CISCO NETWORKING ACADEMY PROGRAM (CNAP)

Slides:



Advertisements
Similar presentations
PJC CCNA Semester 2 Ver. 3.0 by William Kelly
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Cisco 2 - Routers Perrine. J Page 14/30/2015 Chapter 10 TCP/IP Protocol Suite The function of the TCP/IP protocol stack is to transfer information from.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
CCNA – Network Fundamentals
Transmission Control Protocol (TCP)
Intermediate TCP/IP TCP Operation.
Guide to TCP/IP, Third Edition
Chapter 7: Transport Layer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Ensuring the Reliability of Data Delivery © 2004 Cisco Systems, Inc. All rights reserved. Establishing a TCP Connection INTRO v2.0—6-1.
Chapter 7 – Transport Layer Protocols
CCNA 1 v3.1 Module 11 Review.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 10 Intermediate TCP/IP.
IP Basics. Physical Link Network IP ARP ICMP RoutingTables.
IP Basics. IP encapsulates TCP IP packets travel through many different routers (hops) before reaching it’s destination MTU variation at the physical.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Chapter 4 OSI Transport Layer
Gursharan Singh Tatla Transport Layer 16-May
Process-to-Process Delivery:
1 Chapter Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
1 Transport Layer Computer Networks. 2 Where are we?
TCP/IP Application and Transport
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
The Saigon CTT Semester 1 CHAPTER 12 – 13 – 14 Le Chi Trung.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
1 Version 3.0 Module 11 TCP Application and Transport.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
University of the Western Cape Chapter 12: The Transport Layer.
Transmission Control Protocol TCP. Transport layer function.
Routers and Routing Basics CCNA 2 Chapter 10.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 9 Intermediate TCP/IP/ Access Control Lists (ACLs)
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 10 Intermediate TCP/IP.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Networking Basics CCNA 1 Chapter 11.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 10 Intermediate TCP/IP.
Transmission Control Protocol (TCP) BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
© 2002, Cisco Systems, Inc. All rights reserved..
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
1 14-Jun-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Chapter 7: Transport Layer
Chapter 9: Transport Layer
Instructor Materials Chapter 9: Transport Layer
Transport Layer Unit 5.
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
Process-to-Process Delivery:
Process-to-Process Delivery: UDP, TCP
Transport Layer 9/22/2019.
Presentation transcript:

CISCO NETWORKING ACADEMY PROGRAM (CNAP) SEMESTER 2/ MODULE 10 Intermediate TCP/IP

CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP Overview Routers use the Internet Protocol (IP) address information in an IP packet header to determine which interface the packet should be switched to in order to move closer its destination. It is described as an unreliable, connectionless protocol, using best-effort delivery. If packets are dropped in route, arrive in the wrong order, or are transmitted faster than the receiver can accept them, IP alone cannot correct the problem. To address these problems, IP relies upon Transmission Control Protocol (TCP).

TCP/IP TCP/IP operations CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP TCP/IP operations IP addresses allow for the routing of packets between networks. However, IP makes no guarantees about delivery. The transport layer is responsible for the reliable transport of and regulation of data flow from source to destination by using sliding windows and sequencing numbers along with a synchronization process that ensures each host is ready and willing to communicate.

TCP three-ways handshake open-connection CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP TCP three-ways handshake open-connection This synchronization process insures that both sides are ready for data transmission and allows the devices to determine the initial sequence numbers.

Denial of Service Attacks CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP Denial of Service Attacks Denial of service (DoS) attacks are designed to deny services to legitimate hosts attempting to establish connections. One type of DoS is known as SYN flooding. SYN flooding exploits the normal three-way handshake and causes targeted devices to ACK to source addresses that will not complete the handshake.

CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP Denial attacks In a DoS attack, the hacker initiates a synchronization but spoofs the source IP address. Spoofing is a term used when the receiving device replies to a non-existent, unreachable IP address and then is placed in a wait state while waiting to receive the final ACK from the initiator.

CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP Denial attacks The waiting request is placed in a connection queue or a holding area in memory. This waiting state requires the attacked device to commit system resources, such as memory, to the waiting process until the connection timer times out. Hackers will flood the attacked host with these false SYN requests utilizing all of its connection resources to respond and wait for false connections, preventing it from responding to legitimate connection requests. To defend against these attacks, system administrators may decrease the connection timeout period and increase the connection queue size. Software also exists that can detect these types of attacks and initiate defensive measures.

TCP is responsible for breaking data into segments. CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP Simple window sliding The amount of data that needs to be transmitted is often too large to be sent in a single data segment. Thereby, the data must be broken into smaller pieces to allow for proper data transmission. TCP is responsible for breaking data into segments. Once the data is segmented, it must be transmitted to the destination device. One of the services provided by TCP is flow control, which regulates how much data is sent during a given transmission period. The process of flow control is known as windowing.

TCP/IP TCP sliding window CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP TCP sliding window TCP utilizes a sliding window when determining transmission size. A sliding window allows for devices to negotiate a window size to allow for more than one byte to be sent during a single transmission. This sliding window also allows the destination device to indicate to the source a need to decrease or increase the amount of data being sent because it is incapable at that time of dealing with that much data.

TCP/IP TCP segment format CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP TCP segment format Positive acknowledgment and retransmission (PAR) is a common technique many protocols use to provide reliability. With PAR, the source sends a packet, starts a timer, and waits for an acknowledgment before sending the next packet. If the timer expires before the source receives an acknowledgment, the source retransmits the packet and starts the timer over again. TCP uses expectational acknowledgments in which the acknowledgment number refers to the next octet that is expected.

TCP/IP Protocol suit TCP/IP CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP Protocol suit TCP/IP

TCP/IP TCP segment format CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP TCP segment format

TCP/IP UDP segment format CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP UDP segment format

CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP Port numbers Port numbers are represented by 2 bytes in the header of a TCP or UDP segment. This 16-bit value can result in port numbers ranging from 0 to 65535. These port numbers are divided into three different categories: 1. Well-known ports: the first 1023 ports, used for well-known network services 2. Registered ports: range from 1024 to 49151 3. Dynamic or private ports: ports between 49152 and 68835

TCP sequence and acknowledgement numbers CISCO NETWORKING ACADEMY PROGRAM SEMESTER 2/ MODULE 10 TCP/IP TCP sequence and acknowledgement numbers