You are on page 1of 14

1

Introduction to TCP/IP Its Layers , Routing and Security


MEENPAL ANKITA M. E. , EXTC - 2011-12 ROLL NO. - 11EC2012

CONTENTS
1.OSI and TCP/IP Protocol Stack 2. Packet Encapsulation 3.TCP/IP Protocol suite layers (i) Physical and Data Link Layers (ii) Network Layer (iii) Transport Layer (iv) Application Layer 4. Routing 5. Network Security

OSI and TCP/IP Protocol Stack

Packet Encapsulation
The data is sent down the protocol stack. Each layer adds headers to the main data.

22Bytes 20Bytes 20Bytes

4Bytes

64 to 1500 Bytes

TCP/IP PROTOCOL SUITE LAYERS Physical and Data Link Layers

At the physical and data link layers, TCP/IP does not define any specific protocol. A network in a TCP/IP internetwork can be a localarea network or a wide-area network.

Network Layer
At the network layer (or, more accurately, the internetwork layer), TCP/IP supports the Internetworking Protocol. IP, in turn, uses four supporting protocols: ARP,RARP, ICMP, and IGMP.

Internetworking Protocol (IP)


The Internetworking Protocol is the transmission mechanism used by the TCP/IP protocols. It is an unreliable and connectionless protocol a best-effort datagram delivery service. Responsible for routing of data through intermediate networks and computers.

Address Resolution Protocol

The Address Resolution Protocol (ARP) is used to associate a logical address with a physical address.

Reverse Address Resolution Protocol

The Reverse Address Resolution Protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.

Internet Control Message Protocol (ICMP)

It is a mechanism used by hosts and gateways to send notification of datagram problems back to the sender. ICMP sends query and error reporting messages.

Internet Group Message Protocol (IGMP)

The Internet Group Message Protocol is used to facilitate the simultaneous transmission of a message to a group of recipients.

Transport Layer
This layer was represented in TCP/IP by two protocols:TCP and UDPThey are responsible for delivery of a message from a process to another process.

User Datagram Protocol

It is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer.

Transmission Control Protocol

The Transmission Control Protocol (TCP) provides full transportlayer services to applications. TCP is a reliable data transport protocol. It is connection-oriented: A connection must be established between both ends of a transmission before either can transmit data. At the sending end of each transmission, TCP divides a stream of data into smaller units called segments.

Application Layer
The application layer in TCP/IP is equivalent to the combined session, presentation, and application layers in the OSI model.

File Transfer Protocol (FTP)

It is the standard mechanism provided by TCPIP for copying a file from one host to another.

Domain Name System (DNS)

It is a protocol that can map a name to an address and conversely an address to a name.

10

Hyper Text Transfer Protocol (HTTP)

It allows the user to access World Wide Web services.

Simple Mail Transfer Protocol (SMTP)

SMTP provides for mail exchange between user on the same or different computers.

Simple Network Management Protocol (SNMP)


A frame work for managing devices in an internet. Provides fundamental operations for monitoring and maintaining an internet.

ROUTING

11

Routing is done in Network Layer by Internet protocol (IP).IP transports data in packets called datagrams, each of which is transported separately. Datagrams can travel along different routes and can arrive out of sequence or be duplicated. IP does not keep track of the routes and has no facility for reordering datagrams once they arrive at their destination.
Source
Application Transport Network Link

Destination
Application

Router
Network Link

Transport
Network Link

NETWORK SECURITY
Network security is mostly achieved through the use of cryptography, a science based on abstract algebra. Categories of cryptography

12

13

Symmetric Key Cryptography

The same key is used by both parties. The sender uses this key and an encryption algorithm to encrypt data. The receiver uses the same key and the corresponding decryption algorithm to decrypt the data.

Asymmetric Key Cryptography

In asymmetric or public-key cryptography, there are two keys: a private key and a public key.

14

The private key is kept by the receiver. The public key is announced to the public. The public key that is used for encryption is different from the private key that is used for decryption. The public key is available to the public; the private key is available only to an individual.

You might also like