SlideShare uma empresa Scribd logo
1 de 10
Introduction to
TCP/IP Part 1
What is a Protocol?

 o rules of politeness in different types of social situations.

w how to act -- when to speak, when to listen, how to dress, etc.

 h the same. A protocol is a set of rules that tell devices on a network




                              C3PO, a noted
                              expert on etiquette
                              and protocol.
The TCP/IP Suite

f protocols that make up the Internet, and is also standard on nearly

protocol. Rather, it is a “suite” or set of many protocols that all work

ts two most important protocols:



              TCP
              Transmission
              Control Protocol
                                                  IP
                                   Internet Protocol
Transmission Control Protocol
o establish a stable connection and exchange data.

smaller chunks suitable for transmission over the network (packets).

hat each packet is properly delivered, and places packets in the corre

ressing system – no means of finding another host. This is what IP pr
                                                                   p
Transmission Control Protocol
ht of as numbered portals on your computer through which a specific

ypically uses port 80 to exchange information.

transport layer.
Internet Protocol

em of addressing. (That's why we call them IP addresses.)

osing TCP packets in IP datagrams.

n needed to get the packet from its source to its destination. Think of

 networks is called internetworking. Not coincidentally, this ability is
Internet Protocol

were received. It has no error correction. This is what TCP provides.
 ere

 etween devices. This is also provided by TCP.

hat address a letter needs to go to and how to get it there. After it's d

e network layer.
An IP Address

dable form of a standard IP address follows the following format:

                      192.168.1.5
 separated by a period. Each number can have up to three digits.
mbers can be less than 0. None of the numbers can be greater than 2
dress is expressed in binary – it is a string of four 8-bit binary numbe
you do about binary, why can't any number go higher than 255?
IP version 6

des for about 4.3 billion addresses. In January of 2011, we officially us
 es                                                                    u
s 128-bits and can provide up to 3.4 x 1038 (or 340,282,366,920,938,
over previous versions of IP.


000:0004
Terms to Remember

              protocol
               TCP/IP
          internetworking
Transmission Control Protocol (TCP)
       Internet Protocol (IP)
               packet
                 port
             IP address
            IP datagram
                IPv4
                IPv6

Mais conteúdo relacionado

Mais procurados

Internet Overview
Internet OverviewInternet Overview
Internet OverviewCTIN
 
Internet protocol
Internet protocolInternet protocol
Internet protocolOnline
 
What is a static ip address
What is a static ip addressWhat is a static ip address
What is a static ip addressHexa Howe
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6Adeel Rasheed
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002suvobgd
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingBisrat Girma
 
Ip addressing comp
Ip addressing compIp addressing comp
Ip addressing compsafi Ullah
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)junnubabu
 

Mais procurados (20)

Internet Overview
Internet OverviewInternet Overview
Internet Overview
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Arpwatch
ArpwatchArpwatch
Arpwatch
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
What is a static ip address
What is a static ip addressWhat is a static ip address
What is a static ip address
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Ip4 vs ip6
Ip4 vs ip6Ip4 vs ip6
Ip4 vs ip6
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 
Ipv4
Ipv4Ipv4
Ipv4
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
 
Ip addressing comp
Ip addressing compIp addressing comp
Ip addressing comp
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Internet protocol (ip)
Internet protocol (ip)Internet protocol (ip)
Internet protocol (ip)
 

Destaque

Sleeve & Ball Bearing Operational Characteristics
Sleeve & Ball Bearing Operational CharacteristicsSleeve & Ball Bearing Operational Characteristics
Sleeve & Ball Bearing Operational CharacteristicsJMCproducts
 
Mag final
Mag finalMag final
Mag finalYo Hann
 
Edu 610 Final Project Differentiated Instruction Powerpoint With Sound
Edu 610   Final Project  Differentiated Instruction Powerpoint With SoundEdu 610   Final Project  Differentiated Instruction Powerpoint With Sound
Edu 610 Final Project Differentiated Instruction Powerpoint With Soundkduggan2
 

Destaque (7)

La sécurité sur internet
La sécurité sur internetLa sécurité sur internet
La sécurité sur internet
 
Cartellsjoan m
Cartellsjoan mCartellsjoan m
Cartellsjoan m
 
Sleeve & Ball Bearing Operational Characteristics
Sleeve & Ball Bearing Operational CharacteristicsSleeve & Ball Bearing Operational Characteristics
Sleeve & Ball Bearing Operational Characteristics
 
Diigo55
Diigo55Diigo55
Diigo55
 
Mag final
Mag finalMag final
Mag final
 
Edu 610 Final Project Differentiated Instruction Powerpoint With Sound
Edu 610   Final Project  Differentiated Instruction Powerpoint With SoundEdu 610   Final Project  Differentiated Instruction Powerpoint With Sound
Edu 610 Final Project Differentiated Instruction Powerpoint With Sound
 
Ap6532 ss
Ap6532 ssAp6532 ss
Ap6532 ss
 

Semelhante a Intro tcpip-part1

Semelhante a Intro tcpip-part1 (20)

07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
I.p. protocol
I.p. protocolI.p. protocol
I.p. protocol
 
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
 
C14-TCPIP.ppt
C14-TCPIP.pptC14-TCPIP.ppt
C14-TCPIP.ppt
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
IP Address
IP AddressIP Address
IP Address
 
Lecture 04
Lecture 04Lecture 04
Lecture 04
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
TCPIP
TCPIPTCPIP
TCPIP
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
Ip
IpIp
Ip
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Tcp presentation
Tcp presentationTcp presentation
Tcp presentation
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
 

Último

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 

Último (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 

Intro tcpip-part1

  • 2. What is a Protocol? o rules of politeness in different types of social situations. w how to act -- when to speak, when to listen, how to dress, etc. h the same. A protocol is a set of rules that tell devices on a network C3PO, a noted expert on etiquette and protocol.
  • 3. The TCP/IP Suite f protocols that make up the Internet, and is also standard on nearly protocol. Rather, it is a “suite” or set of many protocols that all work ts two most important protocols: TCP Transmission Control Protocol IP Internet Protocol
  • 4. Transmission Control Protocol o establish a stable connection and exchange data. smaller chunks suitable for transmission over the network (packets). hat each packet is properly delivered, and places packets in the corre ressing system – no means of finding another host. This is what IP pr p
  • 5. Transmission Control Protocol ht of as numbered portals on your computer through which a specific ypically uses port 80 to exchange information. transport layer.
  • 6. Internet Protocol em of addressing. (That's why we call them IP addresses.) osing TCP packets in IP datagrams. n needed to get the packet from its source to its destination. Think of networks is called internetworking. Not coincidentally, this ability is
  • 7. Internet Protocol were received. It has no error correction. This is what TCP provides. ere etween devices. This is also provided by TCP. hat address a letter needs to go to and how to get it there. After it's d e network layer.
  • 8. An IP Address dable form of a standard IP address follows the following format: 192.168.1.5 separated by a period. Each number can have up to three digits. mbers can be less than 0. None of the numbers can be greater than 2 dress is expressed in binary – it is a string of four 8-bit binary numbe you do about binary, why can't any number go higher than 255?
  • 9. IP version 6 des for about 4.3 billion addresses. In January of 2011, we officially us es u s 128-bits and can provide up to 3.4 x 1038 (or 340,282,366,920,938, over previous versions of IP. 000:0004
  • 10. Terms to Remember protocol TCP/IP internetworking Transmission Control Protocol (TCP) Internet Protocol (IP) packet port IP address IP datagram IPv4 IPv6