TCP/IP Yang Wang 103301 Professor: M.ANVARI.

Slides:



Advertisements
Similar presentations
TCP/IP MODEL Maninder Kaur
Advertisements

Chapter 5: TCP/IP and OSI Business Data Communications, 5e.
Network Layer and Transport Layer.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Chapter 4 : TCP/IP and OSI Business Data Communications, 4e.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Semester Copyright USM EEE442 Computer Networks Introduction: Protocols En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
Protocols and the TCP/IP Suite
TCP/IP Lecture Extra. TCP/IP Developed by DARPA (Defense Advanced Research Projects) TCP is a connection-oriented transport protocol that sends data as.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
OIS Model TCP/IP Model.
Lecturer: Tamanna Haque Nipa
Chapter Overview TCP/IP Protocols IP Addressing.
Chapter 5: TCP/IP and OSI Business Data Communications, 6e.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Process-to-Process Delivery:
Layering and the TCP/IP protocol Suite  The TCP/IP Protocol only contains 5 Layers in its networking Model  The Layers Are 1.Physical -> 1 in OSI 2.Network.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 9.
Chapter 2 Network Models
Presentation on Osi & TCP/IP MODEL
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
Protocols and the TCP/IP Suite
Huda AL_Omairl - Network 71 Protocols and Network Software.
Lect1..ppt - 01/06/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 2 Protocols and the TCP/IP Suite by Zornitza Genova Prodanoff.
Mukesh N. Tekwani Elphinstone College Mumbai
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications 1.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
The OSI Model.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
TCP/IP Transport and Application (Topic 6)
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Net 221D:Computer Networks Fundamentals
Protocol Layering Chapter 11.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Lecture 4 : Network Architectures (cont..) 1. 2 Summary of OSI Layers.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Protocols and the TCP/IP Suite
Protocols and the TCP/IP Suite
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
ECEN “Internet Protocols and Modeling”
Process-to-Process Delivery:
Networking Theory (part 2)
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Protocols and the TCP/IP Suite
OSI Reference Model Unit II
Process-to-Process Delivery: UDP, TCP
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Networking Theory (part 2)
Networking Theory (part 2)
Presentation transcript:

TCP/IP Yang Wang 103301 Professor: M.ANVARI

TCP/IP 8: Conclusion 1: Distributed Processing 2: Communications Architecture 3: What is TCP/IP 4: TCP/IP Architecture Model 5: TCP 6: IP 7: The Operation of the TCP/IP 8: Conclusion

Distributed Processing 1: Centralized data processing: Mainframe, Host, Terminal. Only host processes data. 2: Distributed data processing: LAN, Sever, Workstation. Workstation fetches software from Sever, and processes data by itself. 3: The advantage of DDP include: 1): Responsiveness 2): Availability 3): Resource sharing 4): Incremental growth 5): Increased user involvement and control 6): End-user productivity

Communications Architecture 1: To achieve these DDP benefits, the operation system must provide a range of support functions for DDP. These include the software for exchanging data among workstations. 2: Communication Architecture is software that supports a network of independent computer. 3: It is possible that each computer has its own separate and different operation system, as long as all computers support the same communications architecture. 4: The technology of the communications architecture is well developed and is supported by all vendors. TCP/IP is the most widely used communications architecture protocol suite.

What is TCP/IP?(con) 1: TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is a networking protocol that provides communication across interconnected networks, between computers with diverse hardware architectures and various operating systems. 2: It was developed by a Department of Defense (DOD) research project to connect a number of different networks designed by different venders into a network of the Internet. 3: The most important TCP/IP services are: 1): File transfer. The file transfer protocol (FTP) allows a user on any computer to get files from another computer, or to send files to another computer.

What is TCP/IP?(2) 4: Why is the TCP/IP popular? 2): Electronic mail. Simple Mail Transfer Protocol (SMTP) to send electronic mail on a TCP/IP network. This allows you to send messages to users on other computers. 3): Remote login. The Network Terminal Protocol (TELNET) allows a user to log in on any other computer on the network. 4: Why is the TCP/IP popular? 1): Robust client-server framework. It is an excellent client-server application platform, especially in wide-area network environment. 2): Information sharing. Thousands of academic, defense, scientific, and commercial organizations share data, electronic mail and services on the connected Internet using TCP/IP.

What is TCP/IP?(3) 3): General availability. Implementations of TCP/IP are available on nearly every popular computer operating system.Additionally, bridge, router and network analyzer vendors all offer support for the TCP/IP protocol family within their products.

TCP/IP Architecture Model 1: Application layer. This layer contains the logic need to support the various user applications. 2: Transport layer or Host-to-host layer. This layer handles all error detection and recovery. Reliability control is concentrated at this layer by Using checksums, acknowledgments, and time-outs. 3: Internet layer. The IP is used at this layer to provide the routing function across multiple networks. 4: Subnet layer. Covers the physical interface and the exchange of data between an end system and the network to which it is attached.

TCP(con) 1: Definition 1): TCP is a transport layer, connection-oriented, end-to-end protocol. It provides reliable, sequenced, and unduplicated delivery of bytes to a remote or local user. a): Connection-oriented implies that TCP first establishes a connection between the two systems that intend to exchange data. b): End-to-end means data transmission between the source system and the destination system. 2): Datagram: A transmission method in which sections of a message are transmitted in scattered order and the correct order is re-established by the receiving workstation. TCP/IP supports Datagram. So no two communicating computers monopolize the network.

TCP(2) 2: How TCP works? 1): Sequence number a): when an application sends a message to TCP for transmission, TCP breaks the message into packets, and sized appropriately for the network. b): TCP marks these packets with sequence numbers before sending them. c): The sequence numbers allow the receiving system to properly reassemble the original message.

TCP(3) 2): Checksum a): Being able to reassemble the original message is not enough, the accuracy of the data must also be verified. TCP does this by computing a checksum. b): A checksum is a simple mathematical computation applied, by the sender, to the data contained in the TCP packet. c): The recipient then does the same calculation on the received data and compares the result with the checksum that the sender computed. d): If the results match, the recipient sends an acknowledgment (ACK). If the results do not match, the recipient asks the sender to resend the packet.

TCP(4) 3): The port ID: TCP uses port ID to specify which application running on the system is sending or receiving data. 4): The TCP header: a):The port ID, sequence number, and checksum are inserted into the TCP packet in a special section called the header. b): The header is at the beginning of the packet containing this and other “control” information for TCP.

IP(con) 1: Definition 2: How IP works? IP is the messenger protocol of TCP/IP. The IP protocol, much simpler than TCP, basically addresses and sends packets 2: How IP works? 1): IP relies on three pieces of information, which you provide, to receive and deliver packets successfully: IP address, subnet mask, and default gateway..

IP(2) 2): IP address a): The IP address identifies your system on the TCP/IP network. b): IP addresses are 32-bit addresses that are globally unique on a network c): They are generally represented in dotted decimal notation, which separates the four bytes of the address with periods. An IP address looks like this: 102.54.94.97 d): Although an IP address is a single value, it really contains two pieces of information: your system’s network ID and your system’s host ID.

IP(3) 3): the subnet mask a): It also represented in dotted decimal notation, is used to extract the network ID and host ID from your IP address. b): the value of the subnet mask is determined by setting the network ID bits of the IP address to ones and the host ID bits to zeros. c): It allows TCP/IP to determine the host ID and network ID of the workstation. d): example: when the IP address is 102.54.94.97 ( specified by the user ) and the subnet mask is 255.255.0.0 (specified by the user ) The network ID is 102.54 ( IP address and subnet mask ) and the host ID is 94.97 ( IP address and subnet mask )

The Operation of the TCP/IP 1: The sending process generates a block of data and passes this to the TCP layer. 2: TCP may break this block into packets and append the TCP header, then hands each packet over to the IP layer. 3: IP appends an IP header to each packet then presents it to the subnet layer. 4: the subnet layer appends its own header to each packet, then sends it to the receiver across the sub-networks. 5: when recipient receives data, the reverse process occurs. At each layer , the corresponding header is removed, until the original user data are delivered to the destination process.

conclusion 1: TCP/IP is the most complete and accepted networking protocol available 2: Almost all modern operating systems offer TCP/IP support, and most large networks rely on TCP/IP for all their network traffic.