Sie sind auf Seite 1von 17

COMPUTER

NETWORKING AND
DATA
COMMUNCTION
NAME
MUHAMMAD YASEEN
ID
4939
TOPIC
IP PACKE & IGP

IP PACKET
Apacketis one unit of binary data capable

of being transmitted through a computer


network.
These packets are constructed in some
standard called aspacket format.
Packet formats generally include a header,
the body containing the message data and
sometimes a footer (also known as
thetrailer).

IP PACKET
Thepacket headerlists the

destination of the packet


(inIPpackets, the destinationIP
address) and often indicates the
length of the message data.

IP PACKET
O Thepacket footercontains data

that shows the end of the packet,


such as a special sequence of bits
known as amagic number. Both the
packet header and footer may
contain error-checking information.
The receiving device is responsible
for re-assembling individual packets
into the original message.

HOW IT MAKES
O It follows OSI MODEL

HOW IT MAKES
O The application layer show data.

Application layer
O It also provide access to the network
resources.
O

O The transport layer comes.

HOW IT MAKES
O The transport layer provide reliable process-

to-process delivery and error recovery.

O Process-to-process needs port address.


O Port address is is a list ofInternet socket

port numbers used by protocols of


theTransport Layerof theInternet Protocol
Suitefor the establishment of host-to-host
connectivity.

HOW IT MAKES
O The a is sender port address and j

is receiver port address.


O Transport layer add port number and
then
network layer adds ip address to
packet.

O When the data is send, outside of the

local network so ip address adds.

HOW IT MAKES
O The A is source address and P is a

destination address(ip
address),which is unique for every
system.
O Then DATA LINK LAYER.
O The data link layer adds physical
layer to the data and physical layer
changes from hope to hope while ip
address remains same.

HOW IT MAKES
O Then at receiver side opposite

actions take place.

PRETTY GOOD PRIVACY(PGP)


O Pretty Good Privacy (PGP) is a

popular program used toencryptand


decrypt e-mail over the Internet.
O It can also be used to send an
encrypteddigital signaturethat lets
the receiver verify the sender's
identity and know that the message
was not changed route.

HOW PGP WORKS


O When a user encrypts plaintext with

PGP, PGP first compresses the


plaintext.
O Data compression saves modem
transmission time and disk space
and, more importantly, strengthens
cryptographic security

O Cryptographyis the science of using

mathematics to encrypt and decrypt data.


O PGP then creates asession key,which is a
one-time-only secret key. This key is a
random number generated from the
random movements of your mouse and
the keystrokes you type.
O This session key works with a very secure,
fast conventional encryption algorithm to
encrypt the plaintext

O Once the data is encrypted, the

session key is then encrypted to the


recipient's public key. This public
key-encrypted session key is
transmitted along with the cipher
text to the recipient.

O Decryption works in the reverse. The

recipient's copy of PGP uses his or


her private key to recover the
temporary session key, which PGP
then uses to decrypt the
conventionally-encrypted cipher text.

INTERIOR GATEWAY
PROTOCOL(IGP)
O An IGP (Interior Gateway Protocol) is a

protocol for exchanging routing


information between gateways (A
gateway is anetworkpoint that acts as
an entrance to another network).within
an independent network.
O The routing information can then be
used by the Internet Protocol (IP) or
other network protocols to specify how
to route transmissions.

O There are two commonly used IGPs:

theRouting Information
Protocol(RIP) and the Open Shortest
Path First (OSPF) protocol.

Das könnte Ihnen auch gefallen