SlideShare a Scribd company logo
Introduction to
TCP/IP
Michael Lamont
Chief Technology Officer
Introduction
 TCP/IP is a set of data transfer protocols used by
modern data networks
 Data network: a group of computers and other devices
that communicate over a shared medium
 Data & requests for data are transmitted between
computers over the network
 Physical transmission mediums can be copper cables,
fiber optics, or radio waves
Basic Network Functionality
 BOS1 transmits data to BOS2
 BOS2 receives and interprets data from BOS1
 BOS2 transmits data back to BOS1
BOS1 BOS2
Applications
 An application lets a computer interact with other
computers by performing a specific set of tasks
 The application is responsible for managing the
transmitting and receiving of data required to perform
its tasks
 The application has to be able to communicate with
applications on other networked computers for it to be
useful
Applications
 A network protocol is a set of rules for how
applications intercommunicate
Application Data Flow
Application
Application Layer
Transport Layer
Internet Layer
Net Access Layer
Network
Application
Application Layer
Transport Layer
Internet Layer
Net Access Layer
Applications
 A network protocol is a set of rules for how
applications intercommunicate
 Common applications include:
• SMTP, IMAP, and POP (email)
• HTTP (web)
• SSH (secure access)
• NFS and FTP (file transfer)
TCP/IP
 The protocols that make up TCP/IP define:
• How data is transmitted across a network
• How data should be formatted so other networked systems
can understand it
 TCP/IP provides a complete system for formatting,
transmitting, and receiving data on a network
TCP/IP
 A TCP/IP implementation is a software package that
handles all of the formatting, transmitting, and
receiving of data
 Process Software’s MultiNet and TCPware packages let
OpenVMS systems participate in data networks
The Internet
 TCP/IP is the standard for modern data
communications across all networks
 In the 1970s, two kinds of networks were being
developed:
• Local area networks (LANs)
• ARPAnet
ARPAnet
 Dept of Defense grew
concerned that their
critical command-and-
control systems were
balkanized in late 1960s
ARPAnet
 DoD had small groups of
networked systems, but
they used proprietary
protocols
 Generally, only systems
from the same
manufacturer could be
networked together
ARPAnet
 As the DoD became more reliant on computers, they
desperately needed everything on one big network
 DoD knew this network would be a primary target for
the Soviets
 Key requirement: the network had to be decentralized,
with no single point of failure
 The network had to stay up in the face of a large-scale
nuclear attack
ARPAnet
 Defense’s Advanced
Research Projects Agency
(ARPA) was tasked to
design and build this new
style of network
 ARPAnet’s protocols
provided the basis for
TCP/IP
The Internet
 In mid-1970s National Science Foundation wanted to
network universities and research institutions
 NSF built off of ARPAnet’s design and protocols to
create the Internet
Decentralized Data Networking
 TCP/IP’s decentralized nature is a key reason it’s still
ubiquitous today
 Two key TCP/IP features support decentralization:
• End node verification: the two endpoints of any data transfer
are responsible for making sure it was successful – no
centralized control scheme
• Dynamic routing: End nodes can transfer data over multiple
paths, and the network chooses the best (fastest, most
reliable) path for each individual data transfer
Local Area Networks
 LAN technology was being developed in parallel to
ARPAnet and the Internet
 Early LANs were highly proprietary and didn’t support
the concept of a larger network (like the Internet)
 Vendor lock-in was rampant
Local Area Networks
 The wide adoption of open interconnectivity protocols
in the R&D community spilled over into corporations
 TCP/IP was a proven solution that could make a
company’s disparate systems/networks all work
together
 Growing popularity of the Internet also spilled over
into corporations
 Email was the original “killer app”
Local Area Networks
 Some LAN vendors started with a step in the right
direction: gateways between their proprietary
protocols and TCP/IP
 Any LAN technology that survives today provides native
TCP/IP support
5 Core Networking Problems
 Addressing
 Routing
 Name resolution
 Flow control
 Interoperability
Physical Addressing
 Every network-connected
hardware device has a
unique ID
 This physical ID is
“burned” into the device
when it’s fabricated
Physical
Address
Physical Addressing
 Guaranteed to be unique from the beginning to the
end of the Internet’s existence
 Referred to as a MAC (Machine Access Code)
 Low-level TCP/IP protocols use MAC addresses to move
data across the physical network to the right device
Physical Addressing
 You can think of MAC addresses like phone numbers
 On very small networks, nodes can just blindly dump
data onto the physical network
 Every node has to examine every transmission and
figure out which data is meant for it
Physical Addressing
 “Dump and parse” quickly exceeds hardware
capabilities as network size increases
 Trying that scheme on the Internet would exceed
physics-imposed limits
 Most addressing schemes that work with physical
addresses can’t scale beyond very small networks
Logical Addressing
 Routers are special network devices that let you divide
large networks into smaller subnets
 A well-designed network uses routers to create a tree-
like structure
 The hierarchy of routers lets data travel between
nodes without hitting every other node on the network
Logical Addressing
 TCP/IP provides native support for logical addressing
 IP Address: logical address configured in a node’s
TCP/IP implementation
 IP addresses can be broken down into network, subnet,
and host ID numbers:
143.192. 168. 227
Routing
 Routers are specialized devices that move data across
networks
 Routers use the logical address information in a data
packet to send it to its destination
 Routers isolate a subnet’s traffic from the entire
network
 Data transmitted between systems on the same subnet
isn’t transmitted across the larger network
Routing
 Keeps unnecessary traffic
from cluttering up the
entire network
 Data traffic destined for a
system outside the
subnet is transmitted as
far up the network as it
needs to go
Larger
Network
Routing
 Large networks have lots
of routers and multiple
possible paths between
nodes
 TCP/IP specifies how
routers should pick the
best path across a
network
RoutersRouters
Name Resolution
 Logical IP addresses are “friendlier” than physical MAC
addresses, but still aren’t really human readable
 Domain Names: structured, user friendly system
names provided by TCP/IP
 Examples of domain names:
• www.process.com
• mail.wku.edu
• travel.state.gov
Name Resolution
 Name Resolution: the
process of mapping
logical addresses back
and forth into domain
names
Name Resolution
 Special name servers store the mapping information in
databases
 TCP/IP’s Domain Name Service (DNS) provides a
hierarchy of name servers that handle name resolution
for the Internet
Error Checking & Flow Control
 Several features integrated into TCP/IP guarantee
reliable data transfers:
• All data transmissions are checked for corruption and missing
data
• All data transmissions are positively acknowledged by the
receiving node
• In-band flow control so any system involved in a data
transmission can control the rate at which data is sent
Application Support
 Key feature of modern networks is ability to run
multiple network apps simultaneously
 Ports: logical channels provided by TCP/IP that allow
multiple applications to access the network
simultaneously
 Ports identified by unique numbers
Ports
App
TCP
Internet Layer
Net Access Layer
Network
UDP
App
App
App
App
Ports
Standards Organizations
 TCP/IP is based on open and complete standards
 Standards guarantee interoperability of network
software and hardware
 Several standards organizations are responsible for
developing and maintaining TCP/IP’s standards
Standards Organizations
 Internet Architecture
Board (IAB)
 Sets general policies for
the Internet
 Manages development of
data protocols and
standards
Standards Organizations
 Internet Engineering Task
Force (IETF)
 R&D organization that
develops Internet
standards
 Composed of working
groups that focus on a
particular area
Standards Organizations
 Internet Corporation for
Assigned Names and
Numbers (ICANN)
 Manages IP addresses,
domain names, and port
numbers
Standards Organizations
 Requests for Comments (RFC): standards published by
the IETF
 Every part of TCP/IP and the Internet has its own RFC
 RFCs are the best way to get a complete understanding
of a standard, protocol, or practice
 Freely available from www.ietf.org
Summary
 Networking and protocol basics
 The TCP/IP protocol family originated from the US
Department of Defense’s ARPAnet
 ARPAnet’s resilient design architecture has been
carried forward to the Internet
 TCP/IP is a completely decentralized protocol that’s
device agnostic
Summary
 TCP/IP’s five key features:
• Logical addressing
• Routing
• Name resolution
• Flow control
• Simultaneous application support
 Internet standards and oversight bodies
www.process.com
(800) 722-7770
info@process.com

More Related Content

What's hot

Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
muhammad amir
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
Kumar Alok
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 
TCP/ IP
TCP/ IP TCP/ IP
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network ModelsWayne Jones Jnr
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
Peter R. Egli
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Ip address
Ip addressIp address
Ip address
Robin Sedeqi
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
Ankur Kumar
 
Network address translation
Network address translationNetwork address translation
Network address translation
Varsha Honde
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
Pijush Kanti Das
 

What's hot (20)

Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Ip address
Ip addressIp address
Ip address
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Tcp
TcpTcp
Tcp
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 

Viewers also liked

Pricing Analytics: Segmenting Customers To Maximize Revenue
Pricing Analytics: Segmenting Customers To Maximize RevenuePricing Analytics: Segmenting Customers To Maximize Revenue
Pricing Analytics: Segmenting Customers To Maximize Revenue
Michael Lamont
 
Pricing Analytics: Optimizing Price
Pricing Analytics: Optimizing PricePricing Analytics: Optimizing Price
Pricing Analytics: Optimizing Price
Michael Lamont
 
Pricing Analytics: Estimating Demand Curves Without Price Elasticity
Pricing Analytics: Estimating Demand Curves Without Price ElasticityPricing Analytics: Estimating Demand Curves Without Price Elasticity
Pricing Analytics: Estimating Demand Curves Without Price Elasticity
Michael Lamont
 
Pricing Analytics: Creating Linear & Power Demand Curves
Pricing Analytics: Creating Linear & Power Demand CurvesPricing Analytics: Creating Linear & Power Demand Curves
Pricing Analytics: Creating Linear & Power Demand Curves
Michael Lamont
 
Business Intelligence: Multidimensional Analysis
Business Intelligence: Multidimensional AnalysisBusiness Intelligence: Multidimensional Analysis
Business Intelligence: Multidimensional Analysis
Michael Lamont
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
sanjoysanyal
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
Pricing Analytics: Optimizing Sales Models
Pricing Analytics: Optimizing Sales ModelsPricing Analytics: Optimizing Sales Models
Pricing Analytics: Optimizing Sales Models
Michael Lamont
 
NetScaler TCP Performance Tuning
NetScaler TCP Performance TuningNetScaler TCP Performance Tuning
NetScaler TCP Performance Tuning
Kevin Mason
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ip
myl_1116
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IP
Sukh Sandhu
 
Himanshupptx
HimanshupptxHimanshupptx
Himanshupptx
Himanshu Chaurishiya
 
ARTK Consulting Retail Systems RFP Selection
ARTK Consulting Retail Systems RFP SelectionARTK Consulting Retail Systems RFP Selection
ARTK Consulting Retail Systems RFP Selection
Art Krulish
 
Understanding Business Intelligence
Understanding Business IntelligenceUnderstanding Business Intelligence
Understanding Business Intelligence
Michael Lamont
 
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...
Dragon1 Inc.
 
Espedia Visual Enterprise Overview
Espedia Visual Enterprise OverviewEspedia Visual Enterprise Overview
Espedia Visual Enterprise OverviewEspedia Consulting
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
Dhrumil Shah
 

Viewers also liked (20)

Pricing Analytics: Segmenting Customers To Maximize Revenue
Pricing Analytics: Segmenting Customers To Maximize RevenuePricing Analytics: Segmenting Customers To Maximize Revenue
Pricing Analytics: Segmenting Customers To Maximize Revenue
 
Pricing Analytics: Optimizing Price
Pricing Analytics: Optimizing PricePricing Analytics: Optimizing Price
Pricing Analytics: Optimizing Price
 
Pricing Analytics: Estimating Demand Curves Without Price Elasticity
Pricing Analytics: Estimating Demand Curves Without Price ElasticityPricing Analytics: Estimating Demand Curves Without Price Elasticity
Pricing Analytics: Estimating Demand Curves Without Price Elasticity
 
Pricing Analytics: Creating Linear & Power Demand Curves
Pricing Analytics: Creating Linear & Power Demand CurvesPricing Analytics: Creating Linear & Power Demand Curves
Pricing Analytics: Creating Linear & Power Demand Curves
 
Business Intelligence: Multidimensional Analysis
Business Intelligence: Multidimensional AnalysisBusiness Intelligence: Multidimensional Analysis
Business Intelligence: Multidimensional Analysis
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Pricing Analytics: Optimizing Sales Models
Pricing Analytics: Optimizing Sales ModelsPricing Analytics: Optimizing Sales Models
Pricing Analytics: Optimizing Sales Models
 
NetScaler TCP Performance Tuning
NetScaler TCP Performance TuningNetScaler TCP Performance Tuning
NetScaler TCP Performance Tuning
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ip
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IP
 
Tcp
TcpTcp
Tcp
 
Himanshupptx
HimanshupptxHimanshupptx
Himanshupptx
 
ARTK Consulting Retail Systems RFP Selection
ARTK Consulting Retail Systems RFP SelectionARTK Consulting Retail Systems RFP Selection
ARTK Consulting Retail Systems RFP Selection
 
Presentation1
Presentation1Presentation1
Presentation1
 
Understanding Business Intelligence
Understanding Business IntelligenceUnderstanding Business Intelligence
Understanding Business Intelligence
 
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...
 
Espedia Visual Enterprise Overview
Espedia Visual Enterprise OverviewEspedia Visual Enterprise Overview
Espedia Visual Enterprise Overview
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 

Similar to Introduction to TCP/IP

INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
badri narayan
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
The Avi Sharma
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
Computer_Network
Computer_NetworkComputer_Network
Computer_Network
Ravi Jiyani
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
LakshyaT
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data comm
Humayoun Kabir
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
nnmaurya
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
shankars73
 
The Internet and the World Wide Web
The Internet and the World Wide WebThe Internet and the World Wide Web
The Internet and the World Wide Webdpd
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
Shivam Singh
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
Serious_SamSoul
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linux
tmavroidis
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
CNP proficiency.pptx
CNP proficiency.pptxCNP proficiency.pptx
CNP proficiency.pptx
theshivammit13
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
abiramiabi21
 
Note1
Note1Note1
Microsoft power point internet history and growth [compatibility mode]
Microsoft power point   internet history and growth [compatibility mode]Microsoft power point   internet history and growth [compatibility mode]
Microsoft power point internet history and growth [compatibility mode]Cr Faezah
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
Naman Rastogi
 

Similar to Introduction to TCP/IP (20)

INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
Session 2
Session 2Session 2
Session 2
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Computer_Network
Computer_NetworkComputer_Network
Computer_Network
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data comm
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
The Internet and the World Wide Web
The Internet and the World Wide WebThe Internet and the World Wide Web
The Internet and the World Wide Web
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linux
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
CNP proficiency.pptx
CNP proficiency.pptxCNP proficiency.pptx
CNP proficiency.pptx
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Note1
Note1Note1
Note1
 
Microsoft power point internet history and growth [compatibility mode]
Microsoft power point   internet history and growth [compatibility mode]Microsoft power point   internet history and growth [compatibility mode]
Microsoft power point internet history and growth [compatibility mode]
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
 

More from Michael Lamont

Why Is Managing Software So Hard?
Why Is Managing Software So Hard?Why Is Managing Software So Hard?
Why Is Managing Software So Hard?
Michael Lamont
 
Pricing Analytics: Price Skimming
Pricing Analytics: Price SkimmingPricing Analytics: Price Skimming
Pricing Analytics: Price Skimming
Michael Lamont
 
Email Address Harvesting
Email Address HarvestingEmail Address Harvesting
Email Address Harvesting
Michael Lamont
 
Antispam Image Filtering Technologies
Antispam Image Filtering TechnologiesAntispam Image Filtering Technologies
Antispam Image Filtering Technologies
Michael Lamont
 
Evaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam SolutionsEvaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam Solutions
Michael Lamont
 
Installing & Configuring OpenLDAP (Hands On Lab)
Installing & Configuring OpenLDAP (Hands On Lab)Installing & Configuring OpenLDAP (Hands On Lab)
Installing & Configuring OpenLDAP (Hands On Lab)Michael Lamont
 
Evaluating Anti-Spam Filtering Solutions
Evaluating Anti-Spam Filtering SolutionsEvaluating Anti-Spam Filtering Solutions
Evaluating Anti-Spam Filtering Solutions
Michael Lamont
 
Business Intelligence: Data Warehouses
Business Intelligence: Data WarehousesBusiness Intelligence: Data Warehouses
Business Intelligence: Data Warehouses
Michael Lamont
 

More from Michael Lamont (8)

Why Is Managing Software So Hard?
Why Is Managing Software So Hard?Why Is Managing Software So Hard?
Why Is Managing Software So Hard?
 
Pricing Analytics: Price Skimming
Pricing Analytics: Price SkimmingPricing Analytics: Price Skimming
Pricing Analytics: Price Skimming
 
Email Address Harvesting
Email Address HarvestingEmail Address Harvesting
Email Address Harvesting
 
Antispam Image Filtering Technologies
Antispam Image Filtering TechnologiesAntispam Image Filtering Technologies
Antispam Image Filtering Technologies
 
Evaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam SolutionsEvaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam Solutions
 
Installing & Configuring OpenLDAP (Hands On Lab)
Installing & Configuring OpenLDAP (Hands On Lab)Installing & Configuring OpenLDAP (Hands On Lab)
Installing & Configuring OpenLDAP (Hands On Lab)
 
Evaluating Anti-Spam Filtering Solutions
Evaluating Anti-Spam Filtering SolutionsEvaluating Anti-Spam Filtering Solutions
Evaluating Anti-Spam Filtering Solutions
 
Business Intelligence: Data Warehouses
Business Intelligence: Data WarehousesBusiness Intelligence: Data Warehouses
Business Intelligence: Data Warehouses
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Introduction to TCP/IP

  • 2. Introduction  TCP/IP is a set of data transfer protocols used by modern data networks  Data network: a group of computers and other devices that communicate over a shared medium  Data & requests for data are transmitted between computers over the network  Physical transmission mediums can be copper cables, fiber optics, or radio waves
  • 3. Basic Network Functionality  BOS1 transmits data to BOS2  BOS2 receives and interprets data from BOS1  BOS2 transmits data back to BOS1 BOS1 BOS2
  • 4. Applications  An application lets a computer interact with other computers by performing a specific set of tasks  The application is responsible for managing the transmitting and receiving of data required to perform its tasks  The application has to be able to communicate with applications on other networked computers for it to be useful
  • 5. Applications  A network protocol is a set of rules for how applications intercommunicate
  • 6. Application Data Flow Application Application Layer Transport Layer Internet Layer Net Access Layer Network Application Application Layer Transport Layer Internet Layer Net Access Layer
  • 7. Applications  A network protocol is a set of rules for how applications intercommunicate  Common applications include: • SMTP, IMAP, and POP (email) • HTTP (web) • SSH (secure access) • NFS and FTP (file transfer)
  • 8. TCP/IP  The protocols that make up TCP/IP define: • How data is transmitted across a network • How data should be formatted so other networked systems can understand it  TCP/IP provides a complete system for formatting, transmitting, and receiving data on a network
  • 9. TCP/IP  A TCP/IP implementation is a software package that handles all of the formatting, transmitting, and receiving of data  Process Software’s MultiNet and TCPware packages let OpenVMS systems participate in data networks
  • 10. The Internet  TCP/IP is the standard for modern data communications across all networks  In the 1970s, two kinds of networks were being developed: • Local area networks (LANs) • ARPAnet
  • 11. ARPAnet  Dept of Defense grew concerned that their critical command-and- control systems were balkanized in late 1960s
  • 12. ARPAnet  DoD had small groups of networked systems, but they used proprietary protocols  Generally, only systems from the same manufacturer could be networked together
  • 13. ARPAnet  As the DoD became more reliant on computers, they desperately needed everything on one big network  DoD knew this network would be a primary target for the Soviets  Key requirement: the network had to be decentralized, with no single point of failure  The network had to stay up in the face of a large-scale nuclear attack
  • 14. ARPAnet  Defense’s Advanced Research Projects Agency (ARPA) was tasked to design and build this new style of network  ARPAnet’s protocols provided the basis for TCP/IP
  • 15. The Internet  In mid-1970s National Science Foundation wanted to network universities and research institutions  NSF built off of ARPAnet’s design and protocols to create the Internet
  • 16. Decentralized Data Networking  TCP/IP’s decentralized nature is a key reason it’s still ubiquitous today  Two key TCP/IP features support decentralization: • End node verification: the two endpoints of any data transfer are responsible for making sure it was successful – no centralized control scheme • Dynamic routing: End nodes can transfer data over multiple paths, and the network chooses the best (fastest, most reliable) path for each individual data transfer
  • 17. Local Area Networks  LAN technology was being developed in parallel to ARPAnet and the Internet  Early LANs were highly proprietary and didn’t support the concept of a larger network (like the Internet)  Vendor lock-in was rampant
  • 18. Local Area Networks  The wide adoption of open interconnectivity protocols in the R&D community spilled over into corporations  TCP/IP was a proven solution that could make a company’s disparate systems/networks all work together  Growing popularity of the Internet also spilled over into corporations  Email was the original “killer app”
  • 19. Local Area Networks  Some LAN vendors started with a step in the right direction: gateways between their proprietary protocols and TCP/IP  Any LAN technology that survives today provides native TCP/IP support
  • 20. 5 Core Networking Problems  Addressing  Routing  Name resolution  Flow control  Interoperability
  • 21. Physical Addressing  Every network-connected hardware device has a unique ID  This physical ID is “burned” into the device when it’s fabricated Physical Address
  • 22. Physical Addressing  Guaranteed to be unique from the beginning to the end of the Internet’s existence  Referred to as a MAC (Machine Access Code)  Low-level TCP/IP protocols use MAC addresses to move data across the physical network to the right device
  • 23. Physical Addressing  You can think of MAC addresses like phone numbers  On very small networks, nodes can just blindly dump data onto the physical network  Every node has to examine every transmission and figure out which data is meant for it
  • 24. Physical Addressing  “Dump and parse” quickly exceeds hardware capabilities as network size increases  Trying that scheme on the Internet would exceed physics-imposed limits  Most addressing schemes that work with physical addresses can’t scale beyond very small networks
  • 25. Logical Addressing  Routers are special network devices that let you divide large networks into smaller subnets  A well-designed network uses routers to create a tree- like structure  The hierarchy of routers lets data travel between nodes without hitting every other node on the network
  • 26. Logical Addressing  TCP/IP provides native support for logical addressing  IP Address: logical address configured in a node’s TCP/IP implementation  IP addresses can be broken down into network, subnet, and host ID numbers: 143.192. 168. 227
  • 27. Routing  Routers are specialized devices that move data across networks  Routers use the logical address information in a data packet to send it to its destination  Routers isolate a subnet’s traffic from the entire network  Data transmitted between systems on the same subnet isn’t transmitted across the larger network
  • 28. Routing  Keeps unnecessary traffic from cluttering up the entire network  Data traffic destined for a system outside the subnet is transmitted as far up the network as it needs to go Larger Network
  • 29. Routing  Large networks have lots of routers and multiple possible paths between nodes  TCP/IP specifies how routers should pick the best path across a network RoutersRouters
  • 30. Name Resolution  Logical IP addresses are “friendlier” than physical MAC addresses, but still aren’t really human readable  Domain Names: structured, user friendly system names provided by TCP/IP  Examples of domain names: • www.process.com • mail.wku.edu • travel.state.gov
  • 31. Name Resolution  Name Resolution: the process of mapping logical addresses back and forth into domain names
  • 32. Name Resolution  Special name servers store the mapping information in databases  TCP/IP’s Domain Name Service (DNS) provides a hierarchy of name servers that handle name resolution for the Internet
  • 33. Error Checking & Flow Control  Several features integrated into TCP/IP guarantee reliable data transfers: • All data transmissions are checked for corruption and missing data • All data transmissions are positively acknowledged by the receiving node • In-band flow control so any system involved in a data transmission can control the rate at which data is sent
  • 34. Application Support  Key feature of modern networks is ability to run multiple network apps simultaneously  Ports: logical channels provided by TCP/IP that allow multiple applications to access the network simultaneously  Ports identified by unique numbers
  • 35. Ports App TCP Internet Layer Net Access Layer Network UDP App App App App Ports
  • 36. Standards Organizations  TCP/IP is based on open and complete standards  Standards guarantee interoperability of network software and hardware  Several standards organizations are responsible for developing and maintaining TCP/IP’s standards
  • 37. Standards Organizations  Internet Architecture Board (IAB)  Sets general policies for the Internet  Manages development of data protocols and standards
  • 38. Standards Organizations  Internet Engineering Task Force (IETF)  R&D organization that develops Internet standards  Composed of working groups that focus on a particular area
  • 39. Standards Organizations  Internet Corporation for Assigned Names and Numbers (ICANN)  Manages IP addresses, domain names, and port numbers
  • 40. Standards Organizations  Requests for Comments (RFC): standards published by the IETF  Every part of TCP/IP and the Internet has its own RFC  RFCs are the best way to get a complete understanding of a standard, protocol, or practice  Freely available from www.ietf.org
  • 41. Summary  Networking and protocol basics  The TCP/IP protocol family originated from the US Department of Defense’s ARPAnet  ARPAnet’s resilient design architecture has been carried forward to the Internet  TCP/IP is a completely decentralized protocol that’s device agnostic
  • 42. Summary  TCP/IP’s five key features: • Logical addressing • Routing • Name resolution • Flow control • Simultaneous application support  Internet standards and oversight bodies