SlideShare una empresa de Scribd logo
1 de 45
- Presentation
 S.L.D.KASUN
National Diploma in Engineering Sciences
(Telecommunication Engineering)
Institute of Engineering Technology,
Katunayake, SriLanka
Suggestions -- dksljets@gmail.com
 IP stands for Internet Protocol
 IP specifies the format of packets, also called
datagrams, and the addressing scheme. Most
networks combine IP with a higher-level
protocol called Transmission Control Protocol
(TCP), which establishes a virtual connection
between a destination and a source.
 IP by itself is something like the postal
system.
 It allows you to address a package and drop it
in the system, but there's no direct link
between you and the recipient.
 TCP/IP, on the other hand, establishes a
connection between two hosts so that they
can send messages back and forth for a
period of time.
 Need a standard means of
communication between devices
 Can’t communicate if speaking two
different languages
Therefore we have a concept called “Protocol”
 Rules and conventions explaining how something
must be done
 Used to describe how devices can communicate
 Protocol also defines the format of Data i.e. : being
exchanged.
If we both utilize the same protocol then you know
how to format data so I will understand it and I know
how to format data so you will understand it
 The Internet Protocol defines the basic unit of
data transfer (IP Datagram)
 IP software performs the routing function
 IP includes a set of rules that process the idea
of unreliable packet delivery.
◦ How hosts and routers should process packets
◦ How & when error messages should be generated
◦ The Conditions under which packets can be
discarded.
 Each #datagram has two components
◦ Header
◦ Payload
Header + Data (Payload)
Packet
 Delivery service of IP is minimal.
 IP provides an unreliable connectionless best
effort service
◦ Unreliable : IP doesn’t make an attempt to recover
lost packets
◦ Connectionless : Each packet is handled
independently
◦ Best Effort : IP doesn’t make guarantees on the
service ( No through output , No delay guarantee…)
 IP supports the following services
 One-to-one (unicast)
 One-to-all (broadcast)
 One-to-several (multicast)
unicast
broadcast multicast
 Open Systems Interconnection
Reference Model
 Splits communication system
into seven layers
 Each layer performs their task
and passes the data to the next
layer
Layer 7: Application
Layer 6: Presentation
Layer 5: Session
Layer 4: Transport
Layer 3: Network
Layer 2: Data Link
Layer 1: Physical
Network
Layer
Data Link Layer
IP
ARP
Network
Access
Media
ICMP IGMP
Transport
Layer
TCP UDP
 IP is a Network Layer Protocol
 This layer deals with the Hardware of network.
 Physical Layer Hardware
◦ Cables , Connectors, Hubs, Repeaters.. Etc.
 Function :
 Manages signaling to and from physical network
connections
 Physical Layer Protocols & Standards
◦ Ethernet (802.3), Token Ring(802.5) , Wi-Fi(802.11)
 This layer deals with MAC addresses of
devices
 Responsible for Physical Addressing , Error
correction & preparing the information for the
media frames.
 Devices
 Switches , Bridges , Wireless Access Points , NICs, etc.
 Data Link Layer Protocols & Standards
 L2TP, PPP,SLIP etc….
 This layer deals with Packets (Data Bundles)
 Responsible for logical addressing and
routing
 Devices
 Routers, Layer 3 Switches, Firewalls.. Etc.
 Network Layer Protocols
 ARP, IP, RIP, IGRP.. Etc.
 This layer deals with Segments
 Breaks information into segments and is
responsible for connection & connectionless
communication
 Hardware
◦ Proxy Server , Gateways , Firewall…etc.
 Transport Layer Protocols
 TCP
 UDP
 Responsible for establishing, managing &
terminating user connections.
 Acknowledgements of data received during a
session.
 Retransmission of data if it is not received by
a device.
 Session Layer Protocols
 RTP , SIP , Net BIOS.. etc.
 Allows hosts & applications to use a common
language.
 Performs..
 Data formatting
 Encryption & Decryption for security
 Compression & Expansion
 Examples
 JPEG, MP3, MPEG…. Etc.
 This layer is what the user sees….
(Loading an application such as web browser or email..)
 Provides Interface for users to communicate
with applications.
 Examples
◦ Email , Instant Messengers, Http , SMTP, Telnet,
Ping… etc.
 TCP/IP is a set of protocols developed to
allow cooperating computers to share
resources across a network.
 TCP stands for Transmission Control Protocol
 They are Transport Layer & Network Layer
protocols in OSI model.
 The most well known network that adopted
TCP/IP is --> Internet. ( The Biggest WAN)
 TCP/IP was developed very Early!
 Technologies were widely discussed in
documents called “Request For Comments”
(RFC) – free of charge
 Supported by UNIX Operating System
 Because TCP/IP was developed earlier than
the OSI 7 layer model, it doesn’t have 7 layers
but only 4 layers.
Application Layer
Transport Layer
Internet Layer
Network Access Layer
 Application layer protocols defined the
rules when implementing specific network
applications.
 Examples :
◦ FTP – (File Transfer Protocol)
◦ Telnet – ( Remote Terminal Protocol)
◦ SMTP – (Simple Mail Transfer Protocol)
◦ HTTP – (Hyper Text Transfer Protocol)
 End to End data transfer……
 Examples :
◦ TCP (Transmission Control Protocol)
 Connection oriented (connection established before
data exchanged)
 Reliable delivery of data
◦ UDP (User Datagram Protocol)
 Connectionless service
 Delivery is not guaranteed (unreliable)
 Internet layer protocols define the rules of
how to find the routers for a packet to the
destination.
 It only gives best effort delivery. (packets can
be delayed, corrupted, lost or out of order)
 Examples :
◦ IP – Internet Protocol (Provide packet delivery)
◦ ARP – Address Resolution Protocol (Defined the
procedure of network address / mac address translation)
◦ ICMP – Internet Control Message Protocol (Defined
the procedure of error message transfer)
 Also known as Network Interface Layer…
 The Network Access Layer is the layer in the
TCP/IP model at which data is transmitted
and received across the physical network.
◦ Mostly in hardware
◦ A well known example is Ethernet
 Examples :
◦ Ethernet
◦ Token Ring
◦ Frame Relay
◦ ATM (Asynchronous Transfer Mode)
 What is an IP address…?
◦ An IP address is a unique global address for a
network interface
- is a 32 bit long identifier
- encodes a network number (network prefix)
and a host number
1000111110000000 10001001 10010000
1st Byte
= 128
2nd Byte
= 143
3rd Byte
= 137
4th Byte
= 144
128.143.137.144
 Class A addresses are assigned to networks
with a very large number of hosts
 The high-order bit in a class A address is
always set to zero.
 The next seven bits (completing the first
octet) complete the network ID.
 The remaining 24 bits represent the host ID.
 Class B addresses are assigned to medium-
sized to large-sized networks.
 The two high-order bits in a class B address
are always set to binary 1 0.
 The next 14 bits complete the network ID.
 The remaining 16 bits represent the host ID.
 Class C addresses are used for small
networks.
 The three high-order bits in a class C address
are always set to binary 1 1 0.
 The next 21 bits complete the network ID.
 The remaining 8 bits represent the host ID.
 Class D addresses are reserved for IP
multicast addresses.
 The four high-order bits in a class D address are
always set to binary 1 1 1 0.
 The remaining bits are for the address that interested
hosts recognize.
 Class E is an experimental address that is
reserved for future use
 The high-order bits in a class E address are set to
1111.
 The network ID cannot begin with the number
127. The number 127 in a class A address is
reserved for internal loopback functions.
 All bits within the network ID cannot be set to 1.
All 1's in the network ID are reserved for use as
an IP broadcast address.
Address Class First Network ID Last Network ID
Class A 1.0.0.0 126.0.0.0
Class B 128.0.0.0 191.255.0.0
Class C 192.0.0.0 223.255.255.0
 Subnetting enables the network administrator
to further divide the host part of the address
into two or more subnets.
 In this case, a part of the host address is
reserved to identify the particular subnet.
 This is easier to see if we show the IP
address in binary format.
 Subnet masks are frequently expressed in dotted
decimal notation.
 Subnet mask is not an IP address.
 Each host on a TCP/IP network requires a subnet mask
even on a single segment network.
Address Class Bits for Subnet Mask Subnet Mask
Class A 11111111 00000000 00000000 00000000 255.0.0.0
Class B 11111111 11111111 00000000 00000000 255.255.0.0
Class C 11111111 11111111 11111111 00000000 255.255.255.0
 IPV(1-3) : were not formally assigned.
 IPV4 : TCP/IP , 32bit IP address currently used.
 IPV5 : Internet Stream Protocol (SP)
 Experimental Protocol
 Never Introduced for public use.
 IPV6 : Designed to replace IPV4 , 128bit IP
address
 Connectionless protocol and best effort
based.
 Simplicity
 It is simpler and easy to remember
 Require less memory
 Familiarity
 Millions of devices are already knowing it
 Existing infrastructure already support it
 Widely support
 Shorter & Sweeter (header)
 Support of all Operating Systems
 All commonly used protocols are supported
 IPV4 specification didn’t identify any security
mechanism.
 Millions of class A addresses are wasted.
 Many class B addresses also wasted.
 Not so many organizations are so small to
have a class C block.
 Class E addresses were reserved for future
purposes.
 PCs
 Servers
 Modems
 Routers
 Printers
 Cameras
 Smart Phones
 Tablets & Gaming Systems
 Just about anything else connecting to the
Internet
IPV6 provides a platform on new internet
functionality that will be needed in the
immediate future and provide
flexibility for future
growth and
expansion.
IPV6
New header format
Large address space
Built in Security
Extensibility
Better support for QoS
Efficient & hierarchical addressing and
routing infrastructure
 Internet
 VoIP
 IP – TV
 IP-VPN
 Wireless Mobile Technology
 Internet Broadcasting
 Multihoming
Internet protocol (ip) ppt

Más contenido relacionado

La actualidad más candente

Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
Mannu Khani
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 

La actualidad más candente (20)

internet protocol
internet protocolinternet protocol
internet protocol
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Ip address
Ip addressIp address
Ip address
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
IP Address
IP AddressIP Address
IP Address
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Telnet
TelnetTelnet
Telnet
 
Transmission Modes in Computer Networks
Transmission Modes in Computer Networks Transmission Modes in Computer Networks
Transmission Modes in Computer Networks
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 

Destacado

Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
farhan516
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
Dsunte Wilson
 

Destacado (11)

Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
 
H.323: Packet Network Protocol
H.323: Packet Network ProtocolH.323: Packet Network Protocol
H.323: Packet Network Protocol
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Operating Systems Basics
Operating Systems BasicsOperating Systems Basics
Operating Systems Basics
 
Operating system overview concepts ppt
Operating system overview concepts pptOperating system overview concepts ppt
Operating system overview concepts ppt
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 

Similar a Internet protocol (ip) ppt

Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
githe26200
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
Amandeep Kaur
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
rajesh531
 

Similar a Internet protocol (ip) ppt (20)

Tcp
TcpTcp
Tcp
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 
C14-TCPIP.ppt
C14-TCPIP.pptC14-TCPIP.ppt
C14-TCPIP.ppt
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
IP Address
IP AddressIP Address
IP Address
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
IPV6
IPV6IPV6
IPV6
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Internet protocol (ip) ppt

  • 2.  S.L.D.KASUN National Diploma in Engineering Sciences (Telecommunication Engineering) Institute of Engineering Technology, Katunayake, SriLanka Suggestions -- dksljets@gmail.com
  • 3.  IP stands for Internet Protocol  IP specifies the format of packets, also called datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.
  • 4.  IP by itself is something like the postal system.  It allows you to address a package and drop it in the system, but there's no direct link between you and the recipient.  TCP/IP, on the other hand, establishes a connection between two hosts so that they can send messages back and forth for a period of time.
  • 5.  Need a standard means of communication between devices  Can’t communicate if speaking two different languages Therefore we have a concept called “Protocol”
  • 6.  Rules and conventions explaining how something must be done  Used to describe how devices can communicate  Protocol also defines the format of Data i.e. : being exchanged. If we both utilize the same protocol then you know how to format data so I will understand it and I know how to format data so you will understand it
  • 7.  The Internet Protocol defines the basic unit of data transfer (IP Datagram)  IP software performs the routing function  IP includes a set of rules that process the idea of unreliable packet delivery. ◦ How hosts and routers should process packets ◦ How & when error messages should be generated ◦ The Conditions under which packets can be discarded.
  • 8.  Each #datagram has two components ◦ Header ◦ Payload Header + Data (Payload) Packet
  • 9.  Delivery service of IP is minimal.  IP provides an unreliable connectionless best effort service ◦ Unreliable : IP doesn’t make an attempt to recover lost packets ◦ Connectionless : Each packet is handled independently ◦ Best Effort : IP doesn’t make guarantees on the service ( No through output , No delay guarantee…)
  • 10.  IP supports the following services  One-to-one (unicast)  One-to-all (broadcast)  One-to-several (multicast) unicast broadcast multicast
  • 11.  Open Systems Interconnection Reference Model  Splits communication system into seven layers  Each layer performs their task and passes the data to the next layer Layer 7: Application Layer 6: Presentation Layer 5: Session Layer 4: Transport Layer 3: Network Layer 2: Data Link Layer 1: Physical
  • 12. Network Layer Data Link Layer IP ARP Network Access Media ICMP IGMP Transport Layer TCP UDP  IP is a Network Layer Protocol
  • 13.  This layer deals with the Hardware of network.  Physical Layer Hardware ◦ Cables , Connectors, Hubs, Repeaters.. Etc.  Function :  Manages signaling to and from physical network connections  Physical Layer Protocols & Standards ◦ Ethernet (802.3), Token Ring(802.5) , Wi-Fi(802.11)
  • 14.  This layer deals with MAC addresses of devices  Responsible for Physical Addressing , Error correction & preparing the information for the media frames.  Devices  Switches , Bridges , Wireless Access Points , NICs, etc.  Data Link Layer Protocols & Standards  L2TP, PPP,SLIP etc….
  • 15.  This layer deals with Packets (Data Bundles)  Responsible for logical addressing and routing  Devices  Routers, Layer 3 Switches, Firewalls.. Etc.  Network Layer Protocols  ARP, IP, RIP, IGRP.. Etc.
  • 16.  This layer deals with Segments  Breaks information into segments and is responsible for connection & connectionless communication  Hardware ◦ Proxy Server , Gateways , Firewall…etc.  Transport Layer Protocols  TCP  UDP
  • 17.  Responsible for establishing, managing & terminating user connections.  Acknowledgements of data received during a session.  Retransmission of data if it is not received by a device.  Session Layer Protocols  RTP , SIP , Net BIOS.. etc.
  • 18.  Allows hosts & applications to use a common language.  Performs..  Data formatting  Encryption & Decryption for security  Compression & Expansion  Examples  JPEG, MP3, MPEG…. Etc.
  • 19.  This layer is what the user sees…. (Loading an application such as web browser or email..)  Provides Interface for users to communicate with applications.  Examples ◦ Email , Instant Messengers, Http , SMTP, Telnet, Ping… etc.
  • 20.  TCP/IP is a set of protocols developed to allow cooperating computers to share resources across a network.  TCP stands for Transmission Control Protocol  They are Transport Layer & Network Layer protocols in OSI model.  The most well known network that adopted TCP/IP is --> Internet. ( The Biggest WAN)
  • 21.  TCP/IP was developed very Early!  Technologies were widely discussed in documents called “Request For Comments” (RFC) – free of charge  Supported by UNIX Operating System
  • 22.  Because TCP/IP was developed earlier than the OSI 7 layer model, it doesn’t have 7 layers but only 4 layers. Application Layer Transport Layer Internet Layer Network Access Layer
  • 23.
  • 24.  Application layer protocols defined the rules when implementing specific network applications.  Examples : ◦ FTP – (File Transfer Protocol) ◦ Telnet – ( Remote Terminal Protocol) ◦ SMTP – (Simple Mail Transfer Protocol) ◦ HTTP – (Hyper Text Transfer Protocol)
  • 25.  End to End data transfer……  Examples : ◦ TCP (Transmission Control Protocol)  Connection oriented (connection established before data exchanged)  Reliable delivery of data ◦ UDP (User Datagram Protocol)  Connectionless service  Delivery is not guaranteed (unreliable)
  • 26.  Internet layer protocols define the rules of how to find the routers for a packet to the destination.  It only gives best effort delivery. (packets can be delayed, corrupted, lost or out of order)  Examples : ◦ IP – Internet Protocol (Provide packet delivery) ◦ ARP – Address Resolution Protocol (Defined the procedure of network address / mac address translation) ◦ ICMP – Internet Control Message Protocol (Defined the procedure of error message transfer)
  • 27.  Also known as Network Interface Layer…  The Network Access Layer is the layer in the TCP/IP model at which data is transmitted and received across the physical network. ◦ Mostly in hardware ◦ A well known example is Ethernet  Examples : ◦ Ethernet ◦ Token Ring ◦ Frame Relay ◦ ATM (Asynchronous Transfer Mode)
  • 28.  What is an IP address…? ◦ An IP address is a unique global address for a network interface - is a 32 bit long identifier - encodes a network number (network prefix) and a host number 1000111110000000 10001001 10010000 1st Byte = 128 2nd Byte = 143 3rd Byte = 137 4th Byte = 144 128.143.137.144
  • 29.
  • 30.  Class A addresses are assigned to networks with a very large number of hosts  The high-order bit in a class A address is always set to zero.  The next seven bits (completing the first octet) complete the network ID.  The remaining 24 bits represent the host ID.
  • 31.  Class B addresses are assigned to medium- sized to large-sized networks.  The two high-order bits in a class B address are always set to binary 1 0.  The next 14 bits complete the network ID.  The remaining 16 bits represent the host ID.
  • 32.  Class C addresses are used for small networks.  The three high-order bits in a class C address are always set to binary 1 1 0.  The next 21 bits complete the network ID.  The remaining 8 bits represent the host ID.
  • 33.  Class D addresses are reserved for IP multicast addresses.  The four high-order bits in a class D address are always set to binary 1 1 1 0.  The remaining bits are for the address that interested hosts recognize.  Class E is an experimental address that is reserved for future use  The high-order bits in a class E address are set to 1111.
  • 34.  The network ID cannot begin with the number 127. The number 127 in a class A address is reserved for internal loopback functions.  All bits within the network ID cannot be set to 1. All 1's in the network ID are reserved for use as an IP broadcast address. Address Class First Network ID Last Network ID Class A 1.0.0.0 126.0.0.0 Class B 128.0.0.0 191.255.0.0 Class C 192.0.0.0 223.255.255.0
  • 35.  Subnetting enables the network administrator to further divide the host part of the address into two or more subnets.  In this case, a part of the host address is reserved to identify the particular subnet.  This is easier to see if we show the IP address in binary format.
  • 36.  Subnet masks are frequently expressed in dotted decimal notation.  Subnet mask is not an IP address.  Each host on a TCP/IP network requires a subnet mask even on a single segment network. Address Class Bits for Subnet Mask Subnet Mask Class A 11111111 00000000 00000000 00000000 255.0.0.0 Class B 11111111 11111111 00000000 00000000 255.255.0.0 Class C 11111111 11111111 11111111 00000000 255.255.255.0
  • 37.  IPV(1-3) : were not formally assigned.  IPV4 : TCP/IP , 32bit IP address currently used.  IPV5 : Internet Stream Protocol (SP)  Experimental Protocol  Never Introduced for public use.  IPV6 : Designed to replace IPV4 , 128bit IP address
  • 38.  Connectionless protocol and best effort based.  Simplicity  It is simpler and easy to remember  Require less memory  Familiarity  Millions of devices are already knowing it  Existing infrastructure already support it
  • 39.  Widely support  Shorter & Sweeter (header)  Support of all Operating Systems  All commonly used protocols are supported
  • 40.  IPV4 specification didn’t identify any security mechanism.  Millions of class A addresses are wasted.  Many class B addresses also wasted.  Not so many organizations are so small to have a class C block.  Class E addresses were reserved for future purposes.
  • 41.  PCs  Servers  Modems  Routers  Printers  Cameras  Smart Phones  Tablets & Gaming Systems  Just about anything else connecting to the Internet
  • 42. IPV6 provides a platform on new internet functionality that will be needed in the immediate future and provide flexibility for future growth and expansion.
  • 43. IPV6 New header format Large address space Built in Security Extensibility Better support for QoS Efficient & hierarchical addressing and routing infrastructure
  • 44.  Internet  VoIP  IP – TV  IP-VPN  Wireless Mobile Technology  Internet Broadcasting  Multihoming