SlideShare uma empresa Scribd logo
1 de 20
SUB: Computer System Security
Presented By
Mr. VIVEK TTRIATHI
ASSISTANT PROFESSOR
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
KCNIT,BANDA
What is TCP/IP Model?
 TCP/IP helps you to determine how a specific computer should be
connected to the internet and how data should be transmitted between them. It
helps you to create a virtual network when multiple computer networks are
connected together.
 TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is
specifically designed as a model to offer highly reliable and end-to-end byte
stream over an unreliable internetwork.
TCP Characteristics
Here, are the essential characteristics of TCP/IP protocol
 Support for a flexible architecture
 Adding more system to a network is easy.
 In TCP/IP, the network remains intact until the source, and
destination machines were functioning properly.
 TCP is a connection-oriented protocol.
 TCP offers reliability and ensures that data which arrives
out of sequence should put back into order.
 TCP allows you to implement flow control, so sender never
overpowers a receiver with data.
Four Layers of TCP/IP
TCP/IP Conceptual Layers
 The functionality of the TCP/IP model is divided into
four layers, and each includes specific protocols.
 TCP/IP is a layered server architecture system in which
each layer is defined according to a specific function
to perform. All these four layers work collaboratively to
transmit the data from one layer to another.
Differences between the OSI and
TCP/IP model:
Differences:
 OSI Model is developed by ISO
(International Standard Organization).
 TCP/IP model is developed by ARPANET (Advanced
Research Project Agency Network).
 OSI model provides a clear distinction between
interfaces, between services, interfaces, and protocols.
 TCP/IP doesn't have any clear distinguishing points
services, and protocols.
OSI refers to Open Systems Interconnection.
TCP refers to Transmission Control Protocol.
OSI uses the network layer to define routing standards
and protocols.
 TCP/IP uses only the Internet layer.
OSI follows a vertical approach.
TCP/IP follows a horizontal approach.
OSI is defined after the advent of the Internet.
It is defined before the advent of the internet.
In OSI The minimum size of the OSI header is 5 bytes.
In TCP/IP Minimum header size is 20 bytes.
Most Common TCP/IP Protocols
 Some widely used most common TCP/IP protocol are:
TCP:
 Transmission Control Protocol is an internet protocol
suite which breaks up the message into TCP Segments
and reassembling them at the receiving side.
IP:
 An Internet Protocol address that is also known as an IP
address is a numerical label. It is assigned to each device
that is connected to a computer network which uses the IP
for communication. Its routing function allows
internetworking and essentially establishes the Internet.
Combination of IP with a TCP allows developing a virtual
connection between a destination and a source.
HTTP:
 The Hypertext Transfer Protocol is a foundation of the
World Wide Web. It is used for transferring web pages and
other such resources from the HTTP server or web server to
the web client or the HTTP client. Whenever you use a web
browser like Google Chrome or Firefox, you are using a
web client. It helps HTTP to transfer web pages that you
request from the remote servers.
SMTP:
 SMTP stands for Simple mail transfer protocol. This
protocol supports the e-mail is known as a simple
mail transfer protocol. This protocol helps you to send
the data to another e-mail address.
SNMP:
 SNMP stands for Simple Network Management
Protocol. It is a framework which is used for managing
the devices on the internet by using the TCP/IP
protocol.
DNS:
 DNS stands for Domain Name System. An IP address
that is used to identify the connection of a host to the
internet uniquely. However, users prefer to use names
instead of addresses for that DNS.
TELNET:
 TELNET stands for Terminal Network. It establishes the
connection between the local and remote computer. It
established connection in such a manner that you can
simulate your local system at the remote system.
FTP:
 FTP stands for File Transfer Protocol. It is a mostly
used standard protocol for transmitting the files from
one machine to another.
Advantages of TCP/IP
Here, are pros/benefits of using the TCP/IP model:
 It helps you to establish/set up a connection between
different types of computers.
 It operates independently of the operating system.
 It supports many routing-protocols.
 It enables the internetworking between the organizations.
 TCP/IP model has a highly scalable client-server
architecture.
 It can be operated independently.
 Supports a number of routing protocols.
 It can be used to establish a connection between two
computers.
Disadvantages of TCP/IP
Here, are few drawbacks of using the TCP/IP model:
 TCP/IP is a complicated model to set up and manage.
 The shallow/overhead of TCP/IP is higher-than IPX
(Internetwork Packet Exchange).
 In this, model the transport layer does not guarantee
delivery of packets.
 Replacing protocol in TCP/IP is not easy.
 It has no clear separation from its services, interfaces,
and protocols.
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx

Mais conteúdo relacionado

Semelhante a CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx

Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer scienceAnushida1
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals Vikas Gupta
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityManishKumarH
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI modelsJake Weaver
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinitashach22
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control ProtocolAliHamza410
 

Semelhante a CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx (20)

Network protocals
Network protocalsNetwork protocals
Network protocals
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Protocols of network in computer science
Protocols of network in computer scienceProtocols of network in computer science
Protocols of network in computer science
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Tcp
TcpTcp
Tcp
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
TCP_IP.pptx
TCP_IP.pptxTCP_IP.pptx
TCP_IP.pptx
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
The TCP/IP and OSI models
The TCP/IP and OSI modelsThe TCP/IP and OSI models
The TCP/IP and OSI models
 
Mcse question
Mcse questionMcse question
Mcse question
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Deeps
DeepsDeeps
Deeps
 
Transmission Control Protocol
Transmission Control ProtocolTransmission Control Protocol
Transmission Control Protocol
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 

Último

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx

  • 1. SUB: Computer System Security Presented By Mr. VIVEK TTRIATHI ASSISTANT PROFESSOR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING KCNIT,BANDA
  • 2.
  • 3. What is TCP/IP Model?  TCP/IP helps you to determine how a specific computer should be connected to the internet and how data should be transmitted between them. It helps you to create a virtual network when multiple computer networks are connected together.  TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is specifically designed as a model to offer highly reliable and end-to-end byte stream over an unreliable internetwork.
  • 4. TCP Characteristics Here, are the essential characteristics of TCP/IP protocol  Support for a flexible architecture  Adding more system to a network is easy.  In TCP/IP, the network remains intact until the source, and destination machines were functioning properly.  TCP is a connection-oriented protocol.  TCP offers reliability and ensures that data which arrives out of sequence should put back into order.  TCP allows you to implement flow control, so sender never overpowers a receiver with data.
  • 5. Four Layers of TCP/IP
  • 6. TCP/IP Conceptual Layers  The functionality of the TCP/IP model is divided into four layers, and each includes specific protocols.  TCP/IP is a layered server architecture system in which each layer is defined according to a specific function to perform. All these four layers work collaboratively to transmit the data from one layer to another.
  • 7. Differences between the OSI and TCP/IP model:
  • 8. Differences:  OSI Model is developed by ISO (International Standard Organization).  TCP/IP model is developed by ARPANET (Advanced Research Project Agency Network).  OSI model provides a clear distinction between interfaces, between services, interfaces, and protocols.  TCP/IP doesn't have any clear distinguishing points services, and protocols.
  • 9. OSI refers to Open Systems Interconnection. TCP refers to Transmission Control Protocol. OSI uses the network layer to define routing standards and protocols.  TCP/IP uses only the Internet layer. OSI follows a vertical approach. TCP/IP follows a horizontal approach. OSI is defined after the advent of the Internet. It is defined before the advent of the internet. In OSI The minimum size of the OSI header is 5 bytes. In TCP/IP Minimum header size is 20 bytes.
  • 10. Most Common TCP/IP Protocols  Some widely used most common TCP/IP protocol are: TCP:  Transmission Control Protocol is an internet protocol suite which breaks up the message into TCP Segments and reassembling them at the receiving side.
  • 11. IP:  An Internet Protocol address that is also known as an IP address is a numerical label. It is assigned to each device that is connected to a computer network which uses the IP for communication. Its routing function allows internetworking and essentially establishes the Internet. Combination of IP with a TCP allows developing a virtual connection between a destination and a source.
  • 12. HTTP:  The Hypertext Transfer Protocol is a foundation of the World Wide Web. It is used for transferring web pages and other such resources from the HTTP server or web server to the web client or the HTTP client. Whenever you use a web browser like Google Chrome or Firefox, you are using a web client. It helps HTTP to transfer web pages that you request from the remote servers.
  • 13. SMTP:  SMTP stands for Simple mail transfer protocol. This protocol supports the e-mail is known as a simple mail transfer protocol. This protocol helps you to send the data to another e-mail address.
  • 14. SNMP:  SNMP stands for Simple Network Management Protocol. It is a framework which is used for managing the devices on the internet by using the TCP/IP protocol.
  • 15. DNS:  DNS stands for Domain Name System. An IP address that is used to identify the connection of a host to the internet uniquely. However, users prefer to use names instead of addresses for that DNS.
  • 16. TELNET:  TELNET stands for Terminal Network. It establishes the connection between the local and remote computer. It established connection in such a manner that you can simulate your local system at the remote system.
  • 17. FTP:  FTP stands for File Transfer Protocol. It is a mostly used standard protocol for transmitting the files from one machine to another.
  • 18. Advantages of TCP/IP Here, are pros/benefits of using the TCP/IP model:  It helps you to establish/set up a connection between different types of computers.  It operates independently of the operating system.  It supports many routing-protocols.  It enables the internetworking between the organizations.  TCP/IP model has a highly scalable client-server architecture.  It can be operated independently.  Supports a number of routing protocols.  It can be used to establish a connection between two computers.
  • 19. Disadvantages of TCP/IP Here, are few drawbacks of using the TCP/IP model:  TCP/IP is a complicated model to set up and manage.  The shallow/overhead of TCP/IP is higher-than IPX (Internetwork Packet Exchange).  In this, model the transport layer does not guarantee delivery of packets.  Replacing protocol in TCP/IP is not easy.  It has no clear separation from its services, interfaces, and protocols.