SlideShare uma empresa Scribd logo
1 de 19
TCP/IP
Objective: Understand the Basic Concepts of Protocols and Get to know
the basics of TCP/IP (the building blocks of the Web)
Communications Architecture: Introduction
‱ Communications functions can be divided into subset
activities
concept of layered communications
‱ Each activity can be looked as a layer
– A layer provides a specific service (function) to other layers
– A layer has a specific protocol (control messages) to connect to other
systems
‱ Two standards:
– IBM’s proprietary SNA
– ISO’s Reference Model for Open Systems Interconnection (OSI model)
The OSI Model
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Lower Layer
connects one node
to another
Layer Function
Network Choosing the next node and the link
to it
Data Link Controls the flow of messages on the
chosen link
Physical Connecting to the physical medium
that provides the link
Upper Layer
directly assist the
user
Layer Function
Application Provides services directly to an
application program
Presentation Presentation of information to
user in a format that the user
will understand
Session Controls the user to user
dialogue – its direction and
synchronization
Transport Raises the quality of service
provided by the network to the
level required by user
The Internet Protocol Suite
Application
Transport
Network
Link
Physical Fiber
Telnet DNS
UDPTCP
IP
Ethernet Wi-Fi
Co-ax
HTTP
Radio
TCP/IP
Transmission Control Protocol/Internet
Protocol
TCP/IP allows networks of different types to interconnect
Inter-net Protocol & Internet Addresses
‱ Network layer protocol whose job is to send packets or
datagrams to send packets from one point to another
‱ Each destination is specified by an IP address
– IPv4: Each address has 4 8 bit numbers
– Represented in dotted decimal places
– A 8 bit number can represent 0-255 in decimal place
– A typical number therefore looks like 209.176.20.9
– IPv6 allows a larger number of addresses (among other advantages)
‱ IP Addresses: Static or Dynamic
– Static useful on infrastructure situations
– Dynamic addresses changes everytime a machine logs on
– Dynamic addresses are most often assigned by Dynamic Host Configuration
Protocol (DHCP)
IP Characteristics
‱ IP is a connectionless protocol
– No concept of a job or a session (each packet is treated as an entity in itself)
‱ IP is an unreliable protocol
– It is unconcerned with whether a packet reaches its eventual destination, or
whether they arrive in the original order
– IP cannot tell if packets were lost or whether they were received out of order
‱ IP packets are not identified as a part of a sequence or
belonging to a particular job.
IP Packet Header
Version Header length Service type Total length
Identification Flags Fragment Offset
Time to live Protocol Header checksum
Source address
Destination address
IP Options Padding
‱ The protocol field in the header information identifies which higher level
TCP/IP protocol sent the data. When data arrives at its destination this field
tells IP which protocol module to pass it on to.
‱The time-to-live (TTL) field, specifies how long the packet is allowed to reamin
in the internet delivery system and is decremented by by every router that the
packet passes through. When it reaches zero the packet is discarded and the
sender. This prevents packets from traveling the Internet forever.
‱The checksum is an error detection checksum covering only the fields of the
header.
ARP & ICMP: Accompanying Protocols
‱ Address Resolution Protocol (ARP) finds out the physical
address corresponding to an IP address
– When an IP Packet is received, an ARP request is brodcasted on the network.
When a host recognizes an ARP request containing its own IP address, it sends
an ARP reply containing its hardware address. This address is cached.
– There is also a Reverse ARP (RARP) protocol. This is used by a host to find out
its own IP address if it has no way of doing this except via the network.
‱ Internet Control Message Protocol:
– Defines the format of control messages that are sent to the sender indicating
that a problem has occurred
TCP Characteristics
‱ TCP is a connection-oriented protocol
– The client & the server must establish a connection before any data can be
transferred between them.
‱ TCP provides reliability
– TCP knows that data it sends is received at the other end, and that it is
received correctly.
– TCP uses checksums on both headers and data.
‱ TCP ensure Data which arrives out of sequence is put back
into order
‱ TCP also implements flow control, so a sender cannot
overwhelm a receiver with data.
TCP Packet Header
Source Port Destination Port
Sequence Number
Acknowledgement Number
Header Length Code Bits Window
Checksum Urgent pointer
Options Padding
‱ TCP sends data using IP, in blocks which are called segments.
‱The Port number identifies a particular user within a machine (which is
identified by the IP address
‱ The sequence number identifies the position in the data stream
‱The acknowledgement number is used to convey back to the sender that data
has been received correctly.
‱The window size gives the number of bytes the receiver can accept.
‱The checksum covers both header and data
‱The urgent pointer identifies the start of data in the stream that must be
processed urgently.
What is a Port?
‱ Refers in this context a software port
‱ Multiple applications or upper layer protocols may use TCP
simultaneously
– Ports are used to map TP data to a specific process
– The combination of an IP address and a port number is called a socket
– Sockets can be full duplex (data transmitted in both directions) or half duplex
‱ Typical Port numbers:
– 20/21 FTP
– 23 Telnet
– 25 Simple Mail Transfer Protocol
– 37 Time
– 53 Domain Name System
– 80 HTTP
– 110 POP3
– 443 HTTPS
TCP Communication: Making a Connection
‱ A connection must be established before any data is sent
‱ Segments are only sent between client and server if there is data to
flow.
‱ No status polling takes place.
‱ To Start:
– The server listens out for connection requests.
– The client requests a connection by sending specifying its own port number and
the port that it wants to connect to .
– The SYN (synchronize sequence numbers) flag is set and the client’s initial data
sequence number is specified.
‱ Next:
– The server responds with a segment in which the header contains its own initial
data sequence number.
‱ To complete the connection :
– the client acknowledges the server’s data sequence number by sending back a
segment with the ACK flag set and the acknowledgement field containing the
server’s data sequence number plus one.
TCP Communication: Data Transmission
‱ TCP is a sliding window protocol, and does not wait for
acknowledgement
‱ To prevent overflow of receiver buffer:
– An acknowledgement is sent containing the with the window size set to zero.
– Later a windows update is sent, specifying the new window size.
‱ For efficiency:
– TCP can specify an acknowledgement delay in the hope that within that time
some data will need to be sent the other way, and the two can ride together
– The Nagle algorithm allows a TCP segment containing less data than the
receiver’s advertised window size can only be sent if the previous segment has
been acknowledged. This allows aggregation of small amounts of data
TCP Communication: Error Correction
‱ In error situations TCP can:
– detect whether data has been successfully received at the other end
– take steps to rectify the situation.
– inform the sending application of the problem and failure, if all else fails,
‱ Data lost or corrupted.
– TCP keeps track of the acknowledgements for the data it sends.
– If an acknowledgement is not received within an specified time data is resent
– Time interval TCP will wait before depends on the connection speed (The protocol
monitors the time it normally takes to receive an acknowledgement)
– Data is resent repeatedly, at ever-increasing intervals, until either a response is
received or an application timeout value is exceeded
‱ Deadlock of flow
– a receiver stops the data flow by setting its window size to zero and the window
update segment that is meant to start data flowing again is lost.
– To prevent deadlock from occurring, TCP sends out window probe messages at
regular intervals to query the receiver about its window size.
TCP Communication: Communication Closure
‱ Each direction of data flow must be closed down separately.
‱ Steps:
– One end of the connection sends a segment in which the FIN (finished sending
data) flag is set.
– The receipt of this segment is acknowledged,
– The receiving end notifies its application that the other end has closed that
half of the connection.
User Datagram Protocol
‱ UDP is a simple protocol
‱ UDP is unreliable and connectionless
– A connection with a host is not necessary before exchanging data
– No mechanism for ensuring that data sent is received
‱ Main function is to specify the upper layer protocols
‱ Useful for broadcasting since it does not require a connection
UDP Packet Header
Source Port Destination Port
Message length Checksum
‱Two different application one using UDP and another using TCP may use the
same port number. The two data streams are distinguished by the protocol
field in the IP address header
‱The checksum is optional.
Unicast, Broadcast, Multicast
Unicast
One sender – one
receiver
Broadcast
Sends data to all
possible receivers
Multicast
Sends data to
interested receivers
Applications of IP Multicast:
Pay TV
File Transfer
Financial Information
But is complex to implement

Mais conteĂșdo relacionado

Mais procurados

TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Transport layer
Transport layer Transport layer
Transport layer Mukesh Chinta
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)Vivek Kumar
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmTechStudent1
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayerLal Bahadur Gehlot
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring Hareem Naz
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 

Mais procurados (20)

TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Transport layer
Transport layer Transport layer
Transport layer
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Osi model
Osi modelOsi model
Osi model
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Ethernet
EthernetEthernet
Ethernet
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Error control
Error controlError control
Error control
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Tcp
TcpTcp
Tcp
 

Destaque

Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP ModelAnkur Kumar
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP AddressingRitul Sonania
 
OSI Network model ppt
OSI Network model pptOSI Network model ppt
OSI Network model pptextraganesh
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basicssanjoysanyal
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
TCP Model
TCP ModelTCP Model
TCP Modelmanojkum22
 

Destaque (13)

Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
Osi model
Osi modelOsi model
Osi model
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 
OSI Network model ppt
OSI Network model pptOSI Network model ppt
OSI Network model ppt
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
TCP Model
TCP ModelTCP Model
TCP Model
 
OSI Model
OSI ModelOSI Model
OSI Model
 

Semelhante a TCP /IP

Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocolN.Jagadish Kumar
 
TCPIP SLIDES.ppt
TCPIP SLIDES.pptTCPIP SLIDES.ppt
TCPIP SLIDES.pptaymenshykh
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
Lecture set 7
Lecture set 7Lecture set 7
Lecture set 7Gopi Saiteja
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxDESTROYER39
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxsarosh32
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxRonoh Kennedy
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
tcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxtcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxAlphaKoiSylvester
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP PresentationHarish Chand
 
Tcp ip presentation
Tcp ip presentationTcp ip presentation
Tcp ip presentationSatya P. Joshi
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesRhydham Joshi
 
Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptxpoonamsngr
 

Semelhante a TCP /IP (20)

Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
TCPIP SLIDES.ppt
TCPIP SLIDES.pptTCPIP SLIDES.ppt
TCPIP SLIDES.ppt
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Lecture set 7
Lecture set 7Lecture set 7
Lecture set 7
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
 
08 coms 525 tcpip - tcp 1
08   coms 525 tcpip - tcp 108   coms 525 tcpip - tcp 1
08 coms 525 tcpip - tcp 1
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Mod4
Mod4Mod4
Mod4
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
tcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxtcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptx
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
TCP/IP & UDP
TCP/IP & UDPTCP/IP & UDP
TCP/IP & UDP
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Tcp ip presentation
Tcp ip presentationTcp ip presentation
Tcp ip presentation
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
 
Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptx
 

Mais de VIKAS SINGH BHADOURIA

Principles of programming languages. Detail notes
Principles of programming languages. Detail notesPrinciples of programming languages. Detail notes
Principles of programming languages. Detail notesVIKAS SINGH BHADOURIA
 
Improve your communication skills
Improve your communication skillsImprove your communication skills
Improve your communication skillsVIKAS SINGH BHADOURIA
 
Speed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-camerasSpeed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-camerasVIKAS SINGH BHADOURIA
 
Next generation graphics programming on xbox 360
Next generation graphics programming on xbox 360Next generation graphics programming on xbox 360
Next generation graphics programming on xbox 360VIKAS SINGH BHADOURIA
 
Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer VIKAS SINGH BHADOURIA
 
Interactive voice-response-system
Interactive voice-response-systemInteractive voice-response-system
Interactive voice-response-systemVIKAS SINGH BHADOURIA
 
Introduction to parallel computing
Introduction to parallel computingIntroduction to parallel computing
Introduction to parallel computingVIKAS SINGH BHADOURIA
 
Parallel computing persentation
Parallel computing persentationParallel computing persentation
Parallel computing persentationVIKAS SINGH BHADOURIA
 
Full report on light peak technology
Full report on light peak technologyFull report on light peak technology
Full report on light peak technologyVIKAS SINGH BHADOURIA
 

Mais de VIKAS SINGH BHADOURIA (20)

Virtualization
VirtualizationVirtualization
Virtualization
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
EDGE DETECTION
EDGE DETECTIONEDGE DETECTION
EDGE DETECTION
 
Complete course on wireless
Complete course on wirelessComplete course on wireless
Complete course on wireless
 
Principles of programming languages. Detail notes
Principles of programming languages. Detail notesPrinciples of programming languages. Detail notes
Principles of programming languages. Detail notes
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Improve your communication skills
Improve your communication skillsImprove your communication skills
Improve your communication skills
 
Infrared spectroscopy
Infrared spectroscopy   Infrared spectroscopy
Infrared spectroscopy
 
Speed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-camerasSpeed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-cameras
 
Next generation graphics programming on xbox 360
Next generation graphics programming on xbox 360Next generation graphics programming on xbox 360
Next generation graphics programming on xbox 360
 
Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer Fingerprint based physical access control vehicle immobilizer
Fingerprint based physical access control vehicle immobilizer
 
Intelligent agents
Intelligent agentsIntelligent agents
Intelligent agents
 
Interactive voice-response-system
Interactive voice-response-systemInteractive voice-response-system
Interactive voice-response-system
 
Data compression
Data compressionData compression
Data compression
 
Brain computer-interface-ppt
Brain computer-interface-pptBrain computer-interface-ppt
Brain computer-interface-ppt
 
Trees
TreesTrees
Trees
 
Introduction to parallel computing
Introduction to parallel computingIntroduction to parallel computing
Introduction to parallel computing
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileip
 
Parallel computing persentation
Parallel computing persentationParallel computing persentation
Parallel computing persentation
 
Full report on light peak technology
Full report on light peak technologyFull report on light peak technology
Full report on light peak technology
 

Último

Low Rate Call Girls Kolkata Avani đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani đŸ€Œ  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani đŸ€Œ  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔☆9289244007✔☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔☆9289244007✔☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔☆9289244007✔☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔☆9289244007✔☆ Female E...SofiyaSharma5
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 

Último (20)

Low Rate Call Girls Kolkata Avani đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani đŸ€Œ  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani đŸ€Œ  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani đŸ€Œ 8250192130 🚀 Vip Call Girls Kolkata
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔☆9289244007✔☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔☆9289244007✔☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔☆9289244007✔☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔☆9289244007✔☆ Female E...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In South Ex đŸ“± 9999965857 đŸ€© Delhi đŸ«Š HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex đŸ“±  9999965857  đŸ€© Delhi đŸ«Š HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex đŸ“±  9999965857  đŸ€© Delhi đŸ«Š HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex đŸ“± 9999965857 đŸ€© Delhi đŸ«Š HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 

TCP /IP

  • 1. TCP/IP Objective: Understand the Basic Concepts of Protocols and Get to know the basics of TCP/IP (the building blocks of the Web)
  • 2. Communications Architecture: Introduction ‱ Communications functions can be divided into subset activities concept of layered communications ‱ Each activity can be looked as a layer – A layer provides a specific service (function) to other layers – A layer has a specific protocol (control messages) to connect to other systems ‱ Two standards: – IBM’s proprietary SNA – ISO’s Reference Model for Open Systems Interconnection (OSI model)
  • 3. The OSI Model 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical Lower Layer connects one node to another Layer Function Network Choosing the next node and the link to it Data Link Controls the flow of messages on the chosen link Physical Connecting to the physical medium that provides the link Upper Layer directly assist the user Layer Function Application Provides services directly to an application program Presentation Presentation of information to user in a format that the user will understand Session Controls the user to user dialogue – its direction and synchronization Transport Raises the quality of service provided by the network to the level required by user
  • 4. The Internet Protocol Suite Application Transport Network Link Physical Fiber Telnet DNS UDPTCP IP Ethernet Wi-Fi Co-ax HTTP Radio
  • 5. TCP/IP Transmission Control Protocol/Internet Protocol TCP/IP allows networks of different types to interconnect
  • 6. Inter-net Protocol & Internet Addresses ‱ Network layer protocol whose job is to send packets or datagrams to send packets from one point to another ‱ Each destination is specified by an IP address – IPv4: Each address has 4 8 bit numbers – Represented in dotted decimal places – A 8 bit number can represent 0-255 in decimal place – A typical number therefore looks like 209.176.20.9 – IPv6 allows a larger number of addresses (among other advantages) ‱ IP Addresses: Static or Dynamic – Static useful on infrastructure situations – Dynamic addresses changes everytime a machine logs on – Dynamic addresses are most often assigned by Dynamic Host Configuration Protocol (DHCP)
  • 7. IP Characteristics ‱ IP is a connectionless protocol – No concept of a job or a session (each packet is treated as an entity in itself) ‱ IP is an unreliable protocol – It is unconcerned with whether a packet reaches its eventual destination, or whether they arrive in the original order – IP cannot tell if packets were lost or whether they were received out of order ‱ IP packets are not identified as a part of a sequence or belonging to a particular job.
  • 8. IP Packet Header Version Header length Service type Total length Identification Flags Fragment Offset Time to live Protocol Header checksum Source address Destination address IP Options Padding ‱ The protocol field in the header information identifies which higher level TCP/IP protocol sent the data. When data arrives at its destination this field tells IP which protocol module to pass it on to. ‱The time-to-live (TTL) field, specifies how long the packet is allowed to reamin in the internet delivery system and is decremented by by every router that the packet passes through. When it reaches zero the packet is discarded and the sender. This prevents packets from traveling the Internet forever. ‱The checksum is an error detection checksum covering only the fields of the header.
  • 9. ARP & ICMP: Accompanying Protocols ‱ Address Resolution Protocol (ARP) finds out the physical address corresponding to an IP address – When an IP Packet is received, an ARP request is brodcasted on the network. When a host recognizes an ARP request containing its own IP address, it sends an ARP reply containing its hardware address. This address is cached. – There is also a Reverse ARP (RARP) protocol. This is used by a host to find out its own IP address if it has no way of doing this except via the network. ‱ Internet Control Message Protocol: – Defines the format of control messages that are sent to the sender indicating that a problem has occurred
  • 10. TCP Characteristics ‱ TCP is a connection-oriented protocol – The client & the server must establish a connection before any data can be transferred between them. ‱ TCP provides reliability – TCP knows that data it sends is received at the other end, and that it is received correctly. – TCP uses checksums on both headers and data. ‱ TCP ensure Data which arrives out of sequence is put back into order ‱ TCP also implements flow control, so a sender cannot overwhelm a receiver with data.
  • 11. TCP Packet Header Source Port Destination Port Sequence Number Acknowledgement Number Header Length Code Bits Window Checksum Urgent pointer Options Padding ‱ TCP sends data using IP, in blocks which are called segments. ‱The Port number identifies a particular user within a machine (which is identified by the IP address ‱ The sequence number identifies the position in the data stream ‱The acknowledgement number is used to convey back to the sender that data has been received correctly. ‱The window size gives the number of bytes the receiver can accept. ‱The checksum covers both header and data ‱The urgent pointer identifies the start of data in the stream that must be processed urgently.
  • 12. What is a Port? ‱ Refers in this context a software port ‱ Multiple applications or upper layer protocols may use TCP simultaneously – Ports are used to map TP data to a specific process – The combination of an IP address and a port number is called a socket – Sockets can be full duplex (data transmitted in both directions) or half duplex ‱ Typical Port numbers: – 20/21 FTP – 23 Telnet – 25 Simple Mail Transfer Protocol – 37 Time – 53 Domain Name System – 80 HTTP – 110 POP3 – 443 HTTPS
  • 13. TCP Communication: Making a Connection ‱ A connection must be established before any data is sent ‱ Segments are only sent between client and server if there is data to flow. ‱ No status polling takes place. ‱ To Start: – The server listens out for connection requests. – The client requests a connection by sending specifying its own port number and the port that it wants to connect to . – The SYN (synchronize sequence numbers) flag is set and the client’s initial data sequence number is specified. ‱ Next: – The server responds with a segment in which the header contains its own initial data sequence number. ‱ To complete the connection : – the client acknowledges the server’s data sequence number by sending back a segment with the ACK flag set and the acknowledgement field containing the server’s data sequence number plus one.
  • 14. TCP Communication: Data Transmission ‱ TCP is a sliding window protocol, and does not wait for acknowledgement ‱ To prevent overflow of receiver buffer: – An acknowledgement is sent containing the with the window size set to zero. – Later a windows update is sent, specifying the new window size. ‱ For efficiency: – TCP can specify an acknowledgement delay in the hope that within that time some data will need to be sent the other way, and the two can ride together – The Nagle algorithm allows a TCP segment containing less data than the receiver’s advertised window size can only be sent if the previous segment has been acknowledged. This allows aggregation of small amounts of data
  • 15. TCP Communication: Error Correction ‱ In error situations TCP can: – detect whether data has been successfully received at the other end – take steps to rectify the situation. – inform the sending application of the problem and failure, if all else fails, ‱ Data lost or corrupted. – TCP keeps track of the acknowledgements for the data it sends. – If an acknowledgement is not received within an specified time data is resent – Time interval TCP will wait before depends on the connection speed (The protocol monitors the time it normally takes to receive an acknowledgement) – Data is resent repeatedly, at ever-increasing intervals, until either a response is received or an application timeout value is exceeded ‱ Deadlock of flow – a receiver stops the data flow by setting its window size to zero and the window update segment that is meant to start data flowing again is lost. – To prevent deadlock from occurring, TCP sends out window probe messages at regular intervals to query the receiver about its window size.
  • 16. TCP Communication: Communication Closure ‱ Each direction of data flow must be closed down separately. ‱ Steps: – One end of the connection sends a segment in which the FIN (finished sending data) flag is set. – The receipt of this segment is acknowledged, – The receiving end notifies its application that the other end has closed that half of the connection.
  • 17. User Datagram Protocol ‱ UDP is a simple protocol ‱ UDP is unreliable and connectionless – A connection with a host is not necessary before exchanging data – No mechanism for ensuring that data sent is received ‱ Main function is to specify the upper layer protocols ‱ Useful for broadcasting since it does not require a connection
  • 18. UDP Packet Header Source Port Destination Port Message length Checksum ‱Two different application one using UDP and another using TCP may use the same port number. The two data streams are distinguished by the protocol field in the IP address header ‱The checksum is optional.
  • 19. Unicast, Broadcast, Multicast Unicast One sender – one receiver Broadcast Sends data to all possible receivers Multicast Sends data to interested receivers Applications of IP Multicast: Pay TV File Transfer Financial Information But is complex to implement