SlideShare a Scribd company logo
TCP/IP & VoIP
GROUP – 1; SEC – B
APRATIM SAHA
MANU MEHROTRA
NEELANJAN BHATTACHARYA
SAKSHAM VARSHNEY
SHASHANK MISHRA
SOVIL KADOO
Network
 A network is a set of devices/nodes connected by
links for the purpose of data communication
 Evaluation criteria for a network
 Performance: Transit time, Response time, Throughput
 Reliability: Frequency of failure, Recovery time
 Security
Classification of Networks
Scale
•LAN
•MAN
•WAN
Topology
•Mesh
•Star
•Bus
•Ring
•Hybrid
Medium
•Wired
•Wireless
•Hybrid
Basis
Components of Network
 Message
 Sender
 Receiver
 Protocol
 Medium
The Internet
 The Internet is a network of networks that consists of
numerous wide- and local- area networks joined by
connecting devices
 Users who want internet connection today use the
services of Internet Service Providers
Internet -Hierarchical Organization
Structure of National ISP Interconnection of National ISPs
Protocol
 A protocol is a system of digital rules governing data
communication between computers/other devices
 Protocol specifies what is communicated, how and
when it is communicated
 Key elements of a protocol are
 Syntax: Refers to structure or format of the data being
sent
 Semantics: Refers to the meaning of each section of bits
 Timing: When data should be sent and how fast it can
be sent
Protocol Layers
 Each layer of a protocol implements a service by:
 Performing some actions itself
 Using services provided by any of the lower layers
 Advantages of Layering:
 Complex task divided in smaller ones at various layers
 Layer implementation can be changed without
affecting other layers
 Different teams can develop h/w or s/w for different
layers
TCP/IP protocol suite
 TCP/IP protocol - A hierarchical protocol made of
interactive modules, each providing specific functionality.
IP
SCTP TCP UDP
FTP HTTP SMTP
Underlying
physical n/w
Network Layer
Data Link Layer
Physical Layer
Transport layer
Application Layer
TCP/IP Model
•Provides Services to users e.g. email, chat, wwwApplication Layer
•Process-to-process message deliveryTransport Layer
•Routing
•Congestion ControlNetwork layer
•Provide raw transmission across a link
•Error detection and correction
•Flow control
Data Link Layer
•Transmits raw bits over communication channelPhysical Layer
Connection Establishment: TCP/IP
 TCP uses control messages to manage the process of
contact and communication
 Two control message types are used in connection
setup, which are specified by setting the following two
flags:
 SYN: This bit indicates that the segment is being used to
initialize a connection. SYN stands for synchronize
 ACK: This bit indicates that the device sending the segment
is conveying an acknowledgement for a message it has
received
TCP “Three Way Handshake”
Terminating TCP Connection
Advantages of TCP
 Is Reliable & provides Connection Oriented Service
 Provides Flow Control
 Implements Error Control mechanism
 Provides congestion control
 Is an industry standard, open protocol
 Has a scalable architecture
VoIP
 VoIP stands for Voice Over Internet Protocol
 VoIP is a methodology and group of technologies that facilitate the transmission of
voice and data over standard protocol networks based on IP like Internet
 Few other terms which are synonymous with VOIP are Internet Telephony, IP
Communications etc.
 It converts the Analog voice and data signals from the sending end into digital form to
be transmitted over the internet and then converts the same into Analog signals at the
receiving end
 Step for voice over IP transmission are
Signalling Channel Setup Digitization of Analog signals Encoding
How VoIP Works
VoIP: How it is different
Traditional Telephony VoIP
When you call using the Normal Phone:
Public Switched Telephone Network
(PSTN), you use circuit-switched
telephony.
VoIP, in contrast to PSTN, uses what is
called packet-switched telephony.
This system works by setting up a
dedicated channel (or circuit) between
two points for the duration of the call.
Using this system, the voice information
travels to its destination in countless
individual network packets across the
Internet.
These telephony systems are based on
copper wires carrying analog voice
data over the dedicated circuits.
VoIP systems don’t need dedicated
circuits. They use the infrastructure used
for providing internet connectivity.
VoIP: Advantages
Cost Effectiveness
• Routing phone calls over existing data networks to avoid the need for
separate voice and data networks
• VoIP calls cost much lesser
Operational Flexibility
• More than one telephone call over a single broadband connection
• Integration with other services Data file exchanges, Video
conferencing, Managing address books
• Location Independence. Only Internet connection is required
Tcp ip

More Related Content

What's hot

TCP/ IP
TCP/ IP TCP/ IP
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
Danial Mirza
 
Remote Access
Remote AccessRemote Access
Remote Access
zaisahil
 
Week2 lec2-bscs1
Week2 lec2-bscs1Week2 lec2-bscs1
Week2 lec2-bscs1
syedhaiderraza
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
Ah Fawad Saiq
 
Remote access service
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMP
hamsa nandhini
 
Unit 1 1 introduction
Unit 1   1 introductionUnit 1   1 introduction
Unit 1 1 introduction
CHINTAN Patel
 
Cs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocolsCs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocols
KathirKathiresan4
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
Sarah R. Dowlath
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
Atika Zaimi
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
Šhæÿæñ Æhmęd
 
Bluetooth 1
Bluetooth 1Bluetooth 1
Bluetooth 1
Udayakumar Easwaran
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
Atika Zaimi
 
Cn
CnCn
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Project on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devicesProject on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devices
Karan Kumar
 
Signaling System 7 (SS7)
Signaling System 7 (SS7)Signaling System 7 (SS7)
Signaling System 7 (SS7)
shire ali
 

What's hot (20)

TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Remote Access
Remote AccessRemote Access
Remote Access
 
Week2 lec2-bscs1
Week2 lec2-bscs1Week2 lec2-bscs1
Week2 lec2-bscs1
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMP
 
Chapter13
Chapter13Chapter13
Chapter13
 
Unit 1 1 introduction
Unit 1   1 introductionUnit 1   1 introduction
Unit 1 1 introduction
 
Cs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocolsCs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocols
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Bluetooth 1
Bluetooth 1Bluetooth 1
Bluetooth 1
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
 
Cn
CnCn
Cn
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Project on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devicesProject on wifi ,LTE and Broadband devices
Project on wifi ,LTE and Broadband devices
 
Signaling System 7 (SS7)
Signaling System 7 (SS7)Signaling System 7 (SS7)
Signaling System 7 (SS7)
 

Similar to Tcp ip

CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
Karthikeyan Dhayalan
 
nv.ppt
nv.pptnv.ppt
nv.ppt
tahaniali27
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
Anwal Mirza
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
nnmaurya
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
08 coms 525 tcpip - tcp 1
08   coms 525 tcpip - tcp 108   coms 525 tcpip - tcp 1
08 coms 525 tcpip - tcp 1
Palanivel Kuppusamy
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Priya Manik
 
02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf
MiftaNurFarid2
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
Saman M. Almufti
 
C C N A Day5
C C N A  Day5C C N A  Day5
C C N A Day5
darulquthni
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
LeahRachael
 
OSI Model.pptx
OSI Model.pptxOSI Model.pptx
OSI Model.pptx
milon24
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.pptmashiur
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
MelkamuEndale1
 

Similar to Tcp ip (20)

CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
08 coms 525 tcpip - tcp 1
08   coms 525 tcpip - tcp 108   coms 525 tcpip - tcp 1
08 coms 525 tcpip - tcp 1
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf02-ProtocolArchitecture.pdf
02-ProtocolArchitecture.pdf
 
Lecture 3- tcp-ip
Lecture  3- tcp-ipLecture  3- tcp-ip
Lecture 3- tcp-ip
 
C C N A Day5
C C N A  Day5C C N A  Day5
C C N A Day5
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
 
OSI Model.pptx
OSI Model.pptxOSI Model.pptx
OSI Model.pptx
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Tcp ip

  • 1. TCP/IP & VoIP GROUP – 1; SEC – B APRATIM SAHA MANU MEHROTRA NEELANJAN BHATTACHARYA SAKSHAM VARSHNEY SHASHANK MISHRA SOVIL KADOO
  • 2. Network  A network is a set of devices/nodes connected by links for the purpose of data communication  Evaluation criteria for a network  Performance: Transit time, Response time, Throughput  Reliability: Frequency of failure, Recovery time  Security
  • 4. Components of Network  Message  Sender  Receiver  Protocol  Medium
  • 5. The Internet  The Internet is a network of networks that consists of numerous wide- and local- area networks joined by connecting devices  Users who want internet connection today use the services of Internet Service Providers
  • 6. Internet -Hierarchical Organization Structure of National ISP Interconnection of National ISPs
  • 7. Protocol  A protocol is a system of digital rules governing data communication between computers/other devices  Protocol specifies what is communicated, how and when it is communicated  Key elements of a protocol are  Syntax: Refers to structure or format of the data being sent  Semantics: Refers to the meaning of each section of bits  Timing: When data should be sent and how fast it can be sent
  • 8. Protocol Layers  Each layer of a protocol implements a service by:  Performing some actions itself  Using services provided by any of the lower layers  Advantages of Layering:  Complex task divided in smaller ones at various layers  Layer implementation can be changed without affecting other layers  Different teams can develop h/w or s/w for different layers
  • 9. TCP/IP protocol suite  TCP/IP protocol - A hierarchical protocol made of interactive modules, each providing specific functionality. IP SCTP TCP UDP FTP HTTP SMTP Underlying physical n/w Network Layer Data Link Layer Physical Layer Transport layer Application Layer
  • 10. TCP/IP Model •Provides Services to users e.g. email, chat, wwwApplication Layer •Process-to-process message deliveryTransport Layer •Routing •Congestion ControlNetwork layer •Provide raw transmission across a link •Error detection and correction •Flow control Data Link Layer •Transmits raw bits over communication channelPhysical Layer
  • 11. Connection Establishment: TCP/IP  TCP uses control messages to manage the process of contact and communication  Two control message types are used in connection setup, which are specified by setting the following two flags:  SYN: This bit indicates that the segment is being used to initialize a connection. SYN stands for synchronize  ACK: This bit indicates that the device sending the segment is conveying an acknowledgement for a message it has received
  • 12. TCP “Three Way Handshake”
  • 14. Advantages of TCP  Is Reliable & provides Connection Oriented Service  Provides Flow Control  Implements Error Control mechanism  Provides congestion control  Is an industry standard, open protocol  Has a scalable architecture
  • 15. VoIP  VoIP stands for Voice Over Internet Protocol  VoIP is a methodology and group of technologies that facilitate the transmission of voice and data over standard protocol networks based on IP like Internet  Few other terms which are synonymous with VOIP are Internet Telephony, IP Communications etc.  It converts the Analog voice and data signals from the sending end into digital form to be transmitted over the internet and then converts the same into Analog signals at the receiving end  Step for voice over IP transmission are Signalling Channel Setup Digitization of Analog signals Encoding
  • 17. VoIP: How it is different Traditional Telephony VoIP When you call using the Normal Phone: Public Switched Telephone Network (PSTN), you use circuit-switched telephony. VoIP, in contrast to PSTN, uses what is called packet-switched telephony. This system works by setting up a dedicated channel (or circuit) between two points for the duration of the call. Using this system, the voice information travels to its destination in countless individual network packets across the Internet. These telephony systems are based on copper wires carrying analog voice data over the dedicated circuits. VoIP systems don’t need dedicated circuits. They use the infrastructure used for providing internet connectivity.
  • 18. VoIP: Advantages Cost Effectiveness • Routing phone calls over existing data networks to avoid the need for separate voice and data networks • VoIP calls cost much lesser Operational Flexibility • More than one telephone call over a single broadband connection • Integration with other services Data file exchanges, Video conferencing, Managing address books • Location Independence. Only Internet connection is required

Editor's Notes

  1. A number of tasks need to be performed by the protocol at both the sender’s and receiver’s end. Hence the protocol is divided into many layers.
  2. Hierarchical protocol – Each upper layer protocol is supported by one or more lower level protocols.The TCP/IP protocol suite supports various protocols in each layerAt the physical and data link layers, it doesn’t define any specific protocolAt network layer, it supports Internetworking ProtocolAt Transport layer, it supports User Datagram Protocol, Stream Control Transmission Protocol, Transmission Control ProtocolAt Application Layer, many protocols are supported including File Transfer Protocol, Hyper Text Transfer Protocol, Simple Mail Transfer Protocol
  3. TCP is a connection oriented protocol. Thus, before initiating data transfer, TCP establishes a dedicated albeit virtual pathway between the nodesTCP operates in full duplex mode i.e. two nodes are able to send data to each other simultaneously.The client sends the first message, a Syn message for synchronization of segment numbers The server sends a Syn+Ack message which serves two purposes : synchronization of segment nos. for communication in other direction and acknowledgement of the first Syn messageThe client sends the 3rd message which is just a Acknowledgement message. After this data transfer may begin between the two.
  4. Similar to connection Establishment process
  5. Numbering system of data packets allows byte oriented flow controlImplements Checksum mechanism for error controlUses buffers at both sender and receiver ends for congestion controlTCP/IP is not controlled by any one institue