SlideShare a Scribd company logo
1 of 24
“The Design Philosophy of the DARPA
Internet Protocols”
- David D. Clark, 1988
Presented By:
Yansi Keim, Sonali Tyagi
0302052015, 03102052015
M.Tech, 1st Semester
Information Security Management
Presented To:
Mr. Vivekanand Jha
Asst. Professor
Dept. of Computer Science and
Engineering
Copyright @ IGDTUW
D.A.R.P.A.
Defense Advanced
Research Projects
Agency
Contents
1. OBJECTIVE OF RESEARCH PAPER
2. Introduction
3. Fundamental Goal
4. Second Level Goals
5. Survivability in the Face of Failure
6. Types of Services
7. Varieties of Networks
8. Other Goals
9. Architecture and Implementation
10. Datagrams
11. TCP
12. Conclusion
Copyright @ IGDTUW
The research paper attempts to describe the Internet
Protocol Suite, i.e. TCP/IP as why it is like that?
The paper catalogs the original objective of the Internet
Architecture.
Objective of Research Paper
Copyright @ IGDTUW
D.A.R.P.A.
Defense Advanced
Research Projects Agency
Contents
1. Objective of Research Paper
2. INTRODUCTION
3. Fundamental Goal
4. Second Level Goals
5. Survivability in the Face of Failure
6. Types of Services
7. Varieties of Networks
8. Other Goals
9. Architecture and Implementation
10. Datagrams
11. TCP
12. Conclusion
Copyright @ IGDTUW
Introduction
 TCP/IP, introduced 15 years ago by DARPA, by U.S.
Department of Defense has been used extensively in military
and commercial systems.
 TCP/IP are now standards for internetworking have influenced
ISO protocols.
 A new extension challenges the existing design principles.
Copyright @ IGDTUW
D.A.R.P.A.
DEFENSE ADVANCED
RESEARCH PROJECTS
AGENCY
Contents
1. Objective of Research Paper
2. Introduction
4. Second Level Goals
5. Survivability in the Face of Failure
6. Types of Services
7. Varieties of Networks
8. Other Goals
9. Architecture and Implementation
10. Datagrams
11. TCP
12. Conclusion
Copyright @ IGDTUW
Fundamental Goal of DARPA
 To develop an effective technique for multiplexed utilization of existing
interconnecting networks.
 Technique for Multiplexing: Packet Switching.
 Technique for Interconnecting: Store and Forward Packet Switching.
Copyright @ IGDTUW
Fundamental Structure of DARPA
 A packet switched communication in which number of
networks are connected together using gateways which
implements store and forward algorithm.
D.A.R.P.A.
Defense Advanced
Research Projects Agency
Contents
1. Objective of Research Paper
2. Introduction
3. Fundamental goal
5. Survivability in the Face of Failure
6. Types of Services
7. Verities of Networks
8. Other Goals
9. Architecture and Implementation
10. Datagrams
11. TCP
12. Conclusion
Copyright @ IGDTUW
Second Level Goals
 1. Internet communication must continue despite loss
of n/w or gateways.
2.Must support multiple types of communication
services.
3. Must accommodate a variety of n/w
4. distributed management of its resources.
5. cost effective
6. permit host attachment with low level of effort.
7.resources must be accountable.
Copyright @ IGDTUW
D.A.R.P.A.
Defense Advanced
Research Projects Agency
Contents
1. Objective of Research Paper
2. Introduction
3. Fundamental goal
4. Second level goals
5. SURVIVABILITY IN THE FACE OF FAILURE
6. Types of Services
7. Varieties of Networks
8. Other Goals
9. Architecture and Implementation
10. Datagrams
11. TCP
12. Conclusion
Copyright @ IGDTUW
SURVIVABILITY IN THE FACE OF FAILURE
 Communication b/w two entities should never lost.
 Synchronization should be there
 to achieve Synchronization State Of Info must be protected.
 SOI is no. of packets transmitted, no. of packets acknowledge.
 In some n/w SOI is stored in intermediate packet switching nodes.
 Fate sharing : take info and gather it at the end point of the net.
Copyright @ IGDTUW
D.A.R.P.A.
DEFENSE ADVANCED
RESEARCH
PROJECTS AGENCY
CONTENTS
1. OBJECTIVE OF RESEARCH PAPER
2. INTRODUCTION
3. FUNDAMENTAL GOAL
4. SECOND LEVEL GOALS
5. SURVIVABILITY IN THE FACE OF FAILURE
6.TYPES OF SERVICES
7. VARIETIES OF NETWORKS
8. OTHER GOALS
9. ARCHITECTURE AND IMPLEMENTATION
10.DATAGRAMS
11.TCP
12.CONCLUSION
Copyright @ IGDTUW
TYPES OF SERVICES
 Traditional types of service is bi-directional reliable delivery of
data. Also sometimes called as “Virtual Circuit” served through
TCP.
 Initially TCP was thought to have supported full range of services,
but later it was found too difficult to accommodate all in one
protocol.
 Those services failing to incorporate are XNET, Delivery of
Digitized Speech.
 Thus it was early decided, more than one transport service
would be required.
 TCP and IP, separated into two layers.
Copyright @ IGDTUW
D.A.R.P.A.
Defense Advanced
Research Projects
Agency
Contents
1. Objective of Research Paper
2. Introduction
3. Fundamental goal
4. Second level goals
5. Survivability in the Face of Failure
6. Types of services
7. VARIETIES OF NETWORKS
8. Other Goals
9. Architecture and Implementation
10. Datagrams
11. TCP
12. Conclusion
Copyright @ IGDTUW
Varieties of Networks
 The internet architecture has operated including long haul
nets (Ethernet, ringnet, etc.), broadcast satellite nets (the
DARPA Atlantic Satellite Network) and packet radio networks.
 This flexibility is achieved due to minimum set of assumptions
network will provide.
 No. of services are not explicitly mentioned as it will be an
undesirable approach.
 Hence, engineering must be done once through TCP.
Copyright @ IGDTUW
D.A.R.P.A.
Defense Advanced
Research Projects Agency
Contents
1. Objective of Research Paper
2. Introduction
3. Fundamental goal
4. Second level goals
5. Survivability in the Face of Failure
6. Types of services
7. Varieties of networks
8. OTHER GOALS
9. Architecture and Implementation
10. Datagrams
11. TCP
12. Conclusion
Copyright @ IGDTUW
Other Goals
 Distributed management of the internet.
 Lack of sufficient tools for distributed management.
 Internet Architecture doesn’t produce cost effectiveness.
 Retransmission of Lost Packets.
 Problem arising from the use of host resident mechanism.
 Goal of accountability.
Copyright @ IGDTUW
D.A.R.P.A.
DEFENSE ADVANCED
RESEARCH
PROJECTS AGENCY
CONTENTS
1. OBJECTIVE OF RESEARCH PAPER
2. INTRODUCTION
3. FUNDAMENTAL GOAL
4. SECOND LEVEL GOALS
5. SURVIVABILITY IN THE FACE OF FAILURE
6. TYPES OF SERVICES
7. VARIETIES OF NETWORKS
8. OTHER GOALS
9. ARCHITECTURE AND IMPLEMENTATION
10.DATAGRAMS
11.TCP
12.CONCLUSION
Copyright @ IGDTUW
ARCHITECTURE AND
IMPLEMENTATION
• Flexibility in the different services.
• Relationship between Architecture and Performance is extremely
challenging.
• The other class of design aid is simulator.
Copyright @ IGDTUW
D.A.R.P.A.
Defense Advanced
Research Projects Agency
Contents
1. Objective of Research Paper
2. Introduction
3. Fundamental goal
4. Second level goals
5. Survivability in the Face of Failure
6. Types of services
7. Varieties of networks
8. Other Goals
9. Architecture and Implementation
10.DATAGRAMS
11. TCP
12. Conclusion
Copyright @ IGDTUW
DATAGRAMS
Internet fundamentally uses datagrams which is transported
across the network.
Why Datagram?
Reason 1: They eliminate the need for connection state within
the intermediate nodes.
Reason 2: The provide the variety of types of services.
Reason 3: It assumes minimum assumption, thus enabling wide
variety of networks to be incorporated.
Copyright @ IGDTUW
D.A.R.P.A.
Defense Advanced
Research Projects
Agency
Contents
1. Objective of Research Paper
2. Introduction
3. Fundamental goal
4. Second level goals
5. Survivability in the Face of Failure
6. Types of services
7. Varieties of networks
8. Other Goals
9. Architecture and Implementation
10. Datagrams
12. Conclusion
Copyright @ IGDTUW
CONCLUSION
 The protocols are widely used in the commercial and military
environment.
 At the same time, we felt that priorities of the designer do not match the
needs of the actual users.
 More attention must be paid to accounting, resource management and
operations of regions with separate administrations are needed.
 Also, there may be a better building block than the datagram for the next
generation of architecture.
Copyright @ IGDTUW
THANKING
YOU Yansi Keim
Sonali Tyagi

More Related Content

What's hot

(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDNAndry Ansah
 
Switching concepts Data communication and networks
Switching concepts Data communication and networksSwitching concepts Data communication and networks
Switching concepts Data communication and networksNt Arvind
 
Random Oracle Model & Hashing - Cryptography & Network Security
Random Oracle Model & Hashing - Cryptography & Network SecurityRandom Oracle Model & Hashing - Cryptography & Network Security
Random Oracle Model & Hashing - Cryptography & Network SecurityMahbubur Rahman
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key ExchangeSAURABHDHAGE6
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication ApplicationVidulatiwari
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suiteYash Kotak
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wiresharkBasaveswar Kureti
 
Hierarchical clustering.pptx
Hierarchical clustering.pptxHierarchical clustering.pptx
Hierarchical clustering.pptxNTUConcepts1
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.pptZaheer720515
 

What's hot (20)

(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN(Mikrotik)MTCNA presentation Material-IDN
(Mikrotik)MTCNA presentation Material-IDN
 
Clustering.pptx
Clustering.pptxClustering.pptx
Clustering.pptx
 
Switching concepts Data communication and networks
Switching concepts Data communication and networksSwitching concepts Data communication and networks
Switching concepts Data communication and networks
 
Chapter 31
Chapter 31Chapter 31
Chapter 31
 
Random Oracle Model & Hashing - Cryptography & Network Security
Random Oracle Model & Hashing - Cryptography & Network SecurityRandom Oracle Model & Hashing - Cryptography & Network Security
Random Oracle Model & Hashing - Cryptography & Network Security
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
K mean-clustering
K mean-clusteringK mean-clustering
K mean-clustering
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Ccna4
Ccna4Ccna4
Ccna4
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
Hierarchical clustering.pptx
Hierarchical clustering.pptxHierarchical clustering.pptx
Hierarchical clustering.pptx
 
WPA2
WPA2WPA2
WPA2
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 

Similar to DARPA Internet Protocol Design Philosophy

A Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentA Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentCSCJournals
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing TechonologiesKathirvel Ayyaswamy
 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIANsmittal121
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
 
Bt 72 computer networks
Bt 72 computer networksBt 72 computer networks
Bt 72 computer networksPadam Thapa
 
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
An Event-based Middleware for Syntactical Interoperability  in Internet of Th...An Event-based Middleware for Syntactical Interoperability  in Internet of Th...
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...ijceronline
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSamantha Randall
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
CN_lecture1.ppt
CN_lecture1.pptCN_lecture1.ppt
CN_lecture1.pptrajucs
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksKumailImran1
 
lecture1_computer_networks_Introduction.ppt
lecture1_computer_networks_Introduction.pptlecture1_computer_networks_Introduction.ppt
lecture1_computer_networks_Introduction.pptSATHYANARAYANAKB
 
Da3210751081
Da3210751081Da3210751081
Da3210751081IJMER
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYEditor IJMTER
 
Extending TCP the Major Protocol of Transport Layer
Extending TCP the Major Protocol of Transport LayerExtending TCP the Major Protocol of Transport Layer
Extending TCP the Major Protocol of Transport LayerScientific Review
 
Extending TCP the Major Protocol of Transport Layer
Extending TCP the Major Protocol of Transport LayerExtending TCP the Major Protocol of Transport Layer
Extending TCP the Major Protocol of Transport LayerScientific Review SR
 

Similar to DARPA Internet Protocol Design Philosophy (20)

A Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentA Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing Environment
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIAN
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2
 
Lan network with Redundancy
Lan network with RedundancyLan network with Redundancy
Lan network with Redundancy
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Bt 72 computer networks
Bt 72 computer networksBt 72 computer networks
Bt 72 computer networks
 
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
An Event-based Middleware for Syntactical Interoperability  in Internet of Th...An Event-based Middleware for Syntactical Interoperability  in Internet of Th...
An Event-based Middleware for Syntactical Interoperability in Internet of Th...
 
Cn sylb reg 2017
Cn sylb reg 2017Cn sylb reg 2017
Cn sylb reg 2017
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
CN_lecture1.ppt
CN_lecture1.pptCN_lecture1.ppt
CN_lecture1.ppt
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
lecture1_computer_networks_Introduction.ppt
lecture1_computer_networks_Introduction.pptlecture1_computer_networks_Introduction.ppt
lecture1_computer_networks_Introduction.ppt
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
 
MANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEYMANAGING ORGANISATION USING VPN's : A SURVEY
MANAGING ORGANISATION USING VPN's : A SURVEY
 
Extending TCP the Major Protocol of Transport Layer
Extending TCP the Major Protocol of Transport LayerExtending TCP the Major Protocol of Transport Layer
Extending TCP the Major Protocol of Transport Layer
 
Extending TCP the Major Protocol of Transport Layer
Extending TCP the Major Protocol of Transport LayerExtending TCP the Major Protocol of Transport Layer
Extending TCP the Major Protocol of Transport Layer
 

More from Yansi Keim

Different climatic regions of the world
Different climatic regions of the worldDifferent climatic regions of the world
Different climatic regions of the worldYansi Keim
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentalsYansi Keim
 
Introduction to Facebook
Introduction to FacebookIntroduction to Facebook
Introduction to FacebookYansi Keim
 
Using Smartphones
Using SmartphonesUsing Smartphones
Using SmartphonesYansi Keim
 
WWW and web browser
WWW and web browserWWW and web browser
WWW and web browserYansi Keim
 
Security economics
Security economicsSecurity economics
Security economicsYansi Keim
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on TwitterYansi Keim
 
Vartman samaz mein vigyapan ka mahatv
Vartman samaz mein vigyapan ka mahatvVartman samaz mein vigyapan ka mahatv
Vartman samaz mein vigyapan ka mahatvYansi Keim
 
Sleeping beauty
Sleeping beautySleeping beauty
Sleeping beautyYansi Keim
 
Virtualization
VirtualizationVirtualization
VirtualizationYansi Keim
 
Virtualization
VirtualizationVirtualization
VirtualizationYansi Keim
 
Mobile Communication Generation
Mobile Communication GenerationMobile Communication Generation
Mobile Communication GenerationYansi Keim
 

More from Yansi Keim (16)

Citrix
CitrixCitrix
Citrix
 
Different climatic regions of the world
Different climatic regions of the worldDifferent climatic regions of the world
Different climatic regions of the world
 
E commerce
E commerceE commerce
E commerce
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Introduction to Facebook
Introduction to FacebookIntroduction to Facebook
Introduction to Facebook
 
Using Smartphones
Using SmartphonesUsing Smartphones
Using Smartphones
 
WWW and web browser
WWW and web browserWWW and web browser
WWW and web browser
 
Security economics
Security economicsSecurity economics
Security economics
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on Twitter
 
Vartman samaz mein vigyapan ka mahatv
Vartman samaz mein vigyapan ka mahatvVartman samaz mein vigyapan ka mahatv
Vartman samaz mein vigyapan ka mahatv
 
Sleeping beauty
Sleeping beautySleeping beauty
Sleeping beauty
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
BitCoins
BitCoinsBitCoins
BitCoins
 
Mobile Communication Generation
Mobile Communication GenerationMobile Communication Generation
Mobile Communication Generation
 
Docker
DockerDocker
Docker
 

Recently uploaded

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

DARPA Internet Protocol Design Philosophy

  • 1. “The Design Philosophy of the DARPA Internet Protocols” - David D. Clark, 1988 Presented By: Yansi Keim, Sonali Tyagi 0302052015, 03102052015 M.Tech, 1st Semester Information Security Management Presented To: Mr. Vivekanand Jha Asst. Professor Dept. of Computer Science and Engineering Copyright @ IGDTUW
  • 2. D.A.R.P.A. Defense Advanced Research Projects Agency Contents 1. OBJECTIVE OF RESEARCH PAPER 2. Introduction 3. Fundamental Goal 4. Second Level Goals 5. Survivability in the Face of Failure 6. Types of Services 7. Varieties of Networks 8. Other Goals 9. Architecture and Implementation 10. Datagrams 11. TCP 12. Conclusion Copyright @ IGDTUW
  • 3. The research paper attempts to describe the Internet Protocol Suite, i.e. TCP/IP as why it is like that? The paper catalogs the original objective of the Internet Architecture. Objective of Research Paper Copyright @ IGDTUW
  • 4. D.A.R.P.A. Defense Advanced Research Projects Agency Contents 1. Objective of Research Paper 2. INTRODUCTION 3. Fundamental Goal 4. Second Level Goals 5. Survivability in the Face of Failure 6. Types of Services 7. Varieties of Networks 8. Other Goals 9. Architecture and Implementation 10. Datagrams 11. TCP 12. Conclusion Copyright @ IGDTUW
  • 5. Introduction  TCP/IP, introduced 15 years ago by DARPA, by U.S. Department of Defense has been used extensively in military and commercial systems.  TCP/IP are now standards for internetworking have influenced ISO protocols.  A new extension challenges the existing design principles. Copyright @ IGDTUW
  • 6. D.A.R.P.A. DEFENSE ADVANCED RESEARCH PROJECTS AGENCY Contents 1. Objective of Research Paper 2. Introduction 4. Second Level Goals 5. Survivability in the Face of Failure 6. Types of Services 7. Varieties of Networks 8. Other Goals 9. Architecture and Implementation 10. Datagrams 11. TCP 12. Conclusion Copyright @ IGDTUW
  • 7. Fundamental Goal of DARPA  To develop an effective technique for multiplexed utilization of existing interconnecting networks.  Technique for Multiplexing: Packet Switching.  Technique for Interconnecting: Store and Forward Packet Switching. Copyright @ IGDTUW Fundamental Structure of DARPA  A packet switched communication in which number of networks are connected together using gateways which implements store and forward algorithm.
  • 8. D.A.R.P.A. Defense Advanced Research Projects Agency Contents 1. Objective of Research Paper 2. Introduction 3. Fundamental goal 5. Survivability in the Face of Failure 6. Types of Services 7. Verities of Networks 8. Other Goals 9. Architecture and Implementation 10. Datagrams 11. TCP 12. Conclusion Copyright @ IGDTUW
  • 9. Second Level Goals  1. Internet communication must continue despite loss of n/w or gateways. 2.Must support multiple types of communication services. 3. Must accommodate a variety of n/w 4. distributed management of its resources. 5. cost effective 6. permit host attachment with low level of effort. 7.resources must be accountable. Copyright @ IGDTUW
  • 10. D.A.R.P.A. Defense Advanced Research Projects Agency Contents 1. Objective of Research Paper 2. Introduction 3. Fundamental goal 4. Second level goals 5. SURVIVABILITY IN THE FACE OF FAILURE 6. Types of Services 7. Varieties of Networks 8. Other Goals 9. Architecture and Implementation 10. Datagrams 11. TCP 12. Conclusion Copyright @ IGDTUW
  • 11. SURVIVABILITY IN THE FACE OF FAILURE  Communication b/w two entities should never lost.  Synchronization should be there  to achieve Synchronization State Of Info must be protected.  SOI is no. of packets transmitted, no. of packets acknowledge.  In some n/w SOI is stored in intermediate packet switching nodes.  Fate sharing : take info and gather it at the end point of the net. Copyright @ IGDTUW
  • 12. D.A.R.P.A. DEFENSE ADVANCED RESEARCH PROJECTS AGENCY CONTENTS 1. OBJECTIVE OF RESEARCH PAPER 2. INTRODUCTION 3. FUNDAMENTAL GOAL 4. SECOND LEVEL GOALS 5. SURVIVABILITY IN THE FACE OF FAILURE 6.TYPES OF SERVICES 7. VARIETIES OF NETWORKS 8. OTHER GOALS 9. ARCHITECTURE AND IMPLEMENTATION 10.DATAGRAMS 11.TCP 12.CONCLUSION Copyright @ IGDTUW
  • 13. TYPES OF SERVICES  Traditional types of service is bi-directional reliable delivery of data. Also sometimes called as “Virtual Circuit” served through TCP.  Initially TCP was thought to have supported full range of services, but later it was found too difficult to accommodate all in one protocol.  Those services failing to incorporate are XNET, Delivery of Digitized Speech.  Thus it was early decided, more than one transport service would be required.  TCP and IP, separated into two layers. Copyright @ IGDTUW
  • 14. D.A.R.P.A. Defense Advanced Research Projects Agency Contents 1. Objective of Research Paper 2. Introduction 3. Fundamental goal 4. Second level goals 5. Survivability in the Face of Failure 6. Types of services 7. VARIETIES OF NETWORKS 8. Other Goals 9. Architecture and Implementation 10. Datagrams 11. TCP 12. Conclusion Copyright @ IGDTUW
  • 15. Varieties of Networks  The internet architecture has operated including long haul nets (Ethernet, ringnet, etc.), broadcast satellite nets (the DARPA Atlantic Satellite Network) and packet radio networks.  This flexibility is achieved due to minimum set of assumptions network will provide.  No. of services are not explicitly mentioned as it will be an undesirable approach.  Hence, engineering must be done once through TCP. Copyright @ IGDTUW
  • 16. D.A.R.P.A. Defense Advanced Research Projects Agency Contents 1. Objective of Research Paper 2. Introduction 3. Fundamental goal 4. Second level goals 5. Survivability in the Face of Failure 6. Types of services 7. Varieties of networks 8. OTHER GOALS 9. Architecture and Implementation 10. Datagrams 11. TCP 12. Conclusion Copyright @ IGDTUW
  • 17. Other Goals  Distributed management of the internet.  Lack of sufficient tools for distributed management.  Internet Architecture doesn’t produce cost effectiveness.  Retransmission of Lost Packets.  Problem arising from the use of host resident mechanism.  Goal of accountability. Copyright @ IGDTUW
  • 18. D.A.R.P.A. DEFENSE ADVANCED RESEARCH PROJECTS AGENCY CONTENTS 1. OBJECTIVE OF RESEARCH PAPER 2. INTRODUCTION 3. FUNDAMENTAL GOAL 4. SECOND LEVEL GOALS 5. SURVIVABILITY IN THE FACE OF FAILURE 6. TYPES OF SERVICES 7. VARIETIES OF NETWORKS 8. OTHER GOALS 9. ARCHITECTURE AND IMPLEMENTATION 10.DATAGRAMS 11.TCP 12.CONCLUSION Copyright @ IGDTUW
  • 19. ARCHITECTURE AND IMPLEMENTATION • Flexibility in the different services. • Relationship between Architecture and Performance is extremely challenging. • The other class of design aid is simulator. Copyright @ IGDTUW
  • 20. D.A.R.P.A. Defense Advanced Research Projects Agency Contents 1. Objective of Research Paper 2. Introduction 3. Fundamental goal 4. Second level goals 5. Survivability in the Face of Failure 6. Types of services 7. Varieties of networks 8. Other Goals 9. Architecture and Implementation 10.DATAGRAMS 11. TCP 12. Conclusion Copyright @ IGDTUW
  • 21. DATAGRAMS Internet fundamentally uses datagrams which is transported across the network. Why Datagram? Reason 1: They eliminate the need for connection state within the intermediate nodes. Reason 2: The provide the variety of types of services. Reason 3: It assumes minimum assumption, thus enabling wide variety of networks to be incorporated. Copyright @ IGDTUW
  • 22. D.A.R.P.A. Defense Advanced Research Projects Agency Contents 1. Objective of Research Paper 2. Introduction 3. Fundamental goal 4. Second level goals 5. Survivability in the Face of Failure 6. Types of services 7. Varieties of networks 8. Other Goals 9. Architecture and Implementation 10. Datagrams 12. Conclusion Copyright @ IGDTUW
  • 23. CONCLUSION  The protocols are widely used in the commercial and military environment.  At the same time, we felt that priorities of the designer do not match the needs of the actual users.  More attention must be paid to accounting, resource management and operations of regions with separate administrations are needed.  Also, there may be a better building block than the datagram for the next generation of architecture. Copyright @ IGDTUW