SlideShare a Scribd company logo
TCP/IP
MANAGEMENT INFORMATION SYSTEM
PRESENTED BY:
MAHWISH SHAIKH
REHAN ALI KANGO
ASSIGNED BY:
SIR NAVEED GHANI
Title and Content Layout with List
• TCP SLIDING WINDOW
• USER DATAGRAM PROTOCOL
• THE APPLICATION LAYER
• DNS
• NETWORK SECURITY EXPATIATION AND
THREATS IN TCP/IP
• FIREWALL
• Internet Protocol (IP)
• IP Packet Format
• IP addressing
• IP subnet
• Address Resolution Protocol
(ARP)
• Internet Routing
• ICMP
• TCP
Internet Protocol
• Internet protocol is a system protocol at (layer 3)
• Contain addressing data
• connectionless service
• No acknowledgement
• Datagrams transfer measured through (MTU)
IP packet Format
IP addressing
Procedure of routing IP datagrams
IT has two primary parts
1 the network number (allocated by Nic)
2Host number (delegated by LNA)
ISP provides the network service
Address assign to Isp is by (IANA) Internet assigned number authority
IP Address Format
IP subnet Addressing
• Two parts
• Subnet
• Host
• Public or Global IP
• Private or local
• IP subnet Mask ( binary number )
Broadcast Address
Directed broadcast address
• At the point when a packet is sent to a system's network broadcast address, a single duplicate of
it goes to network, and after that the packet is sent to each host on that system or subnet work
Limited Broadcast address
• On the off chance that the IP location is all ones (255.255.255.255), this is a restricted broadcast
address; the packet is meant to all hosts on the current (sub) network.
• A routerswitch won't forward to other (sub) networks this sort of broadcast
Address Resolution Protocol (ARP)
• ARP (corresponding MAC address )
• MAC ( physical address )
• IP ( logical address )
• Assigned by the ISP
ARP
RARP
Internet routing
• Called gateways
• Routing protocols is used by the routers to determine appropriate
path
• At application Layer protocol
• Two Types
• Interior routing ( neighboring )
• Rip: Routing Information Protocol (periodic updates)
• IGP: interior gateway protocol (fast convergence)
• OSPF: open shortest path first ( directly connected)
Exterior routing
• BGP : border gateway protocol (multithoming)
Also provide services
• Fragmentation
• Time outs ( specifies age )
• Options (mark packets)
ICMP : Internet Control Message Protocol
Purpose
To provide informational messages considering the routing of IP
datagram.
Two types of information messages
1- control messages
2-Error messages
ICMP
• Echo request
• Echo reply
• Connectivity between N1 and R1
TCP
Reliable transmission f information
Controls abnormality
Relies at (layer 4) of OSI model
Consist of 4 layers
Three way handshake
• The first (Host A) starts an connection by sending a data packets
with the initial number sequence (X) and SYN bit set to
demonstrate an association demand.
• The second (Host B) gets the SYN, records the acknowledging so as
to group number X, and SYN . (with an ACK = X + 1). Host B insert
its own initial sequence number (SEQ = Y). An ACK = 20 implies the
host has gotten bytes 0 through 19 and expects byte 20 next. This
strategy is called forward acknowledgment. Host A then recognizes
all bytes Host B sent with a forward acknowledgment showing the
following byte Host A hopes to get (ACK = Y + 1).
Internet Protocol
• Internet protocol is a system protocol at (layer 3)
• Contain addressing data
• Ip is connectionless service
• Best delivery of data
• Datagrams transfer measured through (MTU)
TCP SLIDING WINDOW
• A sliding window protocol is a feature of packet-based data
transmission protocols. Sliding window protocols are used where
reliable in-order delivery of packets is required, such as in the Data
Link Layer (OSI model) as well as in the Transmission Control
Protocol (TCP)
USER DATAGRAM PROTOCOL
• The User Datagram Protocol (UDP) is one of the core members of
the Internet protocol suite. The protocol was designed by David P.
Reed in 1980 and formally defined in RFC 768. UDP uses a simple
connectionless transmission model with a minimum of protocol
mechanism.
• Core member of IP
• Small packet size
• Does not guarantee packet delivery
USER DATAGRAM PROTOCOL
THE APPLICATION LAYER
• The application layer is a layer in the Open Systems
Interconnection (OSI) seven-layer model and in the TCP/IP protocol
suite.
• It consists of protocols that focus on process-to-process
communication across an IP network
• It is service that provides communication application from one end
to another
• Provides a firm communication interface and end-user services
• Example: HTTP, FTP SMTP
DNS
• The Domain Name System (DNS) is a hierarchical distributed
naming system for computers, services, or any resource connected
to the Internet or a private network.
• It associates various information with domain names assigned to
each of the participating entities.
• www.google.com.
NETWORK SECURITY EXPATIATION AND THREATS IN
TCP/IP
• Data is very confidential an precious
• Business associations and government
• Data security
• Network Security
• Initial a safe system must have trusted and secured data against intruders
• Adjustments while in case of threats
• Accessibility of data to its essential beneficiaries
CERT
• CERT is an open association whose objective is to "study Internet
security vulnerabilities,
• Give episode reaction administrations to locales that have been the
casualties of assault
• Distribute an assortment of security alarms,
• Research in wide-territory arranged figuring, and create data and
preparing to enhance security
How attacker Attacks the data
1-Passive Reconnaissance
Passive reconnaissance is an attempt to gain information about
targeted computers and networks without actively engaging with the
systems.
2-Active Resonance
In active Reconnaissance in contrast, the attacker engages with the
target system, typically conducting a port scan to determine find any
open ports.
IF a system detects you , it can block your IP
Firewalls
• firewall is a network security system that monitors and controls the
incoming and outgoing network traffic based on predetermined
security rules
• Interconnects networks with differing trust
• Imposes restrictions on network services
• only authorized traffic is allowed
• Auditing and controlling access
• can implement alarms for abnormal behavior
• Provides perimeter defence
Firewalls
Characterized by protocol level it controls in
• Packet filtering
• Application gateways
• Combination of above is dynamic packet filter
Packet filtering
• Simplest of components
• Uses transport-layer information only
• Filtering with incoming or outgoing interfaces
• Permits or denies certain services
Application gateways
• Firewall runs set of proxy programs
• Proxies filter incoming, outgoing packets
• All incoming traffic directed to firewall
• All outgoing traffic appears to come from firewall
• Policy embedded in proxy programs
Intrusion Detection System (IDS)
• intrusion detection system (IDS) is a device or software application
that monitors network or system for malicious activities or policy
violations and produces reports to a management station
• IDS is used to recognize and alarm on malicious events that occur
within the networks.
• IDS arrangements are intended to screen occasions in an IT system,
hence supplementing the first line of defense (behind firewall)
against attacks
Thank you

More Related Content

What's hot

Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
Rubal Sagwal
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
suddenven
 
Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol AnalysisKrishbathija
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_01Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Dhananja Kariyawasam
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
suddenven
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
suddenven
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
Daniel Vinyar
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
suddenven
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
Chaman Poorani
 
Wireshark
WiresharkWireshark
Wireshark
Vijay kumar
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
priya sehgal
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
communication-protocols
 communication-protocols communication-protocols
communication-protocolsAli Kamil
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
Yoram Orzach
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
Kailash Kumar
 
Wireshark
Wireshark Wireshark
Wireshark
antivirusspam
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
mhaviv
 

What's hot (20)

Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol Analysis
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_01Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Wireshark
WiresharkWireshark
Wireshark
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Wireshark
Wireshark Wireshark
Wireshark
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
 

Similar to TCP/IP

TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
Danial Mirza
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
Krishnkant Pandey
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
AnyapuPranav
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
Network protocol
Network protocolNetwork protocol
Network protocol
Online
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
hiya123jes
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
Taymoor Nazmy
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
Karthikeyan Dhayalan
 
Basic networking
Basic networkingBasic networking
Basic networking
ajeeshr3
 
tcp.pptx
tcp.pptxtcp.pptx
tcp.pptx
HarishPrasanth1
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
Techvilla
 
IP Security
IP SecurityIP Security
IP Security
Dr.Florence Dayana
 
TCP /IP
TCP /IPTCP /IP
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
KingPinYT
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
Ronoh Kennedy
 
Network Layer
Network LayerNetwork Layer
Network Layer
Lakshika Rasanjali
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 

Similar to TCP/IP (20)

TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Basic networking
Basic networkingBasic networking
Basic networking
 
tcp.pptx
tcp.pptxtcp.pptx
tcp.pptx
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
 
IP Security
IP SecurityIP Security
IP Security
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
TCP.pdf
TCP.pdfTCP.pdf
TCP.pdf
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 

Recently uploaded

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

TCP/IP

  • 1. TCP/IP MANAGEMENT INFORMATION SYSTEM PRESENTED BY: MAHWISH SHAIKH REHAN ALI KANGO ASSIGNED BY: SIR NAVEED GHANI
  • 2. Title and Content Layout with List • TCP SLIDING WINDOW • USER DATAGRAM PROTOCOL • THE APPLICATION LAYER • DNS • NETWORK SECURITY EXPATIATION AND THREATS IN TCP/IP • FIREWALL • Internet Protocol (IP) • IP Packet Format • IP addressing • IP subnet • Address Resolution Protocol (ARP) • Internet Routing • ICMP • TCP
  • 3. Internet Protocol • Internet protocol is a system protocol at (layer 3) • Contain addressing data • connectionless service • No acknowledgement • Datagrams transfer measured through (MTU)
  • 5. IP addressing Procedure of routing IP datagrams IT has two primary parts 1 the network number (allocated by Nic) 2Host number (delegated by LNA) ISP provides the network service Address assign to Isp is by (IANA) Internet assigned number authority
  • 7. IP subnet Addressing • Two parts • Subnet • Host • Public or Global IP • Private or local • IP subnet Mask ( binary number )
  • 8. Broadcast Address Directed broadcast address • At the point when a packet is sent to a system's network broadcast address, a single duplicate of it goes to network, and after that the packet is sent to each host on that system or subnet work Limited Broadcast address • On the off chance that the IP location is all ones (255.255.255.255), this is a restricted broadcast address; the packet is meant to all hosts on the current (sub) network. • A routerswitch won't forward to other (sub) networks this sort of broadcast
  • 9. Address Resolution Protocol (ARP) • ARP (corresponding MAC address ) • MAC ( physical address ) • IP ( logical address ) • Assigned by the ISP ARP RARP
  • 10. Internet routing • Called gateways • Routing protocols is used by the routers to determine appropriate path • At application Layer protocol • Two Types • Interior routing ( neighboring ) • Rip: Routing Information Protocol (periodic updates) • IGP: interior gateway protocol (fast convergence) • OSPF: open shortest path first ( directly connected)
  • 11. Exterior routing • BGP : border gateway protocol (multithoming) Also provide services • Fragmentation • Time outs ( specifies age ) • Options (mark packets)
  • 12. ICMP : Internet Control Message Protocol Purpose To provide informational messages considering the routing of IP datagram. Two types of information messages 1- control messages 2-Error messages
  • 13. ICMP • Echo request • Echo reply • Connectivity between N1 and R1
  • 14. TCP Reliable transmission f information Controls abnormality Relies at (layer 4) of OSI model Consist of 4 layers
  • 15. Three way handshake • The first (Host A) starts an connection by sending a data packets with the initial number sequence (X) and SYN bit set to demonstrate an association demand. • The second (Host B) gets the SYN, records the acknowledging so as to group number X, and SYN . (with an ACK = X + 1). Host B insert its own initial sequence number (SEQ = Y). An ACK = 20 implies the host has gotten bytes 0 through 19 and expects byte 20 next. This strategy is called forward acknowledgment. Host A then recognizes all bytes Host B sent with a forward acknowledgment showing the following byte Host A hopes to get (ACK = Y + 1).
  • 16. Internet Protocol • Internet protocol is a system protocol at (layer 3) • Contain addressing data • Ip is connectionless service • Best delivery of data • Datagrams transfer measured through (MTU)
  • 17. TCP SLIDING WINDOW • A sliding window protocol is a feature of packet-based data transmission protocols. Sliding window protocols are used where reliable in-order delivery of packets is required, such as in the Data Link Layer (OSI model) as well as in the Transmission Control Protocol (TCP)
  • 18. USER DATAGRAM PROTOCOL • The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. UDP uses a simple connectionless transmission model with a minimum of protocol mechanism. • Core member of IP • Small packet size • Does not guarantee packet delivery
  • 20. THE APPLICATION LAYER • The application layer is a layer in the Open Systems Interconnection (OSI) seven-layer model and in the TCP/IP protocol suite. • It consists of protocols that focus on process-to-process communication across an IP network • It is service that provides communication application from one end to another • Provides a firm communication interface and end-user services • Example: HTTP, FTP SMTP
  • 21. DNS • The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. • It associates various information with domain names assigned to each of the participating entities. • www.google.com.
  • 22. NETWORK SECURITY EXPATIATION AND THREATS IN TCP/IP • Data is very confidential an precious • Business associations and government • Data security • Network Security • Initial a safe system must have trusted and secured data against intruders • Adjustments while in case of threats • Accessibility of data to its essential beneficiaries
  • 23. CERT • CERT is an open association whose objective is to "study Internet security vulnerabilities, • Give episode reaction administrations to locales that have been the casualties of assault • Distribute an assortment of security alarms, • Research in wide-territory arranged figuring, and create data and preparing to enhance security
  • 24. How attacker Attacks the data 1-Passive Reconnaissance Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems. 2-Active Resonance In active Reconnaissance in contrast, the attacker engages with the target system, typically conducting a port scan to determine find any open ports. IF a system detects you , it can block your IP
  • 25. Firewalls • firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules • Interconnects networks with differing trust • Imposes restrictions on network services • only authorized traffic is allowed • Auditing and controlling access • can implement alarms for abnormal behavior • Provides perimeter defence
  • 26. Firewalls Characterized by protocol level it controls in • Packet filtering • Application gateways • Combination of above is dynamic packet filter
  • 27. Packet filtering • Simplest of components • Uses transport-layer information only • Filtering with incoming or outgoing interfaces • Permits or denies certain services
  • 28. Application gateways • Firewall runs set of proxy programs • Proxies filter incoming, outgoing packets • All incoming traffic directed to firewall • All outgoing traffic appears to come from firewall • Policy embedded in proxy programs
  • 29. Intrusion Detection System (IDS) • intrusion detection system (IDS) is a device or software application that monitors network or system for malicious activities or policy violations and produces reports to a management station • IDS is used to recognize and alarm on malicious events that occur within the networks. • IDS arrangements are intended to screen occasions in an IT system, hence supplementing the first line of defense (behind firewall) against attacks