SlideShare a Scribd company logo
Introduction to TCP/IPIntroduction to TCP/IP
Frank Fang Kuo YuFrank Fang Kuo Yu
2004/02/202004/02/20
AgendaAgenda
 TCP/IP Network ArchitectureTCP/IP Network Architecture
 Client-Server ModelClient-Server Model
 Naming and AddressingNaming and Addressing
 TCP/UDP/IP/Ethernet Packet FormatTCP/UDP/IP/Ethernet Packet Format
 Application Programming InterfacesApplication Programming Interfaces
 Protocol AnalysisProtocol Analysis
Meet the Protocol Family in the InternetMeet the Protocol Family in the Internet
TCP
UDP
IP
SNMP
ping
tracert
IPsec
Mobile IP
ARP
RARP
PPP
DNS
telnet
ftp
IP QoS
HTTP
IP telephony
IP multicast
BSD socketWinsockJava socket
ICMP
IPv4
IPv6
SMTP
NTCIP
DHCP
POP3
Ethernet
WAP
GPRS
r-utility
ATM
MIB
WinPcap
SLIP
SMS
Internet
internet
intranet
tester
developer
administrator
OSPF
BGP MPLSRTP
WWW
TCP/IP Network ArchitectureTCP/IP Network Architecture
Application LayerApplication Layer
Transport LayerTransport Layer
Network LayerNetwork Layer
Link LayerLink Layer
operating-system/computer-architecture independent
LAN/MAN/WAN applicable
physical-medium independent
host host
network network
media media
process process
client-server model
TCP/IP Protocol SuiteTCP/IP Protocol Suite
EthernetEthernet
ARPARP RARPRARP
IPv4IPv4 IPv6IPv6
TCPTCP UDPUDP
ICMPICMP
TelnetTelnetFTPFTPpingping SNMPSNMP TFTPTFTP
Serial lineSerial line
PPPPPP
SMTPSMTP POP3POP3
21 23 11025 69161
port
number
IP
address
Key Protocols in Transport/Network LayersKey Protocols in Transport/Network Layers
 Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
 aa connection-orientedconnection-oriented,, reliablereliable,, byte-streambyte-stream serviceservice
 User Datagram Protocol (UDP)User Datagram Protocol (UDP)
 aa connectionlessconnectionless,, unreliableunreliable,, datagramdatagram delivery servicedelivery service
 application-aware via port number and UDP checksumapplication-aware via port number and UDP checksum
 Internet Protocol (IP)Internet Protocol (IP)
 aa connectionlessconnectionless,, unreliableunreliable,, datagramdatagram delivery servicedelivery service
 network-aware via routing, fragmentation and reassemblynetwork-aware via routing, fragmentation and reassembly
Encapsulation in Protocol ProcessingEncapsulation in Protocol Processing
ApplicationApplication
TCPTCP
IPIP
EthernetEthernet
fragmentationfragmentation
reassemblyreassembly
paddingpadding
Request For Comments Document SeriesRequest For Comments Document Series
http://www.rfc-editor.org/http://www.rfc-editor.org/
↑↑
http://www.networksorcery.com/enp/default0501.htmhttp://www.networksorcery.com/enp/default0501.htm
↑↑
TCP and UDP Client-Server ModelTCP and UDP Client-Server Model
DNSDNS
clientclient
DNSDNS
serverserver
DNS query (www.yahoo.com)DNS query (www.yahoo.com)
DNS response ( 216.109.125.70 )DNS response ( 216.109.125.70 )
(( UDPUDP 172.18.8.120172.18.8.120 10271027 172.16.2.2172.16.2.2 5353 )),, ,, ,, ,,
172.18.8.120172.18.8.120 172.16.2.2172.16.2.2
( protocol( protocol
locallocal
addressaddress
locallocal
portport
remoteremote
addressaddress
remoteremote
portport )),, ,, ,, ,,
well-knownwell-known
DNS port numberDNS port number
ephemeral port numberephemeral port number
32-bit IPv4 address32-bit IPv4 address
IP Address and TCP/UDP Port NumberIP Address and TCP/UDP Port Number
 Internet Assigned Number AuthorityInternet Assigned Number Authority
 www.iana.orgwww.iana.org
 IP AddressIP Address
 IPv4IPv4 32-bit dotted-decimal notation32-bit dotted-decimal notation e.g., 192.0.32.67e.g., 192.0.32.67
– the IPv4 address space for private internetsthe IPv4 address space for private internets
10.0.0.010.0.0.0 ~ 10.255.255.255~ 10.255.255.255
172.16.0.0172.16.0.0 ~ 172.31.255.255~ 172.31.255.255
192.168.0.0192.168.0.0 ~ 192.168.255.255~ 192.168.255.255
 IPv6IPv6 128-bit hexadecimal string128-bit hexadecimal string e.g., 1080:0:0:0:8:800:200C:417Ae.g., 1080:0:0:0:8:800:200C:417A
 TCP/UDP Port NumberTCP/UDP Port Number
 well known portswell known ports 0 ~ 10230 ~ 1023
 registered portsregistered ports 1024 ~ 491511024 ~ 49151
 dynamic and/or private portsdynamic and/or private ports 49152 ~ 6553649152 ~ 65536
Host Name, IP Address, Physical AddressHost Name, IP Address, Physical Address
TCP Connections underTCP Connections under Windows netstatWindows netstat
show host name and service name
show IP address and port number
TCP Connections underTCP Connections under Linux netstatLinux netstat
show host name and service name
show IP address and port number
show process id and program name
Protocol Stack and netstatProtocol Stack and netstat
Naming, Addressing, and Packet FormatNaming, Addressing, and Packet Format
 TCP SegmentTCP Segment
 UDP DatagramUDP Datagram
 IPv4 DatagramIPv4 Datagram
 Ethernet FrameEthernet Frame
TCP Segment FormatTCP Segment Format
20 bytes
http://www.iana.org/assignments/port-numbershttp://www.iana.org/assignments/port-numbers
C:WINDOWSsystem32driversetcservicesC:WINDOWSsystem32driversetcservices
UDP Datagram FormatUDP Datagram Format
8 bytes
http://www.iana.org/assignments/port-numbershttp://www.iana.org/assignments/port-numbers
C:WINDOWSsystem32driversetcservicesC:WINDOWSsystem32driversetcservices
IPv4 Datagram FormatIPv4 Datagram Format
20 bytes
http://www.iana.org/assignments/protocol-numbershttp://www.iana.org/assignments/protocol-numbers
C:WINDOWSsystem32driversetcprotocolC:WINDOWSsystem32driversetcprotocol
http://www.iana.org/ipaddress/ip-addresses.htmhttp://www.iana.org/ipaddress/ip-addresses.htm
Ethernet Frame FormatEthernet Frame Format
http://www.iana.org/assignments/ethernet-numbershttp://www.iana.org/assignments/ethernet-numbers
Naming, Addressing, and MappingNaming, Addressing, and Mapping
 Mapping fromMapping from Host NameHost Name toto IP addressIP address
 DNS ~ Domain Name SystemDNS ~ Domain Name System
 e.g., www.yahoo.come.g., www.yahoo.com →→ 216.109.125.70216.109.125.70
 Mapping fromMapping from IP AddressIP Address toto Ethernet AddressEthernet Address
 ARP ~ Address Resolution ProtocolARP ~ Address Resolution Protocol
 e.g., 172.18.8.254e.g., 172.18.8.254 →→ 00-0a-8a-d9-47-4000-0a-8a-d9-47-40
Application Programming InterfacesApplication Programming Interfaces
libpcap, WinPcaplibpcap, WinPcap
Raw SocketsRaw Sockets
Sockets, WinSock, Java.net, TLI/XTISockets, WinSock, Java.net, TLI/XTI
Application LayerApplication Layer
Transport LayerTransport Layer
Network LayerNetwork Layer
Link LayerLink Layer
Middleware (RPC, RMI, CORBA, webMiddleware (RPC, RMI, CORBA, web
service,…), HTTP/SMTP/POP3/Telephonyservice,…), HTTP/SMTP/POP3/Telephony
API, …API, …
Sockets Functions for TCP Client/ServerSockets Functions for TCP Client/Server
socket ( )socket ( )
bind ( )bind ( )
listen ( )listen ( )
accept ( )accept ( )
read ( )read ( )
write ( )write ( )
read ( )read ( )
close ( )close ( )
socket ( )socket ( )
connect ( )connect ( )
write ( )write ( )
read ( )read ( )
close ( )close ( )
TCP ServerTCP Server
TCP ClientTCP Client
Connection EstablishmentConnection Establishment
Connection TerminationConnection Termination
requestrequest
replyreply
Sockets Functions for UDP Client/ServerSockets Functions for UDP Client/Server
socket ( )socket ( )
bind ( )bind ( )
recvfrom ( )recvfrom ( )
sendto ( )sendto ( )
socket ( )socket ( )
sendto ( )sendto ( )
recvfrom ( )recvfrom ( )
close ( )close ( )
UDP ServerUDP Server
UDP ClientUDP Client
requestrequest
replyreply
Protocol AnalysisProtocol Analysis
 Hardware/Software Protocol AnalyzerHardware/Software Protocol Analyzer
 Hardware Protocol AnalyzerHardware Protocol Analyzer ~ Agilent, Racal, Rohde & Schwarz~ Agilent, Racal, Rohde & Schwarz
 Software Protocol AnalyzerSoftware Protocol Analyzer ~ WinPcap and Ethereal~ WinPcap and Ethereal
 WinPcap Protocol AnalyzerWinPcap Protocol Analyzer
 http://winpcap.polito.it/http://winpcap.polito.it/
 PcapPcap ~ packet capture library from Lawrence Berkeley Laboratory~ packet capture library from Lawrence Berkeley Laboratory
 WinPcapWinPcap ~ packet capture and network analysis for Win32 from~ packet capture and network analysis for Win32 from ItalyItaly
 Ethereal Protocol AnalyzerEthereal Protocol Analyzer
 http://www.ethereal.comhttp://www.ethereal.com
WinPcap/Ethereal Protocol Analyzer SetupWinPcap/Ethereal Protocol Analyzer Setup
Host A
Host B
WinPcap/Ethereal
Ethernet
internet
Host C
WinPcap/Ethereal
(promiscuous mode)
WinPcap Protocol AnalyzerWinPcap Protocol Analyzer
Screen LayoutScreen Layout
Ethereal Protocol AnalyzerEthereal Protocol Analyzer
Screen LayoutScreen Layout
What is “Ping”?What is “Ping”?
 a program used to test whether another host isa program used to test whether another host is
reachablereachable
 ““PingPing”” sendssends an ICMP echo request messagean ICMP echo request message to ato a
host and expectshost and expects an ICMP echo reply messagean ICMP echo reply message toto
be returned.be returned.
 ““PingPing”” supports a set of options which can be usedsupports a set of options which can be used
by anyone who wants to maintain, investigate, andby anyone who wants to maintain, investigate, and
hack TCP/IP networks.hack TCP/IP networks.
Using “Ping” to Observe Network TrafficUsing “Ping” to Observe Network Traffic
 ICMP Echo Request and Echo ReplyICMP Echo Request and Echo Reply
 ARP Request/Reply and ARP CacheARP Request/Reply and ARP Cache
 DNS Query and ResponseDNS Query and Response
 IP Fragmentation and the “Don’t Fragment” flagIP Fragmentation and the “Don’t Fragment” flag
 Ethernet PaddingEthernet Padding
SummarySummary
 TCP/IP Network ArchitectureTCP/IP Network Architecture
 Client-Server ModelClient-Server Model
 Naming and AddressingNaming and Addressing
 TCP/UDP/IP/Ethernet Packet FormatTCP/UDP/IP/Ethernet Packet Format
 Application Programming InterfacesApplication Programming Interfaces
 Protocol AnalysisProtocol Analysis
TCP
UDP
IP
SNMP
ping
tracert
IPsec
Mobile IP
ARP
RARP
PPP
DNS
telnet
ftp
IP QoS
HTTP
IP telephony
IP multicast
BSD socketWinsockJava socket
ICMP
IPv4
IPv6
SMTP
NTCIP
DHCP
POP3
Ethernet
WAP
GPRS
r-utility
ATM
MIB
WinPcap
SLIP
SMS
Internet
internet
intranet
tester
administrator
OSPF
BGP MPLSRTP
WWW
Everything over IPEverything over IP
IP over EverythingIP over Everything
developer
ThanksThanks
YouYou
Q & AQ & A
Ad

More Related Content

What's hot (20)

Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
Roushan Jha
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
rinnocente
 
PLNOG16: IP/MPLS for Fixed and Mobile Convergence, Kevin Wang
PLNOG16: IP/MPLS for Fixed and Mobile Convergence, Kevin WangPLNOG16: IP/MPLS for Fixed and Mobile Convergence, Kevin Wang
PLNOG16: IP/MPLS for Fixed and Mobile Convergence, Kevin Wang
PROIDEA
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer router
rishi ram khanal
 
MPLS VPN
MPLS VPNMPLS VPN
MPLS VPN
Shahzaib Mahesar
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
Viren Rao
 
Chap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmpChap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmp
東原 李
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Hamidreza Bolhasani
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
Nzava Luwawa
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
rhassan84
 
Networking devices
Networking devicesNetworking devices
Networking devices
Ravi KC
 
Networking basics
Networking basicsNetworking basics
Networking basics
Vadiraj Jahagirdar
 
HTTP/3, QUIC and streaming
HTTP/3, QUIC and streamingHTTP/3, QUIC and streaming
HTTP/3, QUIC and streaming
Daniel Stenberg
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
Dr Shashikant Athawale
 
Cryptanalysis
CryptanalysisCryptanalysis
Cryptanalysis
Sou Jana
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
n|u - The Open Security Community
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms Work
CheapSSLsecurity
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
Amit Kundu
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
rinnocente
 
PLNOG16: IP/MPLS for Fixed and Mobile Convergence, Kevin Wang
PLNOG16: IP/MPLS for Fixed and Mobile Convergence, Kevin WangPLNOG16: IP/MPLS for Fixed and Mobile Convergence, Kevin Wang
PLNOG16: IP/MPLS for Fixed and Mobile Convergence, Kevin Wang
PROIDEA
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer router
rishi ram khanal
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
Viren Rao
 
Chap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmpChap2. ipv4-arp-icmp
Chap2. ipv4-arp-icmp
東原 李
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Hamidreza Bolhasani
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
rhassan84
 
Networking devices
Networking devicesNetworking devices
Networking devices
Ravi KC
 
HTTP/3, QUIC and streaming
HTTP/3, QUIC and streamingHTTP/3, QUIC and streaming
HTTP/3, QUIC and streaming
Daniel Stenberg
 
Cryptanalysis
CryptanalysisCryptanalysis
Cryptanalysis
Sou Jana
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms Work
CheapSSLsecurity
 

Viewers also liked (20)

TCP/IP Protocol - JAVA
TCP/IP Protocol - JAVATCP/IP Protocol - JAVA
TCP/IP Protocol - JAVA
cooddy
 
5 DLL-LLC- Book
5 DLL-LLC- Book5 DLL-LLC- Book
5 DLL-LLC- Book
Water Birds (Ali)
 
Joomla security nuggets
Joomla security nuggetsJoomla security nuggets
Joomla security nuggets
guestbd1cdca
 
Troubleshooting Tips for Data communications, Networking & TCP/IP
Troubleshooting Tips for Data communications, Networking & TCP/IPTroubleshooting Tips for Data communications, Networking & TCP/IP
Troubleshooting Tips for Data communications, Networking & TCP/IP
Living Online
 
05 directnets errors
05 directnets errors05 directnets errors
05 directnets errors
jyang1983
 
Tcp ip
Tcp ipTcp ip
Tcp ip
Jesenia Ocaña Escobar
 
Case study methodology
Case study methodologyCase study methodology
Case study methodology
Anton Halkouski
 
Haystack + DASH7 Security
Haystack + DASH7 SecurityHaystack + DASH7 Security
Haystack + DASH7 Security
Haystack Technologies
 
Case study methodology
Case study methodologyCase study methodology
Case study methodology
Beulah Heights University
 
Case Method at Harvard Business School
Case Method at Harvard Business SchoolCase Method at Harvard Business School
Case Method at Harvard Business School
Frank Fang Kuo Yu
 
Sangregorio
SangregorioSangregorio
Sangregorio
Efren Beltran
 
الجريمة الانتخابية
الجريمة الانتخابيةالجريمة الانتخابية
الجريمة الانتخابية
IHEC2013
 
Using Video for Business
Using Video for BusinessUsing Video for Business
Using Video for Business
Adashmore Creative, LLC
 
Essential tips & effective tactics for social media & quality content marketing
Essential tips & effective tactics for social media & quality content marketingEssential tips & effective tactics for social media & quality content marketing
Essential tips & effective tactics for social media & quality content marketing
Adashmore Creative, LLC
 
Sectores económicos
Sectores económicos Sectores económicos
Sectores económicos
Efren Beltran
 
Enith
EnithEnith
Enith
Efren Beltran
 
E learning management system
E learning management systemE learning management system
E learning management system
chrt222
 
Final Ancillary Tasks
Final Ancillary TasksFinal Ancillary Tasks
Final Ancillary Tasks
philippa21
 
Eduardo
EduardoEduardo
Eduardo
Efren Beltran
 
โครงงาน 2
โครงงาน 2โครงงาน 2
โครงงาน 2
Fam Santiboon
 
TCP/IP Protocol - JAVA
TCP/IP Protocol - JAVATCP/IP Protocol - JAVA
TCP/IP Protocol - JAVA
cooddy
 
Joomla security nuggets
Joomla security nuggetsJoomla security nuggets
Joomla security nuggets
guestbd1cdca
 
Troubleshooting Tips for Data communications, Networking & TCP/IP
Troubleshooting Tips for Data communications, Networking & TCP/IPTroubleshooting Tips for Data communications, Networking & TCP/IP
Troubleshooting Tips for Data communications, Networking & TCP/IP
Living Online
 
05 directnets errors
05 directnets errors05 directnets errors
05 directnets errors
jyang1983
 
Case Method at Harvard Business School
Case Method at Harvard Business SchoolCase Method at Harvard Business School
Case Method at Harvard Business School
Frank Fang Kuo Yu
 
الجريمة الانتخابية
الجريمة الانتخابيةالجريمة الانتخابية
الجريمة الانتخابية
IHEC2013
 
Essential tips & effective tactics for social media & quality content marketing
Essential tips & effective tactics for social media & quality content marketingEssential tips & effective tactics for social media & quality content marketing
Essential tips & effective tactics for social media & quality content marketing
Adashmore Creative, LLC
 
Sectores económicos
Sectores económicos Sectores económicos
Sectores económicos
Efren Beltran
 
E learning management system
E learning management systemE learning management system
E learning management system
chrt222
 
Final Ancillary Tasks
Final Ancillary TasksFinal Ancillary Tasks
Final Ancillary Tasks
philippa21
 
โครงงาน 2
โครงงาน 2โครงงาน 2
โครงงาน 2
Fam Santiboon
 
Ad

Similar to Introduction to TCP/IP (20)

TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
SMC Networks Europe
 
Tcp ip
Tcp ipTcp ip
Tcp ip
Akshay Nagpurkar
 
บทที่ 2 โพรโตคอล (protocol)
บทที่  2 โพรโตคอล (protocol)บทที่  2 โพรโตคอล (protocol)
บทที่ 2 โพรโตคอล (protocol)
chrisman77
 
NAT 64 FPGA Implementation
NAT 64 FPGA ImplementationNAT 64 FPGA Implementation
NAT 64 FPGA Implementation
Janith Rukman
 
Group Apres
Group ApresGroup Apres
Group Apres
ramya5a
 
C Cpres
C CpresC Cpres
C Cpres
ramya5a
 
C Cpres
C CpresC Cpres
C Cpres
ramya5a
 
C Cpres
C CpresC Cpres
C Cpres
ramya5a
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
Serious_SamSoul
 
Replacing iptables with eBPF in Kubernetes with Cilium
Replacing iptables with eBPF in Kubernetes with CiliumReplacing iptables with eBPF in Kubernetes with Cilium
Replacing iptables with eBPF in Kubernetes with Cilium
Michal Rostecki
 
Ip address
Ip address Ip address
Ip address
CYBERINTELLIGENTS
 
Multipath TCP
Multipath TCPMultipath TCP
Multipath TCP
Olivier Bonaventure
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
Netwax Lab
 
Where can buy Special Edition Using TCP IP Niit (Usa) Inc. ebook with cheap p...
Where can buy Special Edition Using TCP IP Niit (Usa) Inc. ebook with cheap p...Where can buy Special Edition Using TCP IP Niit (Usa) Inc. ebook with cheap p...
Where can buy Special Edition Using TCP IP Niit (Usa) Inc. ebook with cheap p...
attietorreda
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.
igede tirtanata
 
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET Journal
 
TCP/IP For Engineers
TCP/IP For EngineersTCP/IP For Engineers
TCP/IP For Engineers
Leif Bloomquist
 
TCP IP
TCP IP TCP IP
TCP IP
muh kemal
 
Clase 1 Direccionamiento IPv4.pdf
Clase 1 Direccionamiento IPv4.pdfClase 1 Direccionamiento IPv4.pdf
Clase 1 Direccionamiento IPv4.pdf
FERNANDOBONILLA43
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
Cisco DevNet
 
บทที่ 2 โพรโตคอล (protocol)
บทที่  2 โพรโตคอล (protocol)บทที่  2 โพรโตคอล (protocol)
บทที่ 2 โพรโตคอล (protocol)
chrisman77
 
NAT 64 FPGA Implementation
NAT 64 FPGA ImplementationNAT 64 FPGA Implementation
NAT 64 FPGA Implementation
Janith Rukman
 
Group Apres
Group ApresGroup Apres
Group Apres
ramya5a
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
Serious_SamSoul
 
Replacing iptables with eBPF in Kubernetes with Cilium
Replacing iptables with eBPF in Kubernetes with CiliumReplacing iptables with eBPF in Kubernetes with Cilium
Replacing iptables with eBPF in Kubernetes with Cilium
Michal Rostecki
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
Netwax Lab
 
Where can buy Special Edition Using TCP IP Niit (Usa) Inc. ebook with cheap p...
Where can buy Special Edition Using TCP IP Niit (Usa) Inc. ebook with cheap p...Where can buy Special Edition Using TCP IP Niit (Usa) Inc. ebook with cheap p...
Where can buy Special Edition Using TCP IP Niit (Usa) Inc. ebook with cheap p...
attietorreda
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.
igede tirtanata
 
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET Journal
 
Clase 1 Direccionamiento IPv4.pdf
Clase 1 Direccionamiento IPv4.pdfClase 1 Direccionamiento IPv4.pdf
Clase 1 Direccionamiento IPv4.pdf
FERNANDOBONILLA43
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
Cisco DevNet
 
Ad

More from Frank Fang Kuo Yu (20)

Microsoft Bing Image Creator (OpenAI DALL-E 3) 文字生成圖片經驗分享
Microsoft Bing Image Creator (OpenAI DALL-E 3) 文字生成圖片經驗分享Microsoft Bing Image Creator (OpenAI DALL-E 3) 文字生成圖片經驗分享
Microsoft Bing Image Creator (OpenAI DALL-E 3) 文字生成圖片經驗分享
Frank Fang Kuo Yu
 
Microsoft Bing Image Creator (OpenAI DALL·E) 建築景觀圖片生成經驗分享
Microsoft Bing Image Creator (OpenAI DALL·E) 建築景觀圖片生成經驗分享Microsoft Bing Image Creator (OpenAI DALL·E) 建築景觀圖片生成經驗分享
Microsoft Bing Image Creator (OpenAI DALL·E) 建築景觀圖片生成經驗分享
Frank Fang Kuo Yu
 
大型語言模型的幻覺和風險
大型語言模型的幻覺和風險大型語言模型的幻覺和風險
大型語言模型的幻覺和風險
Frank Fang Kuo Yu
 
從 Atari/AlphaGo/ChatGPT 談深度強化學習及通用人工智慧
從 Atari/AlphaGo/ChatGPT 談深度強化學習及通用人工智慧從 Atari/AlphaGo/ChatGPT 談深度強化學習及通用人工智慧
從 Atari/AlphaGo/ChatGPT 談深度強化學習及通用人工智慧
Frank Fang Kuo Yu
 
強化學習的王者之旅
強化學習的王者之旅強化學習的王者之旅
強化學習的王者之旅
Frank Fang Kuo Yu
 
強化學習的王者之旅
強化學習的王者之旅強化學習的王者之旅
強化學習的王者之旅
Frank Fang Kuo Yu
 
A Journey to Reinforcement Learning
A Journey to Reinforcement LearningA Journey to Reinforcement Learning
A Journey to Reinforcement Learning
Frank Fang Kuo Yu
 
人工智慧圖像應用簡介
人工智慧圖像應用簡介人工智慧圖像應用簡介
人工智慧圖像應用簡介
Frank Fang Kuo Yu
 
Orange Data Mining 軟體系統簡介及生醫應用支援
Orange Data Mining 軟體系統簡介及生醫應用支援Orange Data Mining 軟體系統簡介及生醫應用支援
Orange Data Mining 軟體系統簡介及生醫應用支援
Frank Fang Kuo Yu
 
從開源資料集看人工智慧醫療應用
從開源資料集看人工智慧醫療應用從開源資料集看人工智慧醫療應用
從開源資料集看人工智慧醫療應用
Frank Fang Kuo Yu
 
Deep Learning and Object Detection
Deep Learning and Object DetectionDeep Learning and Object Detection
Deep Learning and Object Detection
Frank Fang Kuo Yu
 
Data Science and Machine Learning in Smart manufacturing
Data Science and Machine Learning in Smart manufacturingData Science and Machine Learning in Smart manufacturing
Data Science and Machine Learning in Smart manufacturing
Frank Fang Kuo Yu
 
Automated Machine Learning
Automated Machine LearningAutomated Machine Learning
Automated Machine Learning
Frank Fang Kuo Yu
 
Deep Learning and Image Recognition
Deep Learning and Image RecognitionDeep Learning and Image Recognition
Deep Learning and Image Recognition
Frank Fang Kuo Yu
 
Leap Motion Controller and Application Development
Leap Motion Controller and Application DevelopmentLeap Motion Controller and Application Development
Leap Motion Controller and Application Development
Frank Fang Kuo Yu
 
創客/創業/創新
創客/創業/創新創客/創業/創新
創客/創業/創新
Frank Fang Kuo Yu
 
Startup Ecosystem in Shanghai
Startup Ecosystem in ShanghaiStartup Ecosystem in Shanghai
Startup Ecosystem in Shanghai
Frank Fang Kuo Yu
 
如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)
Frank Fang Kuo Yu
 
Introduction to GPRS
Introduction to GPRSIntroduction to GPRS
Introduction to GPRS
Frank Fang Kuo Yu
 
Introduction to PPP
Introduction to PPPIntroduction to PPP
Introduction to PPP
Frank Fang Kuo Yu
 
Microsoft Bing Image Creator (OpenAI DALL-E 3) 文字生成圖片經驗分享
Microsoft Bing Image Creator (OpenAI DALL-E 3) 文字生成圖片經驗分享Microsoft Bing Image Creator (OpenAI DALL-E 3) 文字生成圖片經驗分享
Microsoft Bing Image Creator (OpenAI DALL-E 3) 文字生成圖片經驗分享
Frank Fang Kuo Yu
 
Microsoft Bing Image Creator (OpenAI DALL·E) 建築景觀圖片生成經驗分享
Microsoft Bing Image Creator (OpenAI DALL·E) 建築景觀圖片生成經驗分享Microsoft Bing Image Creator (OpenAI DALL·E) 建築景觀圖片生成經驗分享
Microsoft Bing Image Creator (OpenAI DALL·E) 建築景觀圖片生成經驗分享
Frank Fang Kuo Yu
 
大型語言模型的幻覺和風險
大型語言模型的幻覺和風險大型語言模型的幻覺和風險
大型語言模型的幻覺和風險
Frank Fang Kuo Yu
 
從 Atari/AlphaGo/ChatGPT 談深度強化學習及通用人工智慧
從 Atari/AlphaGo/ChatGPT 談深度強化學習及通用人工智慧從 Atari/AlphaGo/ChatGPT 談深度強化學習及通用人工智慧
從 Atari/AlphaGo/ChatGPT 談深度強化學習及通用人工智慧
Frank Fang Kuo Yu
 
A Journey to Reinforcement Learning
A Journey to Reinforcement LearningA Journey to Reinforcement Learning
A Journey to Reinforcement Learning
Frank Fang Kuo Yu
 
人工智慧圖像應用簡介
人工智慧圖像應用簡介人工智慧圖像應用簡介
人工智慧圖像應用簡介
Frank Fang Kuo Yu
 
Orange Data Mining 軟體系統簡介及生醫應用支援
Orange Data Mining 軟體系統簡介及生醫應用支援Orange Data Mining 軟體系統簡介及生醫應用支援
Orange Data Mining 軟體系統簡介及生醫應用支援
Frank Fang Kuo Yu
 
從開源資料集看人工智慧醫療應用
從開源資料集看人工智慧醫療應用從開源資料集看人工智慧醫療應用
從開源資料集看人工智慧醫療應用
Frank Fang Kuo Yu
 
Deep Learning and Object Detection
Deep Learning and Object DetectionDeep Learning and Object Detection
Deep Learning and Object Detection
Frank Fang Kuo Yu
 
Data Science and Machine Learning in Smart manufacturing
Data Science and Machine Learning in Smart manufacturingData Science and Machine Learning in Smart manufacturing
Data Science and Machine Learning in Smart manufacturing
Frank Fang Kuo Yu
 
Deep Learning and Image Recognition
Deep Learning and Image RecognitionDeep Learning and Image Recognition
Deep Learning and Image Recognition
Frank Fang Kuo Yu
 
Leap Motion Controller and Application Development
Leap Motion Controller and Application DevelopmentLeap Motion Controller and Application Development
Leap Motion Controller and Application Development
Frank Fang Kuo Yu
 
Startup Ecosystem in Shanghai
Startup Ecosystem in ShanghaiStartup Ecosystem in Shanghai
Startup Ecosystem in Shanghai
Frank Fang Kuo Yu
 
如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)
Frank Fang Kuo Yu
 

Recently uploaded (20)

Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 

Introduction to TCP/IP

  • 1. Introduction to TCP/IPIntroduction to TCP/IP Frank Fang Kuo YuFrank Fang Kuo Yu 2004/02/202004/02/20
  • 2. AgendaAgenda  TCP/IP Network ArchitectureTCP/IP Network Architecture  Client-Server ModelClient-Server Model  Naming and AddressingNaming and Addressing  TCP/UDP/IP/Ethernet Packet FormatTCP/UDP/IP/Ethernet Packet Format  Application Programming InterfacesApplication Programming Interfaces  Protocol AnalysisProtocol Analysis
  • 3. Meet the Protocol Family in the InternetMeet the Protocol Family in the Internet TCP UDP IP SNMP ping tracert IPsec Mobile IP ARP RARP PPP DNS telnet ftp IP QoS HTTP IP telephony IP multicast BSD socketWinsockJava socket ICMP IPv4 IPv6 SMTP NTCIP DHCP POP3 Ethernet WAP GPRS r-utility ATM MIB WinPcap SLIP SMS Internet internet intranet tester developer administrator OSPF BGP MPLSRTP WWW
  • 4. TCP/IP Network ArchitectureTCP/IP Network Architecture Application LayerApplication Layer Transport LayerTransport Layer Network LayerNetwork Layer Link LayerLink Layer operating-system/computer-architecture independent LAN/MAN/WAN applicable physical-medium independent host host network network media media process process client-server model
  • 5. TCP/IP Protocol SuiteTCP/IP Protocol Suite EthernetEthernet ARPARP RARPRARP IPv4IPv4 IPv6IPv6 TCPTCP UDPUDP ICMPICMP TelnetTelnetFTPFTPpingping SNMPSNMP TFTPTFTP Serial lineSerial line PPPPPP SMTPSMTP POP3POP3 21 23 11025 69161 port number IP address
  • 6. Key Protocols in Transport/Network LayersKey Protocols in Transport/Network Layers  Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)  aa connection-orientedconnection-oriented,, reliablereliable,, byte-streambyte-stream serviceservice  User Datagram Protocol (UDP)User Datagram Protocol (UDP)  aa connectionlessconnectionless,, unreliableunreliable,, datagramdatagram delivery servicedelivery service  application-aware via port number and UDP checksumapplication-aware via port number and UDP checksum  Internet Protocol (IP)Internet Protocol (IP)  aa connectionlessconnectionless,, unreliableunreliable,, datagramdatagram delivery servicedelivery service  network-aware via routing, fragmentation and reassemblynetwork-aware via routing, fragmentation and reassembly
  • 7. Encapsulation in Protocol ProcessingEncapsulation in Protocol Processing ApplicationApplication TCPTCP IPIP EthernetEthernet fragmentationfragmentation reassemblyreassembly paddingpadding
  • 8. Request For Comments Document SeriesRequest For Comments Document Series http://www.rfc-editor.org/http://www.rfc-editor.org/ ↑↑ http://www.networksorcery.com/enp/default0501.htmhttp://www.networksorcery.com/enp/default0501.htm ↑↑
  • 9. TCP and UDP Client-Server ModelTCP and UDP Client-Server Model DNSDNS clientclient DNSDNS serverserver DNS query (www.yahoo.com)DNS query (www.yahoo.com) DNS response ( 216.109.125.70 )DNS response ( 216.109.125.70 ) (( UDPUDP 172.18.8.120172.18.8.120 10271027 172.16.2.2172.16.2.2 5353 )),, ,, ,, ,, 172.18.8.120172.18.8.120 172.16.2.2172.16.2.2 ( protocol( protocol locallocal addressaddress locallocal portport remoteremote addressaddress remoteremote portport )),, ,, ,, ,, well-knownwell-known DNS port numberDNS port number ephemeral port numberephemeral port number 32-bit IPv4 address32-bit IPv4 address
  • 10. IP Address and TCP/UDP Port NumberIP Address and TCP/UDP Port Number  Internet Assigned Number AuthorityInternet Assigned Number Authority  www.iana.orgwww.iana.org  IP AddressIP Address  IPv4IPv4 32-bit dotted-decimal notation32-bit dotted-decimal notation e.g., 192.0.32.67e.g., 192.0.32.67 – the IPv4 address space for private internetsthe IPv4 address space for private internets 10.0.0.010.0.0.0 ~ 10.255.255.255~ 10.255.255.255 172.16.0.0172.16.0.0 ~ 172.31.255.255~ 172.31.255.255 192.168.0.0192.168.0.0 ~ 192.168.255.255~ 192.168.255.255  IPv6IPv6 128-bit hexadecimal string128-bit hexadecimal string e.g., 1080:0:0:0:8:800:200C:417Ae.g., 1080:0:0:0:8:800:200C:417A  TCP/UDP Port NumberTCP/UDP Port Number  well known portswell known ports 0 ~ 10230 ~ 1023  registered portsregistered ports 1024 ~ 491511024 ~ 49151  dynamic and/or private portsdynamic and/or private ports 49152 ~ 6553649152 ~ 65536
  • 11. Host Name, IP Address, Physical AddressHost Name, IP Address, Physical Address
  • 12. TCP Connections underTCP Connections under Windows netstatWindows netstat show host name and service name show IP address and port number
  • 13. TCP Connections underTCP Connections under Linux netstatLinux netstat show host name and service name show IP address and port number show process id and program name
  • 14. Protocol Stack and netstatProtocol Stack and netstat
  • 15. Naming, Addressing, and Packet FormatNaming, Addressing, and Packet Format  TCP SegmentTCP Segment  UDP DatagramUDP Datagram  IPv4 DatagramIPv4 Datagram  Ethernet FrameEthernet Frame
  • 16. TCP Segment FormatTCP Segment Format 20 bytes http://www.iana.org/assignments/port-numbershttp://www.iana.org/assignments/port-numbers C:WINDOWSsystem32driversetcservicesC:WINDOWSsystem32driversetcservices
  • 17. UDP Datagram FormatUDP Datagram Format 8 bytes http://www.iana.org/assignments/port-numbershttp://www.iana.org/assignments/port-numbers C:WINDOWSsystem32driversetcservicesC:WINDOWSsystem32driversetcservices
  • 18. IPv4 Datagram FormatIPv4 Datagram Format 20 bytes http://www.iana.org/assignments/protocol-numbershttp://www.iana.org/assignments/protocol-numbers C:WINDOWSsystem32driversetcprotocolC:WINDOWSsystem32driversetcprotocol http://www.iana.org/ipaddress/ip-addresses.htmhttp://www.iana.org/ipaddress/ip-addresses.htm
  • 19. Ethernet Frame FormatEthernet Frame Format http://www.iana.org/assignments/ethernet-numbershttp://www.iana.org/assignments/ethernet-numbers
  • 20. Naming, Addressing, and MappingNaming, Addressing, and Mapping  Mapping fromMapping from Host NameHost Name toto IP addressIP address  DNS ~ Domain Name SystemDNS ~ Domain Name System  e.g., www.yahoo.come.g., www.yahoo.com →→ 216.109.125.70216.109.125.70  Mapping fromMapping from IP AddressIP Address toto Ethernet AddressEthernet Address  ARP ~ Address Resolution ProtocolARP ~ Address Resolution Protocol  e.g., 172.18.8.254e.g., 172.18.8.254 →→ 00-0a-8a-d9-47-4000-0a-8a-d9-47-40
  • 21. Application Programming InterfacesApplication Programming Interfaces libpcap, WinPcaplibpcap, WinPcap Raw SocketsRaw Sockets Sockets, WinSock, Java.net, TLI/XTISockets, WinSock, Java.net, TLI/XTI Application LayerApplication Layer Transport LayerTransport Layer Network LayerNetwork Layer Link LayerLink Layer Middleware (RPC, RMI, CORBA, webMiddleware (RPC, RMI, CORBA, web service,…), HTTP/SMTP/POP3/Telephonyservice,…), HTTP/SMTP/POP3/Telephony API, …API, …
  • 22. Sockets Functions for TCP Client/ServerSockets Functions for TCP Client/Server socket ( )socket ( ) bind ( )bind ( ) listen ( )listen ( ) accept ( )accept ( ) read ( )read ( ) write ( )write ( ) read ( )read ( ) close ( )close ( ) socket ( )socket ( ) connect ( )connect ( ) write ( )write ( ) read ( )read ( ) close ( )close ( ) TCP ServerTCP Server TCP ClientTCP Client Connection EstablishmentConnection Establishment Connection TerminationConnection Termination requestrequest replyreply
  • 23. Sockets Functions for UDP Client/ServerSockets Functions for UDP Client/Server socket ( )socket ( ) bind ( )bind ( ) recvfrom ( )recvfrom ( ) sendto ( )sendto ( ) socket ( )socket ( ) sendto ( )sendto ( ) recvfrom ( )recvfrom ( ) close ( )close ( ) UDP ServerUDP Server UDP ClientUDP Client requestrequest replyreply
  • 24. Protocol AnalysisProtocol Analysis  Hardware/Software Protocol AnalyzerHardware/Software Protocol Analyzer  Hardware Protocol AnalyzerHardware Protocol Analyzer ~ Agilent, Racal, Rohde & Schwarz~ Agilent, Racal, Rohde & Schwarz  Software Protocol AnalyzerSoftware Protocol Analyzer ~ WinPcap and Ethereal~ WinPcap and Ethereal  WinPcap Protocol AnalyzerWinPcap Protocol Analyzer  http://winpcap.polito.it/http://winpcap.polito.it/  PcapPcap ~ packet capture library from Lawrence Berkeley Laboratory~ packet capture library from Lawrence Berkeley Laboratory  WinPcapWinPcap ~ packet capture and network analysis for Win32 from~ packet capture and network analysis for Win32 from ItalyItaly  Ethereal Protocol AnalyzerEthereal Protocol Analyzer  http://www.ethereal.comhttp://www.ethereal.com
  • 25. WinPcap/Ethereal Protocol Analyzer SetupWinPcap/Ethereal Protocol Analyzer Setup Host A Host B WinPcap/Ethereal Ethernet internet Host C WinPcap/Ethereal (promiscuous mode)
  • 26. WinPcap Protocol AnalyzerWinPcap Protocol Analyzer Screen LayoutScreen Layout
  • 27. Ethereal Protocol AnalyzerEthereal Protocol Analyzer Screen LayoutScreen Layout
  • 28. What is “Ping”?What is “Ping”?  a program used to test whether another host isa program used to test whether another host is reachablereachable  ““PingPing”” sendssends an ICMP echo request messagean ICMP echo request message to ato a host and expectshost and expects an ICMP echo reply messagean ICMP echo reply message toto be returned.be returned.  ““PingPing”” supports a set of options which can be usedsupports a set of options which can be used by anyone who wants to maintain, investigate, andby anyone who wants to maintain, investigate, and hack TCP/IP networks.hack TCP/IP networks.
  • 29. Using “Ping” to Observe Network TrafficUsing “Ping” to Observe Network Traffic  ICMP Echo Request and Echo ReplyICMP Echo Request and Echo Reply  ARP Request/Reply and ARP CacheARP Request/Reply and ARP Cache  DNS Query and ResponseDNS Query and Response  IP Fragmentation and the “Don’t Fragment” flagIP Fragmentation and the “Don’t Fragment” flag  Ethernet PaddingEthernet Padding
  • 30. SummarySummary  TCP/IP Network ArchitectureTCP/IP Network Architecture  Client-Server ModelClient-Server Model  Naming and AddressingNaming and Addressing  TCP/UDP/IP/Ethernet Packet FormatTCP/UDP/IP/Ethernet Packet Format  Application Programming InterfacesApplication Programming Interfaces  Protocol AnalysisProtocol Analysis
  • 31. TCP UDP IP SNMP ping tracert IPsec Mobile IP ARP RARP PPP DNS telnet ftp IP QoS HTTP IP telephony IP multicast BSD socketWinsockJava socket ICMP IPv4 IPv6 SMTP NTCIP DHCP POP3 Ethernet WAP GPRS r-utility ATM MIB WinPcap SLIP SMS Internet internet intranet tester administrator OSPF BGP MPLSRTP WWW Everything over IPEverything over IP IP over EverythingIP over Everything developer ThanksThanks YouYou Q & AQ & A