SlideShare una empresa de Scribd logo
1 de 30
TCP/IP
MANAGEMENT INFORMATION SYSTEM
PRESENTED BY:
MAHWISH SHAIKH
REHAN ALI KANGO
ASSIGNED BY:
SIR NAVEED GHANI
Title and Content Layout with List
• TCP SLIDING WINDOW
• USER DATAGRAM PROTOCOL
• THE APPLICATION LAYER
• DNS
• NETWORK SECURITY EXPATIATION AND
THREATS IN TCP/IP
• FIREWALL
• Internet Protocol (IP)
• IP Packet Format
• IP addressing
• IP subnet
• Address Resolution Protocol
(ARP)
• Internet Routing
• ICMP
• TCP
Internet Protocol
• Internet protocol is a system protocol at (layer 3)
• Contain addressing data
• connectionless service
• No acknowledgement
• Datagrams transfer measured through (MTU)
IP packet Format
IP addressing
Procedure of routing IP datagrams
IT has two primary parts
1 the network number (allocated by Nic)
2Host number (delegated by LNA)
ISP provides the network service
Address assign to Isp is by (IANA) Internet assigned number authority
IP Address Format
IP subnet Addressing
• Two parts
• Subnet
• Host
• Public or Global IP
• Private or local
• IP subnet Mask ( binary number )
Broadcast Address
Directed broadcast address
• At the point when a packet is sent to a system's network broadcast address, a single duplicate of
it goes to network, and after that the packet is sent to each host on that system or subnet work
Limited Broadcast address
• On the off chance that the IP location is all ones (255.255.255.255), this is a restricted broadcast
address; the packet is meant to all hosts on the current (sub) network.
• A routerswitch won't forward to other (sub) networks this sort of broadcast
Address Resolution Protocol (ARP)
• ARP (corresponding MAC address )
• MAC ( physical address )
• IP ( logical address )
• Assigned by the ISP
ARP
RARP
Internet routing
• Called gateways
• Routing protocols is used by the routers to determine appropriate
path
• At application Layer protocol
• Two Types
• Interior routing ( neighboring )
• Rip: Routing Information Protocol (periodic updates)
• IGP: interior gateway protocol (fast convergence)
• OSPF: open shortest path first ( directly connected)
Exterior routing
• BGP : border gateway protocol (multithoming)
Also provide services
• Fragmentation
• Time outs ( specifies age )
• Options (mark packets)
ICMP : Internet Control Message Protocol
Purpose
To provide informational messages considering the routing of IP
datagram.
Two types of information messages
1- control messages
2-Error messages
ICMP
• Echo request
• Echo reply
• Connectivity between N1 and R1
TCP
Reliable transmission f information
Controls abnormality
Relies at (layer 4) of OSI model
Consist of 4 layers
Three way handshake
• The first (Host A) starts an connection by sending a data packets
with the initial number sequence (X) and SYN bit set to
demonstrate an association demand.
• The second (Host B) gets the SYN, records the acknowledging so as
to group number X, and SYN . (with an ACK = X + 1). Host B insert
its own initial sequence number (SEQ = Y). An ACK = 20 implies the
host has gotten bytes 0 through 19 and expects byte 20 next. This
strategy is called forward acknowledgment. Host A then recognizes
all bytes Host B sent with a forward acknowledgment showing the
following byte Host A hopes to get (ACK = Y + 1).
Internet Protocol
• Internet protocol is a system protocol at (layer 3)
• Contain addressing data
• Ip is connectionless service
• Best delivery of data
• Datagrams transfer measured through (MTU)
TCP SLIDING WINDOW
• A sliding window protocol is a feature of packet-based data
transmission protocols. Sliding window protocols are used where
reliable in-order delivery of packets is required, such as in the Data
Link Layer (OSI model) as well as in the Transmission Control
Protocol (TCP)
USER DATAGRAM PROTOCOL
• The User Datagram Protocol (UDP) is one of the core members of
the Internet protocol suite. The protocol was designed by David P.
Reed in 1980 and formally defined in RFC 768. UDP uses a simple
connectionless transmission model with a minimum of protocol
mechanism.
• Core member of IP
• Small packet size
• Does not guarantee packet delivery
USER DATAGRAM PROTOCOL
THE APPLICATION LAYER
• The application layer is a layer in the Open Systems
Interconnection (OSI) seven-layer model and in the TCP/IP protocol
suite.
• It consists of protocols that focus on process-to-process
communication across an IP network
• It is service that provides communication application from one end
to another
• Provides a firm communication interface and end-user services
• Example: HTTP, FTP SMTP
DNS
• The Domain Name System (DNS) is a hierarchical distributed
naming system for computers, services, or any resource connected
to the Internet or a private network.
• It associates various information with domain names assigned to
each of the participating entities.
• www.google.com.
NETWORK SECURITY EXPATIATION AND THREATS IN
TCP/IP
• Data is very confidential an precious
• Business associations and government
• Data security
• Network Security
• Initial a safe system must have trusted and secured data against intruders
• Adjustments while in case of threats
• Accessibility of data to its essential beneficiaries
CERT
• CERT is an open association whose objective is to "study Internet
security vulnerabilities,
• Give episode reaction administrations to locales that have been the
casualties of assault
• Distribute an assortment of security alarms,
• Research in wide-territory arranged figuring, and create data and
preparing to enhance security
How attacker Attacks the data
1-Passive Reconnaissance
Passive reconnaissance is an attempt to gain information about
targeted computers and networks without actively engaging with the
systems.
2-Active Resonance
In active Reconnaissance in contrast, the attacker engages with the
target system, typically conducting a port scan to determine find any
open ports.
IF a system detects you , it can block your IP
Firewalls
• firewall is a network security system that monitors and controls the
incoming and outgoing network traffic based on predetermined
security rules
• Interconnects networks with differing trust
• Imposes restrictions on network services
• only authorized traffic is allowed
• Auditing and controlling access
• can implement alarms for abnormal behavior
• Provides perimeter defence
Firewalls
Characterized by protocol level it controls in
• Packet filtering
• Application gateways
• Combination of above is dynamic packet filter
Packet filtering
• Simplest of components
• Uses transport-layer information only
• Filtering with incoming or outgoing interfaces
• Permits or denies certain services
Application gateways
• Firewall runs set of proxy programs
• Proxies filter incoming, outgoing packets
• All incoming traffic directed to firewall
• All outgoing traffic appears to come from firewall
• Policy embedded in proxy programs
Intrusion Detection System (IDS)
• intrusion detection system (IDS) is a device or software application
that monitors network or system for malicious activities or policy
violations and produces reports to a management station
• IDS is used to recognize and alarm on malicious events that occur
within the networks.
• IDS arrangements are intended to screen occasions in an IT system,
hence supplementing the first line of defense (behind firewall)
against attacks
Thank you

Más contenido relacionado

La actualidad más candente

Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol Analysis
Krishbathija
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
Ali Kamil
 

La actualidad más candente (20)

Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol Analysis
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_01Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Wireshark
WiresharkWireshark
Wireshark
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Wireshark
Wireshark Wireshark
Wireshark
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
 

Similar a TCP/IP

Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
Bassam Kanber
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
Piero Fraternali
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
Techvilla
 

Similar a TCP/IP (20)

TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Basic networking
Basic networkingBasic networking
Basic networking
 
tcp.pptx
tcp.pptxtcp.pptx
tcp.pptx
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
 
IP Security
IP SecurityIP Security
IP Security
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
Lecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptxLecture 1 Network Reference Models Final.pptx
Lecture 1 Network Reference Models Final.pptx
 
TCP.pdf
TCP.pdfTCP.pdf
TCP.pdf
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 

Último

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 

TCP/IP

  • 1. TCP/IP MANAGEMENT INFORMATION SYSTEM PRESENTED BY: MAHWISH SHAIKH REHAN ALI KANGO ASSIGNED BY: SIR NAVEED GHANI
  • 2. Title and Content Layout with List • TCP SLIDING WINDOW • USER DATAGRAM PROTOCOL • THE APPLICATION LAYER • DNS • NETWORK SECURITY EXPATIATION AND THREATS IN TCP/IP • FIREWALL • Internet Protocol (IP) • IP Packet Format • IP addressing • IP subnet • Address Resolution Protocol (ARP) • Internet Routing • ICMP • TCP
  • 3. Internet Protocol • Internet protocol is a system protocol at (layer 3) • Contain addressing data • connectionless service • No acknowledgement • Datagrams transfer measured through (MTU)
  • 5. IP addressing Procedure of routing IP datagrams IT has two primary parts 1 the network number (allocated by Nic) 2Host number (delegated by LNA) ISP provides the network service Address assign to Isp is by (IANA) Internet assigned number authority
  • 7. IP subnet Addressing • Two parts • Subnet • Host • Public or Global IP • Private or local • IP subnet Mask ( binary number )
  • 8. Broadcast Address Directed broadcast address • At the point when a packet is sent to a system's network broadcast address, a single duplicate of it goes to network, and after that the packet is sent to each host on that system or subnet work Limited Broadcast address • On the off chance that the IP location is all ones (255.255.255.255), this is a restricted broadcast address; the packet is meant to all hosts on the current (sub) network. • A routerswitch won't forward to other (sub) networks this sort of broadcast
  • 9. Address Resolution Protocol (ARP) • ARP (corresponding MAC address ) • MAC ( physical address ) • IP ( logical address ) • Assigned by the ISP ARP RARP
  • 10. Internet routing • Called gateways • Routing protocols is used by the routers to determine appropriate path • At application Layer protocol • Two Types • Interior routing ( neighboring ) • Rip: Routing Information Protocol (periodic updates) • IGP: interior gateway protocol (fast convergence) • OSPF: open shortest path first ( directly connected)
  • 11. Exterior routing • BGP : border gateway protocol (multithoming) Also provide services • Fragmentation • Time outs ( specifies age ) • Options (mark packets)
  • 12. ICMP : Internet Control Message Protocol Purpose To provide informational messages considering the routing of IP datagram. Two types of information messages 1- control messages 2-Error messages
  • 13. ICMP • Echo request • Echo reply • Connectivity between N1 and R1
  • 14. TCP Reliable transmission f information Controls abnormality Relies at (layer 4) of OSI model Consist of 4 layers
  • 15. Three way handshake • The first (Host A) starts an connection by sending a data packets with the initial number sequence (X) and SYN bit set to demonstrate an association demand. • The second (Host B) gets the SYN, records the acknowledging so as to group number X, and SYN . (with an ACK = X + 1). Host B insert its own initial sequence number (SEQ = Y). An ACK = 20 implies the host has gotten bytes 0 through 19 and expects byte 20 next. This strategy is called forward acknowledgment. Host A then recognizes all bytes Host B sent with a forward acknowledgment showing the following byte Host A hopes to get (ACK = Y + 1).
  • 16. Internet Protocol • Internet protocol is a system protocol at (layer 3) • Contain addressing data • Ip is connectionless service • Best delivery of data • Datagrams transfer measured through (MTU)
  • 17. TCP SLIDING WINDOW • A sliding window protocol is a feature of packet-based data transmission protocols. Sliding window protocols are used where reliable in-order delivery of packets is required, such as in the Data Link Layer (OSI model) as well as in the Transmission Control Protocol (TCP)
  • 18. USER DATAGRAM PROTOCOL • The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. UDP uses a simple connectionless transmission model with a minimum of protocol mechanism. • Core member of IP • Small packet size • Does not guarantee packet delivery
  • 20. THE APPLICATION LAYER • The application layer is a layer in the Open Systems Interconnection (OSI) seven-layer model and in the TCP/IP protocol suite. • It consists of protocols that focus on process-to-process communication across an IP network • It is service that provides communication application from one end to another • Provides a firm communication interface and end-user services • Example: HTTP, FTP SMTP
  • 21. DNS • The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. • It associates various information with domain names assigned to each of the participating entities. • www.google.com.
  • 22. NETWORK SECURITY EXPATIATION AND THREATS IN TCP/IP • Data is very confidential an precious • Business associations and government • Data security • Network Security • Initial a safe system must have trusted and secured data against intruders • Adjustments while in case of threats • Accessibility of data to its essential beneficiaries
  • 23. CERT • CERT is an open association whose objective is to "study Internet security vulnerabilities, • Give episode reaction administrations to locales that have been the casualties of assault • Distribute an assortment of security alarms, • Research in wide-territory arranged figuring, and create data and preparing to enhance security
  • 24. How attacker Attacks the data 1-Passive Reconnaissance Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems. 2-Active Resonance In active Reconnaissance in contrast, the attacker engages with the target system, typically conducting a port scan to determine find any open ports. IF a system detects you , it can block your IP
  • 25. Firewalls • firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules • Interconnects networks with differing trust • Imposes restrictions on network services • only authorized traffic is allowed • Auditing and controlling access • can implement alarms for abnormal behavior • Provides perimeter defence
  • 26. Firewalls Characterized by protocol level it controls in • Packet filtering • Application gateways • Combination of above is dynamic packet filter
  • 27. Packet filtering • Simplest of components • Uses transport-layer information only • Filtering with incoming or outgoing interfaces • Permits or denies certain services
  • 28. Application gateways • Firewall runs set of proxy programs • Proxies filter incoming, outgoing packets • All incoming traffic directed to firewall • All outgoing traffic appears to come from firewall • Policy embedded in proxy programs
  • 29. Intrusion Detection System (IDS) • intrusion detection system (IDS) is a device or software application that monitors network or system for malicious activities or policy violations and produces reports to a management station • IDS is used to recognize and alarm on malicious events that occur within the networks. • IDS arrangements are intended to screen occasions in an IT system, hence supplementing the first line of defense (behind firewall) against attacks