Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

4/24/2015

TCP/IP and the DoD Model


 The DoD model is basically a condensed version of the OSI model

Internet Protocol (IP)

Prepared By G.Uthayakumar

The DoD and OSI models


2 Prepared By G.Uthayakumar

The Process/Application Layer Protocols


 Telnet
 Telnet is the chameleon of protocols—its specialty is terminal emulation. It allows a
user on a remote client machine, called the Telnet client, to access the
resources of another machine, the Telnet server.
 File Transfer Protocol (FTP)
 File Transfer Protocol (FTP) is the protocol that actually lets you transfer files across
an IP network, and it can accomplish this between any two machines using it.
 Secure File Transfer Protocol (SFTP)
 Secure File Transfer Protocol (SFTP) is used when you need to transfer files
over an encrypted connection. It uses an SSH session, which encrypts the
connection.
 Trivial File Transfer Protocol (TFTP) is the stripped-down, stock
version of FTP, but it’s the protocol of choice if you know exactly
what you want and where to find it plus it’s easy to use, and it’s
fast too!
The TCP/IP protocol suite
3 Prepared By G.Uthayakumar 4 Prepared By G.Uthayakumar

 Network File System (NFS)  SIP (VoIP)


 Network File System (NFS) is a jewel of a protocol specializing in file sharing.  Session Initiation Protocol (SIP) is a hugely popular signaling protocol
It allows two different types of file systems to interoperate. used to construct and deconstruct multimedia communication
sessions for many things like voice and video calls, video
 Simple Mail Transfer Protocol (SMTP), ubiquitous call to conferencing, streaming multimedia distribution, instant messaging,
email, uses a spooled, or queued, method of mail delivery. presence information, and online games over the Internet.
 Post Office Protocol (POP) gives us a storage facility for  RTP (VoIP)
incoming mail, and the latest version is called POP3.  Real-time Transport Protocol (RTP) describes a packet-formatting
 Internet Message Access Protocol (IMAP) makes it to get control standard for delivering audio and video over the Internet. Although
initially designed as a multicast protocol, it’s now used for unicast
over how to download mail, with it, also gain some much-needed applications too.
security.
 Line Printer Daemon (LPD)
 Transport Layer Security (TLS) and its forerunner, Secure  The Line Printer Daemon (LPD) protocol is designed for printer
Sockets Layer (SSL), are cryptographic protocols that come in sharing. The LPD, along with the Line Printer (LPR) program, allows
really handy for enabling secure online data-transfer activities like print jobs to be spooled and sent to the network’s printers using
browsing the Web, instant messaging, internet faxing, and so on. TCP/IP.

5 Prepared By G.Uthayakumar 6 Prepared By G.Uthayakumar

1
4/24/2015

 X Window, Designed for client/server operations, XWindow defines a  Network Time Protocol (NTP) works in conjunction with
protocol for writing client/server applications based on a graphical user
interface (GUI). other synchronization utilities to ensure all computers on a given
 Secure Shell (SSH) protocol sets up a secure Telnet session over a
network agree on the time.
standard TCP/IP connection and is employed for doing things like  Network News Transfer Protocol (NNTP) access the Usenet
logging into other systems, running programs on remote systems, and news servers that hold the legion of specific message boards called
moving files from one system to another. newsgroups.
 Simple Network Management Protocol (SNMP) collects and
manipulates valuable network information. It gathers data by polling the  Secure Copy Protocol (SCP) rescue its whole purpose is to
devices on the network from a management station at fixed or random protect user’s precious files. Through SSH, it first establishes and
intervals, requiring them to disclose certain information. then sustains a secure, encrypted connection between the sending
 Hypertext Transfer Protocol (HTTP) and receiving hosts until file transfer is complete. When armed
 All those snappy websites comprising a mélange of graphics, text, links, and with SCP.
so on—the Hypertext Transfer Protocol (HTTP) is making it all possible.
 Lightweight Directory Access Protocol (LDAP) This
 Both SSH (port 22) and HTTPS (port 443) is used to encrypt
protocol standardizes how you access directories, and its first and
packets over your intranet and the internet.
second inceptions.

7 Prepared By G.Uthayakumar 8 Prepared By G.Uthayakumar

 Internet Group Management Protocol (IGMP) is the  Domain Name Service (DNS) resolves hostnames—specifically, Internet
TCP/IP protocol used for managing IP multicast sessions. names, to their corresponding IP addresses.
 It accomplishes this by sending out unique IGMP messages over the  Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to
network to reveal the multicast-group landscape and to find out hosts with information provided by a server.
which hosts belong to which multicast group.  It allows easier administration and works well in small to even very large
network environments.
 Line Printer Remote (LPR)
 Many types of hardware can be used as a DHCP server, including routers.
 When printing in an unblended, genuine TCP/IP
 The following is the four-step process a client takes to receive an
environment, a combination of Line Printer (LPR) and the IP address from a DHCP server:
Line Printer Daemon (LPD) is typically what’s used to get the 1. The DHCP client broadcasts a DHCP Discover message looking for a
job done. DHCP server (Port 67).
 LPD, installed on all printing devices, handles both printers and print 2. The DHCP server that received the DHCP Discover message sends a
jobs. unicast DHCP Offer message back to the host
 LPR acts on the client, or sending machine, and is used to send the 3. The client then broadcasts to the server a DHCP Request message asking
data from a host machine to the network’s print resource so you end for the offered IP address and possibly other information.
up with actual printed output. 4. The server finalizes the exchange with a unicast DHCP Acknowledgment
message.

9 Prepared By G.Uthayakumar 10 Prepared By G.Uthayakumar

DHCP client four-step process  The Host-to-Host Layer Protocols is to shield the upper-layer
applications from the complexities of the network.
 the two protocols at this layer:
 Transmission C NN ontrol Protocol (TCP)
 User Datagram Protocol (UDP)
 Transmission Control Protocol (TCP) takes large blocks of
information from an application and breaks them into segments.
 TCP is a full-duplex, connection-oriented, reliable, and
accurate protocol, but establishing all these terms and
conditions, in addition to error checking, is no small task.

11 Prepared By G.Uthayakumar 12 Prepared By G.Uthayakumar

2
4/24/2015

User Datagram Protocol (UDP)


 compare User Datagram Protocol (UDP) with TCP, the former is basically
the scaled-down economy model that’s sometimes referred to as a
thin protocol.
 SNMP monitors the network, using UDP.
 NFS handles its own reliability issues, making the use of TCP/UDP
both impractical and redundant.
 UDP does not sequence the segments and doesn’t care in which order the
segments arrive at the destination.

UDP segment
TCP segment format
The TCP header is 20 bytes long, or up to 24 bytes with options.
13 Prepared By G.Uthayakumar 14 Prepared By G.Uthayakumar

Port Numbers
Key Features of TCP and UDP
 TCP and UDP must use port numbers to communicate with the upper
layers.
 Originating-source port numbers are dynamically assigned by the
source host and will usually have a value of 1024 or higher.
 Numbers below 1024 are considered well-known port numbers
and are defined in RFC 3232.

Port numbers for TCP and UDP


15 Prepared By G.Uthayakumar 16 Prepared By G.Uthayakumar

 The Internet Layer Protocols routing and providing a single


Key Protocols That Use TCP and UDP network interface to the upper layers.
 Internet Protocol (IP) essentially is the Internet layer.

IP header
17 Prepared By G.Uthayakumar 18 Prepared By G.Uthayakumar

3
4/24/2015

Internet Control Message Protocol (ICMP) ICMP error message is sent to the sending host from the remote router.

 Internet Control Message Protocol (ICMP) works at the Network layer and
is used by IP for many different services.
 ICMP is a management protocol and messaging service provider
for IP.
 Its messages are carried as IP packets.
 ICMP packets have the following characteristics:
 They can provide hosts with information about network problems.
 They are encapsulated within IP datagrams.
 Destination Unreachable If a router can’t send an IP
datagram any further, it uses ICMP to send a message back to
the sender.
 Buffer Full If a router’s memory buffer for receiving incoming
datagrams is full.
EO on Lab B is down. Host A is trying to communicate to Host B. What happens?
19 Prepared By G.Uthayakumar 20 Prepared By G.Uthayakumar

 Hops Each IP datagram is allotted a certain number of routers, Address Resolution Protocol (ARP)
called hops, to pass through.  Address Resolution Protocol (ARP) finds the hardware address of a host
 Ping uses ICMP echo request and reply messages to check the from a known IP address.
physical and logical connectivity of machines on an internetwork.  ARP resolves IP addresses to Ethernet (MAC) addresses.
 Traceroute uses IP packet Time-to-Live time-outs to discover the
path a packet takes as it traverses an internetwork.

Local ARP broadcast


21 Prepared By G.Uthayakumar 22 Prepared By G.Uthayakumar

Reverse Address Resolution Protocol (RARP) Proxy Address Resolution Protocol (Proxy ARP)
 Reverse Address Resolution Protocol (RARP) discovers the identity of the  One advantage of using Proxy ARP is that it can be added to a
IP address for diskless machines by sending out a packet that single router on a network without disturbing the routing tables of
includes its MAC address and a request for the IP address assigned all the other routers that live there too.
to that MAC address.  Data Encapsulation When a host transmits data across a
network to another device, the data goes through encapsulation:
 To communicate and exchange information, each layer uses Protocol
Data Units (PDUs).
 These hold the control information attached to the data at each layer
of the model.

RARP broadcast example

23 Prepared By G.Uthayakumar 24 Prepared By G.Uthayakumar

4
4/24/2015

 At a transmitting device, the data-encapsulation method works like


Data encapsulation this:
1. User information is converted to data for transmission on the
network.
2. Data is converted to segments, and a reliable connection is set up
between the transmitting and receiving hosts.
3. Segments are converted to packets or datagrams, and a logical
address is placed in the header so each packet can be routed
through an internetwork.
4. Packets or datagrams are converted to frames for transmission
on the local network. Hardware (Ethernet) addresses are used to
uniquely identify hosts on a local network segment.
5. Frames are converted to bits, and a digital encoding and clocking
scheme is used.
25 Prepared By G.Uthayakumar 26 Prepared By G.Uthayakumar

Port numbers at the Transport layer

27 Prepared By G.Uthayakumar

You might also like