10/13/20151 TCP/IP Transmission Control Protocol Internet Protocol.

Slides:



Advertisements
Similar presentations
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Advertisements

CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
CCNA – Network Fundamentals
Intermediate TCP/IP TCP Operation.
Instructor: Sam Nanavaty TCP/IP protocol. Instructor: Sam Nanavaty Version – Allows for the evolution of the protocol IHL (Internet header length) – Length.
CP476 Internet Computing TCP/IP 1 Lecture 3. TCP / IP Objective: A in-step look at TCP/IP Purposes and operations Header specifications Implementations.
Chapter 7 – Transport Layer Protocols
IP Suite© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science Department.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Chapter 3 Review of Protocols And Packet Formats
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
Gursharan Singh Tatla Transport Layer 16-May
1 Kyung Hee University Part 4 : Network Layer. 2 Kyung Hee University Role and Position of Network Layer o Network layer in the Internet model is responsible.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
1 Internetworking : Internet architecture and TCP/IP Protocol TK3133 Computer Networking Technology.
The Saigon CTT Semester 1 CHAPTER 12 – 13 – 14 Le Chi Trung.
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
The Saigon CTT Semester 1 CHAPTER 10 Le Chi Trung.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
University of the Western Cape Chapter 12: The Transport Layer.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Protocols 1 Objective: Build a protocol foundation for Client / Server programming in an Internet Environment Note: RFCs available from
Transmission Control Protocol
TCOM 515 IP Routing. Syllabus Objectives IP header IP addresses, classes and subnetting Routing tables Routing decisions Directly connected routes Static.
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
CS 4396 Computer Networks Lab
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
CSCI 465 D ata Communications and Networks Lecture 24 Martin van Bommel CSCI 465 Data Communications & Networks 1.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
TCP/IP PROTOCOL UNIT 6. Overview of TCP/IP Application FTP, Telnet, SMTP, HTTP.. Presentation Session TransportHost-to-HostTCP, UDP NetworkInternetIP,
Network Layer/IP Protocols 1. Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2.
Introduction to TCP/IP networking
IP - The Internet Protocol
Network Layer Protocols
Chapter 9 ICMP.
Process-to-Process Delivery, TCP and UDP protocols
TCP/IP Transmission Control Protocol / Internet Protocol
TCP Transport layer Er. Vikram Dhiman LPU.
IP - The Internet Protocol
IP - The Internet Protocol
Dr. John P. Abraham Professor UTPA
CPEG512 Advanced Computer Networks
IP - The Internet Protocol
Dr. John P. Abraham Professor UTPA
Net 323 D: Networks Protocols
Chapter 15. Internet Protocol
IP - The Internet Protocol
Introduction to Networks
IP - The Internet Protocol
Transport Layer 9/22/2019.
Presentation transcript:

10/13/20151 TCP/IP Transmission Control Protocol Internet Protocol

TCP/IP Set of protocols that defines how all transmissions are exchanged across the Internet An Internet under TCP/IP operates like a single network connecting many computers of any size and type. An Internet is an interconnection of independent physical networks (such as LANs) linked together by internetworking devices.

An Internet According to TCP/IP A, B, C - hosts1, 2, 3 – routers, gateways I, II, III – separate physical networks

TCP/IP and the OSI Model

IP ( Internet Protocol ) Network Layer

Internet Protocol IP’s current version is Version 4 (IPv4). It is specified in RFC 891. IP is used to provide interconnection among subnetworks. It defines a protocol not a connection. It provides connectionless delivery making it unreliable. It has no flow control. It has no checksum for the data contents of the datagram.

4 Main Functions of IP 1.Basic data transfer 2.Addressing 3.Routing 4.Fragmentation of datagrams

IP Datagram / IP Header 20 bytes ≤ Header Size < 2 4 x 4 bytes = 60 bytes 20 bytes ≤ Total Length < 2 16 bytes = bytes

IP Datagram / IP Header 1. Version number (4 bit field) - contains the IP version number of the protocol software is using - receiving station must first check the version number of incoming datagrams before proceeding to analyze the rest of the header and encapsulated data. 2. Internet Header Length (4 bit field) - the length of the Internet header in 32 bit words, and thus points to the beginning of the data. ***Note that the minimum value for a correct header is 5 words (20 bytes) and the maximum is 15 words (60 bytes).

IP Datagram / IP Header 3. Type of Service - provides an indication of the abstract parameters of the quality of service desired. - specifies the manner in which a packet is routed. Several networks offer service precedence, which somehow treats high precedence traffic as more important than other traffic. The major choice is a three-way tradeoff between low-delay, high- reliability, and high-throughput.

IP Datagram / IP Header 3.1 Precedence - indicates the datagram’s importance - eight levels are used (0-7), the higher the number, the more important the datagram 3.2 Delay if = 0, High Delay if = 1, Low Delay 3.3 Throughput If = 0, Low Throughput if = 1, High Throughput 3.4 Reliability if = 0, Low Reliability if = 1, High Reliability * Bits are reserved for future use and is usually set to 00 Precedence Delay Throughput Reliability Not used

IP Datagram / IP Header 4. Total Length - length of the datagram, measured in octets, including Internet header and data. This field allows the length of a datagram to be up to 65,535 octets. 5. Identification - a value assigned by the IP sender of an IP as an aid to reassembling fragmented packets (16 bits). Each of the fragmented datagrams will have the same Identification field value, which enables IP to reassemble fragmented datagrams correctly.

IP Datagram / IP Header 6. Flags - used to control fragmentation Bit 16 - Reserved and usually set to 0 Bit 17 – Don’t Fragment (DF) Flag - indicates whether or not a datagram can be fragmented - if DF = 1, datagram cannot be fragmented Bit 18 – More Fragments (MF) Flag - if MF = 1, more datagram must be reassembled to recreate the full datagram - last fragment has its MF = 0 so that the receiving device knows when to stop waiting for datagrams R D M F F

IP Datagram / IP Header 7. Fragmentation Offset - contains the position number of the fragments so that they can be reassembled in proper order 8. Time to Live (TTL) 2 Functions of the TTL field 1. to limit the lifetime of transmitted data 2. to end routing loops If the TTL field has expired (TTL = 0), current node must discard the datagram but a message is sent back to the sending station requesting it to send again the discarded datagram.

IP Datagram / IP Header 9. Protocol –identifies which higher layer protocol should receive the data portion of the datagram ValueNameProtocol 1ICMPInternet Control Message Protocol 6TCPTransmission Control Protocol 17UDPUser Datagram Protocol 46RSVPReservation Protocol 80ISO-IPISO Internet Protocol

IP Datagram / IP Header 10. Header Checksum - checks the IP header for errors 11. Source IP Address - contains the 32 bit IP address of the sending station 12. Destination IP Address - contains the 32 bit IP address of the destination station 13. Options - contains information on source routing, tracing a route, time stamping the packet as it traverses routers, security entries. - found only on IPv4

Source Routing - the ability of the originating station to place route information in a datagram to be interpreted by routers. 2 types of source routing 1. Strict Routing path must not deviate from the route information specified by the source. 2. Loose Allows a router to forward packets to any router it feels is correct to service the next route indicated in the Source route field.

FRAGMENTATION Datagram fragmentation is necessary to ensure that data transmitted from one network may not be too large when received by another network.

NETWORK ADDRESSING 1.Classless - the full address range can be used without regard to bit reservation - used by routers of ISPs 2.Classful - 32 bit address is segmented to denote network and host id

Internet Address

Internet Classes

IP Addresses in Decimal Notation

Class Ranges of Internet Addresses

Network and Host Addresses Sample Internet

A Network with Two Levels of Hierarchy

SUBNETTING –Refers to the partitioning of a network address space into separate autonomous subnetworks. –Subnetting allowed tremendous efficiency not only in Internet routing tables but also on customer networks. –It allows reassignment of some of the bits normally used by the host portion of the address to the network portion of the address.

A Network with Three Levels of Hierarchy Internet is not aware that the network is divided into 3 physical subnetworks R1 knows that the network is divided into 3 subnetworks Address  Netid (2 octets)  Subnetid (1 octet)  Hostid (1 octet)

Three Levels of Hierarchy  Netid – first level, defines the site.  Subnetid – second level, defines the physical subnetwork.  Hostid – third level, defines the connection of the host to the subnetwork. Routing of the IP datagram, –Delivery to the site –Delivery to the subnetwork –Delivery to the host

Subnet bit ranges Class A 0 7 bits of network address Up to 22 bits available for subnetting 1014 bits of network address Up to 14 bits available for subnetting Class B bits of network address 6 bits for subnetting Class C

Masking Masking is a process that extracts the address of the physical network from an IP address. –If the network is not subnetted, masking extracts the network address from the IP address. –In subnetted network, masking extracts the subnetwork address.

Subnet Mask A mask is the portion of an address that is subtracted from the original address. It indicates how many bits are masked out of the original address to use as a subnet address.

Masking

Addresses with and without Subnetting

Subnet Mask (default) IP Address Class Default Subnet Mask Class A Class B Class C

Finding the Subnetwork Address Boundary-Level Masking (mask numbers-255 or 0) 1.The bytes in the IP address that corresponds to 255 in the mask will be repeated in the subnetwork address. 2.The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the subnetwork address. Example: Nonboundary-Level Masking (mask numbers- not just 255 or 0) - use bit-wise AND operator to get the subnetwork address if the mask number is not 255 or 0. Example:

Other Protocols in the Network Layer Address Resolution Protocol (ARP) –associates an IP address with the physical address. –used to find the physical address of the node when its Internet address is known –when a router needs to find the physical address of another host on its network, it formats an ARP query packet that includes the IP address and broadcasts it over the network

ARP

Other Protocols in the Network Layer Reverse Address Resolution Protocol (RARP) –allows a host to discover its internet address when it knows only its physical address. –used to find the physical address of the node when its Internet address is known –RARP query packet, send by the host –Server recognizes the RARP packet and returns the host’s internet address

Other Protocols in the Network Layer Internet Control Message Protocol (ICMP) –a mechanism used by hosts and routers to send notification of datagram problems back to the sender. Disabled links, device is on fire, network congestion –its sole function is to report problems, not to correct them.

Other Protocols in the Network Layer Internet Group Message Protocol (IGMP) –designed to help a multicast router identify the hosts in a LAN that are members of a multicast group 2 types of communication in IP protocol Unicasting – one-to-one communication Multicasting – one-to-many communication

UDP / TCP User Datagram Protocol Transmission Control Protocol TRANSPORT LAYER

2 Protocols in Transport Layer of TCP/IP –User Datagram Protocol (UDP) Provides nonsequenced transport functionality when reliability and security are less important than size and speed. – Transmission Control Protocol (TCP) Provides reliable end-to-end delivery

IP – host-to-host protocol (from one physical device to another) Delivers a datagram from a source host to a destination host. TCP – port-to-port protocol –Define a set of conceptual connections to individual processes called protocol ports or ports. protocol ports – a destination port for storing data (usually a buffer) for use by a particular process.

Port Addresses Port to port protocols use IP services

UDP Datagram Adds only port addresses, checksum error control and length information to the data from the upper layer The packet produced by the UDP is called a user datagram

TCP/IP and the OSI Model

Figure UDP Datagram Format 1.Source port address of the application program that has created the message. 2.Destination port address of the application program that receive the message. 3.Total length of the user datagram in bytes 4.Checksum is used for error detection

Transmission Control Protocol (TCP) TCP is a reliable stream transport port-to-port protocol. TCP generates a virtual circuit between sender and receiver that is active for the duration of a transmission There’s a connection establishment before the transmission and connection termination after the transmission. Divides long transmission into smaller data units and packages each into a frame called segments.

TCP Segment Format

Source port address defines the application program in the source computer. Destination port address defines the application program in the destination computer. Sequence number field shows the position of. the data in the original data stream Acknowledgment number is used to acknowledge the receipt of the data from other communicating device. Header length – a four bit field indicates the number of words in the TCP header.

Reserved – for future use Control –Urgent bit – validates the urgent pointer field –ACK bit – validates the acknowledgment number field –PSH bit – used to inform the sender that a higher throughput is needed –Reset bit – used to reset the connection when there is confusion in the sequence numbers. –SYN bit – used for sequence number synchronization –FIN bit – used in connection termination Types of segments Connection request/ Termination request Connection confirmation/ Termination confirmation Confirmation acknowledgment/ Termination confirmation acknowledgment

Window size (16 bit) – defines the size of the sliding window Checksum – used in error detection Urgent pointer – valid only if the URG bit is set Options and padding – optional field –Additional information to the receiver or alignment purposes