The document discusses the TCP/IP protocol suite including the layers, protocols, addressing, and routing. It describes the layers of TCP/IP including application, transport, internet, and link layers. Examples are provided of protocols at each layer like SMTP, TCP, IP, and ARP. Network addressing, subnets, port numbers, and routing between routers is also covered at a high level.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...MathivananP4
Â
The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...MathivananP4
Â
The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria.
TCP/IP Protocol Suite model Transmission Control Protocol27230106
Â
TCP/IP is a set of protocols developed to allow cooperating computers to share resources across a network
TCP stands for âTransmission Control Protocolâ
IP stands for âInternet Protocolâ
They are Transport layer and Network layer protocols respectively of the protocol suite
The most well known network that adopted TCP/IP is Internet â the biggest WAN in the world
Slides for a college course at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610.
Instructor: Sam Bowne
Class website: https://samsclass.info/123/123_S17.shtml
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
Title Slide:
Title: Introduction to TCP/IP Networking
Subtitle: Understanding the Backbone of the Internet
Slide 1: Introduction to TCP/IP:
Brief overview of TCP/IP.
Explanation of its importance as the fundamental protocol suite of the Internet.
Slide 2: TCP/IP Layers:
Explanation of the four layers of the TCP/IP model: Link, Internet, Transport, and Application.
Briefly describe the purpose of each layer.
Slide 3: IP Addressing:
Explanation of IP addresses and their role in uniquely identifying devices on a network.
Differentiation between IPv4 and IPv6.
Slide 4: Subnetting:
Introduction to subnetting in TCP/IP networks.
Purpose and benefits of subnetting.
Slide 5: TCP (Transmission Control Protocol):
Overview of TCP and its role as a reliable, connection-oriented protocol.
Explanation of features like error checking, flow control, and sequencing.
Slide 6: UDP (User Datagram Protocol):
Overview of UDP and its role as a connectionless, lightweight protocol.
Comparison with TCP.
Slide 7: Ports and Sockets:
Explanation of ports and sockets in TCP/IP.
Role in enabling communication between applications.
Slide 8: DNS (Domain Name System):
Overview of DNS and its role in translating human-readable domain names into IP addresses.
Importance of DNS in Internet communication.
Slide 9: DHCP (Dynamic Host Configuration Protocol):
Explanation of DHCP and its role in dynamically assigning IP addresses to devices on a network.
Benefits of DHCP.
Slide 10: Routing and Routers:
Overview of routing in TCP/IP networks.
Role of routers in directing data between networks.
Slide 11: Security in TCP/IP:
Introduction to security considerations in TCP/IP networks.
Briefly cover topics like firewalls, VPNs, and encryption.
Slide 12: Future Trends:
Brief discussion on emerging technologies and trends in TCP/IP.
Topics like IoT (Internet of Things) and 5G.
Slide 13: Conclusion:
Summary of key points.
Emphasis on the ubiquity and importance of TCP/IP in modern networking.
TCP/IP Protocol Suite model Transmission Control Protocol27230106
Â
TCP/IP is a set of protocols developed to allow cooperating computers to share resources across a network
TCP stands for âTransmission Control Protocolâ
IP stands for âInternet Protocolâ
They are Transport layer and Network layer protocols respectively of the protocol suite
The most well known network that adopted TCP/IP is Internet â the biggest WAN in the world
Slides for a college course at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610.
Instructor: Sam Bowne
Class website: https://samsclass.info/123/123_S17.shtml
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
Title Slide:
Title: Introduction to TCP/IP Networking
Subtitle: Understanding the Backbone of the Internet
Slide 1: Introduction to TCP/IP:
Brief overview of TCP/IP.
Explanation of its importance as the fundamental protocol suite of the Internet.
Slide 2: TCP/IP Layers:
Explanation of the four layers of the TCP/IP model: Link, Internet, Transport, and Application.
Briefly describe the purpose of each layer.
Slide 3: IP Addressing:
Explanation of IP addresses and their role in uniquely identifying devices on a network.
Differentiation between IPv4 and IPv6.
Slide 4: Subnetting:
Introduction to subnetting in TCP/IP networks.
Purpose and benefits of subnetting.
Slide 5: TCP (Transmission Control Protocol):
Overview of TCP and its role as a reliable, connection-oriented protocol.
Explanation of features like error checking, flow control, and sequencing.
Slide 6: UDP (User Datagram Protocol):
Overview of UDP and its role as a connectionless, lightweight protocol.
Comparison with TCP.
Slide 7: Ports and Sockets:
Explanation of ports and sockets in TCP/IP.
Role in enabling communication between applications.
Slide 8: DNS (Domain Name System):
Overview of DNS and its role in translating human-readable domain names into IP addresses.
Importance of DNS in Internet communication.
Slide 9: DHCP (Dynamic Host Configuration Protocol):
Explanation of DHCP and its role in dynamically assigning IP addresses to devices on a network.
Benefits of DHCP.
Slide 10: Routing and Routers:
Overview of routing in TCP/IP networks.
Role of routers in directing data between networks.
Slide 11: Security in TCP/IP:
Introduction to security considerations in TCP/IP networks.
Briefly cover topics like firewalls, VPNs, and encryption.
Slide 12: Future Trends:
Brief discussion on emerging technologies and trends in TCP/IP.
Topics like IoT (Internet of Things) and 5G.
Slide 13: Conclusion:
Summary of key points.
Emphasis on the ubiquity and importance of TCP/IP in modern networking.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
Â
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Create Map Views in the Odoo 17 ERPCeline George
Â
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Make a Field invisible in Odoo 17Celine George
Â
It is possible to hide or invisible some fields in odoo. Commonly using âinvisibleâ attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
Â
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesarâs dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empireâs birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empireâs society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
3. A. What is TCP/IP?
⢠TCP/IP is a set of protocols developed to allow
cooperating computers to share resources across a
network
⢠TCP stands for âTransmission Control Protocolâ
⢠IP stands for âInternet Protocolâ
⢠They are Transport layer and Network layer
protocols respectively of the protocol suite
⢠The most well known network that adopted
TCP/IP is Internet â the biggest WAN in the world
TCP/IP
3
4. ⢠A protocol is a collection of rules and procedures
for two computers to exchange information
⢠Protocol also defines the format of data that is
being exchanged
What is a protocol?
TCP/IP
4
5. Why TCP/IP is so popular?
⢠TCP/IP was developed very early
⢠Technologies were widely discussed and circulated
in documents called âRequest for Commentsâ
(RFC) â free of charge
⢠Supported by UNIX operating system
TCP/IP
5
6. TCP/IP Model
⢠Because TCP/IP was developed earlier than the
OSI 7-layer mode, it does not have 7 layers but
only 4 layers
OSI 7-layer
TCP/IP Protocol Suite
FTP, SMTP, Telnet,
HTTP,âŚ
TCP, UDP
IP, ARP, ICMP
Network Interface
TCP/IP
6
7. 7
⢠Application layer protocols define the rules when
implementing specific network applications
⢠Rely on the underlying layers to provide accurate
and efficient data delivery
⢠Typical protocols:
⢠FTP â File Transfer Protocol
⢠For file transfer
⢠Telnet â Remote terminal protocol
⢠For remote login on any other computer on the
network
⢠SMTP â Simple Mail Transfer Protocol
⢠For mail transfer
⢠HTTP â Hypertext Transfer Protocol
⢠For Web browsing
TCP/IP
8. 8
⢠TCP/IP is built on âconnectionlessâ technology,
each datagram finds its own way to its destination
⢠Transport Layer protocols define the rules of
⢠Dividing a chunk of data into segments
⢠Reassemble segments into the original chunk
⢠Typical protocols:
⢠TCP â Transmission Control Protocol
⢠Provide further the functions such as reordering
and data resend
⢠UDP â User Datagram Service
⢠Use when the message to be sent fit exactly into a
datagram
⢠Use also when a more simplified data format is
required
TCP/IP
9. ⢠Network layer protocols define the rules of how to
find the routes for a packet to the destination
⢠It only gives best effort delivery. Packets can be
delayed, corrupted, lost, duplicated, out-of-order
⢠Typical protocols:
⢠IP â Internet Protocol
⢠Provide packet delivery
⢠ARP â Address Resolution Protocol
⢠Define the procedures of network address / MAC
address translation
⢠ICMP â Internet Control Message Protocol
⢠Define the procedures of error message transfer
TCP/IP
9
11. SMTP
TCP
IP, ARP, ICMP
Network Interface
SMTP
TCP
IP, ARP, ICMP
Network Interface
SMTP Server
Client
Actual
Virtual
B. Example: SMTP
TCP/IP
11
12. 12
⢠The underlying layers have guaranteed accurate
data delivery
⢠We need to make a lot agreements with the server
in application layer before sending mail
1. Agree on how data is represented
⢠Binary or ASCII
2. Ensure the right recipient
⢠There may be 1000 users served by the server
3. Ensure the client has the right to send mail
⢠Some clients are not welcome
4. How to tell the server it is the end of the message
⢠All mail looks the same
:
TCP/IP
13. ⢠Example: SMTP
The following mail is to be sent:
Date: Fri, 18 Jan 02 13:26:31 IST
From: harshxtime@iiitdm.in
To: cds12m001@iiitdm.in
Subject: meeting
Letâs get together Monday at 1pm.
TCP/IP
13
14. Client SMTP Server
access port 25 of server
220 cds.iiitdm.ac SMTP Service
at 20 Jan 02 05:17:18 EDT
HELO iiitdm.in
250 cds.iiitdm.ac â Hello,
iitdm.in
MAIL From:
<cds12m001@iiitdm.ac.in>
250 MAIL accepted
TCP/IP
14
15. 15
Client SMTP Server
RCPT To:<harshxtime@iiitdm.in>
250 Recipient accepted
DATA
354 Start mail input;
end with .
Date: Fri, 18 Jan 02 13:26:31 EDT
From: harshxtime@iiitdm.in
To: cds12m001@iiitdm.in
Subject: meeting
Letâs get together Monday at 1pm.
TCP/IP
.
16. ⢠The agreement made in the SMTP protocol
⢠All messages use normal text
⢠All ASCII characters
⢠The responses all begin with numbers
⢠To indicate the status when receiving the command
⢠Some words are reserved words
⢠HELO, MAIL, RCPTâŚ
⢠Mail ends with a line that contains only a period
⢠The information passed with the SMTP messages
⢠The recipient name
⢠The sender name
⢠The mail
TCP/IP
16
17. C. Domain Name (mentioned before)
⢠Every computer has a network address
⢠e.g. 158.132.161.99
⢠To access a computer, we need to specify its
network address
⢠Human beings are weak in memorizing numbers
⢠We prefer computer name or domain name
⢠e.g. hkpu10.iiitdm.ac.in
⢠Need a machine on the Internet to convert name to
number
TCP/IP
17
18. 18
Client
Domain Name Server
(DNS) of
XXXX.ac.in
Address of
www.yahoo.com
Where is
www.yahoo.co
usmua?llyUDP
DNS of com
DNS of Yahoo.com
Where is
www.yahoo.co
m?
Address of
www.Yahoo.com
Where is
yahoo.com? Address ofthe
DNS of
Yahoo.com
Become
client
TCP/IP
19. ⢠Nevertheless, such a complicated procedure needs
not perform in most cases
⢠Client computers usually remember the answers
that it got before
⢠It reduces the loading to the root DNS
⢠To further reduce loading, there can be many root
DNS on the Internet
⢠e.g. there are a few âcomâ root DNS
TCP/IP
19
21. D. TCP and UDP
TCP â Transmission Control Protocol
⢠TCP is a connection-oriented protocol
⢠Does not mean it has a physical connection between
sender and receiver
⢠TCP provides the function to allow a connection
virtually exists â also called virtual circuit
⢠TCP provides the functions:
⢠Dividing a chunk of data into segments
⢠Reassembly segments into the original chunk
⢠Provide further the functions such as reordering and
data resend
⢠Offering a reliable byte-stream delivery service
TCP/IP
21
23. ⢠A Typical Procedure
⢠Sender
⢠TCP divides a message into segments
⢠Add sequence no.
⢠Send the segments in sequence and wait for
acknowledgement
⢠If an acknowledgement for a segment is not received
for a certain period of time, resend it until an
acknowledgement is received
⢠Recipient
⢠When receiving segments, send the
acknowledgement with correct number
⢠Reassembly the segments back to the message
TCP/IP
23
24. Port Multiplexing
⢠A computer may perform a number of network
applications at the same time
⢠FTP + SMTP + HTTP, etc.
⢠Each computer has only one network address, how
can it serve so many applications at the same time?
ď by portmultiplexing
Port 80
FTP
Port 21
Network add:
158.132.161.99
SMTP
Port 25 HTTP
TCP/IP
24
25. Well-known Port Numbers
⢠Some port numbers are reserved for some
purposes
⢠Port 21: FTP â file transfer
⢠Port 25: SMTP â mail transfer
⢠Port 23: TELNET â remote login
⢠Port 80: HTTP â Web access
⢠These port numbers are well known to all
computers in the network
⢠E.g. whenever a client access port 25 of the server,
it means the client needs SMTP service
TCP/IP
25
26. Client SMTP Server
Located by: network
address + TCP port
no.
Source Port
= 1357
Destination
Port = 25
Sequence Number
Acknowledgement
Number
Checksum
Message Data
SMTP port
= 1357
SMTP port
= 25
TCP/IP
26
27. Client A
Client B
SMTP port
= 1357
FTP port
= 1361
SMTP + FTP Server
Network address:
158.132.161.99
SMTP port
= 25
FTP port
= 21
TCP/IP
27
29. E. Network Addresses and
Subnets
⢠A header is added to each segment in the
Network layer
IP
Total
Length
Time to Protocol
Live
Header
CheckSum
Source Address
Destination Address
Segment
3
Segment
TCP/IP
29
30. 30
⢠Total Length â Total length of a packet (up to
65535 bytes)
⢠Time to Live â How many times this packet can
be routed on the network (up to 255)
⢠Protocol â The transport layer protocol that
the packet belongs to
⢠TCP: 6
⢠UDP: 17
⢠ICMP: 1
⢠Source address â the network address of the
computer that sends the data
⢠Destination address â the network address of
the computer that the data is sending to
TCP/IP
31. 31
⢠(Already mentioned)
⢠Each computer (host) must have a unique
network address (or IP address for TCP/IP suite)
⢠Each IP address is 32-bit long (four bytes)
⢠The four-byte address is written out as a.b.c.d
⢠e.g. Byte 1 Byte 2 Byte 3 Byte 4
158 132 161 99
⢠IP addresses are hierarchical
⢠network I.D. and host I.D.
⢠Each Network I.D. on the Internet needs to be
registered to the Internet Assigned Number
Authority
TCP/IP
32. Class A â for very large network
0 Net I.D. Host I.D.
1 bit 7 bits 24 bits
⢠Only 27 (63) networks can belong to this class
⢠Each network, there are 224 hosts or computers
⢠Very few class A networks in the world
⢠e.g. Arpanet â the earliest packet switched
WAN (started 40 years ago)
32
TCP/IP
33. 33
Class B â for medium size network
2 bits 14 bits 16 bits
⢠214 (16384) networks can belong to this class
⢠Each network, there are 216 (65536) hosts or
computers
⢠XXXXâs address belongs to this group
⢠e.g. 158.132.14.1
1 0 Net I.D. Host I.D.
1001 1110 1000 0100 0000 1110 0000 0001
Network I.D. Host I.D.
TCP/IP
34. Class C â for small network
3 bits 21 bits 8 bits
⢠221 networks can belong to this class
⢠Each network, there are only 28 (256) hosts or
computers
1 1 0 Net I.D. Host I.D.
TCP/IP
34
35. Class D â for multicast network
4 bits 28 bits
⢠Packets are addressed to a multicast group
⢠Not often supported on Internet
1 1 1 0 Group no.
TCP/IP
35
36. Special Addresses
⢠Host I.D. = all â1âs ď Directed broadcast
âBroadcast to all hosts in the network or
subnetworkâ, not assigned
⢠Host I.D. = all â0âs ď âThis networkâ, not
assigned
⢠Network I.D. = 127 is reserved for loopback and
diagnostic purposes, not assigned
⢠Network I.D. + Host I.D. = all â1âs ď Limited
broadcast
âBroadcast to all hosts in the current networkâ,
not assigned
TCP/IP
36
37. Subnets
⢠A class B address can have 65536 hosts
⢠Difficult to manage
⢠Usually subdivide into a few small subnets
⢠Subnetting can also help to reduce broadcasting
All traffic to
158.132.0.
traffic
158.132.0.0
Total 65536 hosts
Router Router
All traffic to
158.132.1.0
158.132.2.0
158.132.3.0
158.132.0.0Each subnet 2563h
7 osts
TCP/IP
38. 38
Subnet Mask
⢠How does the router know which subnet a packet
should go?
⢠For each interface of the router, a subnet mask is
provided to redefine which part of the address is
Net ID and which part is Host ID
⢠Become classless addressing
A subnet mask: 255.255.255.0
1111 1111.1111 1111. 1111 1111. 0000 0000
â1âs Net ID â0âs Host ID
TCP/IP
40. 40
F. Overview Of Routing
⢠How a packet finds its way to a computer in a
network?
⢠By using Routers
⢠Routing is the selection of a path to guide a
packet from the source to the destination
⢠Criteria in selecting a path may be:
⢠Shortest path
⢠Quickest path
⢠Cheapest path
TCP/IP
42. 42
⢠Each router has a table that records the
estimated distance to all other routers
⢠If a router knows the entire network topology,
the shortest path can be calculated
⢠To achieve this, routers broadcast Link State
Advertisement to all other routers periodically
⢠By means of routing protocol
⢠Each router knows the exact topology, and
then calculates the shortest path
⢠In practice, it is not possible for a router to all
paths. Only the nearer ones are kept
⢠Hence can give wrong estimation
TCP/IP
43. 43
Host A
158.132.148.66
Default gateway: Router C
Host B
160.64.123.98
Router C
S0
T1
S1
T0
S1
T1
T0
T0
T0
Router A
S0
S1
Subnet
160.64.123.0
Router B
Routing Table
Subnet
158.132.166.0
S1 158.132.166.0 Direct
255.255.255.0
T1 160. 64. 0. 0 Forward
255.255. 0. 0
Routing Table
Subnet
S0 160.64.124.0
S0 160. 64.124.0
255.255.255.0
S1 160. 64.123.0
255.255.255.0
Direct
Direct
TCP/IP
44. 44
1. Host A wants to send a packet to Host B with address
160.64.123.98
2. Host A checks that 160.64.123.98 is not in the same
network
3. Send packet to default gateway (Router C)
4. Default gateway finds that it cannot provide the best
route for the packet, inform Host A to send the
packet to Router A next time
5. Router C sends the packet to Router A
6. Router A checks from the table the packet should
forward to Router B
7. Router B receives the packet and checks in its table
the packet should directly deliver to subnet
160.64.123.0
8. Host B (160.64.123.98) receives the packet
TCP/IP
45. 45
Reference: Charles L. Hedrick, âIntroduction to the Internet Protocolsâ, Rutgers
University, http://oac3.hsc.uth.tmc.edu/staff/snewton/tcp-tutorial/
Reference
TCP/IP