SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Downloaden Sie, um offline zu lesen
Introduction to
TCP/IP
Michael Lamont
Chief Technology Officer
Introduction
 TCP/IP is a set of data transfer protocols used by
modern data networks
 Data network: a group of computers and other devices
that communicate over a shared medium
 Data & requests for data are transmitted between
computers over the network
 Physical transmission mediums can be copper cables,
fiber optics, or radio waves
Basic Network Functionality
 BOS1 transmits data to BOS2
 BOS2 receives and interprets data from BOS1
 BOS2 transmits data back to BOS1
BOS1 BOS2
Applications
 An application lets a computer interact with other
computers by performing a specific set of tasks
 The application is responsible for managing the
transmitting and receiving of data required to perform
its tasks
 The application has to be able to communicate with
applications on other networked computers for it to be
useful
Applications
 A network protocol is a set of rules for how
applications intercommunicate
Application Data Flow
Application
Application Layer
Transport Layer
Internet Layer
Net Access Layer
Network
Application
Application Layer
Transport Layer
Internet Layer
Net Access Layer
Applications
 A network protocol is a set of rules for how
applications intercommunicate
 Common applications include:
• SMTP, IMAP, and POP (email)
• HTTP (web)
• SSH (secure access)
• NFS and FTP (file transfer)
TCP/IP
 The protocols that make up TCP/IP define:
• How data is transmitted across a network
• How data should be formatted so other networked systems
can understand it
 TCP/IP provides a complete system for formatting,
transmitting, and receiving data on a network
TCP/IP
 A TCP/IP implementation is a software package that
handles all of the formatting, transmitting, and
receiving of data
 Process Software’s MultiNet and TCPware packages let
OpenVMS systems participate in data networks
The Internet
 TCP/IP is the standard for modern data
communications across all networks
 In the 1970s, two kinds of networks were being
developed:
• Local area networks (LANs)
• ARPAnet
ARPAnet
 Dept of Defense grew
concerned that their
critical command-and-
control systems were
balkanized in late 1960s
ARPAnet
 DoD had small groups of
networked systems, but
they used proprietary
protocols
 Generally, only systems
from the same
manufacturer could be
networked together
ARPAnet
 As the DoD became more reliant on computers, they
desperately needed everything on one big network
 DoD knew this network would be a primary target for
the Soviets
 Key requirement: the network had to be decentralized,
with no single point of failure
 The network had to stay up in the face of a large-scale
nuclear attack
ARPAnet
 Defense’s Advanced
Research Projects Agency
(ARPA) was tasked to
design and build this new
style of network
 ARPAnet’s protocols
provided the basis for
TCP/IP
The Internet
 In mid-1970s National Science Foundation wanted to
network universities and research institutions
 NSF built off of ARPAnet’s design and protocols to
create the Internet
Decentralized Data Networking
 TCP/IP’s decentralized nature is a key reason it’s still
ubiquitous today
 Two key TCP/IP features support decentralization:
• End node verification: the two endpoints of any data transfer
are responsible for making sure it was successful – no
centralized control scheme
• Dynamic routing: End nodes can transfer data over multiple
paths, and the network chooses the best (fastest, most
reliable) path for each individual data transfer
Local Area Networks
 LAN technology was being developed in parallel to
ARPAnet and the Internet
 Early LANs were highly proprietary and didn’t support
the concept of a larger network (like the Internet)
 Vendor lock-in was rampant
Local Area Networks
 The wide adoption of open interconnectivity protocols
in the R&D community spilled over into corporations
 TCP/IP was a proven solution that could make a
company’s disparate systems/networks all work
together
 Growing popularity of the Internet also spilled over
into corporations
 Email was the original “killer app”
Local Area Networks
 Some LAN vendors started with a step in the right
direction: gateways between their proprietary
protocols and TCP/IP
 Any LAN technology that survives today provides native
TCP/IP support
5 Core Networking Problems
 Addressing
 Routing
 Name resolution
 Flow control
 Interoperability
Physical Addressing
 Every network-connected
hardware device has a
unique ID
 This physical ID is
“burned” into the device
when it’s fabricated
Physical
Address
Physical Addressing
 Guaranteed to be unique from the beginning to the
end of the Internet’s existence
 Referred to as a MAC (Machine Access Code)
 Low-level TCP/IP protocols use MAC addresses to move
data across the physical network to the right device
Physical Addressing
 You can think of MAC addresses like phone numbers
 On very small networks, nodes can just blindly dump
data onto the physical network
 Every node has to examine every transmission and
figure out which data is meant for it
Physical Addressing
 “Dump and parse” quickly exceeds hardware
capabilities as network size increases
 Trying that scheme on the Internet would exceed
physics-imposed limits
 Most addressing schemes that work with physical
addresses can’t scale beyond very small networks
Logical Addressing
 Routers are special network devices that let you divide
large networks into smaller subnets
 A well-designed network uses routers to create a tree-
like structure
 The hierarchy of routers lets data travel between
nodes without hitting every other node on the network
Logical Addressing
 TCP/IP provides native support for logical addressing
 IP Address: logical address configured in a node’s
TCP/IP implementation
 IP addresses can be broken down into network, subnet,
and host ID numbers:
143.192. 168. 227
Routing
 Routers are specialized devices that move data across
networks
 Routers use the logical address information in a data
packet to send it to its destination
 Routers isolate a subnet’s traffic from the entire
network
 Data transmitted between systems on the same subnet
isn’t transmitted across the larger network
Routing
 Keeps unnecessary traffic
from cluttering up the
entire network
 Data traffic destined for a
system outside the
subnet is transmitted as
far up the network as it
needs to go
Larger
Network
Routing
 Large networks have lots
of routers and multiple
possible paths between
nodes
 TCP/IP specifies how
routers should pick the
best path across a
network
RoutersRouters
Name Resolution
 Logical IP addresses are “friendlier” than physical MAC
addresses, but still aren’t really human readable
 Domain Names: structured, user friendly system
names provided by TCP/IP
 Examples of domain names:
• www.process.com
• mail.wku.edu
• travel.state.gov
Name Resolution
 Name Resolution: the
process of mapping
logical addresses back
and forth into domain
names
Name Resolution
 Special name servers store the mapping information in
databases
 TCP/IP’s Domain Name Service (DNS) provides a
hierarchy of name servers that handle name resolution
for the Internet
Error Checking & Flow Control
 Several features integrated into TCP/IP guarantee
reliable data transfers:
• All data transmissions are checked for corruption and missing
data
• All data transmissions are positively acknowledged by the
receiving node
• In-band flow control so any system involved in a data
transmission can control the rate at which data is sent
Application Support
 Key feature of modern networks is ability to run
multiple network apps simultaneously
 Ports: logical channels provided by TCP/IP that allow
multiple applications to access the network
simultaneously
 Ports identified by unique numbers
Ports
App
TCP
Internet Layer
Net Access Layer
Network
UDP
App
App
App
App
Ports
Standards Organizations
 TCP/IP is based on open and complete standards
 Standards guarantee interoperability of network
software and hardware
 Several standards organizations are responsible for
developing and maintaining TCP/IP’s standards
Standards Organizations
 Internet Architecture
Board (IAB)
 Sets general policies for
the Internet
 Manages development of
data protocols and
standards
Standards Organizations
 Internet Engineering Task
Force (IETF)
 R&D organization that
develops Internet
standards
 Composed of working
groups that focus on a
particular area
Standards Organizations
 Internet Corporation for
Assigned Names and
Numbers (ICANN)
 Manages IP addresses,
domain names, and port
numbers
Standards Organizations
 Requests for Comments (RFC): standards published by
the IETF
 Every part of TCP/IP and the Internet has its own RFC
 RFCs are the best way to get a complete understanding
of a standard, protocol, or practice
 Freely available from www.ietf.org
Summary
 Networking and protocol basics
 The TCP/IP protocol family originated from the US
Department of Defense’s ARPAnet
 ARPAnet’s resilient design architecture has been
carried forward to the Internet
 TCP/IP is a completely decentralized protocol that’s
device agnostic
Summary
 TCP/IP’s five key features:
• Logical addressing
• Routing
• Name resolution
• Flow control
• Simultaneous application support
 Internet standards and oversight bodies
www.process.com
(800) 722-7770
info@process.com

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Application Layer
Application Layer Application Layer
Application Layer
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Tcp/ip
Tcp/ipTcp/ip
Tcp/ip
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
OSI Model
OSI ModelOSI Model
OSI Model
 

Andere mochten auch

Pricing Analytics: Segmenting Customers To Maximize Revenue
Pricing Analytics: Segmenting Customers To Maximize RevenuePricing Analytics: Segmenting Customers To Maximize Revenue
Pricing Analytics: Segmenting Customers To Maximize RevenueMichael Lamont
 
Pricing Analytics: Optimizing Price
Pricing Analytics: Optimizing PricePricing Analytics: Optimizing Price
Pricing Analytics: Optimizing PriceMichael Lamont
 
Pricing Analytics: Estimating Demand Curves Without Price Elasticity
Pricing Analytics: Estimating Demand Curves Without Price ElasticityPricing Analytics: Estimating Demand Curves Without Price Elasticity
Pricing Analytics: Estimating Demand Curves Without Price ElasticityMichael Lamont
 
Pricing Analytics: Creating Linear & Power Demand Curves
Pricing Analytics: Creating Linear & Power Demand CurvesPricing Analytics: Creating Linear & Power Demand Curves
Pricing Analytics: Creating Linear & Power Demand CurvesMichael Lamont
 
Business Intelligence: Multidimensional Analysis
Business Intelligence: Multidimensional AnalysisBusiness Intelligence: Multidimensional Analysis
Business Intelligence: Multidimensional AnalysisMichael Lamont
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
Pricing Analytics: Optimizing Sales Models
Pricing Analytics: Optimizing Sales ModelsPricing Analytics: Optimizing Sales Models
Pricing Analytics: Optimizing Sales ModelsMichael Lamont
 
NetScaler TCP Performance Tuning
NetScaler TCP Performance TuningNetScaler TCP Performance Tuning
NetScaler TCP Performance TuningKevin Mason
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ipmyl_1116
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IPSukh Sandhu
 
ARTK Consulting Retail Systems RFP Selection
ARTK Consulting Retail Systems RFP SelectionARTK Consulting Retail Systems RFP Selection
ARTK Consulting Retail Systems RFP SelectionArt Krulish
 
Understanding Business Intelligence
Understanding Business IntelligenceUnderstanding Business Intelligence
Understanding Business IntelligenceMichael Lamont
 
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...Dragon1 Inc.
 
Espedia Visual Enterprise Overview
Espedia Visual Enterprise OverviewEspedia Visual Enterprise Overview
Espedia Visual Enterprise OverviewEspedia Consulting
 

Andere mochten auch (20)

Pricing Analytics: Segmenting Customers To Maximize Revenue
Pricing Analytics: Segmenting Customers To Maximize RevenuePricing Analytics: Segmenting Customers To Maximize Revenue
Pricing Analytics: Segmenting Customers To Maximize Revenue
 
Pricing Analytics: Optimizing Price
Pricing Analytics: Optimizing PricePricing Analytics: Optimizing Price
Pricing Analytics: Optimizing Price
 
Pricing Analytics: Estimating Demand Curves Without Price Elasticity
Pricing Analytics: Estimating Demand Curves Without Price ElasticityPricing Analytics: Estimating Demand Curves Without Price Elasticity
Pricing Analytics: Estimating Demand Curves Without Price Elasticity
 
Pricing Analytics: Creating Linear & Power Demand Curves
Pricing Analytics: Creating Linear & Power Demand CurvesPricing Analytics: Creating Linear & Power Demand Curves
Pricing Analytics: Creating Linear & Power Demand Curves
 
Business Intelligence: Multidimensional Analysis
Business Intelligence: Multidimensional AnalysisBusiness Intelligence: Multidimensional Analysis
Business Intelligence: Multidimensional Analysis
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Pricing Analytics: Optimizing Sales Models
Pricing Analytics: Optimizing Sales ModelsPricing Analytics: Optimizing Sales Models
Pricing Analytics: Optimizing Sales Models
 
NetScaler TCP Performance Tuning
NetScaler TCP Performance TuningNetScaler TCP Performance Tuning
NetScaler TCP Performance Tuning
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ip
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IP
 
Tcp
TcpTcp
Tcp
 
Himanshupptx
HimanshupptxHimanshupptx
Himanshupptx
 
ARTK Consulting Retail Systems RFP Selection
ARTK Consulting Retail Systems RFP SelectionARTK Consulting Retail Systems RFP Selection
ARTK Consulting Retail Systems RFP Selection
 
Presentation1
Presentation1Presentation1
Presentation1
 
Understanding Business Intelligence
Understanding Business IntelligenceUnderstanding Business Intelligence
Understanding Business Intelligence
 
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...
Strategic Decision Making by the CIO using Visual Enterprise Architecture wit...
 
Espedia Visual Enterprise Overview
Espedia Visual Enterprise OverviewEspedia Visual Enterprise Overview
Espedia Visual Enterprise Overview
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 

Ähnlich wie Introduction to TCP/IP

INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSbadri narayan
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
Computer_Network
Computer_NetworkComputer_Network
Computer_NetworkRavi Jiyani
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data commHumayoun Kabir
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
The Internet and the World Wide Web
The Internet and the World Wide WebThe Internet and the World Wide Web
The Internet and the World Wide Webdpd
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linuxtmavroidis
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Microsoft power point internet history and growth [compatibility mode]
Microsoft power point   internet history and growth [compatibility mode]Microsoft power point   internet history and growth [compatibility mode]
Microsoft power point internet history and growth [compatibility mode]Cr Faezah
 
Internet architecture
Internet architectureInternet architecture
Internet architectureNaman Rastogi
 

Ähnlich wie Introduction to TCP/IP (20)

INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
Session 2
Session 2Session 2
Session 2
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Computer_Network
Computer_NetworkComputer_Network
Computer_Network
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data comm
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
The Internet and the World Wide Web
The Internet and the World Wide WebThe Internet and the World Wide Web
The Internet and the World Wide Web
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linux
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
CNP proficiency.pptx
CNP proficiency.pptxCNP proficiency.pptx
CNP proficiency.pptx
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Note1
Note1Note1
Note1
 
Microsoft power point internet history and growth [compatibility mode]
Microsoft power point   internet history and growth [compatibility mode]Microsoft power point   internet history and growth [compatibility mode]
Microsoft power point internet history and growth [compatibility mode]
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
 

Mehr von Michael Lamont

Why Is Managing Software So Hard?
Why Is Managing Software So Hard?Why Is Managing Software So Hard?
Why Is Managing Software So Hard?Michael Lamont
 
Pricing Analytics: Price Skimming
Pricing Analytics: Price SkimmingPricing Analytics: Price Skimming
Pricing Analytics: Price SkimmingMichael Lamont
 
Email Address Harvesting
Email Address HarvestingEmail Address Harvesting
Email Address HarvestingMichael Lamont
 
Antispam Image Filtering Technologies
Antispam Image Filtering TechnologiesAntispam Image Filtering Technologies
Antispam Image Filtering TechnologiesMichael Lamont
 
Evaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam SolutionsEvaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam SolutionsMichael Lamont
 
Installing & Configuring OpenLDAP (Hands On Lab)
Installing & Configuring OpenLDAP (Hands On Lab)Installing & Configuring OpenLDAP (Hands On Lab)
Installing & Configuring OpenLDAP (Hands On Lab)Michael Lamont
 
Evaluating Anti-Spam Filtering Solutions
Evaluating Anti-Spam Filtering SolutionsEvaluating Anti-Spam Filtering Solutions
Evaluating Anti-Spam Filtering SolutionsMichael Lamont
 
Business Intelligence: Data Warehouses
Business Intelligence: Data WarehousesBusiness Intelligence: Data Warehouses
Business Intelligence: Data WarehousesMichael Lamont
 

Mehr von Michael Lamont (8)

Why Is Managing Software So Hard?
Why Is Managing Software So Hard?Why Is Managing Software So Hard?
Why Is Managing Software So Hard?
 
Pricing Analytics: Price Skimming
Pricing Analytics: Price SkimmingPricing Analytics: Price Skimming
Pricing Analytics: Price Skimming
 
Email Address Harvesting
Email Address HarvestingEmail Address Harvesting
Email Address Harvesting
 
Antispam Image Filtering Technologies
Antispam Image Filtering TechnologiesAntispam Image Filtering Technologies
Antispam Image Filtering Technologies
 
Evaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam SolutionsEvaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam Solutions
 
Installing & Configuring OpenLDAP (Hands On Lab)
Installing & Configuring OpenLDAP (Hands On Lab)Installing & Configuring OpenLDAP (Hands On Lab)
Installing & Configuring OpenLDAP (Hands On Lab)
 
Evaluating Anti-Spam Filtering Solutions
Evaluating Anti-Spam Filtering SolutionsEvaluating Anti-Spam Filtering Solutions
Evaluating Anti-Spam Filtering Solutions
 
Business Intelligence: Data Warehouses
Business Intelligence: Data WarehousesBusiness Intelligence: Data Warehouses
Business Intelligence: Data Warehouses
 

Kürzlich hochgeladen

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Introduction to TCP/IP

  • 2. Introduction  TCP/IP is a set of data transfer protocols used by modern data networks  Data network: a group of computers and other devices that communicate over a shared medium  Data & requests for data are transmitted between computers over the network  Physical transmission mediums can be copper cables, fiber optics, or radio waves
  • 3. Basic Network Functionality  BOS1 transmits data to BOS2  BOS2 receives and interprets data from BOS1  BOS2 transmits data back to BOS1 BOS1 BOS2
  • 4. Applications  An application lets a computer interact with other computers by performing a specific set of tasks  The application is responsible for managing the transmitting and receiving of data required to perform its tasks  The application has to be able to communicate with applications on other networked computers for it to be useful
  • 5. Applications  A network protocol is a set of rules for how applications intercommunicate
  • 6. Application Data Flow Application Application Layer Transport Layer Internet Layer Net Access Layer Network Application Application Layer Transport Layer Internet Layer Net Access Layer
  • 7. Applications  A network protocol is a set of rules for how applications intercommunicate  Common applications include: • SMTP, IMAP, and POP (email) • HTTP (web) • SSH (secure access) • NFS and FTP (file transfer)
  • 8. TCP/IP  The protocols that make up TCP/IP define: • How data is transmitted across a network • How data should be formatted so other networked systems can understand it  TCP/IP provides a complete system for formatting, transmitting, and receiving data on a network
  • 9. TCP/IP  A TCP/IP implementation is a software package that handles all of the formatting, transmitting, and receiving of data  Process Software’s MultiNet and TCPware packages let OpenVMS systems participate in data networks
  • 10. The Internet  TCP/IP is the standard for modern data communications across all networks  In the 1970s, two kinds of networks were being developed: • Local area networks (LANs) • ARPAnet
  • 11. ARPAnet  Dept of Defense grew concerned that their critical command-and- control systems were balkanized in late 1960s
  • 12. ARPAnet  DoD had small groups of networked systems, but they used proprietary protocols  Generally, only systems from the same manufacturer could be networked together
  • 13. ARPAnet  As the DoD became more reliant on computers, they desperately needed everything on one big network  DoD knew this network would be a primary target for the Soviets  Key requirement: the network had to be decentralized, with no single point of failure  The network had to stay up in the face of a large-scale nuclear attack
  • 14. ARPAnet  Defense’s Advanced Research Projects Agency (ARPA) was tasked to design and build this new style of network  ARPAnet’s protocols provided the basis for TCP/IP
  • 15. The Internet  In mid-1970s National Science Foundation wanted to network universities and research institutions  NSF built off of ARPAnet’s design and protocols to create the Internet
  • 16. Decentralized Data Networking  TCP/IP’s decentralized nature is a key reason it’s still ubiquitous today  Two key TCP/IP features support decentralization: • End node verification: the two endpoints of any data transfer are responsible for making sure it was successful – no centralized control scheme • Dynamic routing: End nodes can transfer data over multiple paths, and the network chooses the best (fastest, most reliable) path for each individual data transfer
  • 17. Local Area Networks  LAN technology was being developed in parallel to ARPAnet and the Internet  Early LANs were highly proprietary and didn’t support the concept of a larger network (like the Internet)  Vendor lock-in was rampant
  • 18. Local Area Networks  The wide adoption of open interconnectivity protocols in the R&D community spilled over into corporations  TCP/IP was a proven solution that could make a company’s disparate systems/networks all work together  Growing popularity of the Internet also spilled over into corporations  Email was the original “killer app”
  • 19. Local Area Networks  Some LAN vendors started with a step in the right direction: gateways between their proprietary protocols and TCP/IP  Any LAN technology that survives today provides native TCP/IP support
  • 20. 5 Core Networking Problems  Addressing  Routing  Name resolution  Flow control  Interoperability
  • 21. Physical Addressing  Every network-connected hardware device has a unique ID  This physical ID is “burned” into the device when it’s fabricated Physical Address
  • 22. Physical Addressing  Guaranteed to be unique from the beginning to the end of the Internet’s existence  Referred to as a MAC (Machine Access Code)  Low-level TCP/IP protocols use MAC addresses to move data across the physical network to the right device
  • 23. Physical Addressing  You can think of MAC addresses like phone numbers  On very small networks, nodes can just blindly dump data onto the physical network  Every node has to examine every transmission and figure out which data is meant for it
  • 24. Physical Addressing  “Dump and parse” quickly exceeds hardware capabilities as network size increases  Trying that scheme on the Internet would exceed physics-imposed limits  Most addressing schemes that work with physical addresses can’t scale beyond very small networks
  • 25. Logical Addressing  Routers are special network devices that let you divide large networks into smaller subnets  A well-designed network uses routers to create a tree- like structure  The hierarchy of routers lets data travel between nodes without hitting every other node on the network
  • 26. Logical Addressing  TCP/IP provides native support for logical addressing  IP Address: logical address configured in a node’s TCP/IP implementation  IP addresses can be broken down into network, subnet, and host ID numbers: 143.192. 168. 227
  • 27. Routing  Routers are specialized devices that move data across networks  Routers use the logical address information in a data packet to send it to its destination  Routers isolate a subnet’s traffic from the entire network  Data transmitted between systems on the same subnet isn’t transmitted across the larger network
  • 28. Routing  Keeps unnecessary traffic from cluttering up the entire network  Data traffic destined for a system outside the subnet is transmitted as far up the network as it needs to go Larger Network
  • 29. Routing  Large networks have lots of routers and multiple possible paths between nodes  TCP/IP specifies how routers should pick the best path across a network RoutersRouters
  • 30. Name Resolution  Logical IP addresses are “friendlier” than physical MAC addresses, but still aren’t really human readable  Domain Names: structured, user friendly system names provided by TCP/IP  Examples of domain names: • www.process.com • mail.wku.edu • travel.state.gov
  • 31. Name Resolution  Name Resolution: the process of mapping logical addresses back and forth into domain names
  • 32. Name Resolution  Special name servers store the mapping information in databases  TCP/IP’s Domain Name Service (DNS) provides a hierarchy of name servers that handle name resolution for the Internet
  • 33. Error Checking & Flow Control  Several features integrated into TCP/IP guarantee reliable data transfers: • All data transmissions are checked for corruption and missing data • All data transmissions are positively acknowledged by the receiving node • In-band flow control so any system involved in a data transmission can control the rate at which data is sent
  • 34. Application Support  Key feature of modern networks is ability to run multiple network apps simultaneously  Ports: logical channels provided by TCP/IP that allow multiple applications to access the network simultaneously  Ports identified by unique numbers
  • 35. Ports App TCP Internet Layer Net Access Layer Network UDP App App App App Ports
  • 36. Standards Organizations  TCP/IP is based on open and complete standards  Standards guarantee interoperability of network software and hardware  Several standards organizations are responsible for developing and maintaining TCP/IP’s standards
  • 37. Standards Organizations  Internet Architecture Board (IAB)  Sets general policies for the Internet  Manages development of data protocols and standards
  • 38. Standards Organizations  Internet Engineering Task Force (IETF)  R&D organization that develops Internet standards  Composed of working groups that focus on a particular area
  • 39. Standards Organizations  Internet Corporation for Assigned Names and Numbers (ICANN)  Manages IP addresses, domain names, and port numbers
  • 40. Standards Organizations  Requests for Comments (RFC): standards published by the IETF  Every part of TCP/IP and the Internet has its own RFC  RFCs are the best way to get a complete understanding of a standard, protocol, or practice  Freely available from www.ietf.org
  • 41. Summary  Networking and protocol basics  The TCP/IP protocol family originated from the US Department of Defense’s ARPAnet  ARPAnet’s resilient design architecture has been carried forward to the Internet  TCP/IP is a completely decentralized protocol that’s device agnostic
  • 42. Summary  TCP/IP’s five key features: • Logical addressing • Routing • Name resolution • Flow control • Simultaneous application support  Internet standards and oversight bodies