The document provides an overview of the Transmission Control Protocol/Internet Protocol (TCP/IP) model, comparing it with the OSI model and detailing its four layers: Network Interface, Internet, Transport, and Application. It identifies common TCP and UDP default ports and discusses various protocols such as FTP, SFTP, SMTP, and Telnet, along with their functionalities. Additionally, it covers data encapsulation processes and the role of protocols like ARP and ICMP in network communication.
The document provides an overview of the Transmission Control Protocol/Internet Protocol (TCP/IP) model, comparing it with the OSI model and detailing its four layers: Network Interface, Internet, Transport, and Application. It identifies common TCP and UDP default ports and discusses various protocols such as FTP, SFTP, SMTP, and Telnet, along with their functionalities. Additionally, it covers data encapsulation processes and the role of protocols like ARP and ICMP in network communication.
▪ The transmission control protocol /Internet Protocol (TCP/IP)
first came on the 1974 . ▪ In 1978 it was divided into two distinct protocols. TCP and IP. The DoD Model ▪ The DoD model is basically a condensed version of the OSI model, it’s composed of four instead of seven layers. ▪ Process/Application layers Common Network Devices ▪ Host to Host layer ▪ Internet Layers ▪ Network Access layers The DoD and OSI models • The Host to Host layer parallels the functions of the OSI’s Transport layer , defining protocols for setting up the level of transmission service for applications . • The internet layer corresponds to the OSI’s Network layer , designing the protocols relating to the logical transmission of packets over the entire networks . • The Network Access layer monitors the data exchange between the host and the network. • The equivalent of the Data Link and Physical layers of the OSI model. • The network Access layers oversees hardware addressing and defines protocols for the physical transmission of data. • The Dod and OSI models are alike a in design and concept and have similar functions in similar layers. TCP/IP MODEL • Telnet is a protocols that allows a user to access a remote client machine called the Telnet server . • Telnet offers no security or encryption and is being replaced by Secure Shell(SSH) when across the remote File Transfer Protocol • File Transfer Protocol (FTP) is the protocol that actually lets you transfer files across an IP network and it can accomplish this between any two machines that are using it. • FTP is not just protocol but it also a program . Operating as a protocol, FTP is used by applications. Secure File Transfer Protocol • Secure File Transfer Protocol (SFTP) is used when you need to transfer files over an encrypted connection. • It uses an SSH session that encrypts the connection. Apart from secure part, it’s used just as FTP • Trivial File Transfer Protocol (TFTP) is the stripped – down , stock version of FTP. It is a very simple client- server protocol, which manages file transfers in computer networks–it’s easy to use and it’s faster. • Simple Mail Transfer Protocol (SMTP) is defined as an email protocol that enables the transmission of emails among user accounts over an internet connection. Post Office Protocol • It gives us a storage facility for incoming mail, and the latest version is called ESMTP Protocols along with Port Numbers TCP UDP Telnet 23 SNMP 161 SMTP 25 TFTP 69 HTTP 80 DNS 53 FTP 20,21 BOOTPS/DHCP 6 DNS 53 HTTPS SSH POP3 110 NTP 123 IMAP4 143 Features of TCP and UDP TCP Segment Format UDP Segment Format Protocols at Internet Layer • Internet Protocol (IP) • Internet Control Message Protocol (ICMP) • Address Resolution Protocol (ARP) • Reverse Address Resolution Protocol (RARP) • Proxy ARP IP HEADER Characteristics of ICMP • They can provide hosts with information about network problems. • They are encapsulated within IP datagrams
Destination Unreachable: A message that will be
sent back to the sender by ICMP when a destination device is not reachable. ARP • Address Resolution Protocol (ARP), is a protocol that finds the hardware address (MAC) of a host from a known IP address. Data Encapsulation • User information is converted to data for transmission on the network. • Data is converted to segments, and a reliable connection is set up between the transmitting and receiving hosts. • Segments are converted to packets or datagrams, and a logical address is placed in the header so each packet can be routed through an internetwork. • Packets or datagrams are converted to frames for transmission on the local network. Hardware (Ethernet) addresses are used to uniquely identify hosts on a local network segment. • Frames are converted to bits, and then to digital encoding Data Encapsulation Thank you !