SlideShare a Scribd company logo
2
Most read
3
Most read
11
Most read
TCP Header/
IP Header/
Authentication
Header
NETWORK SECURITY
By Faizan Shaikh
T.Y.B.Sc.IT
Roll no.37
What is TCP/IP?
 TCP/IP is the basic communication language or protocol(set of
rules) of the Internet.
 It can also be used as a communications protocol in a private
network(either an intranet or an extranet).
 Basically, it can be said as the TCP works in order to divide file into
packets and send it to the workstation. The IP handels the shortest
route. So it can be said as both work together.
Tcp header/IP Header/Authentication header
Source Port Number: This 2 bytes number
signifies the port number of the source
computer.
Destination Port Number: This 2 bytes number
signifies the port number of the destination.
Sequence Number: This field defines the
number assigned to the first byte of data
portion contained in each TCP segment. For
the data to be delivered correctly, each byte to
be transferred is numbered in an increasing
sequence.
Acknowledgement Number:
If the destination host receives the
sequence number correctly, it sends X+1 as the acknowledgement number back to the source.
Header Length: We know that the header length can be between 20-to-60 bytes. Hence the value of the field
can be between 5(5*4=20) and 15(15*4=60).
Reserved: This 6 byte field is reserved for future use and is currently unused.
TCP Header
Flag: This 6-byte field defines 6 different control flags,each one of them occupying one bit. Out of these 6 flags
two are most important. The SYN flag indicates that the source wants to establish a connection with the
destination. The FIN flag indicates that the sender wants to terminate the TCP connection.
Window Size: This field determines the size of the window the other party must maintain.
Checksum: This 16-bit field contains the checksum for facilitating the error detection and correction.
Urgent Pointer: This fields is used in situations where data in TCP segment is more important or urgent
than other data in the same TCP connection.
IP Header
The TCP header plus the
original message is now
passed to the IP layer. The IP
header treats this whole
package and adds its own
header to it. The format of an
IP datagram is shown.
Version: This field contains a
value 4, which indicates IPv4.
In future, this field would
contain 6 when IPv6 becomes
the standard.
Header Length(HLEN)
indicates the size of the
header in a multiple four-byte
words.
Service Type: This field defines the service parameters such as priority of the datagram and the level of
reliability desired..
Total Length: This field contains the total length of the IP datagram. Because it is two bytes long, an IP
datagram cannot be more than 65,536 bytes.
Identification: This field is used
in situations when a datagram
is fragmented. As a datagram
passes through different
networks, it might be
fragmented into smaller sub-
datagrams. In such a situation,
the sub-datagram are
sequenced using the
identification field, so that the
original datagram can be
reconstructed from them.
Flags: This field corresponds to Identification. It indicates whether a datagram can be fragmented and if it
can be fragmented, whether it is the first or the last or the middle fragment.
Fragmentation Offset: If a datagram is fragmented, this field is useful. It is useful when reconstructing a
datagram from its fragments.
Time to Live: We know that
datagram travels through one
or more routers before
reaching its destination. In
case of Network problems,
some of the routes to the final
destination may not be
available due to hardware
failures, link failure or
congestion. In that condition
the datagram may be sent
through a different route. This
can continue for a long time if
the problems aren’t
resolved quickly. To avoid this, the datagram sender initializes this field to some number. As the datagram
travels through routers this field is decremented each time. If the value becomes zero or negative, it is
immediately discarded. No attempt is made to forward it to the next hop. This avoids the datagram travel an
infinite amount of time and hence preventing network congestion. After all the datagrams are reached to
their destination, the TCP finds out the missing datagram and will request for its retransmission. Thus, IP is not
responsible for the error-free, timely and insequence delivery of the entire message--- it is done by TCP.
Protocol: This field identifies
the transport protocol
running on top of IP. After the
datagram is constructed from
its fragments, it has to be
passed on to the upper layer
software piece.
Source Address: This field
contains the 32-bit IP address
of the sender.
Destination Address: This field
contains the 32-bit IP address
of the final destination.
Options: This field contains optional information such as routing details, timing, management and alignment.
For instance, it can store the information about the exact route that the datagram has taken. However, most
of the time, the space in this field is not sufficient for all these details, therefore, it is not used very often.
Authentication Header
Authentication Header
THANKS!
Ad

Recommended

IPV4 vs IPV6
IPV4 vs IPV6
Devang Doshi
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
marwan aldulaimy
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
Adeel Rasheed
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
Shailesh Pachori
 
Chapter 2 - Network Models
Chapter 2 - Network Models
Wayne Jones Jnr
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
Hinal Lunagariya
 
20 common port numbers and their purposes
20 common port numbers and their purposes
salamassh
 
Tcp and udp
Tcp and udp
Ahmad Khalid Nasrat
 
Media Access Control
Media Access Control
VijayaLakshmi514
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
IPV6 ADDRESS
IPV6 ADDRESS
Jothi Lakshmi
 
Network software
Network software
SakthiVinoth78
 
IPV4 Frame Format
IPV4 Frame Format
Aditya Rawat
 
Computer network switching
Computer network switching
Shivani Godha
 
Data link layer
Data link layer
Mukesh Chinta
 
Unicast multicast & broadcast
Unicast multicast & broadcast
NetProtocol Xpert
 
Arp and rarp
Arp and rarp
राहुल खेडेकर
 
Network Address Translation (NAT)
Network Address Translation (NAT)
Joud Khattab
 
WLAN
WLAN
Mukesh Chinta
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
OSI Model
OSI Model
Shubham Pendharkar
 
Ipv4 presentation
Ipv4 presentation
shakeel khan
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Mac addresses(media access control)
Mac addresses(media access control)
Ismail Mukiibi
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
Alok Tripathi
 
Routing protocols
Routing protocols
N.Jagadish Kumar
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Network Layer
Network Layer
Dr Shashikant Athawale
 
Tcp Header
Tcp Header
sui90
 
Transmission Control Protocol
Transmission Control Protocol
sangeepower
 

More Related Content

What's hot (20)

Media Access Control
Media Access Control
VijayaLakshmi514
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
IPV6 ADDRESS
IPV6 ADDRESS
Jothi Lakshmi
 
Network software
Network software
SakthiVinoth78
 
IPV4 Frame Format
IPV4 Frame Format
Aditya Rawat
 
Computer network switching
Computer network switching
Shivani Godha
 
Data link layer
Data link layer
Mukesh Chinta
 
Unicast multicast & broadcast
Unicast multicast & broadcast
NetProtocol Xpert
 
Arp and rarp
Arp and rarp
राहुल खेडेकर
 
Network Address Translation (NAT)
Network Address Translation (NAT)
Joud Khattab
 
WLAN
WLAN
Mukesh Chinta
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
OSI Model
OSI Model
Shubham Pendharkar
 
Ipv4 presentation
Ipv4 presentation
shakeel khan
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Mac addresses(media access control)
Mac addresses(media access control)
Ismail Mukiibi
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
Alok Tripathi
 
Routing protocols
Routing protocols
N.Jagadish Kumar
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Network Layer
Network Layer
Dr Shashikant Athawale
 

Viewers also liked (20)

Tcp Header
Tcp Header
sui90
 
Transmission Control Protocol
Transmission Control Protocol
sangeepower
 
TCP/IP Basics
TCP/IP Basics
sanjoysanyal
 
TCP Model
TCP Model
manojkum22
 
Ip header
Ip header
JohnGorny
 
Features of tcp (part 2) .68
Features of tcp (part 2) .68
myrajendra
 
TCP - Transmission Control Protocol
TCP - Transmission Control Protocol
Peter R. Egli
 
UDP - User Datagram Protocol
UDP - User Datagram Protocol
Peter R. Egli
 
TCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
Ethernet Frames Explained
Ethernet Frames Explained
Joshua Kathiravan
 
Network and DNS Vulnerabilities
Network and DNS Vulnerabilities
n|u - The Open Security Community
 
Linux Mint System Components and Environmental Subsystems
Linux Mint System Components and Environmental Subsystems
Gerald Borja
 
RSA alogrithm
RSA alogrithm
Senthil Kanth
 
Networking Basics
Networking Basics
Carlo Fonda
 
E mail transfer .74
E mail transfer .74
myrajendra
 
TCP / IP Services and Standards
TCP / IP Services and Standards
Ross University School of Medicine
 
Digital Image Processing: Digital Image Fundamentals
Digital Image Processing: Digital Image Fundamentals
Mostafa G. M. Mostafa
 
Block Cipher
Block Cipher
Brandon Byungyong Jo
 
Cygnotel Prueba 01
Cygnotel Prueba 01
cygnotel
 
Carrier As A Service15102009
Carrier As A Service15102009
vnandlall
 
Tcp Header
Tcp Header
sui90
 
Transmission Control Protocol
Transmission Control Protocol
sangeepower
 
Features of tcp (part 2) .68
Features of tcp (part 2) .68
myrajendra
 
TCP - Transmission Control Protocol
TCP - Transmission Control Protocol
Peter R. Egli
 
UDP - User Datagram Protocol
UDP - User Datagram Protocol
Peter R. Egli
 
TCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
Linux Mint System Components and Environmental Subsystems
Linux Mint System Components and Environmental Subsystems
Gerald Borja
 
Networking Basics
Networking Basics
Carlo Fonda
 
E mail transfer .74
E mail transfer .74
myrajendra
 
Digital Image Processing: Digital Image Fundamentals
Digital Image Processing: Digital Image Fundamentals
Mostafa G. M. Mostafa
 
Cygnotel Prueba 01
Cygnotel Prueba 01
cygnotel
 
Carrier As A Service15102009
Carrier As A Service15102009
vnandlall
 
Ad

Similar to Tcp header/IP Header/Authentication header (20)

Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internat
Kritika Purohit
 
As the packet travels through the TCP.docx
As the packet travels through the TCP.docx
laraibshaheen
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
linux unit 4 (2).pptxjiy8t7r7iguyguyy888
linux unit 4 (2).pptxjiy8t7r7iguyguyy888
abhinandpk2405
 
TCP and UDP comparison and itsi application.pptx
TCP and UDP comparison and itsi application.pptx
Mugabo4
 
Computer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Internet Protocol
Internet Protocol
Ghaffar Khan
 
TCP/IP & UDP
TCP/IP & UDP
ghayour abbas
 
the transport layer
the transport layer
tumetr1
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
Rhydham Joshi
 
計概
計概
allan3160
 
Mod4
Mod4
Alam Garcia
 
TCP/IP Introduction
TCP/IP Introduction
Dineesha Suraweera
 
transport layer
transport layer
BishalWosti1
 
Final Presentation
Final Presentation
A&U Trading Corporation
 
TCP Vs UDP
TCP Vs UDP
Ahmed Elnaggar
 
Ip protocol
Ip protocol
H K
 
Network Layer
Network Layer
Ghaffar Khan
 
ppt of computer netwokrs.cse engineering.part 5
ppt of computer netwokrs.cse engineering.part 5
ANANTHAKRISHNANM17
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
Vishal Vasudev
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internat
Kritika Purohit
 
As the packet travels through the TCP.docx
As the packet travels through the TCP.docx
laraibshaheen
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
ssuserf7cd2b
 
linux unit 4 (2).pptxjiy8t7r7iguyguyy888
linux unit 4 (2).pptxjiy8t7r7iguyguyy888
abhinandpk2405
 
TCP and UDP comparison and itsi application.pptx
TCP and UDP comparison and itsi application.pptx
Mugabo4
 
Computer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
the transport layer
the transport layer
tumetr1
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
Rhydham Joshi
 
Ip protocol
Ip protocol
H K
 
ppt of computer netwokrs.cse engineering.part 5
ppt of computer netwokrs.cse engineering.part 5
ANANTHAKRISHNANM17
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
Vishal Vasudev
 
Ad

Recently uploaded (14)

tdygtftyghgy ubh fg g jbv uhkjg jhgjg kj.pptx
tdygtftyghgy ubh fg g jbv uhkjg jhgjg kj.pptx
FrklyByRht
 
Synektik_presentation_H1_2024 FY_EN final online.pdf
Synektik_presentation_H1_2024 FY_EN final online.pdf
SynektikSA
 
OR Royalties Inc. - Corporate Presentation, June 16, 2025
OR Royalties Inc. - Corporate Presentation, June 16, 2025
OR Royalties Inc.
 
网上可查学历Uni SiegenOffer德国锡根大学学历认证查询,Uni Siegen文凭
网上可查学历Uni SiegenOffer德国锡根大学学历认证查询,Uni Siegen文凭
taqyed
 
仿制AAULetter美国旧金山艺术大学毕业证明,AAU成绩单
仿制AAULetter美国旧金山艺术大学毕业证明,AAU成绩单
taqyed
 
Collective Mining | Corporate Presentation - June 2025
Collective Mining | Corporate Presentation - June 2025
Collective Mining
 
OR Royalties Inc. - Major Asset Overview, June 2025
OR Royalties Inc. - Major Asset Overview, June 2025
OR Royalties Inc.
 
How Crypto Trends Will Drive Institutional Investment.docx
How Crypto Trends Will Drive Institutional Investment.docx
taymormohse7
 
西班牙布尔戈斯大学学历认证查询{UBU在读证明信UBU学历证书}在线购买
西班牙布尔戈斯大学学历认证查询{UBU在读证明信UBU学历证书}在线购买
Taqyea
 
The Rise of Real-World Assets in Crypto Trends.docx
The Rise of Real-World Assets in Crypto Trends.docx
taymormohse7
 
最新版美国印第安纳大学东部分校毕业证(IU East毕业证书)原版定制
最新版美国印第安纳大学东部分校毕业证(IU East毕业证书)原版定制
Taqyea
 
最新版美国田纳西理工大学毕业证(TTU毕业证书)原版定制
最新版美国田纳西理工大学毕业证(TTU毕业证书)原版定制
taqyea
 
North Arrow Minerals corporate update on the Kraaipan Gold Project, Botswana
North Arrow Minerals corporate update on the Kraaipan Gold Project, Botswana
narminerals
 
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
 
tdygtftyghgy ubh fg g jbv uhkjg jhgjg kj.pptx
tdygtftyghgy ubh fg g jbv uhkjg jhgjg kj.pptx
FrklyByRht
 
Synektik_presentation_H1_2024 FY_EN final online.pdf
Synektik_presentation_H1_2024 FY_EN final online.pdf
SynektikSA
 
OR Royalties Inc. - Corporate Presentation, June 16, 2025
OR Royalties Inc. - Corporate Presentation, June 16, 2025
OR Royalties Inc.
 
网上可查学历Uni SiegenOffer德国锡根大学学历认证查询,Uni Siegen文凭
网上可查学历Uni SiegenOffer德国锡根大学学历认证查询,Uni Siegen文凭
taqyed
 
仿制AAULetter美国旧金山艺术大学毕业证明,AAU成绩单
仿制AAULetter美国旧金山艺术大学毕业证明,AAU成绩单
taqyed
 
Collective Mining | Corporate Presentation - June 2025
Collective Mining | Corporate Presentation - June 2025
Collective Mining
 
OR Royalties Inc. - Major Asset Overview, June 2025
OR Royalties Inc. - Major Asset Overview, June 2025
OR Royalties Inc.
 
How Crypto Trends Will Drive Institutional Investment.docx
How Crypto Trends Will Drive Institutional Investment.docx
taymormohse7
 
西班牙布尔戈斯大学学历认证查询{UBU在读证明信UBU学历证书}在线购买
西班牙布尔戈斯大学学历认证查询{UBU在读证明信UBU学历证书}在线购买
Taqyea
 
The Rise of Real-World Assets in Crypto Trends.docx
The Rise of Real-World Assets in Crypto Trends.docx
taymormohse7
 
最新版美国印第安纳大学东部分校毕业证(IU East毕业证书)原版定制
最新版美国印第安纳大学东部分校毕业证(IU East毕业证书)原版定制
Taqyea
 
最新版美国田纳西理工大学毕业证(TTU毕业证书)原版定制
最新版美国田纳西理工大学毕业证(TTU毕业证书)原版定制
taqyea
 
North Arrow Minerals corporate update on the Kraaipan Gold Project, Botswana
North Arrow Minerals corporate update on the Kraaipan Gold Project, Botswana
narminerals
 
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
 

Tcp header/IP Header/Authentication header

  • 1. TCP Header/ IP Header/ Authentication Header NETWORK SECURITY By Faizan Shaikh T.Y.B.Sc.IT Roll no.37
  • 2. What is TCP/IP?  TCP/IP is the basic communication language or protocol(set of rules) of the Internet.  It can also be used as a communications protocol in a private network(either an intranet or an extranet).  Basically, it can be said as the TCP works in order to divide file into packets and send it to the workstation. The IP handels the shortest route. So it can be said as both work together.
  • 4. Source Port Number: This 2 bytes number signifies the port number of the source computer. Destination Port Number: This 2 bytes number signifies the port number of the destination. Sequence Number: This field defines the number assigned to the first byte of data portion contained in each TCP segment. For the data to be delivered correctly, each byte to be transferred is numbered in an increasing sequence. Acknowledgement Number: If the destination host receives the sequence number correctly, it sends X+1 as the acknowledgement number back to the source. Header Length: We know that the header length can be between 20-to-60 bytes. Hence the value of the field can be between 5(5*4=20) and 15(15*4=60). Reserved: This 6 byte field is reserved for future use and is currently unused. TCP Header
  • 5. Flag: This 6-byte field defines 6 different control flags,each one of them occupying one bit. Out of these 6 flags two are most important. The SYN flag indicates that the source wants to establish a connection with the destination. The FIN flag indicates that the sender wants to terminate the TCP connection. Window Size: This field determines the size of the window the other party must maintain. Checksum: This 16-bit field contains the checksum for facilitating the error detection and correction. Urgent Pointer: This fields is used in situations where data in TCP segment is more important or urgent than other data in the same TCP connection.
  • 6. IP Header The TCP header plus the original message is now passed to the IP layer. The IP header treats this whole package and adds its own header to it. The format of an IP datagram is shown. Version: This field contains a value 4, which indicates IPv4. In future, this field would contain 6 when IPv6 becomes the standard. Header Length(HLEN) indicates the size of the header in a multiple four-byte words. Service Type: This field defines the service parameters such as priority of the datagram and the level of reliability desired.. Total Length: This field contains the total length of the IP datagram. Because it is two bytes long, an IP datagram cannot be more than 65,536 bytes.
  • 7. Identification: This field is used in situations when a datagram is fragmented. As a datagram passes through different networks, it might be fragmented into smaller sub- datagrams. In such a situation, the sub-datagram are sequenced using the identification field, so that the original datagram can be reconstructed from them. Flags: This field corresponds to Identification. It indicates whether a datagram can be fragmented and if it can be fragmented, whether it is the first or the last or the middle fragment. Fragmentation Offset: If a datagram is fragmented, this field is useful. It is useful when reconstructing a datagram from its fragments.
  • 8. Time to Live: We know that datagram travels through one or more routers before reaching its destination. In case of Network problems, some of the routes to the final destination may not be available due to hardware failures, link failure or congestion. In that condition the datagram may be sent through a different route. This can continue for a long time if the problems aren’t resolved quickly. To avoid this, the datagram sender initializes this field to some number. As the datagram travels through routers this field is decremented each time. If the value becomes zero or negative, it is immediately discarded. No attempt is made to forward it to the next hop. This avoids the datagram travel an infinite amount of time and hence preventing network congestion. After all the datagrams are reached to their destination, the TCP finds out the missing datagram and will request for its retransmission. Thus, IP is not responsible for the error-free, timely and insequence delivery of the entire message--- it is done by TCP.
  • 9. Protocol: This field identifies the transport protocol running on top of IP. After the datagram is constructed from its fragments, it has to be passed on to the upper layer software piece. Source Address: This field contains the 32-bit IP address of the sender. Destination Address: This field contains the 32-bit IP address of the final destination. Options: This field contains optional information such as routing details, timing, management and alignment. For instance, it can store the information about the exact route that the datagram has taken. However, most of the time, the space in this field is not sufficient for all these details, therefore, it is not used very often.