SlideShare ist ein Scribd-Unternehmen logo
1 von 85
TCP/IP Transmission Control Protocol / Internet Protocol Rakhi Saxena Assistant Professor, Deshbandhu College, Delhi University
What is TCP/IP? ,[object Object],[object Object],[object Object]
History of TCP/IP ,[object Object],[object Object],[object Object]
Why TCP/IP is Popular? ,[object Object],[object Object],[object Object],[object Object],[object Object]
TCP/IP & OSI ,[object Object],[object Object],Physical Network Interface Data Link Layer Internet (IP) Network Transport (TCP) Transport Session Presentation Application Application Corresponding TCP/IP Layer OSI Model Layer
But First ...
Ethernet - Data-Link Layer ,[object Object],[object Object],[object Object]
Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object]
MAC address ,[object Object],[object Object],[object Object],[object Object]
ipconfig/ ifconfig
 
Back to  TCP/IP
Internet Protocol The IP in TCP/IP ,[object Object],[object Object],[object Object]
IP Datagrams ,[object Object],[object Object],[object Object],An IP packet  is called a  datagram
IP Addresses ,[object Object],[object Object],Rensselaer
IP Addresses ,[object Object],[object Object]
IP Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IPv4  (version 4) IPv6  (version 6)
Network and Host IDs ,[object Object],[object Object],[object Object]
IP Addresses ,[object Object],[object Object],[object Object],[object Object],CS has a class B network
 
Host and Network Addresses ,[object Object],[object Object],[object Object]
Mapping IP Addresses  to Hardware Addresses ,[object Object],[object Object],[object Object],[object Object]
ARP ,[object Object],[object Object],[object Object],Arp Arp!
ARP (cont.) ,[object Object],[object Object]
ARP conversation HEY - Everyone please listen!  Will  128.213.1.5  please send me his/her Ethernet address? not me Hi Green! I’m 128.213.1.5, and my Ethernet address is  87:A2:15:35:02:C3
Services provided by IP ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP-Layer Operation IP Data Link Physical IP Data Link Physical IP Data Link Physical Application TCP IP Data Link Physical X A B C Y X A B C Y Application TCP IP Data Link Physical TCP is  end-to-end  layer
Transport Layer & TCP/IP ,[object Object],[object Object],[object Object]
Process Layer Transport Layer Network Layer Data-Link Layer ICMP, ARP  & RARP TCP UDP IP 802.3 Process Process
UDP User Datagram Protocol ,[object Object],[object Object],[object Object],[object Object]
Ports ,[object Object],[object Object],[object Object]
Ports Host A Host B Process Process Process Process Process Process
UDP ,[object Object],[object Object],[object Object],[object Object],The term  datagram  is also used to describe the unit of transfer of UDP!
TCP Transmission Control Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Connection-Oriented ,[object Object],[object Object],[object Object]
Reliable ,[object Object],[object Object],Reliable does not mean that things don't go wrong, it means that we find out when things go wrong.
Byte Stream ,[object Object],[object Object],Somebody needs to do this since IP is delivering all the data, it's just that the application layer doesn't need to do this!
Full Duplex ,[object Object],[object Object]
TCP Ports ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Addressing in TCP/IP ,[object Object],[object Object],[object Object],[object Object],NOTE: TCP/IP is a  protocol suite  that includes IP, TCP and UDP.
TCP/IP Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OSI and Protocol Stack OSI: Open Systems Interconnect Link Layer  : includes device driver and network interface card Network Layer  : handles the movement of packets, i.e. Routing Transport Layer  : provides a reliable flow of data between two hosts Application Layer : handles the details of the particular application OSI Model TCP/IP Hierarchy Protocols 7 th Application Layer 6 th Presentation Layer 5 th Session Layer 4 th Transport Layer 3 rd Network Layer 2 nd Link Layer 1 st Physical Layer Application Layer Transport Layer Network Layer Link Layer
TCP vs. UDP ,[object Object],[object Object],[object Object],[object Object]
Hmmmmm. TCP or UDP ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Break
TCP Connection Establishment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
C onnection Creation
C onnection Creation
C onnection Creation
C onnection Creation
Why is a two-Way Handshake not enough? When aida initiates the data transfer (starting with SeqNo=15322112355) ,  mng will reject all data.   Will be discarded as a duplicate SYN 
C onnection Teardown
C onnection Teardown
C onnection Teardown
C onnection Teardown
C onnection Teardown
T wo-Army Problem Red army Red army Blue army
T wo-Army Problem
T wo-Army Problem
T wo-Army Problem
T wo-Army Problem
T wo-Army Problem
T wo-Army Problem So how many acks of acks are enough??
C onnection Teardown Connection close is treated as two separate “close’s”  of each simplex connection
Sockets ,[object Object],[object Object],[object Object],[object Object]
Packet Exchange for TCP Connection socket() socket() bind() listen() connect() write() read() read() write() Data reply, ack Data request ack of reply close() close() SYN j SYN k, ack j+1 ack k+1 FIN M ack M+1 FIN N ack N+1 CLIENT SERVER accept()
netstat –n  Lists all active sockets with the address/port number pair
netstat –r Displays the routing table
netstat –s Displays network statistics
ping sends a test packet to a given address and reports the round trip time
traceroute discovers the route from a source to a destination
TCP/IP Hacks and Attacks ,[object Object],[object Object]
[object Object]
Denial of Service Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Early DOS attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP SYN Flood client server SYN RQST SYN ACK Spoofed  SYN  RQST zombie victim Waiting buffer overflows Zombies SYN ACK
Distributed Denial of Service Zombies on innocent computers Server-level DDoS attacks Infrastructure-level DDoS attacks Bandwidth-level DDoS attacks
Spoofing X Y Z Mr. Z is that you? Yes I’m here!
ARP Cache Poisoning IP -> 192.168.51.36 MAC -> 00:00:00:BB:BB:BB Internal ARP Cache 192.168.51.35 – 00:00:00:CC:CC:CC System B IP -> 192.168.51.35 MAC -> 00:00:00:AA:AA:AA Internal ARP Cache 192.168.51.36 – 00:00:00:CC:CC:CC System A IP -> 192.168.51.37 MAC -> 00:00:00:CC:CC:CC Internal ARP Cache 192.168.51.36 – 00:00:00:BB:BB:BB 192.168.51.35 – 00:00:00:AA:AA:AA Attacker 192.168.51.36 is at  00:00:00:CC:CC:CC 192.168.51.35 is at  00:00:00:CC:CC:CC
More DoS attacks Continuous requests for a heavy computational dynamic page HTTP SQL/Application server attack Source and destination IP addresses are the same causing the response to loop TCP SYN Land Local IP address hijack Middleman attack ARP ARP Redirect
Mitigation Techniques
ACL – Access Control List ,[object Object],[object Object],[object Object],[object Object],[object Object]
TCP Intercept
References ,[object Object],[object Object],[object Object],[object Object]
[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionKae Hsu
 
TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.Amir Panahi
 
TCP IP
TCP IPTCP IP
TCP IPhivasu
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ipkashish0313
 
What is TCP/IP
What is TCP/IPWhat is TCP/IP
What is TCP/IPfarhan516
 
"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Polandirenazd
 
Network protocol
Network protocolNetwork protocol
Network protocolOnline
 
TCP/IP Introduction
TCP/IP Introduction TCP/IP Introduction
TCP/IP Introduction LJ PROJECTS
 
Network infrastructure - TCP/IP
Network infrastructure - TCP/IPNetwork infrastructure - TCP/IP
Network infrastructure - TCP/IPraymondkao
 

Was ist angesagt? (20)

Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
eTwinning - TCP/IP: Internet layer
eTwinning - TCP/IP: Internet layereTwinning - TCP/IP: Internet layer
eTwinning - TCP/IP: Internet layer
 
Tcp ip tutorial
Tcp ip tutorialTcp ip tutorial
Tcp ip tutorial
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.
 
TCP IP
TCP IP TCP IP
TCP IP
 
Overview of TCP IP
Overview of TCP IPOverview of TCP IP
Overview of TCP IP
 
TCP IP
TCP IPTCP IP
TCP IP
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ip
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
What is TCP/IP
What is TCP/IPWhat is TCP/IP
What is TCP/IP
 
TCP/IP Introduction
TCP/IP IntroductionTCP/IP Introduction
TCP/IP Introduction
 
"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
 
TCP Model
TCP ModelTCP Model
TCP Model
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
TCP/IP Introduction
TCP/IP Introduction TCP/IP Introduction
TCP/IP Introduction
 
Network infrastructure - TCP/IP
Network infrastructure - TCP/IPNetwork infrastructure - TCP/IP
Network infrastructure - TCP/IP
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 

Andere mochten auch

TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
The TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux KernelThe TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux KernelDivye Kapoor
 
The secret of TCP/IP and how it affects your PBX
The secret of TCP/IP and how it affects your PBXThe secret of TCP/IP and how it affects your PBX
The secret of TCP/IP and how it affects your PBXOlle E Johansson
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
Black Ops of TCP/IP 2011 (Black Hat USA 2011)
Black Ops of TCP/IP 2011 (Black Hat USA 2011)Black Ops of TCP/IP 2011 (Black Hat USA 2011)
Black Ops of TCP/IP 2011 (Black Hat USA 2011)Dan Kaminsky
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IPSukh Sandhu
 
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with VolatlityOMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with VolatlityAndrew Case
 
Rootkit 102 - Kernel-Based Rootkit
Rootkit 102 - Kernel-Based RootkitRootkit 102 - Kernel-Based Rootkit
Rootkit 102 - Kernel-Based RootkitChia-Hao Tsai
 

Andere mochten auch (16)

TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
TCP/IP Presentation
TCP/IP PresentationTCP/IP Presentation
TCP/IP Presentation
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
The TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux KernelThe TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux Kernel
 
The secret of TCP/IP and how it affects your PBX
The secret of TCP/IP and how it affects your PBXThe secret of TCP/IP and how it affects your PBX
The secret of TCP/IP and how it affects your PBX
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
World wide web
World wide webWorld wide web
World wide web
 
Black Ops of TCP/IP 2011 (Black Hat USA 2011)
Black Ops of TCP/IP 2011 (Black Hat USA 2011)Black Ops of TCP/IP 2011 (Black Hat USA 2011)
Black Ops of TCP/IP 2011 (Black Hat USA 2011)
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IP
 
TCP/IP basics
TCP/IP basicsTCP/IP basics
TCP/IP basics
 
Multipath TCP
Multipath TCPMultipath TCP
Multipath TCP
 
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with VolatlityOMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
 
Rootkit 102 - Kernel-Based Rootkit
Rootkit 102 - Kernel-Based RootkitRootkit 102 - Kernel-Based Rootkit
Rootkit 102 - Kernel-Based Rootkit
 

Ähnlich wie More on Tcp/Ip

07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocolsRaja Waseem Akhtar
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals Vikas Gupta
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsSerious_SamSoul
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdfhoang971
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
layering.pdf
layering.pdflayering.pdf
layering.pdfBoostHub
 
10. tcp ip and do d model
10. tcp ip and do d model10. tcp ip and do d model
10. tcp ip and do d modelSwarndeep Singh
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in javaAmol Gaikwad
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 

Ähnlich wie More on Tcp/Ip (20)

07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
Mod4
Mod4Mod4
Mod4
 
IP Utilites
IP UtilitesIP Utilites
IP Utilites
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
lecture-2-tcp-ip.ppt
lecture-2-tcp-ip.pptlecture-2-tcp-ip.ppt
lecture-2-tcp-ip.ppt
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
layering.pdf
layering.pdflayering.pdf
layering.pdf
 
10. tcp ip and do d model
10. tcp ip and do d model10. tcp ip and do d model
10. tcp ip and do d model
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in java
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 

Kürzlich hochgeladen

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Kürzlich hochgeladen (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

More on Tcp/Ip

  • 1. TCP/IP Transmission Control Protocol / Internet Protocol Rakhi Saxena Assistant Professor, Deshbandhu College, Delhi University
  • 2.
  • 3.
  • 4.
  • 5.
  • 7.
  • 8.
  • 9.
  • 11.  
  • 12. Back to TCP/IP
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.  
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. ARP conversation HEY - Everyone please listen! Will 128.213.1.5 please send me his/her Ethernet address? not me Hi Green! I’m 128.213.1.5, and my Ethernet address is 87:A2:15:35:02:C3
  • 26.
  • 27. IP-Layer Operation IP Data Link Physical IP Data Link Physical IP Data Link Physical Application TCP IP Data Link Physical X A B C Y X A B C Y Application TCP IP Data Link Physical TCP is end-to-end layer
  • 28.
  • 29. Process Layer Transport Layer Network Layer Data-Link Layer ICMP, ARP & RARP TCP UDP IP 802.3 Process Process
  • 30.
  • 31.
  • 32. Ports Host A Host B Process Process Process Process Process Process
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. OSI and Protocol Stack OSI: Open Systems Interconnect Link Layer : includes device driver and network interface card Network Layer : handles the movement of packets, i.e. Routing Transport Layer : provides a reliable flow of data between two hosts Application Layer : handles the details of the particular application OSI Model TCP/IP Hierarchy Protocols 7 th Application Layer 6 th Presentation Layer 5 th Session Layer 4 th Transport Layer 3 rd Network Layer 2 nd Link Layer 1 st Physical Layer Application Layer Transport Layer Network Layer Link Layer
  • 43.
  • 44.
  • 45. Break
  • 46.
  • 51. Why is a two-Way Handshake not enough? When aida initiates the data transfer (starting with SeqNo=15322112355) , mng will reject all data. Will be discarded as a duplicate SYN 
  • 57. T wo-Army Problem Red army Red army Blue army
  • 63. T wo-Army Problem So how many acks of acks are enough??
  • 64. C onnection Teardown Connection close is treated as two separate “close’s” of each simplex connection
  • 65.
  • 66. Packet Exchange for TCP Connection socket() socket() bind() listen() connect() write() read() read() write() Data reply, ack Data request ack of reply close() close() SYN j SYN k, ack j+1 ack k+1 FIN M ack M+1 FIN N ack N+1 CLIENT SERVER accept()
  • 67. netstat –n Lists all active sockets with the address/port number pair
  • 68. netstat –r Displays the routing table
  • 69. netstat –s Displays network statistics
  • 70. ping sends a test packet to a given address and reports the round trip time
  • 71. traceroute discovers the route from a source to a destination
  • 72.
  • 73.
  • 74.
  • 75.
  • 76. TCP SYN Flood client server SYN RQST SYN ACK Spoofed SYN RQST zombie victim Waiting buffer overflows Zombies SYN ACK
  • 77. Distributed Denial of Service Zombies on innocent computers Server-level DDoS attacks Infrastructure-level DDoS attacks Bandwidth-level DDoS attacks
  • 78. Spoofing X Y Z Mr. Z is that you? Yes I’m here!
  • 79. ARP Cache Poisoning IP -> 192.168.51.36 MAC -> 00:00:00:BB:BB:BB Internal ARP Cache 192.168.51.35 – 00:00:00:CC:CC:CC System B IP -> 192.168.51.35 MAC -> 00:00:00:AA:AA:AA Internal ARP Cache 192.168.51.36 – 00:00:00:CC:CC:CC System A IP -> 192.168.51.37 MAC -> 00:00:00:CC:CC:CC Internal ARP Cache 192.168.51.36 – 00:00:00:BB:BB:BB 192.168.51.35 – 00:00:00:AA:AA:AA Attacker 192.168.51.36 is at 00:00:00:CC:CC:CC 192.168.51.35 is at 00:00:00:CC:CC:CC
  • 80. More DoS attacks Continuous requests for a heavy computational dynamic page HTTP SQL/Application server attack Source and destination IP addresses are the same causing the response to loop TCP SYN Land Local IP address hijack Middleman attack ARP ARP Redirect
  • 82.
  • 84.
  • 85.