0% found this document useful (0 votes)
2 views

Module4

The document outlines the structure and functionality of TCP/IP protocols, detailing how data is encapsulated through various layers, including the roles of TCP and UDP in data transmission. It explains TCP's connection-oriented features, including the three-way handshake and flow control, while contrasting it with UDP's efficiency and lack of error checking. Additionally, it covers IP's role in internetworking, IPv6 packet characteristics, ARP and NDP protocols, Ethernet standards, and key encryption methods used in secure communications.

Uploaded by

Elmar Suleymanov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Module4

The document outlines the structure and functionality of TCP/IP protocols, detailing how data is encapsulated through various layers, including the roles of TCP and UDP in data transmission. It explains TCP's connection-oriented features, including the three-way handshake and flow control, while contrasting it with UDP's efficiency and lack of error checking. Additionally, it covers IP's role in internetworking, IPv6 packet characteristics, ARP and NDP protocols, Ethernet standards, and key encryption methods used in secure communications.

Uploaded by

Elmar Suleymanov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

TCP/IP protocols add a header to data inherited from the

layer above it
Layers 7, 6, and 5 - Data and instructions, known as
payload
Layer 4 – A Transport Layer protocol, usually TCP or
UDP, adds a header to the payload
• Includes a port number to identify the receiving app
Layer 3 - Network layer adds it own header and becomes a
packet
Layer 2 - packet is passed to Data Link layer on NIC,
which encapsulates data with its own header and trailer,
creating a frame
Three characteristics of TCP:
• Connection-oriented - TCP ensures that a connection
or session is established by using a three-step process called
a three-way handshake
Three transmissions are sent before data
transmission:
• Step 1 – a request for a connection (SYN)
• Step 2 – a response to the request (SYN/ACK)
• Step 3 – a connection is established (ACK)
Sequence numbers will be increased by the number of bits
included in each received
segment
• Confirms the correct length of message was received
• Sequencing and checksums - TCP sends a character
string called a checksum that is checked by the destination
host along with a sequence number for each segment
• Flow control - gauges rate of transmission based on
how quickly recipient can accept data

UDP provides no error checking, sequencing, or flow


control, no three-way handshake
• This makes UDP more efficient than TCP carrying
messages within one data packet, but does not guarantee
delivery of data
 Useful for live audio or video transmissions over the
Internet

: Source port, Destination port, Length, and Checksum


• Use of Checksum field in UDP is optional in IPv4, but
required in IPv6

IP enables TCP/IP to internetwork


• To traverse more than one LAN segment and type of
network through a router
IP does not guarantee delivery of data and no session is
established before data is transmitted(IP depends on TCP to
ensure)

IPv6 Packets
• IPv6 uses a different packet format than IPv4
• IPv6 can accommodate the much longer IPv6
addresses
• There is no Fragment offset field
• IPv6 hosts adjust their packet sizes to fit the
requirements of the network before sending IPv6 messages

ICMP can indicate the following:


• When part of a network is congested
• When data fails to reach its destination
• When data has been discarded because the allotted
TTL(time-to-live) has expired
ICMP announces transmission failures to the sender but
does not correct errors it detects.
ARP is a Layer 2 protocol that uses IPv4 to discover the
MAC address of a host or node on the (only)local network in
Layer 3 and relies on broadcasting
Two types of entries:
• Dynamic - created when a client makes an ARP request
that could not be satisfied by data already in the ARP table
• Static - those someone entered manually using the ARP
utility (arp -a command)

NDP (Neighbor Discovery Protocol) information carried in


ICMPv6 messages
automatically detects neighboring devices and automatically
adjusts when nodes fail or are removed

NDP offers several ICMPv6 message types:


• RA (router advertisement)
• RS (router solicitation)
• Redirect
• NS (neighbor solicitation)
• NA (neighbor advertisement)

Ethernet is the most important data link layer standard


 Capable of running on a variety network media
 Offers excellent throughput
 The most popular network technology
 Adds both a header and a trailer to the payload(creates
frame)
 Theheader+Frame(inc.MAC)CheckSequence
(FCS)=18-byte “frame” data frame from 46 to
1500 bytes
 MTU(max transmission unit) routers allow at 3rd layer

Key Encryption
A random string of characters:
Generates unique data block(ciphertext)
Created according to algorithms
Two categories:
Private uses only one key, which is secure between
sender and receiver.
Public relies on receiver that can be safe by anyone
IPsec:
-defines rules for encryption, authentication and key
management for TCP/IP transmissions
-creates secure connections in five steps
1. IPsec initiation
2. Key management
3. Security negotiations
4. Data transfer
5. Termination
Operates in two modes
Transport and Tunnel mode

You might also like