SlideShare a Scribd company logo
1 of 25
NAME
KRISHNKANT PANDEY
SUBMITTED BY:-
Telecom Switching System And Network
PRESENTATION ON
TCP/IP MODEL
1
Content
• Introduction
• What is TCP/IP
• Addressing in TCP/IP
• Network Model
• Advantage
• Disadvantage
2
INTRODUCTION
The Internet Protocol Suite (commonly known as
TCP/IP) is the set of communications protocols used
for the Internet and other similar networks.
It is named from two of the most important protocols in it:
1. The Transmission Control Protocol (TCP)
2. The Internet Protocol (IP), which were the first two
networking protocols defined in this standard.
3
What is TCP/IP
• IP addresses are not the same as the underlying
data-link (MAC) addresses.
• IP is a network layer - it must be capable of
providing communication between hosts on
different kinds of networks (different data-link
implementations).
• The address must include information about
what network the receiving host is on.
• This is what makes routing feasible.
IP
4
IP
• IP Addresses are usually shown in dotted
decimal notation:
1.2.3.4
00000001 00000010 00000011 00000100
• cse.unr.edu is 134.197.40.3
10000110 11000101 00101000 00000010
5
TCP
• Reliable, full-duplex, connection-oriented,
stream delivery
– Interface presented to the application doesn’t
require data in individual packets
– Data is guaranteed to arrive, and in the correct
order without duplications
• Or the connection will be dropped
– Imposes significant overheads
6
Applications Of TCP
• Most things!
– HTTP, FTP, …
• Saves the application a lot of work, so
used unless there’s a good reason not to
7
Addressing in TCP/IP
• Each TCP/IP address includes:
– Internet Address
– Protocol (UDP or TCP)
– Port Number
8
TCP/IP Network Model
• Different view – 4 layers
– Layer 1 : Application
– Layer 2 : Transport
– Layer 3 : Internet
– Layer 4 : Network
9
Application
• This layer is comparable to the application,
presentation, and session layers of the
OSI model all combined into one.
It provides a way for applications to have
access to networked services.
• This layer also contains the high level
protocols. The main issue with this layer is
the ability to use both TCP and
• UDP protocols.
10
•For example TFTP uses UDP because
usually on a LAN the physical links are short
enough to ensure quick and reliable packet
delivery without many errors. SMTP instead
uses TCP because of the error checking
capabilities.
•Since we consider our email important
information we would like to ensure a safe
delivery.
11
• UDP (User Datagram Protocol) - offering
a direct way to send and receive
datagram over an IP network with very
few error recovery services.
• TFTP (Trivial File Transfer Protocol) -
Simplified version of the FTP protocol
which has no security features.
12
Application Layer (AL)
• Application Layer (AL), contains those protocols which provides
services to users.
• Web browsing, e-mail, encryption, session establishment all these
things happen in application Layer which uses protocols such as,
• HTTP, SMTP, DNS, TELNET, FTP, NFS, DFS, IMAP4, POP3, NNTP,
• SSH, SSL, GOPHER.
• Application Layer (AL), defines network application services like
file transfer, network management.
• Identification of services is done using port numbers. Ports are
nothing but socket i.e. entry & exit point to the layer.
• Application layer, Presentation layer, Session layer of OSI model
• Responsible for converting data into standard format ex:
ASCII, JPEG, MIDI, MP3.
• Encoding-decoding, encryption-decryption, compression, NFS, RPC
• (remote procedure code).
13
TRANSPORT
• This layer acts as the delivery service
used by the application layer.
• Again the two protocols used are TCP
and UDP.
• The choice is made based on the
application's transmission reliability
requirements.
• The transport layer also handles all error
detection and recovery.
14
• It uses checksums, acknowledgements,
and timeouts to control transmissions and
end to end verification.
• Unlike the OSI model, TCP/IP treats
reliability as an end-to-end problem
15
Transport Layer (TL)
• Two important protocols are used in Transport layer
(TL). They are TCP and UDP
• Transport layer (TL), deals with actual manipulation of
data and prepares it for delivery through network.
• If data is too large for the single frame, then TL
breaks it into smaller pieces and assigns sequence
number.
• It ensures that all the data is received in the right order
than it was sent.
• TL is responsible for ensuring data is sent and
received successfully.
• TL is responsible for verifying delivery of packets.
• Identification services, sequencing, flow control, error
correction,
• segmentation, reassembling is done here.
16
• A set of interconnected networks
• The Internet is the most famous example
• Networks can be completely different
– Ethernet, ATM, modem, …
– (TCP/)IP is what links them
• Routers (nodes) are devices on multiple
networks that pass traffic between them
• Individual networks pass traffic from one
router or endpoint to another
• TCP/IP hides the details as much as possible
INTERNET
17
• This layer is also known as Internet layer. The
main purpose of this layer is to organize or
handle the movement of data on network.
• By movement of data, we generally mean
routing of data over the network. The main
protocol used at this layer is IP. While
ICMP(used by popular ‘ping’ command) and
IGMP are also used at this layer.
18
Internet Layer (IL)
• Internet layer (IL), deals with, finding the way to the destination.
• internet layer (IL) defines, IP addressing, routing, switching.
• It determines where the data should go on the physical network.
• It is responsible for routing each packet to its destination.
• Defines network address.
• Protocols that are used in this layer are routing protocol-OSPF,
RIP, IGRP, EIGRP Routed protocols-IP, IPX, Appletalk. And DDP
(datagram delivery protocol), ICMP, IPSec.
• This layer is also known as network layer in OSI model.
• IL provides best path to the data to reach destination.
• Device working in this layer is Router.
19
NETWORK
This layer is also known as network
interface layer
This layer normally consists of device drivers
in the OS and the network interface card
attached to the system.
Both the device drivers and the network
interface card take care of the
communication details with the media being
used to transfer the data over the network.
20
In most of the cases, this media is in the
form of cables.
Some of the famous protocols that are used
at this layer include ARP(Address resolution
protocol), PPP(Point to point protocol) etc.
21
Network Access Layer
• It is responsible for putting frames (packets) on the wire.
• Responsible for setting bits & bytes, electrical signals and
impulses back and forth across the wire (coaxial or twisted pair).
• Deals with wire, connectors, signals, pulses, modems, fiber optic
cable (in for of light).
• “Doors between worlds” connecting physical aspect of network
(cables & Digital pulses).
• Describes specifications for topology.
• Devices used here are- HUB, Switch, Repeater, Bridges, and NIC.
• MAC – it talks about physical address
• LLC – it talks about wan protocols like ppp, hdlc, and frame relay.
• Responsible for error detection.
22
Advantages
• It can be used to establish/set up connection
b/w different types of computers.
• It operates/works independently of the
operating system.
• It support for a number of routing-protocols.
• It enables the internetworking between the
organizations.
• It has a scalable, client-server architecture.
23
Disadvantages
• It is complex to set up & manage.
• IPX is faster than TCP/IP model.
• The shallow/overhead of TCP/IP is higher-than
ipx.
24
• THANK YOU
25

More Related Content

What's hot (20)

Network Layer
Network LayerNetwork Layer
Network Layer
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP Model
 
Icmp
IcmpIcmp
Icmp
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
osi vs tcp/ip
osi vs tcp/iposi vs tcp/ip
osi vs tcp/ip
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Osi model
Osi modelOsi model
Osi model
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL
 
Osi model
Osi modelOsi model
Osi model
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
TCP/IP MODEL
TCP/IP MODEL TCP/IP MODEL
TCP/IP MODEL
 
Tcp ip tutorial
Tcp ip tutorialTcp ip tutorial
Tcp ip tutorial
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 

Similar to TCP/IP model

Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) M Shamim Iqbal
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdfmashiur
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnectionKingPinYT
 
TCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationTCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationKANNANKR12
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1Roman Brovko
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Basic networking
Basic networkingBasic networking
Basic networkingajeeshr3
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalKarthikeyan Dhayalan
 
TCPIP SLIDES.ppt
TCPIP SLIDES.pptTCPIP SLIDES.ppt
TCPIP SLIDES.pptaymenshykh
 

Similar to TCP/IP model (20)

TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
tcp.pptx
tcp.pptxtcp.pptx
tcp.pptx
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP) The Internet Protocol Suite (commonly known as TCP/IP)
The Internet Protocol Suite (commonly known as TCP/IP)
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
TCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationTCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple Explanation
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Basic networking
Basic networkingBasic networking
Basic networking
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
TCPIP SLIDES.ppt
TCPIP SLIDES.pptTCPIP SLIDES.ppt
TCPIP SLIDES.ppt
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

TCP/IP model

  • 1. NAME KRISHNKANT PANDEY SUBMITTED BY:- Telecom Switching System And Network PRESENTATION ON TCP/IP MODEL 1
  • 2. Content • Introduction • What is TCP/IP • Addressing in TCP/IP • Network Model • Advantage • Disadvantage 2
  • 3. INTRODUCTION The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks. It is named from two of the most important protocols in it: 1. The Transmission Control Protocol (TCP) 2. The Internet Protocol (IP), which were the first two networking protocols defined in this standard. 3
  • 4. What is TCP/IP • IP addresses are not the same as the underlying data-link (MAC) addresses. • IP is a network layer - it must be capable of providing communication between hosts on different kinds of networks (different data-link implementations). • The address must include information about what network the receiving host is on. • This is what makes routing feasible. IP 4
  • 5. IP • IP Addresses are usually shown in dotted decimal notation: 1.2.3.4 00000001 00000010 00000011 00000100 • cse.unr.edu is 134.197.40.3 10000110 11000101 00101000 00000010 5
  • 6. TCP • Reliable, full-duplex, connection-oriented, stream delivery – Interface presented to the application doesn’t require data in individual packets – Data is guaranteed to arrive, and in the correct order without duplications • Or the connection will be dropped – Imposes significant overheads 6
  • 7. Applications Of TCP • Most things! – HTTP, FTP, … • Saves the application a lot of work, so used unless there’s a good reason not to 7
  • 8. Addressing in TCP/IP • Each TCP/IP address includes: – Internet Address – Protocol (UDP or TCP) – Port Number 8
  • 9. TCP/IP Network Model • Different view – 4 layers – Layer 1 : Application – Layer 2 : Transport – Layer 3 : Internet – Layer 4 : Network 9
  • 10. Application • This layer is comparable to the application, presentation, and session layers of the OSI model all combined into one. It provides a way for applications to have access to networked services. • This layer also contains the high level protocols. The main issue with this layer is the ability to use both TCP and • UDP protocols. 10
  • 11. •For example TFTP uses UDP because usually on a LAN the physical links are short enough to ensure quick and reliable packet delivery without many errors. SMTP instead uses TCP because of the error checking capabilities. •Since we consider our email important information we would like to ensure a safe delivery. 11
  • 12. • UDP (User Datagram Protocol) - offering a direct way to send and receive datagram over an IP network with very few error recovery services. • TFTP (Trivial File Transfer Protocol) - Simplified version of the FTP protocol which has no security features. 12
  • 13. Application Layer (AL) • Application Layer (AL), contains those protocols which provides services to users. • Web browsing, e-mail, encryption, session establishment all these things happen in application Layer which uses protocols such as, • HTTP, SMTP, DNS, TELNET, FTP, NFS, DFS, IMAP4, POP3, NNTP, • SSH, SSL, GOPHER. • Application Layer (AL), defines network application services like file transfer, network management. • Identification of services is done using port numbers. Ports are nothing but socket i.e. entry & exit point to the layer. • Application layer, Presentation layer, Session layer of OSI model • Responsible for converting data into standard format ex: ASCII, JPEG, MIDI, MP3. • Encoding-decoding, encryption-decryption, compression, NFS, RPC • (remote procedure code). 13
  • 14. TRANSPORT • This layer acts as the delivery service used by the application layer. • Again the two protocols used are TCP and UDP. • The choice is made based on the application's transmission reliability requirements. • The transport layer also handles all error detection and recovery. 14
  • 15. • It uses checksums, acknowledgements, and timeouts to control transmissions and end to end verification. • Unlike the OSI model, TCP/IP treats reliability as an end-to-end problem 15
  • 16. Transport Layer (TL) • Two important protocols are used in Transport layer (TL). They are TCP and UDP • Transport layer (TL), deals with actual manipulation of data and prepares it for delivery through network. • If data is too large for the single frame, then TL breaks it into smaller pieces and assigns sequence number. • It ensures that all the data is received in the right order than it was sent. • TL is responsible for ensuring data is sent and received successfully. • TL is responsible for verifying delivery of packets. • Identification services, sequencing, flow control, error correction, • segmentation, reassembling is done here. 16
  • 17. • A set of interconnected networks • The Internet is the most famous example • Networks can be completely different – Ethernet, ATM, modem, … – (TCP/)IP is what links them • Routers (nodes) are devices on multiple networks that pass traffic between them • Individual networks pass traffic from one router or endpoint to another • TCP/IP hides the details as much as possible INTERNET 17
  • 18. • This layer is also known as Internet layer. The main purpose of this layer is to organize or handle the movement of data on network. • By movement of data, we generally mean routing of data over the network. The main protocol used at this layer is IP. While ICMP(used by popular ‘ping’ command) and IGMP are also used at this layer. 18
  • 19. Internet Layer (IL) • Internet layer (IL), deals with, finding the way to the destination. • internet layer (IL) defines, IP addressing, routing, switching. • It determines where the data should go on the physical network. • It is responsible for routing each packet to its destination. • Defines network address. • Protocols that are used in this layer are routing protocol-OSPF, RIP, IGRP, EIGRP Routed protocols-IP, IPX, Appletalk. And DDP (datagram delivery protocol), ICMP, IPSec. • This layer is also known as network layer in OSI model. • IL provides best path to the data to reach destination. • Device working in this layer is Router. 19
  • 20. NETWORK This layer is also known as network interface layer This layer normally consists of device drivers in the OS and the network interface card attached to the system. Both the device drivers and the network interface card take care of the communication details with the media being used to transfer the data over the network. 20
  • 21. In most of the cases, this media is in the form of cables. Some of the famous protocols that are used at this layer include ARP(Address resolution protocol), PPP(Point to point protocol) etc. 21
  • 22. Network Access Layer • It is responsible for putting frames (packets) on the wire. • Responsible for setting bits & bytes, electrical signals and impulses back and forth across the wire (coaxial or twisted pair). • Deals with wire, connectors, signals, pulses, modems, fiber optic cable (in for of light). • “Doors between worlds” connecting physical aspect of network (cables & Digital pulses). • Describes specifications for topology. • Devices used here are- HUB, Switch, Repeater, Bridges, and NIC. • MAC – it talks about physical address • LLC – it talks about wan protocols like ppp, hdlc, and frame relay. • Responsible for error detection. 22
  • 23. Advantages • It can be used to establish/set up connection b/w different types of computers. • It operates/works independently of the operating system. • It support for a number of routing-protocols. • It enables the internetworking between the organizations. • It has a scalable, client-server architecture. 23
  • 24. Disadvantages • It is complex to set up & manage. • IPX is faster than TCP/IP model. • The shallow/overhead of TCP/IP is higher-than ipx. 24