TCP/IP Protocol Architecture CSE 3213 – Fall 2011 1.

Slides:



Advertisements
Similar presentations
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Advertisements

Chapter 2 Network Models.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Semester Copyright USM EEE442 Computer Networks Introduction: Protocols En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
Protocols and the TCP/IP Suite
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
Review on Networking Technologies Linda Wu (CMPT )
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Chapter 2 Network Models
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Definitions Protocol (1) An agreement between the communicating parties on how communication is to proceed. (2) A set of rules that governs how two or.
Protocols and the TCP/IP Suite
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
Overview of Network Protocols, Services & Layering OSI Reference Model TCP/IP Architecture Error Detection and Correction.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
Network Applications and Layered Architectures Protocols OSI Reference Model.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Chapter 1 Communication Networks and Services Network Architecture and Services.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
1. Layered Architecture of Communication Networks: OSI Reference Model.
1 ECEN “Internet Protocols and Modeling”, Spring 2011 Slide 5.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Net 221D:Computer Networks Fundamentals
Chapter 2 Applications and Layered Architectures
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
8/28/ Network Models - Lin 1 CPET/ECET Network Models Data Communications and Networking Fall 2004 Professor Paul I-Hai Lin Electrical and.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
CSCI 465 D ata Communications and Networks Lecture 2 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
- 1 - DPNM Review of Important Networking Concepts J. Won-Ki Hong Dept. of Computer Science and Engineering POSTECH Tel:
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
TUNALIData Communications1 Chapter 2 Protocols and Architecture.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Lecture (2).
Computer Networks.
Part I. Overview of Data Communications and Networking
Network Architecture Introductory material
Protocols and the TCP/IP Suite
Data and Computer Communications by William Stallings Eighth Edition
Review of Important Networking Concepts
Review of Important Networking Concepts
TCP/IP Protocol Suite: Review
TCP/IP Protocol Suite: Review
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Protocols and the TCP/IP Suite
Review of Important Networking Concepts
Presentation transcript:

TCP/IP Protocol Architecture CSE 3213 – Fall

The Need For Protocol Architecture 1.) the source must activate communications path or inform network of destination 2.) the source must make sure that destination is prepared to receive data 3.) the file transfer application on source must confirm file management program at destination is prepared to accept and store file 4.) a format translation function may need to be performed if the formats on systems are different To transfer data several tasks must be performed: 2

Functions of Protocol Architecture  breaks logic into subtask modules which are implemented separately  modules are arranged in a vertical stack each layer in the stack performs a subset of functions relies on next lower layer for primitive functions changes in one layer should not require changes in other layers 3

Layers, Services & Protocols  The overall communications process between two or more machines connected across one or more networks is very complex  Layering partitions related communications functions into groups that are manageable  Each layer provides a service to the layer above  Each layer operates according to a protocol 4

Protocols  A protocol is a set of rules that governs how two or more communicating entities in a layer are to interact  Messages that can be sent and received  Actions that are to be taken when a certain event occurs, e.g. sending or receiving messages, expiry of timers  The purpose of a protocol is to provide a service to the layer above 5

Layers  A set of related communication functions that can be managed and grouped together  Application Layer: communications functions that are used by application programs  HTTP, DNS, SMTP ( )  Transport Layer: end-to-end communications between two processes in two machines  TCP, User Datagram Protocol (UDP)  Network Layer: node-to-node communications between two machines  Internet Protocol (IP) 6

Why Layering?  Layering simplifies design, implementation, and testing by partitioning overall communications process into parts  Protocol in each layer can be designed separately from those in other layers  Protocol makes “calls” for services from layer below  Layering provides flexibility for modifying and evolving protocols and services without having to change layers below  Monolithic non-layered architectures are costly, inflexible, and soon obsolete  Let’s consider the TCP/IP protocol architecture 7

TCP/IP Protocol Architecture Result of protocol research and development conducted on ARPANET Referred to as TCP/IP protocol suite TCP/IP comprises a large collection of protocols that are Internet standards 8

TCP/IP Layers and Example Protocols also called Data Link 9

Physical Layer TTransfers bits across a link CConcerned with issues like: ccharacteristics of transmission medium (optical fiber, twisted- pair cable, coaxial cable, wireless) nnature of the signals (modulation, signal strength, voltage levels, bit times) ddata rates 10

Data Link (Network Access) Layer  Transfers frames across direct connections  Groups bits into frames  Detection of bit errors; retransmission of frames  Activation, maintenance and deactivation of data link connections  Medium access control for LANs  Flow control Data Link Layer Physical Layer Data Link Layer Physical Layer frames bits 11

Network Layer  Transfers packets across multiple links and/or multiple networks  Addressing must scale to large networks  Nodes jointly execute routing algorithm to determine paths across the network  Forwarding transfers packet across a node  Congestion control to deal with traffic surges  Connection setup, maintenance, and teardown when connection-based 12

Transport Layer  Transfers data end-to-end from process in a machine to process in another machine  Reliable stream transfer or quick-and-simple single-block transfer  Port numbers enable multiplexing  Message segmentation and reassembly  Connection setup, maintenance, and release Transport Layer Network Layer Transport Layer Network Layer Network Layer Network Layer Communication Network 13

Application Layer  Contains the logic needed to support various user applications (HTTP, FTP, SSH)  A separate module is needed for each type of application. 14

Internet Protocol Approach IP packets transfer information across Internet Host A IP → router → router… → router → Host B IP IP layer in each router determines next hop (router) Network interfaces transfer IP packets across networks Router Internet Layer Network Interface Transport Layer Internet Layer Network Interface Transport Layer Internet Layer Network Interface Host A Host B Net 5 Net 1 Net 5 Net 2 Net 5 Net 3 Router Internet Layer Network Interface Router Internet Layer Network Interface Net 5 Net 4 15

TCP/IP Encapsulation 16 (Packet) (Frame)

TCP/IP Addressing  Port (or SAP) numbers of processes at source and destination  Each process with a host must have an address that is unique within the host; this allows the host- to-host protocol (e.g., TCP) to deliver data to the proper process.  IP addresses of source and destination  Each host on a sub-network must have a unique global internet address; this allows the data to be delivered to the proper host.  Network interface card (NIC) addresses defined by the NIC  Also called physical addresses or MAC addresses 17

IP Addresses 18  Each host in the Internet is identified by a globally unique IP address  The IP address identifies the host’s network interface rather than the host itself (usually the host is identified by its physical address within a network).  An IP address consists of two parts: network ID and host ID (more on formats of IP addresses later).  IP addresses on the Internet are distributed in a hierarchical way. At the top of the hierarchy is ICANN (Internet Corporation for Assigned Names and Numbers). ICANN allocates blocks of IP addresses to regional Internet registries. There are currently three regional Internet registries that cover the Americas, Europe, and Asia. The regional registries then further allocate blocks of IP addresses to local Internet registries within their geographic region. Finally, the local Internet registries assign addresses to end users.  Router: a node that is attached to two or more physical networks. Each network interface has its own IP address.

Physical Addresses 19  On a physical network, the attachment of a device to the network is often identified by a physical address.  The format of the physical address depends on the particular type of network.  Example: Ethernet LANs use 48-bit addresses.  Ethernet: protocol for bus LANs, originally designed by Xerox, later developed into IEEE standard.  Every machine in a LAN comes with a NIC that is assigned a physical address.

Physical Addresses (cont.)  LANs (and other networks) assign physical addresses to the physical attachment to the network  The network uses its own address to transfer packets or frames to the appropriate destination  IP address needs to be resolved to physical address at each IP network interface  Example: Ethernet uses 48-bit addresses  Each Ethernet network interface card (NIC) has globally unique Medium Access Control (MAC) or physical address  First 24 bits identify NIC manufacturer; second 24 bits are serial number  00:90:27:96:68:07 12 hex numbers Intel 20

Network Interface Cards (NICs) 21 NICs are adapters installed in a computer that provide the connection point to a network. Each NIC is designed for a specific type of LAN, such as Ethernet, token ring, FDDI. A NIC provides an attachment point for a specific type of cable, such as coaxial cable, twisted-pair cable, or fiber-optic cable. Every NIC has a globally unique identifying node address (globally unique physical address). Token ring and Ethernet card addresses are hardwired on the card. The IEEE (Institute of Electrical and Electronic Engineers) is in charge of assigning addresses to token ring and Ethernet cards. Each manufacturer is given a unique code and a block of addresses.

Examples To reinforce understanding of TCP/IP  protocol suite  operations  encapsulation  addressing 22

Reading  Chapter 2 (2.1, 2.3, 2.5)  Next time: Data Transmission (chapter 3) 23