SlideShare una empresa de Scribd logo
1 de 14
TCP-IP

    Web Technologies
piero.fraternali@polimi.it
Outline
• ISO-OSI
• TCP-IP
   – The TCP-IP suite
   – New features of IPv6
• HTTP 1.0 e 1.1
   –   actors
   –   request & response
   –   security
   –   server and client architecture
   –   multi-tier architecture
• References
ISO/OSI
• International Standard Organization
• Open System Interconnection
• Standardization of the concepts of multi-level
  protocol for network communicaiton
• 7 levels stack
• Each stack level uses services from the inferior
  level and offers services to the superior level
• Reference model, not fully implemented
The stack




http://www.novell.com/info/primer/prim05.html
An example
Implementations
TCP-IP
• The protocol suite of
  the Internet packet
  switching network
• Focus on
  heterogeneous inter-
  networking
• Compacts the upper
  levels of the ISO-OSI
  model
  http://tools.ietf.org/html/rfc1122
  Requirements for Internet Hosts -- Communication Layers
TCP-IP stack
Stack                                               ISO/OSI vs TCP-IP
•   Application layer : where applications create
    data and communicate to other processes on
    another or the same host ( peer).
    SMTP, FTP, SSH, HTTP are examples of
    protocols at this level
•   Transport layer: hides the topology (layout)
    of the underlying network connections.
    Provides flow-control, error-correction, and
    connection protocols (e.g., TCP, UDP). Deals
    with opening and maintaining connections
    between hosts.
•   Internet layer (internetworking): masters the
    exchange of datagrams across networks.
    Defines the addressing and routing
    structures. The primary protocol is IP, which
    defines IP addresses.
•   Link layer: defines the networking methods
    within the scope of the local network link on
    which hosts communicate without
    intervening routers. Defines the protocols
    used to describe the local network topology
    and the interfaces needed to transmit
    datagrams to neighboring hosts.
Internet Protocol
  • Primary protocol in the
    Internet layer of the
    Internet protocol suite
  • Addresses how packets are
    delivered from the source
    host to the destination host
  • Defines
        – datagram structures that
          encapsulate the data to be
          delivered
                                                     IPv4 Datagram Format
        – addressing methods used to
          label the datagram source
          and destination

http://www.tcpipguide.com/free/t_IPDatagramGeneralFormat.htm
Transport over IP
• Motivation: IP is connectionless, unreliable and unacknowledged
• Applications may havve different transport requirements (reliability
  vs space-time tradeoff)
• Transmission Control Protocol (TCP): allows a pair of devices to
  establish a virtual connection and then pass data bidirectionally.
  Transmissions are managed using a special sliding window
  system, with unacknowledged transmissions detected and
  automatically retransmitted.
    – Examples applications: (HTTP) used by the World Wide Web
      (WWW), File Transfer Protocol (FTP); Simple Mail Transfer Protocol
      (SMTP).
• User Datagram Protocol (UDP): A very simple transport protocol
  that acting as a “wrapper” around IP. No connection is
  established, transmissions are unreliable, and data can be lost.
   •   Examples applications: multimedia streaming, multicast applications
TCP functions
•   Addressing/Multiplexing: multiplexes the data
    received from these different applications
    (processes) identified using TCP ports.
•   Connection Establishment, Management and
    Termination: establishes procedures to negotiate
    and establish a TCP connection. Plus logic for
    managing connections and handling problems.
    When a device is done with a TCP connection, a
    special process is followed to terminate it.
•   Data Handling and Packaging: defines how
    applications send data from higher layers. This data
    is then packaged into messages to be sent to the
    destination. The destination software unpackages
    the data and gives it to the application on the
    destination machine.
•   Data Transfer: this is done by passing the data
    packets to the underlying network-layer
    protocol, normally IP.
•   Reliability and Transmission Quality Services:
    includes features that allow an application to
    consider the sending of data using the protocol to
    be “reliable”.
•   Flow Control and Congestion Avoidance : allows
    the flow of data between two devices to be
    controlled and managed and deals with congestion.
TCP essential features
•   Connection-Oriented: devices must establish a connection with each other before they send data.
•   Bidirectional: Once a connection is established, TCP devices send data bi-directionally. Both devices
    on the connection can send and receive, regardless of which of them initiated the connection.
•   Multiply-Connected and Endpoint-Identified: TCP connections are identified by the pair of sockets
    used by the two devices in the connection. Each device can have multiple connections
    opened, either to the same IP device or different IP devices, and can handle each connection
    independently.
•   Reliable: TCP keeps track of data sent and received to ensure it all gets to its destination.
•   Acknowledged: all transmissions are acknowledged (at the TCP layer—TCP cannot guarantee
    reception by the remote application).
•   Stream-Oriented: TCP allows applications to send a continuous stream of data and chunks it for
    transmission.
•   Data-Unstructured: there are no TCP divisions between data elements in the data stream.
    Applications must differentiate one message (data element, record, etc.) from the next.
•   Data-Flow-Managed: A TCP connection ensures that data flows evenly and smoothly, with means
    to deal with errors.
Internet Protocol v 6
REFERENCE                           DESIGN GOALS
• First major change since          • Larger Address Space
  IPv4 was formalized in 1981.      • Better Management of
• Relevant RFCs                       Address Space
   – RFC 2460 (Internet             • Elimination of NAT
     Protocol, Version 6 (IPv6)     • Easier TCP/IP Administration
     Specification)
                                    • Modern Design For Routing
       • RFC 2461, IPv6 Neighbor
         Discovery Protocol         • Better Support For
       • RFC 2463, ICMP version 6     Multicasting
         (ICMPv6) for IPv6          • Better Support For Security
                                    • Better Support For Mobility
IPv6 major changes
•   Larger Address Space: IPv6 addresses are 128 bits long instead of 32 bits. From around 4 billion to
    over 300 trillion trillion trillion addresses.
•   Hierarchical Address Space: to provide a large number of addresses for each class
•   Hierarchical Assignment of Unicast Addresses: the unicast address structure reflects the overall
    topology of the Internet. It allows for multiple levels of network and subnetwork hierarchies both
    at the ISP and organizational level. It also permits generating IP addresses based on underlying
    hardware interface device IDs such as Ethernet MAC addresses.
•   Better Support for Non-Unicast Addressing: multicasting improved, a new type of addressing:
    anycast addressing ( “deliver this message to the easiest-to-reach member of this group”)
•   Autoconfiguration and Renumbering: easier autoconfiguration of hosts and renumbering of the IP
    addresses in networks and subnetworks.
•   New Datagram Format: The main header of each IP datagram has been streamlined, and support
    added for extending the header for datagrams requiring more control information.
•   Support for Quality of Service: IPv6 datagrams include QoS features, for multimedia and other
    applications requiring quality of service.
•   Security Support: Security support is designed into IPv6 using the authentication and encryption
    extension headers and other features.
•   Updated Fragmentation and Reassembly Procedures: to improve efficiency of routing.
•   Modernized Routing Support: to support modern routing systems and to allow expansion.
•   Transition Capabilities: plan for interoperating IPv4 and IPv6 networks, mapping between IPv4 and
    IPv6 addresses, etc.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Web technology Unit-I Part E
Web technology Unit-I   Part EWeb technology Unit-I   Part E
Web technology Unit-I Part E
 
Network layer
Network layerNetwork layer
Network layer
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
 
Unit v
Unit v Unit v
Unit v
 
Application layer
Application layerApplication layer
Application layer
 
COMPUTER NETWORKS UNIT 5
COMPUTER NETWORKS UNIT 5COMPUTER NETWORKS UNIT 5
COMPUTER NETWORKS UNIT 5
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layer
 
Application layer
Application layerApplication layer
Application layer
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Web technology unit I - Part B
Web technology unit I - Part BWeb technology unit I - Part B
Web technology unit I - Part B
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Email HTTP And FTP
Email HTTP And FTP Email HTTP And FTP
Email HTTP And FTP
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer network
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 

Destacado

Web technologies course, an introduction
Web technologies course, an introductionWeb technologies course, an introduction
Web technologies course, an introductionPiero Fraternali
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applicationsOnline
 
Modern web technologies
Modern web technologiesModern web technologies
Modern web technologiesOday Alqarra
 
Introduction to Modern and Emerging Web Technologies
Introduction to Modern and Emerging Web TechnologiesIntroduction to Modern and Emerging Web Technologies
Introduction to Modern and Emerging Web TechnologiesSuresh Patidar
 
Intro to modern web technology
Intro to modern web technologyIntro to modern web technology
Intro to modern web technologyChris Love
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path FirstKashif Latif
 
Latest Trends in Web Technologies
Latest Trends in Web TechnologiesLatest Trends in Web Technologies
Latest Trends in Web Technologiesbryanbibat
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1nhepner
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram ProtocolPeter R. Egli
 
Web Design & Development Trends Presentation
Web Design & Development Trends PresentationWeb Design & Development Trends Presentation
Web Design & Development Trends PresentationRichard Bowden
 
introduction to web technology
introduction to web technologyintroduction to web technology
introduction to web technologyvikram singh
 
Web Development Trends 2016
Web Development Trends 2016Web Development Trends 2016
Web Development Trends 2016Miva
 

Destacado (20)

Web technologies course, an introduction
Web technologies course, an introductionWeb technologies course, an introduction
Web technologies course, an introduction
 
Lecture03 H
Lecture03 HLecture03 H
Lecture03 H
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Ospf
OspfOspf
Ospf
 
Modern web technologies
Modern web technologiesModern web technologies
Modern web technologies
 
Introduction to Modern and Emerging Web Technologies
Introduction to Modern and Emerging Web TechnologiesIntroduction to Modern and Emerging Web Technologies
Introduction to Modern and Emerging Web Technologies
 
Intro to modern web technology
Intro to modern web technologyIntro to modern web technology
Intro to modern web technology
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
 
Bgp tutorial for ISP
Bgp tutorial for ISPBgp tutorial for ISP
Bgp tutorial for ISP
 
Latest Trends in Web Technologies
Latest Trends in Web TechnologiesLatest Trends in Web Technologies
Latest Trends in Web Technologies
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Web technology
Web technologyWeb technology
Web technology
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
Web Design & Development Trends Presentation
Web Design & Development Trends PresentationWeb Design & Development Trends Presentation
Web Design & Development Trends Presentation
 
introduction to web technology
introduction to web technologyintroduction to web technology
introduction to web technology
 
Web Development Trends 2016
Web Development Trends 2016Web Development Trends 2016
Web Development Trends 2016
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar a TCP-IP Protocol Suite and IPv6 Features

Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- finalTaymoor Nazmy
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnectionKingPinYT
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Travis Leong Ping
 
02 coms 525 tcpip - introduction to tcpip
02   coms 525 tcpip -  introduction to tcpip02   coms 525 tcpip -  introduction to tcpip
02 coms 525 tcpip - introduction to tcpipPalanivel Kuppusamy
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
Computer design and Architechure and Algorithm
Computer design and Architechure and AlgorithmComputer design and Architechure and Algorithm
Computer design and Architechure and Algorithmmirzaahmadali
 
02-ProtocolArchitecture william stellings.ppt
02-ProtocolArchitecture william stellings.ppt02-ProtocolArchitecture william stellings.ppt
02-ProtocolArchitecture william stellings.pptstriker78669
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalKarthikeyan Dhayalan
 

Similar a TCP-IP Protocol Suite and IPv6 Features (20)

TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Sargation university's open system interconnection
Sargation university's open system interconnectionSargation university's open system interconnection
Sargation university's open system interconnection
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Osi
OsiOsi
Osi
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
clg_assgn.pptx
clg_assgn.pptxclg_assgn.pptx
clg_assgn.pptx
 
lecture 4.pptx
lecture 4.pptxlecture 4.pptx
lecture 4.pptx
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013
 
02 coms 525 tcpip - introduction to tcpip
02   coms 525 tcpip -  introduction to tcpip02   coms 525 tcpip -  introduction to tcpip
02 coms 525 tcpip - introduction to tcpip
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Computer design and Architechure and Algorithm
Computer design and Architechure and AlgorithmComputer design and Architechure and Algorithm
Computer design and Architechure and Algorithm
 
02-ProtocolArchitecture william stellings.ppt
02-ProtocolArchitecture william stellings.ppt02-ProtocolArchitecture william stellings.ppt
02-ProtocolArchitecture william stellings.ppt
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 

Más de Piero Fraternali

Multimedia on the mountaintop: presentation at ACM MM2016
Multimedia on the mountaintop: presentation at ACM MM2016Multimedia on the mountaintop: presentation at ACM MM2016
Multimedia on the mountaintop: presentation at ACM MM2016Piero Fraternali
 
presentation at European Utility Week, Vienna, Nov. 2015
presentation at European Utility Week, Vienna, Nov. 2015presentation at European Utility Week, Vienna, Nov. 2015
presentation at European Utility Week, Vienna, Nov. 2015Piero Fraternali
 
Fraternali concertation june25bruxelles
Fraternali concertation june25bruxellesFraternali concertation june25bruxelles
Fraternali concertation june25bruxellesPiero Fraternali
 
Crowsourcing (anche) per le aziende del settore tessile e della moda
Crowsourcing (anche) per le aziende del settore tessile e della modaCrowsourcing (anche) per le aziende del settore tessile e della moda
Crowsourcing (anche) per le aziende del settore tessile e della modaPiero Fraternali
 
06 1 array_stringhe_typedef
06 1 array_stringhe_typedef06 1 array_stringhe_typedef
06 1 array_stringhe_typedefPiero Fraternali
 
05 3 istruzioni-selezione-iterazione-condizioni
05 3 istruzioni-selezione-iterazione-condizioni05 3 istruzioni-selezione-iterazione-condizioni
05 3 istruzioni-selezione-iterazione-condizioniPiero Fraternali
 
05 2 integrali-conversioni-costanti-preproc-inclusione
05 2 integrali-conversioni-costanti-preproc-inclusione05 2 integrali-conversioni-costanti-preproc-inclusione
05 2 integrali-conversioni-costanti-preproc-inclusionePiero Fraternali
 
Human computation and participatory systems
Human computation and participatory systems Human computation and participatory systems
Human computation and participatory systems Piero Fraternali
 
Better society: Meet us at #ICT2013eu for #trustedsocialmedia http://bit.ly/1...
Better society: Meet us at #ICT2013eu for #trustedsocialmedia http://bit.ly/1...Better society: Meet us at #ICT2013eu for #trustedsocialmedia http://bit.ly/1...
Better society: Meet us at #ICT2013eu for #trustedsocialmedia http://bit.ly/1...Piero Fraternali
 
Human and social computation
Human and social computation Human and social computation
Human and social computation Piero Fraternali
 
Web technologies: Model Driven Engineering
Web technologies: Model Driven EngineeringWeb technologies: Model Driven Engineering
Web technologies: Model Driven EngineeringPiero Fraternali
 

Más de Piero Fraternali (20)

Multimedia on the mountaintop: presentation at ACM MM2016
Multimedia on the mountaintop: presentation at ACM MM2016Multimedia on the mountaintop: presentation at ACM MM2016
Multimedia on the mountaintop: presentation at ACM MM2016
 
presentation at European Utility Week, Vienna, Nov. 2015
presentation at European Utility Week, Vienna, Nov. 2015presentation at European Utility Week, Vienna, Nov. 2015
presentation at European Utility Week, Vienna, Nov. 2015
 
Fraternali concertation june25bruxelles
Fraternali concertation june25bruxellesFraternali concertation june25bruxelles
Fraternali concertation june25bruxelles
 
Crowsourcing (anche) per le aziende del settore tessile e della moda
Crowsourcing (anche) per le aziende del settore tessile e della modaCrowsourcing (anche) per le aziende del settore tessile e della moda
Crowsourcing (anche) per le aziende del settore tessile e della moda
 
07 2 ricorsione
07 2 ricorsione07 2 ricorsione
07 2 ricorsione
 
07 1 funzioni
07 1 funzioni07 1 funzioni
07 1 funzioni
 
06 2 vector_matrici
06 2 vector_matrici06 2 vector_matrici
06 2 vector_matrici
 
06 1 array_stringhe_typedef
06 1 array_stringhe_typedef06 1 array_stringhe_typedef
06 1 array_stringhe_typedef
 
05 3 istruzioni-selezione-iterazione-condizioni
05 3 istruzioni-selezione-iterazione-condizioni05 3 istruzioni-selezione-iterazione-condizioni
05 3 istruzioni-selezione-iterazione-condizioni
 
05 2 integrali-conversioni-costanti-preproc-inclusione
05 2 integrali-conversioni-costanti-preproc-inclusione05 2 integrali-conversioni-costanti-preproc-inclusione
05 2 integrali-conversioni-costanti-preproc-inclusione
 
05 1 intro-struttura
05 1 intro-struttura05 1 intro-struttura
05 1 intro-struttura
 
03 2 arit_bin
03 2 arit_bin03 2 arit_bin
03 2 arit_bin
 
03 1 alg_bool
03 1 alg_bool03 1 alg_bool
03 1 alg_bool
 
02 algo programmi
02 algo programmi02 algo programmi
02 algo programmi
 
06 3 struct
06 3 struct06 3 struct
06 3 struct
 
Human computation and participatory systems
Human computation and participatory systems Human computation and participatory systems
Human computation and participatory systems
 
Better society: Meet us at #ICT2013eu for #trustedsocialmedia http://bit.ly/1...
Better society: Meet us at #ICT2013eu for #trustedsocialmedia http://bit.ly/1...Better society: Meet us at #ICT2013eu for #trustedsocialmedia http://bit.ly/1...
Better society: Meet us at #ICT2013eu for #trustedsocialmedia http://bit.ly/1...
 
So human presentation
So human presentationSo human presentation
So human presentation
 
Human and social computation
Human and social computation Human and social computation
Human and social computation
 
Web technologies: Model Driven Engineering
Web technologies: Model Driven EngineeringWeb technologies: Model Driven Engineering
Web technologies: Model Driven Engineering
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

TCP-IP Protocol Suite and IPv6 Features

  • 1. TCP-IP Web Technologies piero.fraternali@polimi.it
  • 2. Outline • ISO-OSI • TCP-IP – The TCP-IP suite – New features of IPv6 • HTTP 1.0 e 1.1 – actors – request & response – security – server and client architecture – multi-tier architecture • References
  • 3. ISO/OSI • International Standard Organization • Open System Interconnection • Standardization of the concepts of multi-level protocol for network communicaiton • 7 levels stack • Each stack level uses services from the inferior level and offers services to the superior level • Reference model, not fully implemented
  • 7. TCP-IP • The protocol suite of the Internet packet switching network • Focus on heterogeneous inter- networking • Compacts the upper levels of the ISO-OSI model http://tools.ietf.org/html/rfc1122 Requirements for Internet Hosts -- Communication Layers
  • 8. TCP-IP stack Stack ISO/OSI vs TCP-IP • Application layer : where applications create data and communicate to other processes on another or the same host ( peer). SMTP, FTP, SSH, HTTP are examples of protocols at this level • Transport layer: hides the topology (layout) of the underlying network connections. Provides flow-control, error-correction, and connection protocols (e.g., TCP, UDP). Deals with opening and maintaining connections between hosts. • Internet layer (internetworking): masters the exchange of datagrams across networks. Defines the addressing and routing structures. The primary protocol is IP, which defines IP addresses. • Link layer: defines the networking methods within the scope of the local network link on which hosts communicate without intervening routers. Defines the protocols used to describe the local network topology and the interfaces needed to transmit datagrams to neighboring hosts.
  • 9. Internet Protocol • Primary protocol in the Internet layer of the Internet protocol suite • Addresses how packets are delivered from the source host to the destination host • Defines – datagram structures that encapsulate the data to be delivered IPv4 Datagram Format – addressing methods used to label the datagram source and destination http://www.tcpipguide.com/free/t_IPDatagramGeneralFormat.htm
  • 10. Transport over IP • Motivation: IP is connectionless, unreliable and unacknowledged • Applications may havve different transport requirements (reliability vs space-time tradeoff) • Transmission Control Protocol (TCP): allows a pair of devices to establish a virtual connection and then pass data bidirectionally. Transmissions are managed using a special sliding window system, with unacknowledged transmissions detected and automatically retransmitted. – Examples applications: (HTTP) used by the World Wide Web (WWW), File Transfer Protocol (FTP); Simple Mail Transfer Protocol (SMTP). • User Datagram Protocol (UDP): A very simple transport protocol that acting as a “wrapper” around IP. No connection is established, transmissions are unreliable, and data can be lost. • Examples applications: multimedia streaming, multicast applications
  • 11. TCP functions • Addressing/Multiplexing: multiplexes the data received from these different applications (processes) identified using TCP ports. • Connection Establishment, Management and Termination: establishes procedures to negotiate and establish a TCP connection. Plus logic for managing connections and handling problems. When a device is done with a TCP connection, a special process is followed to terminate it. • Data Handling and Packaging: defines how applications send data from higher layers. This data is then packaged into messages to be sent to the destination. The destination software unpackages the data and gives it to the application on the destination machine. • Data Transfer: this is done by passing the data packets to the underlying network-layer protocol, normally IP. • Reliability and Transmission Quality Services: includes features that allow an application to consider the sending of data using the protocol to be “reliable”. • Flow Control and Congestion Avoidance : allows the flow of data between two devices to be controlled and managed and deals with congestion.
  • 12. TCP essential features • Connection-Oriented: devices must establish a connection with each other before they send data. • Bidirectional: Once a connection is established, TCP devices send data bi-directionally. Both devices on the connection can send and receive, regardless of which of them initiated the connection. • Multiply-Connected and Endpoint-Identified: TCP connections are identified by the pair of sockets used by the two devices in the connection. Each device can have multiple connections opened, either to the same IP device or different IP devices, and can handle each connection independently. • Reliable: TCP keeps track of data sent and received to ensure it all gets to its destination. • Acknowledged: all transmissions are acknowledged (at the TCP layer—TCP cannot guarantee reception by the remote application). • Stream-Oriented: TCP allows applications to send a continuous stream of data and chunks it for transmission. • Data-Unstructured: there are no TCP divisions between data elements in the data stream. Applications must differentiate one message (data element, record, etc.) from the next. • Data-Flow-Managed: A TCP connection ensures that data flows evenly and smoothly, with means to deal with errors.
  • 13. Internet Protocol v 6 REFERENCE DESIGN GOALS • First major change since • Larger Address Space IPv4 was formalized in 1981. • Better Management of • Relevant RFCs Address Space – RFC 2460 (Internet • Elimination of NAT Protocol, Version 6 (IPv6) • Easier TCP/IP Administration Specification) • Modern Design For Routing • RFC 2461, IPv6 Neighbor Discovery Protocol • Better Support For • RFC 2463, ICMP version 6 Multicasting (ICMPv6) for IPv6 • Better Support For Security • Better Support For Mobility
  • 14. IPv6 major changes • Larger Address Space: IPv6 addresses are 128 bits long instead of 32 bits. From around 4 billion to over 300 trillion trillion trillion addresses. • Hierarchical Address Space: to provide a large number of addresses for each class • Hierarchical Assignment of Unicast Addresses: the unicast address structure reflects the overall topology of the Internet. It allows for multiple levels of network and subnetwork hierarchies both at the ISP and organizational level. It also permits generating IP addresses based on underlying hardware interface device IDs such as Ethernet MAC addresses. • Better Support for Non-Unicast Addressing: multicasting improved, a new type of addressing: anycast addressing ( “deliver this message to the easiest-to-reach member of this group”) • Autoconfiguration and Renumbering: easier autoconfiguration of hosts and renumbering of the IP addresses in networks and subnetworks. • New Datagram Format: The main header of each IP datagram has been streamlined, and support added for extending the header for datagrams requiring more control information. • Support for Quality of Service: IPv6 datagrams include QoS features, for multimedia and other applications requiring quality of service. • Security Support: Security support is designed into IPv6 using the authentication and encryption extension headers and other features. • Updated Fragmentation and Reassembly Procedures: to improve efficiency of routing. • Modernized Routing Support: to support modern routing systems and to allow expansion. • Transition Capabilities: plan for interoperating IPv4 and IPv6 networks, mapping between IPv4 and IPv6 addresses, etc.