Internet Protocol (IP)
Internet Protocol (IP)
Prepared By G.Uthayakumar
1
4/24/2015
X Window, Designed for client/server operations, XWindow defines a Network Time Protocol (NTP) works in conjunction with
protocol for writing client/server applications based on a graphical user
interface (GUI). other synchronization utilities to ensure all computers on a given
Secure Shell (SSH) protocol sets up a secure Telnet session over a
network agree on the time.
standard TCP/IP connection and is employed for doing things like Network News Transfer Protocol (NNTP) access the Usenet
logging into other systems, running programs on remote systems, and news servers that hold the legion of specific message boards called
moving files from one system to another. newsgroups.
Simple Network Management Protocol (SNMP) collects and
manipulates valuable network information. It gathers data by polling the Secure Copy Protocol (SCP) rescue its whole purpose is to
devices on the network from a management station at fixed or random protect user’s precious files. Through SSH, it first establishes and
intervals, requiring them to disclose certain information. then sustains a secure, encrypted connection between the sending
Hypertext Transfer Protocol (HTTP) and receiving hosts until file transfer is complete. When armed
All those snappy websites comprising a mélange of graphics, text, links, and with SCP.
so on—the Hypertext Transfer Protocol (HTTP) is making it all possible.
Lightweight Directory Access Protocol (LDAP) This
Both SSH (port 22) and HTTPS (port 443) is used to encrypt
protocol standardizes how you access directories, and its first and
packets over your intranet and the internet.
second inceptions.
Internet Group Management Protocol (IGMP) is the Domain Name Service (DNS) resolves hostnames—specifically, Internet
TCP/IP protocol used for managing IP multicast sessions. names, to their corresponding IP addresses.
It accomplishes this by sending out unique IGMP messages over the Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to
network to reveal the multicast-group landscape and to find out hosts with information provided by a server.
which hosts belong to which multicast group. It allows easier administration and works well in small to even very large
network environments.
Line Printer Remote (LPR)
Many types of hardware can be used as a DHCP server, including routers.
When printing in an unblended, genuine TCP/IP
The following is the four-step process a client takes to receive an
environment, a combination of Line Printer (LPR) and the IP address from a DHCP server:
Line Printer Daemon (LPD) is typically what’s used to get the 1. The DHCP client broadcasts a DHCP Discover message looking for a
job done. DHCP server (Port 67).
LPD, installed on all printing devices, handles both printers and print 2. The DHCP server that received the DHCP Discover message sends a
jobs. unicast DHCP Offer message back to the host
LPR acts on the client, or sending machine, and is used to send the 3. The client then broadcasts to the server a DHCP Request message asking
data from a host machine to the network’s print resource so you end for the offered IP address and possibly other information.
up with actual printed output. 4. The server finalizes the exchange with a unicast DHCP Acknowledgment
message.
DHCP client four-step process The Host-to-Host Layer Protocols is to shield the upper-layer
applications from the complexities of the network.
the two protocols at this layer:
Transmission C NN ontrol Protocol (TCP)
User Datagram Protocol (UDP)
Transmission Control Protocol (TCP) takes large blocks of
information from an application and breaks them into segments.
TCP is a full-duplex, connection-oriented, reliable, and
accurate protocol, but establishing all these terms and
conditions, in addition to error checking, is no small task.
2
4/24/2015
UDP segment
TCP segment format
The TCP header is 20 bytes long, or up to 24 bytes with options.
13 Prepared By G.Uthayakumar 14 Prepared By G.Uthayakumar
Port Numbers
Key Features of TCP and UDP
TCP and UDP must use port numbers to communicate with the upper
layers.
Originating-source port numbers are dynamically assigned by the
source host and will usually have a value of 1024 or higher.
Numbers below 1024 are considered well-known port numbers
and are defined in RFC 3232.
IP header
17 Prepared By G.Uthayakumar 18 Prepared By G.Uthayakumar
3
4/24/2015
Internet Control Message Protocol (ICMP) ICMP error message is sent to the sending host from the remote router.
Internet Control Message Protocol (ICMP) works at the Network layer and
is used by IP for many different services.
ICMP is a management protocol and messaging service provider
for IP.
Its messages are carried as IP packets.
ICMP packets have the following characteristics:
They can provide hosts with information about network problems.
They are encapsulated within IP datagrams.
Destination Unreachable If a router can’t send an IP
datagram any further, it uses ICMP to send a message back to
the sender.
Buffer Full If a router’s memory buffer for receiving incoming
datagrams is full.
EO on Lab B is down. Host A is trying to communicate to Host B. What happens?
19 Prepared By G.Uthayakumar 20 Prepared By G.Uthayakumar
Hops Each IP datagram is allotted a certain number of routers, Address Resolution Protocol (ARP)
called hops, to pass through. Address Resolution Protocol (ARP) finds the hardware address of a host
Ping uses ICMP echo request and reply messages to check the from a known IP address.
physical and logical connectivity of machines on an internetwork. ARP resolves IP addresses to Ethernet (MAC) addresses.
Traceroute uses IP packet Time-to-Live time-outs to discover the
path a packet takes as it traverses an internetwork.
Reverse Address Resolution Protocol (RARP) Proxy Address Resolution Protocol (Proxy ARP)
Reverse Address Resolution Protocol (RARP) discovers the identity of the One advantage of using Proxy ARP is that it can be added to a
IP address for diskless machines by sending out a packet that single router on a network without disturbing the routing tables of
includes its MAC address and a request for the IP address assigned all the other routers that live there too.
to that MAC address. Data Encapsulation When a host transmits data across a
network to another device, the data goes through encapsulation:
To communicate and exchange information, each layer uses Protocol
Data Units (PDUs).
These hold the control information attached to the data at each layer
of the model.
4
4/24/2015
27 Prepared By G.Uthayakumar