TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.

Slides:



Advertisements
Similar presentations
(4.4) Internet Protocols Layered approach to Internet Software 1.
Advertisements

Network Layer and Transport Layer.
Chapter 2 Network Models.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
IS Network and Telecommunications Risks
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Chapter 2 Network Models.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Remote Networking Architectures
Chapter 2 TCP/ IP PROTOCOL STACK. TCP/IP Protocol Suite Describes a set of general design guidelines and implementations of specific networking protocols.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
* The Internet’s genesis - Defense Department project to create a network that could survive a nuclear conflict * The first users - Government agencies.
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
The Internet, World Wide Web, and Computer Communication.
TCP/IP protocols Communication over Internet is mostly TCP/IP (Transmission Control Protocol over Internet Protocol) TCP/IP "stack" is software which allows.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
HTTP HTTP stands for Hypertext Transfer Protocol. It is an TCP/IP based communication protocol which is used to deliver virtually all files and other.
Mukesh N. Tekwani Elphinstone College Mumbai
1 Review - OSI Model n OSI Reference Model u represents the communications process. u 7 layers: physical, data link, network, transport, session, presentation.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Cisco – Semester 1 – Chapter 2 Network Fundamentals And The OSI Model.
1 Figure 3-2: TCP/IP Standards (Study Figure) Origins  Defense Advanced Research Projects Agency (DARPA) created the ARPANET  An internet connects multiple.
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
The University of Oklahoma Virtual Private Network How it works.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Presented by Rebecca Meinhold But How Does the Internet Work?
Communication Networks - Overview CSE 3213 – Fall November 2015.
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
CS1001 Lecture 7. Overview Computer Networks Computer Networks The Internet The Internet Internet Services Internet Services Markup Languages Markup Languages.
Net 221D:Computer Networks Fundamentals
Authors: Henry Post Darian Gurrola Davvid Caballero.
What is an IP address? Each and every computer that you use that connects to the internet or a network uses a specific range of numbers separated by periods.
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
CIT232©IFM-CIT Dept The Internet. CIT232©IFM-CIT Dept Know how the Internet began. Understand the architecture of today’s Internet and its relation- ship.
K. Salah1 Security Protocols in the Internet IPSec.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Windows Vista Configuration MCTS : Advanced Networking.
1 ** THE INTERNET ** Large, worldwide collection of networks that use a common protocol to communicate with each other A network of networks.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
Introduction to TCP/IP. What is TCP/IP? It is a protocol suite Enables computers within a network to communicate with each other Network can be made up.
The Concept of Universal Service
Distributed Systems.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
BY Engr. Mehran Mamonai Department of Telecommunication Engineering
Lec 5 Layers Computer Networks Al-Mustansiryah University
Topic 5: Communication and the Internet
TCP/IP Protocol Suite: Review
TCP/IP Protocol Suite: Review
Computer Networking A Top-Down Approach Featuring the Internet
Protocol Application TCP/IP Layer Model
INFORMATION FLOW ACROSS THE INTERNET
Kyle Broussard, Alexandra Mikolai,
Presentation transcript:

TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN

Contents  What is the TCP/IP model?  History  Layers of TCP/IP  Internet Layer  Way to browse the internet anonymously  What are the drawbacks?

TCP/IP Model  TCP/IP stands for Transmission Control Protocol and Internet Protocol.  Transmission Control Protocol and Internet Protocol (TCP/IP) is a collection of protocols designed to facilitate how data and communication are handled over a large network.

History  It was developed in 1969 by the U.S. Department of Defense (DoD) Defense Advanced Research Projects Agency (DARPA).  TCP/IP was born from a resource-sharing experiment called Advanced Research Projects Agency Network (ARPANET) which later evolved into what we now know as the internet.  TCP/IP is maintained by the Internet Engineering Task Force (IETF) which operates under the Internet Society – an international non-profit organization, is dedicated to providing “relevant technical documents that influences the way people design, use, and manage the internet.”

Layers of TCP/IP Model  The TCP/IP model can be broken down into four major layers:  Application layer  Transport layer  Internet layer  Network interface layer / Network access layer

Layers of TCP/IP Model  Application layer - defines how programs run by the host interacts with transport layer services to access the network  Transport layer - provides the communication session management between host computers.  This layer defines the level of service and status of the connection used when transporting data.  Internet layer - responsible for packaging data into IP datagrams (packets).  IP datagrams contain the source and destination address as information used to forward the datagram across the network.  The internet layer is comprised of many protocols such as: IP (Internet Protocol)  Network interface layer - responsible for detailing how data is physically sent through the network, i.e. it details how bits are electrically signaled by devices that interface with the network e.g. coaxial cables.

TCP/IP Model

IP – Internet Protocol  Internet Protocol (IP), a internet layer protocol, defines the format of datagrams (or packets), and the addressing scheme.  Every computer on the network has an IP address that identifies it.  IP is an connectionless protocol, i.e. there is no connection between the source and destination.  Packets are treated as independent data and is reorganized correctly due to TCP.

Public IP Address  Public IP address – used by internet servers, network routers, or any computer connected directly to the Internet via a modem.  Can be accessed over the internet like a postal address.  How to figure out your public IP address?  Google search “IP”  In some s, you can find the IP address of the sender.

What can someone do with your public IP address?  Get your location.  Using geolocation to get the router or the ISP location.  It’s possible to obtain a person’s exact location (however, it may be difficult).  Attack your computer/network.  DDOS.  Malicious users may scan your network for open ports or simply break into your router and act as a computer on the network, etc.

IP Geolocation Websites  These IP Geolocation websites typically show the location of the ISP (internet service provider) providing the connection.   

IP Geolocation:

Ways to Mask Your IP Address  Proxy Servers  VPN (virtual private network) software/services

Proxy Servers  A proxy server functions as an intermediary between your computer and the Internet.  Traffic from your browser is re-routed and made to appear to come from the proxy server's IP address.  Ex. Tor Browser - Internet traffic is routed through Tor’s network.  Disadvantage:  The proxy server owner can may view information saved on their cache such as passwords, usernames, browsing history.

VPN (Virtual Private Network)  VPN mask your IP address and also encrypt all the traffic from your computer to the desired destination by using encryption protocols and secure tunneling techniques.  VPNs also secure your data when using public Wi-Fi networks.  Ex. Foxyproxy – offers both VPN and proxy.  Disadvantage:  The VPN provider may have security vulnerabilities.

References (1 of 3)               

References (2 of 3)               

References (3 of 3)   