Lecture 2: Overview of TCP/IP protocol

Slides:



Advertisements
Similar presentations
CCNA – Network Fundamentals
Advertisements

Chapter 2 Network Models.
Gursharan Singh Tatla Transport Layer 16-May
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
CS 356 Systems Security Spring Dr. Indrajit Ray
NETWORKING CONCEPTS. TCP/IP The TCPIIP protocol suite was developed prior to the OSI model TCP/IP protocol suite was defined as having four layers: Host-to-network,
Chapter 2 Network Models
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Mukesh N. Tekwani Elphinstone College Mumbai
TCP/IP PROTOCOL SUITE The TCPIIP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not exactly.
NET 221D:Computer Networks Fundamentals
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Net 221D:Computer Networks Fundamentals
2.1 Chapter 2 Network Models – cont. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 2 Network Models
CompTIA Security+ Study Guide (SY0-401)
Introduction to Networks
Chapter 5 Network and Transport Layers
Computer Networks.
Chapter 3 outline 3.1 Transport-layer services
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Introduction to TCP/IP
OSI Model And TCP\IP SUITE
OSI Protocol Stack Given the post man exemple.
Layered Architectures
Networking for Home and Small Businesses – Chapter 6
Network Architecture Introductory material
Net 431: ADVANCED COMPUTER NETWORKS
Introduction to Protocol and Layer
Introduction to Networks
Net431:advanced net services
Networking for Home and Small Businesses – Chapter 6
CompTIA Security+ Study Guide (SY0-401)
Chapter 2 Network Models
Review of Important Networking Concepts
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Process-to-Process Delivery:
Review of Important Networking Concepts
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
Communication Networks NETW 501
Network Model.
TCP/IP Protocol Suite: Review
Lecture 3: Secure Network Architecture
Networking Theory (part 2)
Net 323 D: Networks Protocols
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
CSCD 330 Network Programming
Chapter 2 Network Models
Data Communication Networks
Networking for Home and Small Businesses – Chapter 6
OSI Reference Model Unit II
Kyle Broussard, Alexandra Mikolai,
Review of Important Networking Concepts
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Transport Layer 9/22/2019.
Networking Theory (part 2)
Transport Layer Our goals:
Networking Theory (part 2)
Unit – III Network Essentials
Presentation transcript:

Lecture 2: Overview of TCP/IP protocol NET 536 Network Security Networks and Communication Department Lecture 2: Overview of TCP/IP protocol

lecture contents: Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. 14-Jan-19 Networks and Communication Department

TPC/IP Review Ideally, a secure network architecture is designed before any systems are in place. TPC/IP review: Internet is made up of a wide variety of computers, from supercomputers to personal computers. Each of these computers has its type of software and application running. How do all of these computers understand each other and work together ? There are a set of rules to govern communications so each computer understand how to act and how to interpret the actions of the other computers.

TCP/IP architectural models TCP/IP is a hierarchical protocol made up of interactive modules, each of which provides a specific functionality. The layers of the TCP/IP protocol suite contain relatively independent protocols. The term hierarchical means that each upper-level protocol is supported by one or more lower-level protocols. 14-Jan-19 Networks and Communication Department

OSI models 14-Jan-19 Networks and Communication Department

TCP/IP Architectural Models 14-Jan-19 Networks and Communication Department

TCP protocol layers Physical Layer Data Link Layer The physical network layer specifies the characteristics of the hardware to be used for the network. For example, it specifies the physical characteristics of the communications media Data Link Layer The data-link layer identifies the network protocol type of the packet, in this case TCP/IP. It also provides error control and "framing." No specific protocol is defined at this layer, rather, TCP/IP model supports all the standard and proprietary protocols. 14-Jan-19 Networks and Communication Department

TCP protocol layers Network layer (internetwork layer) TCP/IP at this layer supports the Internetworking Protocol (IP) There are also some other protocols that support data movement in this layer. Including: ARP, RARP, ICMP, and IGMP. 14-Jan-19 Networks and Communication Department

TCP protocol layers: Protocols at the network layer Internetworking Protocol (IP) Most important protocol of the TCP/IP network stack! Implements internetworking. IP is an unreliable and connectionless protocol- a best-effort delivery. It is host-to-host protocol. 14-Jan-19 Networks and Communication Department

TCP protocol layers: Protocols at the network layer Address Resolution Protocol (ARP) It is used to find the physical address (NIC) of the node after its Network address is known. Reverse Address Resolution Protocol (RARP) It is used to find the Internet address of the node after its physical address is known. 14-Jan-19 Networks and Communication Department

TCP protocol layers: Protocols at the network layer Internet Control Message Protocol (ICMP) It is used by hosts and gateways to send notification of datagrams ( packets) problem back to the sender. Internet Group Message Protocol (IGMP) It is used to facilitate the simultaneous transmission of messages to a group of recipients. 14-Jan-19 Networks and Communication Department

TCP protocol layers Transport Layer In this layer, the protocol is responsible for delivery of message from a process to another process. 14-Jan-19 Networks and Communication Department

TCP protocol layers: Protocols at the Transport layer User Datagram Protocol (UDP) It adds port addresses, checksum error control, and length information to the data from the upper layer. Transmission Control Protocol (TCP) It is reliable and connection-oriented. Stream Control Transmission Protocol (STCP) It supports the newer application e.g. voice over the Internet. It combine best features of UDP and TCP. 14-Jan-19 Networks and Communication Department

TCP protocol layers Application Layer The application layer in TCP/IP is equivalent to the combined session, presentation, and application. 14-Jan-19 Networks and Communication Department

TPC/IP Review When transferring information across a network, TCP breaks information into small pieces (packets). Each packet is sent separately. TCP has support to detect errors, and lost of data. IP handles carrying TCP packets from one computer to the other one based on 4 bytes (destination IP address). Each computer is uniquely identified by a specific IP address. When a client requests a service from a server, it builds a TCP connection with the server. 14-Jan-19 Networks and Communication Department

TPC/IP Review TCP connection includes : connection establishment Data exchange Connection termination A port number is used to distinguish various services. A Port is a way to identify a specific service on a computer in a network. 14-Jan-19 Networks and Communication Department

TPC/IP Review 14-Jan-19 Networks and Communication Department

TPC/IP Review Port 80 is used by HTTP (send and retrieve web pages). Port numbers are specified by a 16 bits and enumerated from 0 to 65535. End to End communication can be identified by: IP address source, source Port, IP address destination, destination Port. Basic connection: Client browser finds first an unused dynamic port) 14-Jan-19 Networks and Communication Department

TPC/IP Review 14-Jan-19 Networks and Communication Department

TPC/IP Review A client program A (IP 5.6.7.8) wants to open a connection with a server B (IP 1.2.3.4) for web service (on port 80). A begins the connection attempt by dynamically openning a port, say 1078. A sends 5.6.7.8: 1078 1.2.3.4: 80 Syn = 1. B receives the packet and understands that A wants to form a new connection. B sends a response for A 1.2.3.4: 80 5.6.7.8: 1078 Syn= 1, ACK = 1 A informs B that the response has been received 5.6.7.8: 1078 1.2.3.4: 80 Syn =0 14-Jan-19 Networks and Communication Department

Security Principles Security principles: 1- Least privilege: States that a user should have only the privileges needed to do his job. Least privilege is enforced using a network device, such as a router with an access control list (ACL) which tells a computer operating system which access rights each user has to a particular object. 2- Layered security: Is the concept that security functions should happen at multiple layers. 14-Jan-19 Networks and Communication Department

Security Principles Physical layer: traditional security measures such as cameras, walls are used to present unauthorized users. Data link: unused port can be disabled. We can also rely on VPN. Network layer: firewalls and ACLs restrict network access. Intrusion detection may base its decision on TCP/UDP port numbers.(transport layer) Proxies operate between the transport and the application layer. Top layers are application content inspection services (anti-virus scanners,…). 14-Jan-19 Networks and Communication Department

Security Principles 3- Functional segmentation: Is based on layered security and the principle of least privilege. Functional segmentation suggests a design in which the network is partitioned according to user or device function. Each segment may be further divided by academic department. Segmentation advantage is in preventing the spread of worms such as slammers. 14-Jan-19 Networks and Communication Department

Security Principles 14-Jan-19 Networks and Communication Department