SlideShare a Scribd company logo
1 of 35
Internet Standards:
• It is a specification of technologies and methodologies related to the
Internet.
• Internet Engineering Task Force (IETF):
– Internet Standards are created and published by a body.
• Request For Comment (RFC):
– It is basically an Internet Standards or set of RFCs.
– An RFC, after going through several revisions, is accepted by an RFC editor.
• Internet Engineering Steering Group (IESG):
– It approves each RFC is identified by a unique integer.
– They can be found at http://www.ietf.org/rfc.html
– It helpful for all Internet Users.
• Example:
– Specifications for HTTP/1.0 and HTTP/1.1 can be found in RFC 1945 and 2616
respectively.
TCP/IP Protocol Suite:
• It is a set of protocols used in the Internet and
other communication networks.
• It creates the technical foundation of the
Internet.
• Two primary protocols:
• Transmission Control Protocol (TCP)
• Internet Protocol (IP)
• But it consists of many other protocols.
• Each of which deals with a set of issues that arise while
designing a communication network.
• According to RFC 1122, only four layers.
– Link layer
– Internet layer
– Transport layer
– Application layer
• Each layer provides a well-defined set of services to its
upper layer and uses services provided by its lower layer.
Communication between two
hosts using TCP/IP
Host-to-Host or Peer-to-Peer and N/W Interface or Link and Internet or Network
TCP/IP suite of protocols
Layer Protocols
Applicati
on
HTTP, SMTP, SSH, Telnet, SIP, Gopher, IMAP, SNIMP, Rlogin, POP3, DNS, SSL,
FTP
Transpor
t
TCP, UDP
Internet IP, ICMP, IGMP, OSPF, BGP, RIP,ARP, RARP
Link HDLC
Link Layer:
• This is the lower most layer in TCP/IP protocol suite.
• It deals with LAN (Local Area Network).
• It is responsible for transferring data from one machine
to another within the same local network.
• Primary Function:
– Framing
– Error Detection
– Error Correction
– Flow Control
– Error Control
– Medium Access Control
Internet Layer:
• It is to deliver packets from one network to
another.
• Routing:
• It determines a suitable route from the source
computer to the target and delivers packets
through this route.
• Purpose:
• It introduces an addressing mechanism called
IP addressing.
Transport Layer:
• It is end-to-end message transfer.
• Types of services to its upper layer:
– Connection-oriented:
• The segments of a message are delivered in order.
• The TCP in a TCP/IP protocol suite provides connection-
oriented service.
– Connection-less:
• No such guarantee is given.
• User Datagram Protocol provides connection-less
service.
• It also introduces port numbers to identify
processes that run in a computer.
• It should also implement the following
optional tasks:
– Segmentation
– Flow Control
– Error Control
– Congestion Control
Application Layer:
• This is the layer that users actually interact
with.
• It provides interfaces to users for network
communication.
• Example:
• It provides an interface using which users can
transfer files from one computer to another
computer
IP Addresses:
• What is an IP Address?
– An IP address is a 32 bit sequence of 1’s and 0’s.
– A way to identify a machines on a network.
– TCP/IP protocol suite assigns a unique address.
– IP version 4, an IP address is a 32 bit binary number.
Purpose
Identifying a
host/network interface
Location addressing
Dotted Decimal Notation:
• IP addresses using 4 decimal numbers, each
representing 8 bits.
• The range 0 to 255.
• It separate by three dots (.).
• Example:
• IP Address: 203.197.107.107
• Binary Form:
11001011.11000101.01101011.01101011
• Growth of internet, a new system IPv6 was
introduced uses 128 bit address.
Part of an IP Address:
– Network Part:
• It identifies the network part is same for all hosts
belonging to the same network
– Host Part:
• The number of bits in the host part determines the
number of possible hosts within the network uniquely.
Classes for IP Address:
Class
es
Starts with 1st
Octet in Binary
Range ID Reserved
Network Host
Class
A
0XXXXXXX 0 to 127 or 1 to
126
W (8) x, y, z
(24)
Governments
Class
B
10XXXXXX 128 to 191 w, x (16) y, z
(16)
Medium
Companies
Class
C
110XXXXX 192 to 223 w, x, y (24) Z (8) Small
Companies
Class
D
1110XXXX 224 to 239 Reserved
for
Multicast
- Multicasting
Class
E
1111XXXX 240 to 255 Reserved
for
Experiment
- Future Use
Class D and E are reserved for research purpose but aren’t
used.
Classless Inter-Domain Routing:
• It creating allocation for IP Address blocks and
new rules of routing protocol using IPv4
addresses was implemented.
• Introduced: Variable-length network ID
• Result: Moderate utilization of IP addresses
• A network consisting of consecutive IP addresses
is very often represented as X/Y.
• Subnet ID: where X is the first IP address in the
series
• Network ID: where Y is the number of bits in this
field.
Example:
• 203.197.107.96/28 having 28 bits in the network ID.
• It means host ID field has 4 (32-28) bits.
• So, possible IP addresses in this subnet is 16 (24).
• They are 203.197.107.96-203.197.107.111.
• Out of these 16 addresses, only 14 (16-2) can be
assigned to hosts.
• First - 203.197.107.96 and Second - 203.197.107.111.
• It is used as subnet’s IP address and broadcast IP
address.
IP Address:
The concept of classful IP address isn’t used in practice.
It is only used in the technical jargon in network
administrator’s.
IPv4 Private Addresses:
• What is IPv4?
• IPv4 (Internet Protocol Version 4)
used to identify devices on a
network through an addressing
system.
• It uses 32-bit address scheme
allowing for a total of 2^32
addresses (just over 4 million
addresses).
• It including computers, smartphones
and game consoles – connect to the
internet requires an address.
• Early Network Design:
• IP addresses assigned to particular computers or
network devices were intended to be unique for global
end-to-end communication.
• It is exhausted quickly.
• So, there was a tremendous demand to find a way out
from this IPv4 address exhaustion.
• It was released that IP addresses used by the computers
in private networks need not be unique.
• So, Computers are not connected to the Internet.
• Example:
• Factory machines that communicate only with each
other via TCP/IP, need not have unique addresses.
Network Range Number of addresses
10.0.0.08/ (1 class A
network)
10.0.0.0 -
10.255.255.255
16,777,216
172.16.0.0/12 (16 class B
network)
172.16.0.0 -
172.313.255.255
1,048,576
192.168.0.0/16 (256 class C
network)
192.168.0.0 -
192.168.255.255
65,536
• Three ranges of IPv4 addresses for private networks.
• One range for each class (A, B, C) were reserved in RFC 1918.
• Theses addresses are not routed on Internet and use need not be
coordinated with an IP address registry.
• Today, Private networks typically connect to the Internet through
Network Address Translation (NAT).
MIME (Multipurpose Internet Mail
Extension):• Simple Mail Transfer
Protocol:
– It is important and
frequently used
protocol in TCP/IP
protocol suite.
– It is used to deliver
electronic mails (E
mail).
– SMTP was designed
to transfer only text
messages.
MIME
MIME extends the format of
following of
email supports:
• Text in character sets other that
ASCII
• Non text attachments.
• Message bodies with multiple
parts.
• Header information in non ASCII
character sets.
Sending Large Message:
• When sending a large message, it splits them into small parts is called
multi part message.
• Peoples written emails can be transmitted through this SMTP in MIME
format.
• This format is specified as a part of HTTP/1.1.
• MIME has grown beyond and describing the content of email to describing
content type.
– content type = multipart /related
– content type = multipart/mixed
Example:
– In communication protocol like HTTP for WWW.
– HTTP requires data transmitted in context of email like messages but data
aren’t actually text.
Important:
– MIME use character encodings other than ASCII, and 8-bit binary content.
– Mapping message into and out of MIME format is typically done automatically
by e-mail or mail servers when sending or receiving e-mail to the internet.
Cyber Laws:
• Cyber Laws is a system of law and regulation for the cyber space.
• It refers to all the legal and regulatory aspects of the Internet and the
applicable to WWW.
Cyber Law-The Law of Internet & WWW:
 The number of users doubling using the Internet every 100 days
 New and sensitive issues related to various legal aspects of
cyberspace began cropping up.
 A new and highly specialized branch of law came into existence
Example:
Cyber crimes involves traditional criminal activities such as theft,
fraud, forgery, defamation and mischief. It can be categorized into two
types:
Categories of Cyber Crime:
Using computers as a
tool
Computers are used to attack other
computers.
It includes hacking, virus/worm attacks,
DOS attacks, denial of service attacks,
Trojan attacks, etc.
Using computers as a
weapon
Computers are used as a weapon.
It includes credit card frauds,
email spoofing, email spamming,
email bombing, cyber terrorism,
EFT frauds, etc.

More Related Content

What's hot (20)

CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
world wide web
world wide webworld wide web
world wide web
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
Application layer
Application layerApplication layer
Application layer
 
Internet
InternetInternet
Internet
 
COMPUTER NETWORKS UNIT 5
COMPUTER NETWORKS UNIT 5COMPUTER NETWORKS UNIT 5
COMPUTER NETWORKS UNIT 5
 
Network layer
Network layerNetwork layer
Network layer
 
The HTTP and Web
The HTTP and Web The HTTP and Web
The HTTP and Web
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Web technologies: HTTP
Web technologies: HTTPWeb technologies: HTTP
Web technologies: HTTP
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer network
 
HTTP & HTML & Web
HTTP & HTML & WebHTTP & HTML & Web
HTTP & HTML & Web
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layer
 
5 introduction to internet
5 introduction to internet5 introduction to internet
5 introduction to internet
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
introduction for web connectivity (IoT)
introduction for web connectivity (IoT)introduction for web connectivity (IoT)
introduction for web connectivity (IoT)
 
Web hosting Introduction- MilesWeb
Web hosting  Introduction- MilesWebWeb hosting  Introduction- MilesWeb
Web hosting Introduction- MilesWeb
 
Internet
InternetInternet
Internet
 

Similar to Internet Standards and TCP/IP Protocol Suite

Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxDESTROYER39
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxsahilraturi
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)Nitesh Singh
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-finalTaymoor Nazmy
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial junaidahmedsaba
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in detailsapel7
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
Configuring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptxConfiguring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptxNanetteMaraonSansano1
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptxKushalSrivastava23
 

Similar to Internet Standards and TCP/IP Protocol Suite (20)

Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Computer networks
Computer networksComputer networks
Computer networks
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Unit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptxUnit-1 Introduction to WWW and Network.pptx
Unit-1 Introduction to WWW and Network.pptx
 
Internetworking
InternetworkingInternetworking
Internetworking
 
New tcp-ip model
New tcp-ip modelNew tcp-ip model
New tcp-ip model
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Configuring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptxConfiguring-Computer-Systems-and-Networks.pptx
Configuring-Computer-Systems-and-Networks.pptx
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 

More from SSN College of Engineering, Kalavakkam

More from SSN College of Engineering, Kalavakkam (20)

ECG
ECG ECG
ECG
 
Localization, Classification, and Evaluation.pdf
Localization, Classification, and Evaluation.pdfLocalization, Classification, and Evaluation.pdf
Localization, Classification, and Evaluation.pdf
 
ADBMS 3a
ADBMS   3aADBMS   3a
ADBMS 3a
 
Exercise 5
Exercise   5Exercise   5
Exercise 5
 
ADBMS Unit-II c
ADBMS Unit-II cADBMS Unit-II c
ADBMS Unit-II c
 
ADBMS Unit-II b
ADBMS Unit-II bADBMS Unit-II b
ADBMS Unit-II b
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
 
Unit III - Inventory Problems
Unit III - Inventory ProblemsUnit III - Inventory Problems
Unit III - Inventory Problems
 
Unit II B - Game Theory
Unit II B - Game TheoryUnit II B - Game Theory
Unit II B - Game Theory
 
Unit II A - Game Theory
Unit II A - Game TheoryUnit II A - Game Theory
Unit II A - Game Theory
 
Unit V - Queuing Theory
Unit V - Queuing TheoryUnit V - Queuing Theory
Unit V - Queuing Theory
 
Unit IV-Project Management
Unit IV-Project ManagementUnit IV-Project Management
Unit IV-Project Management
 
Unit I-B
Unit I-BUnit I-B
Unit I-B
 
Unit I-A
Unit I-AUnit I-A
Unit I-A
 
Web technology Unit-II Part-C
Web technology Unit-II Part-CWeb technology Unit-II Part-C
Web technology Unit-II Part-C
 
Data structure Unit-I Part-C
Data structure Unit-I Part-CData structure Unit-I Part-C
Data structure Unit-I Part-C
 
Data structure unit I part B
Data structure unit I part BData structure unit I part B
Data structure unit I part B
 
Data structure Unit-I Part A
Data structure Unit-I Part AData structure Unit-I Part A
Data structure Unit-I Part A
 
Web technology Unit-I Part D - message format
Web technology Unit-I  Part D - message formatWeb technology Unit-I  Part D - message format
Web technology Unit-I Part D - message format
 
Web technology unit I - Part A
Web technology unit I -  Part AWeb technology unit I -  Part A
Web technology unit I - Part A
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Internet Standards and TCP/IP Protocol Suite

  • 1. Internet Standards: • It is a specification of technologies and methodologies related to the Internet. • Internet Engineering Task Force (IETF): – Internet Standards are created and published by a body. • Request For Comment (RFC): – It is basically an Internet Standards or set of RFCs. – An RFC, after going through several revisions, is accepted by an RFC editor. • Internet Engineering Steering Group (IESG): – It approves each RFC is identified by a unique integer. – They can be found at http://www.ietf.org/rfc.html – It helpful for all Internet Users. • Example: – Specifications for HTTP/1.0 and HTTP/1.1 can be found in RFC 1945 and 2616 respectively.
  • 2. TCP/IP Protocol Suite: • It is a set of protocols used in the Internet and other communication networks. • It creates the technical foundation of the Internet. • Two primary protocols: • Transmission Control Protocol (TCP) • Internet Protocol (IP) • But it consists of many other protocols.
  • 3.
  • 4. • Each of which deals with a set of issues that arise while designing a communication network. • According to RFC 1122, only four layers. – Link layer – Internet layer – Transport layer – Application layer • Each layer provides a well-defined set of services to its upper layer and uses services provided by its lower layer.
  • 6.
  • 7. Host-to-Host or Peer-to-Peer and N/W Interface or Link and Internet or Network
  • 8. TCP/IP suite of protocols Layer Protocols Applicati on HTTP, SMTP, SSH, Telnet, SIP, Gopher, IMAP, SNIMP, Rlogin, POP3, DNS, SSL, FTP Transpor t TCP, UDP Internet IP, ICMP, IGMP, OSPF, BGP, RIP,ARP, RARP Link HDLC
  • 9. Link Layer: • This is the lower most layer in TCP/IP protocol suite. • It deals with LAN (Local Area Network). • It is responsible for transferring data from one machine to another within the same local network. • Primary Function: – Framing – Error Detection – Error Correction – Flow Control – Error Control – Medium Access Control
  • 10. Internet Layer: • It is to deliver packets from one network to another. • Routing: • It determines a suitable route from the source computer to the target and delivers packets through this route. • Purpose: • It introduces an addressing mechanism called IP addressing.
  • 11. Transport Layer: • It is end-to-end message transfer. • Types of services to its upper layer: – Connection-oriented: • The segments of a message are delivered in order. • The TCP in a TCP/IP protocol suite provides connection- oriented service. – Connection-less: • No such guarantee is given. • User Datagram Protocol provides connection-less service.
  • 12. • It also introduces port numbers to identify processes that run in a computer. • It should also implement the following optional tasks: – Segmentation – Flow Control – Error Control – Congestion Control
  • 13. Application Layer: • This is the layer that users actually interact with. • It provides interfaces to users for network communication. • Example: • It provides an interface using which users can transfer files from one computer to another computer
  • 14.
  • 15. IP Addresses: • What is an IP Address? – An IP address is a 32 bit sequence of 1’s and 0’s. – A way to identify a machines on a network. – TCP/IP protocol suite assigns a unique address. – IP version 4, an IP address is a 32 bit binary number. Purpose Identifying a host/network interface Location addressing
  • 16. Dotted Decimal Notation: • IP addresses using 4 decimal numbers, each representing 8 bits. • The range 0 to 255. • It separate by three dots (.). • Example: • IP Address: 203.197.107.107 • Binary Form: 11001011.11000101.01101011.01101011 • Growth of internet, a new system IPv6 was introduced uses 128 bit address.
  • 17. Part of an IP Address: – Network Part: • It identifies the network part is same for all hosts belonging to the same network – Host Part: • The number of bits in the host part determines the number of possible hosts within the network uniquely.
  • 18. Classes for IP Address: Class es Starts with 1st Octet in Binary Range ID Reserved Network Host Class A 0XXXXXXX 0 to 127 or 1 to 126 W (8) x, y, z (24) Governments Class B 10XXXXXX 128 to 191 w, x (16) y, z (16) Medium Companies Class C 110XXXXX 192 to 223 w, x, y (24) Z (8) Small Companies Class D 1110XXXX 224 to 239 Reserved for Multicast - Multicasting Class E 1111XXXX 240 to 255 Reserved for Experiment - Future Use Class D and E are reserved for research purpose but aren’t used.
  • 19.
  • 20.
  • 21.
  • 22. Classless Inter-Domain Routing: • It creating allocation for IP Address blocks and new rules of routing protocol using IPv4 addresses was implemented. • Introduced: Variable-length network ID • Result: Moderate utilization of IP addresses • A network consisting of consecutive IP addresses is very often represented as X/Y. • Subnet ID: where X is the first IP address in the series • Network ID: where Y is the number of bits in this field.
  • 23. Example: • 203.197.107.96/28 having 28 bits in the network ID. • It means host ID field has 4 (32-28) bits. • So, possible IP addresses in this subnet is 16 (24). • They are 203.197.107.96-203.197.107.111. • Out of these 16 addresses, only 14 (16-2) can be assigned to hosts. • First - 203.197.107.96 and Second - 203.197.107.111. • It is used as subnet’s IP address and broadcast IP address. IP Address: The concept of classful IP address isn’t used in practice. It is only used in the technical jargon in network administrator’s.
  • 24. IPv4 Private Addresses: • What is IPv4? • IPv4 (Internet Protocol Version 4) used to identify devices on a network through an addressing system. • It uses 32-bit address scheme allowing for a total of 2^32 addresses (just over 4 million addresses). • It including computers, smartphones and game consoles – connect to the internet requires an address.
  • 25. • Early Network Design: • IP addresses assigned to particular computers or network devices were intended to be unique for global end-to-end communication. • It is exhausted quickly. • So, there was a tremendous demand to find a way out from this IPv4 address exhaustion. • It was released that IP addresses used by the computers in private networks need not be unique. • So, Computers are not connected to the Internet. • Example: • Factory machines that communicate only with each other via TCP/IP, need not have unique addresses.
  • 26.
  • 27.
  • 28. Network Range Number of addresses 10.0.0.08/ (1 class A network) 10.0.0.0 - 10.255.255.255 16,777,216 172.16.0.0/12 (16 class B network) 172.16.0.0 - 172.313.255.255 1,048,576 192.168.0.0/16 (256 class C network) 192.168.0.0 - 192.168.255.255 65,536 • Three ranges of IPv4 addresses for private networks. • One range for each class (A, B, C) were reserved in RFC 1918. • Theses addresses are not routed on Internet and use need not be coordinated with an IP address registry. • Today, Private networks typically connect to the Internet through Network Address Translation (NAT).
  • 29.
  • 30.
  • 31. MIME (Multipurpose Internet Mail Extension):• Simple Mail Transfer Protocol: – It is important and frequently used protocol in TCP/IP protocol suite. – It is used to deliver electronic mails (E mail). – SMTP was designed to transfer only text messages.
  • 32. MIME MIME extends the format of following of email supports: • Text in character sets other that ASCII • Non text attachments. • Message bodies with multiple parts. • Header information in non ASCII character sets.
  • 33. Sending Large Message: • When sending a large message, it splits them into small parts is called multi part message. • Peoples written emails can be transmitted through this SMTP in MIME format. • This format is specified as a part of HTTP/1.1. • MIME has grown beyond and describing the content of email to describing content type. – content type = multipart /related – content type = multipart/mixed Example: – In communication protocol like HTTP for WWW. – HTTP requires data transmitted in context of email like messages but data aren’t actually text. Important: – MIME use character encodings other than ASCII, and 8-bit binary content. – Mapping message into and out of MIME format is typically done automatically by e-mail or mail servers when sending or receiving e-mail to the internet.
  • 34. Cyber Laws: • Cyber Laws is a system of law and regulation for the cyber space. • It refers to all the legal and regulatory aspects of the Internet and the applicable to WWW. Cyber Law-The Law of Internet & WWW:  The number of users doubling using the Internet every 100 days  New and sensitive issues related to various legal aspects of cyberspace began cropping up.  A new and highly specialized branch of law came into existence Example: Cyber crimes involves traditional criminal activities such as theft, fraud, forgery, defamation and mischief. It can be categorized into two types:
  • 35. Categories of Cyber Crime: Using computers as a tool Computers are used to attack other computers. It includes hacking, virus/worm attacks, DOS attacks, denial of service attacks, Trojan attacks, etc. Using computers as a weapon Computers are used as a weapon. It includes credit card frauds, email spoofing, email spamming, email bombing, cyber terrorism, EFT frauds, etc.