores
 
OFIN: Proyecto seguridad del producto software
OFIN: Proyecto seguridad del producto softwareOFIN: Proyecto seguridad del producto software
OFIN: Proyecto seguridad del producto software
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

TCP/IP Protocols Guide

  • 1. REDES Y TELECOMUNICACIONES Ing. CIP Jack Daniel Cáceres Meza PROTOCOLOS TCP/IP TEMA 7
  • 2. 2 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Temas a tratar Unidad de aprendizaje 2  Tema 7:  ALGUNOS PROTOCOLOS TCP/IP
  • 3. 3 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Protocolos TCP/IP FTP File Transfer Protocol HTTP HyperText Transfer Protocol SMTP Simple Mail Transfer Protocol DNS Domain Name System TFTP Trivial File Transfer Protocol http://www.iana.org/assignments/port-numbers
  • 4. 4 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com File Transfer Protocol -FTP  RFC 959 (1985)  Actualizaciones: RFCs 2228, 2428, 2640, 2773, 3659  20/TCP DATA Port  21/TCP Control Port  The objectives of FTP are 1) to promote sharing of files (computer programs and/or data), 2) to encourage indirect or implicit (via programs) use of remote computers, 3) to shield a user from variations in file storage systems among hosts, and 4) to transfer data reliably and efficiently. FTP, though usable directly by a user at a terminal, is designed mainly for use by programs.  The attempt in this specification is to satisfy the diverse needs of users of maxi-hosts, mini-hosts, personal workstations, and TACs, with a simple, and easily implemented protocol design.  This paper assumes knowledge of the Transmission Control Protocol (TCP) [2] and the Telnet Protocol [3].
  • 5. 5 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Modelo de funcionamiento PI Protocol interpreter DTP Data transfer process
  • 6. 6 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Esquema de conexión activo testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2 Connected to testbox2.slacksite.com. 220 testbox2.slacksite.com FTP server ready. Name (testbox2:slacker): slacker ---> USER slacker 331 Password required for slacker. Password: TmpPass ---> PASS XXXX 230 User slacker logged in. ---> SYST 215 UNIX Type: L8 Remote system type is UNIX. Using binary mode to transfer files. ftp> ls ---> PORT 192,168,150,80,14,178 200 PORT command successful. ---> LIST 150 Opening ASCII mode data connection for file list. drwx------ 3 slacker users 104 Jul 27 01:45 public_html 226 Transfer complete. ftp> quit ---> QUIT 221 Goodbye. testbox1.slacksite.com (192.168.150.80) testbox2.slacksite.com (192.168.150.90) Puerto=14*256+178
  • 7. 7 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Esquema de conexión pasivo testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2 Connected to testbox2.slacksite.com. 220 testbox2.slacksite.com FTP server ready. Name (testbox2:slacker): slacker ---> USER slacker 331 Password required for slacker. Password: TmpPass ---> PASS XXXX 230 User slacker logged in. ---> SYST 215 UNIX Type: L8 Remote system type is UNIX. Using binary mode to transfer files. ftp> passive Passive mode on. ftp> ls ---> PASV 227 Entering Passive Mode (192,168,150,90,195,149). ---> LIST 150 Opening ASCII mode data connection for file list drwx------ 3 slacker users 104 Jul 27 01:45 public_html 226 Transfer complete. ftp> quit ---> QUIT 221 Goodbye. testbox1.slacksite.com (192.168.150.80) testbox2.slacksite.com (192.168.150.90)
  • 8. 8 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Ejemplo
  • 9. 9 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Telnet -TELecommunication NETwork  RFC 854 (1983)  Actualizaciones: RFC 5198  Puerto: 23  The purpose of the TELNET Protocol is to provide a fairly general, bi-directional, eight-bit byte oriented communications facility. Its primary goal is to allow a standard method of interfacing terminal devices and terminal-oriented processes to each other. It is envisioned that the protocol may also be used for terminal-terminal communication ("linking") and process- process communication (distributed computation).  The TELNET Protocol is built upon three main ideas: first, the concept of a "Network Virtual Terminal"; second, the principle of negotiated options; and third, a symmetric view of terminals and processes.
  • 10. 10 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Modelo
  • 11. 11 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com SSH -Secure SHell  RFC 4251 (2006)  Puerto: 22  The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels.  Secuencia de eventos de una conexión SSH  Primero, se crea una capa de transporte segura para que el cliente sepa que está efectivamente comunicando con el servidor correcto. Luego se cifra la comunicación entre el cliente y el servidor por medio de un código simétrico.  Después, con la conexión segura al servidor en su lugar, el cliente se autentica ante el servidor sin preocuparse de que la información de autenticación pudiese exponerse a peligro.  Por último, con el cliente autenticado ante el servidor, se pueden
  • 12. 12 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Modelo
  • 13. 13 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Ejemplo $ ssh X.X.X.X The authenticity of host 'X.X.X.X (X.X.X.X)' can't be established. DSA key fingerprint is d4:dd:40:fa:0d:e4:7f:45:63:d9:e4:3f:8c:70:0f:3d. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'X.X.X.X' (DSA) to the list of known hosts. Password:
  • 14. 14 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Hypertext Transfer Protocol -HTTP  RFC 1945 (1996)  Actualizaciones: RFC 2068, 2616, 2774  Puerto: 80  The Hypertext Transfer Protocol (HTTP) is an application-level protocol with the lightness and speed necessary for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol which can be used for many tasks, such as name servers and distributed object management systems, through extension of its request methods (commands). A feature of HTTP is the typing of data representation, allowing systems to be built independently of the data being transferred.  HTTP has been in use by the World-Wide Web global information initiative since 1990. This specification reflects common usage of the protocol referred to as 'HTTP/1.0'
  • 15. 15 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Modelo de funcionamiento  Most HTTP communication is initiated by a user agent and consists of a request to be applied to a resource on some origin server. In the simplest case, this may be accomplished via a single connection (v) between the user agent (UA) and the origin server (O). request chain ------------------------> UA -------------------v------------------- O <----------------------- response chain  A more complicated situation occurs when one or more intermediaries are present in the request/response chain. There are three common forms of intermediary: proxy, gateway, and tunnel. A proxy is a forwarding agent, receiving requests for a URI in its absolute form rewriting all or part of the message, and forwarding the reformatted request toward the server identified by the URI. A gateway is a receiving agent, acting as a layer above some other server(s) and, if necessary, translating the requests to the underlying server's protocol. A tunnel acts as a relay point between two connections without changing the messages; tunnels are used when the communication needs to pass through
  • 16. 16 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Simple Mail Transfer Protocol -SMTP  RFC 788 (1981)  Actualizaciones:RFCs 2821, reemplaza 821 y 974, y actualiza 1123  Puerto: 25  An important feature of SMTP is its capability to transport mail across networks, usually referred to as "SMTP mail relaying". A network consists of the mutually-TCP-accessible hosts on the public Internet, the mutually-TCP-accessible hosts on a firewall- isolated TCP/IP Intranet, or hosts in some other LAN or WAN environment utilizing a non-TCP transport-level protocol.  Using SMTP, a process can transfer mail to another process on the same network or to some other network via a relay or gateway process accessible to both networks. In this way, a mail message may pass through a number of intermediate relay or gateway hosts on its path from sender to ultimate recipient.
  • 17. 17 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Modelo de funcionamiento
  • 18. 18 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Ejemplo
  • 19. 19 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Ejemplo
  • 20. 20 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Domain Name System -DNS  RFC 1035 (1987)  Actualizaciones: 882, 883, 973, 1034, 4033, 4035  Puerto: 53  The goal of domain names is to provide a mechanism for naming resources in such a way that the names are usable in different hosts, networks,protocol families, internets, and administrative organizations. From the user's point of view, domain names are useful as arguments to a local agent, called a resolver, which retrieves information associated with the domain name. Thus a user might ask for the host address or mail information associated with a particular domain name. To enable the user to request a particular type of information, an appropriate query type is passed to the resolver with the domain name. To the user, the domain tree is a single information space; the resolver is responsible for hiding the distribution of data among name servers from the user.
  • 21. 21 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com DNS Domain Namespace Jerarquía Delegación
  • 22. 22 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Types of DNS Domain Names Name Type Description Example Root domain This is the top of the tree. When used in a DNS domain name, it is stated by a trailing period (.) to designate that the name is located at the root or highest level of the domain hierarchy. In this instance, the DNS domain name is considered to be complete and points to an exact location in the tree of names. Names stated this way are called fully qualified domain names (FQDNs). A single period (.) or a period used at the end of a name, such as “example.microsoft.com.” Top level domain A name used to indicate a country/region or the type of organization using a name. ““.com”, which indicates a name registered to a business for commercial use on the Internet. Second level domain Variable-length names registered to an individual or organization for use on the Internet. These names are always based upon an appropriate top-level domain, depending on the type of organization or geographic location where a name is used. ““microsoft.com. ”, which is the second-level domain name registered to Microsoft by the Internet DNS domain name registrar.
  • 23. 23 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Types of DNS Domain Names Name Type Description Example Subdomain Additional names that an organization can create that are derived from the registered second-level domain name. These include names added to grow the DNS tree of names in an organization and divide it into departments or geographic locations. ““example.microsoft.com. ”, which is a fictitious subdomain assigned by Microsoft for use in documentation example names. Host or resource name Names that represent a leaf in the DNS tree of names and identify a specific resource. Typically, the leftmost label of a DNS domain name identifies a specific computer on the network. For example, if a name at this level is used in a host (A) RR, it is used to look up the IP address of computer based on its host name. ““host-a.example.microsoft.com.”, where the first label (“host-a”) is the DNS host name for a specific computer on the network.
  • 24. 24 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Descriptio n Class Time To Live (TTL) Type Data Start of Authority Internet (IN) Default TTL is 60 minutes SOA Owner Name Primary Name Server DNS Name, Serial Number Refresh Interval Retry Interval Expire Time Minimum TTL Host Internet (IN) Record-specific TTL if present, or else zone (SOA) TTL A Owner Name (Host DNS Name) Host IP Address Name Server Internet (IN) Record-specific TTL if present, or else zone (SOA) TTL NS Owner Name Name Server DNS Name Mail Exchanger Internet (IN) Record-specific TTL if present, or else zone (SOA) TTL MX Owner Name Mail Exchange Server DNS Name, Preference Number Canonical Name (an alias) Internet (IN) Record-specific TTL if present, or else zone (SOA) TTL CNAME Owner Name (Alias Name) Host DNS Name Common DNS Resource Records http://www.iana.org/assignments/dns-parameters
  • 25. 25 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Modelo de funcionamiento whois
  • 26. 26 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Ejemplo de funcionamiento
  • 27. 27 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Tablas DNS -partial zone for physics department Remember named.conf file 32 bit time interval, in seconds 32 bit unsignedYYYYMMDDNNN -formatted number
  • 28. 28 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Tablas DNS -glue records for physics department
  • 29. 29 Ciclo 2009-IIIng.CIP Jack Daniel Cáceres Meza jack_caceres@hotmail.com Tablas DNS -in-addr.arpa records Subnet 12 Network 149.76
  • 30. REDES Y TELECOMUNICACIONES Ing. CIP Jack Daniel Cáceres Meza