Presentation is loading. Please wait.

Presentation is loading. Please wait.

10/13/20151 TCP/IP Transmission Control Protocol Internet Protocol.

Similar presentations


Presentation on theme: "10/13/20151 TCP/IP Transmission Control Protocol Internet Protocol."— Presentation transcript:

1 10/13/20151 TCP/IP Transmission Control Protocol Internet Protocol

2 TCP/IP Set of protocols that defines how all transmissions are exchanged across the Internet An Internet under TCP/IP operates like a single network connecting many computers of any size and type. An Internet is an interconnection of independent physical networks (such as LANs) linked together by internetworking devices.

3 An Internet According to TCP/IP A, B, C - hosts1, 2, 3 – routers, gateways I, II, III – separate physical networks

4 TCP/IP and the OSI Model

5 IP ( Internet Protocol ) Network Layer

6 Internet Protocol IP’s current version is Version 4 (IPv4). It is specified in RFC 891. IP is used to provide interconnection among subnetworks. It defines a protocol not a connection. It provides connectionless delivery making it unreliable. It has no flow control. It has no checksum for the data contents of the datagram.

7 4 Main Functions of IP 1.Basic data transfer 2.Addressing 3.Routing 4.Fragmentation of datagrams

8 IP Datagram / IP Header 20 bytes ≤ Header Size < 2 4 x 4 bytes = 60 bytes 20 bytes ≤ Total Length < 2 16 bytes = 65536 bytes

9 IP Datagram / IP Header 1. Version number (4 bit field) - contains the IP version number of the protocol software is using - receiving station must first check the version number of incoming datagrams before proceeding to analyze the rest of the header and encapsulated data. 2. Internet Header Length (4 bit field) - the length of the Internet header in 32 bit words, and thus points to the beginning of the data. ***Note that the minimum value for a correct header is 5 words (20 bytes) and the maximum is 15 words (60 bytes).

10 IP Datagram / IP Header 3. Type of Service - provides an indication of the abstract parameters of the quality of service desired. - specifies the manner in which a packet is routed. Several networks offer service precedence, which somehow treats high precedence traffic as more important than other traffic. The major choice is a three-way tradeoff between low-delay, high- reliability, and high-throughput.

11 IP Datagram / IP Header 3.1 Precedence - indicates the datagram’s importance - eight levels are used (0-7), the higher the number, the more important the datagram 3.2 Delay if = 0, High Delay if = 1, Low Delay 3.3 Throughput If = 0, Low Throughput if = 1, High Throughput 3.4 Reliability if = 0, Low Reliability if = 1, High Reliability * Bits 14-15 are reserved for future use and is usually set to 00 Precedence Delay Throughput Reliability Not used 8 - 10 11 12 13 14 - 15

12 IP Datagram / IP Header 4. Total Length - length of the datagram, measured in octets, including Internet header and data. This field allows the length of a datagram to be up to 65,535 octets. 5. Identification - a value assigned by the IP sender of an IP as an aid to reassembling fragmented packets (16 bits). Each of the fragmented datagrams will have the same Identification field value, which enables IP to reassemble fragmented datagrams correctly.

13 IP Datagram / IP Header 6. Flags - used to control fragmentation Bit 16 - Reserved and usually set to 0 Bit 17 – Don’t Fragment (DF) Flag - indicates whether or not a datagram can be fragmented - if DF = 1, datagram cannot be fragmented Bit 18 – More Fragments (MF) Flag - if MF = 1, more datagram must be reassembled to recreate the full datagram - last fragment has its MF = 0 so that the receiving device knows when to stop waiting for datagrams R D M F F 16 17 18

14 IP Datagram / IP Header 7. Fragmentation Offset - contains the position number of the fragments so that they can be reassembled in proper order 8. Time to Live (TTL) 2 Functions of the TTL field 1. to limit the lifetime of transmitted data 2. to end routing loops If the TTL field has expired (TTL = 0), current node must discard the datagram but a message is sent back to the sending station requesting it to send again the discarded datagram.

15 IP Datagram / IP Header 9. Protocol –identifies which higher layer protocol should receive the data portion of the datagram ValueNameProtocol 1ICMPInternet Control Message Protocol 6TCPTransmission Control Protocol 17UDPUser Datagram Protocol 46RSVPReservation Protocol 80ISO-IPISO Internet Protocol

16 IP Datagram / IP Header 10. Header Checksum - checks the IP header for errors 11. Source IP Address - contains the 32 bit IP address of the sending station 12. Destination IP Address - contains the 32 bit IP address of the destination station 13. Options - contains information on source routing, tracing a route, time stamping the packet as it traverses routers, security entries. - found only on IPv4

17 Source Routing - the ability of the originating station to place route information in a datagram to be interpreted by routers. 2 types of source routing 1. Strict Routing path must not deviate from the route information specified by the source. 2. Loose Allows a router to forward packets to any router it feels is correct to service the next route indicated in the Source route field.

18 FRAGMENTATION Datagram fragmentation is necessary to ensure that data transmitted from one network may not be too large when received by another network.

19 NETWORK ADDRESSING 1.Classless - the full address range can be used without regard to bit reservation - used by routers of ISPs 2.Classful - 32 bit address is segmented to denote network and host id

20 Internet Address

21 Internet Classes

22 IP Addresses in Decimal Notation

23 Class Ranges of Internet Addresses

24 Network and Host Addresses Sample Internet

25 A Network with Two Levels of Hierarchy

26 SUBNETTING –Refers to the partitioning of a network address space into separate autonomous subnetworks. –Subnetting allowed tremendous efficiency not only in Internet routing tables but also on customer networks. –It allows reassignment of some of the bits normally used by the host portion of the address to the network portion of the address.

27 A Network with Three Levels of Hierarchy Internet is not aware that the network is divided into 3 physical subnetworks R1 knows that the network 141.14 is divided into 3 subnetworks Address  Netid (2 octets)  Subnetid (1 octet)  Hostid (1 octet)

28 Three Levels of Hierarchy  Netid – first level, defines the site.  Subnetid – second level, defines the physical subnetwork.  Hostid – third level, defines the connection of the host to the subnetwork. Routing of the IP datagram, –Delivery to the site –Delivery to the subnetwork –Delivery to the host

29 Subnet bit ranges Class A 0 7 bits of network address Up to 22 bits available for subnetting 1014 bits of network address Up to 14 bits available for subnetting Class B 11021 bits of network address 6 bits for subnetting Class C

30 Masking Masking is a process that extracts the address of the physical network from an IP address. –If the network is not subnetted, masking extracts the network address from the IP address. –In subnetted network, masking extracts the subnetwork address.

31 Subnet Mask A mask is the portion of an address that is subtracted from the original address. It indicates how many bits are masked out of the original address to use as a subnet address.

32 Masking

33 Addresses with and without Subnetting

34 Subnet Mask (default) IP Address Class Default Subnet Mask Class A255.0.0.0 Class B255.255.0.0 Class C255.255.255.0

35 Finding the Subnetwork Address Boundary-Level Masking (mask numbers-255 or 0) 1.The bytes in the IP address that corresponds to 255 in the mask will be repeated in the subnetwork address. 2.The bytes in the IP address that corresponds to 0 in the mask will change to 0 in the subnetwork address. Example: Nonboundary-Level Masking (mask numbers- not just 255 or 0) - use bit-wise AND operator to get the subnetwork address if the mask number is not 255 or 0. Example:

36 Other Protocols in the Network Layer Address Resolution Protocol (ARP) –associates an IP address with the physical address. –used to find the physical address of the node when its Internet address is known –when a router needs to find the physical address of another host on its network, it formats an ARP query packet that includes the IP address and broadcasts it over the network

37 ARP

38 Other Protocols in the Network Layer Reverse Address Resolution Protocol (RARP) –allows a host to discover its internet address when it knows only its physical address. –used to find the physical address of the node when its Internet address is known –RARP query packet, send by the host –Server recognizes the RARP packet and returns the host’s internet address

39 Other Protocols in the Network Layer Internet Control Message Protocol (ICMP) –a mechanism used by hosts and routers to send notification of datagram problems back to the sender. Disabled links, device is on fire, network congestion –its sole function is to report problems, not to correct them.

40 Other Protocols in the Network Layer Internet Group Message Protocol (IGMP) –designed to help a multicast router identify the hosts in a LAN that are members of a multicast group 2 types of communication in IP protocol Unicasting – one-to-one communication Multicasting – one-to-many communication

41 UDP / TCP User Datagram Protocol Transmission Control Protocol TRANSPORT LAYER

42 2 Protocols in Transport Layer of TCP/IP –User Datagram Protocol (UDP) Provides nonsequenced transport functionality when reliability and security are less important than size and speed. – Transmission Control Protocol (TCP) Provides reliable end-to-end delivery

43 IP – host-to-host protocol (from one physical device to another) Delivers a datagram from a source host to a destination host. TCP – port-to-port protocol –Define a set of conceptual connections to individual processes called protocol ports or ports. protocol ports – a destination port for storing data (usually a buffer) for use by a particular process.

44 Port Addresses Port to port protocols use IP services

45 UDP Datagram Adds only port addresses, checksum error control and length information to the data from the upper layer The packet produced by the UDP is called a user datagram

46 TCP/IP and the OSI Model

47 Figure 24-15 UDP Datagram Format 1.Source port address of the application program that has created the message. 2.Destination port address of the application program that receive the message. 3.Total length of the user datagram in bytes 4.Checksum is used for error detection

48 Transmission Control Protocol (TCP) TCP is a reliable stream transport port-to-port protocol. TCP generates a virtual circuit between sender and receiver that is active for the duration of a transmission There’s a connection establishment before the transmission and connection termination after the transmission. Divides long transmission into smaller data units and packages each into a frame called segments.

49 TCP Segment Format

50 Source port address defines the application program in the source computer. Destination port address defines the application program in the destination computer. Sequence number field shows the position of. the data in the original data stream Acknowledgment number is used to acknowledge the receipt of the data from other communicating device. Header length – a four bit field indicates the number of words in the TCP header.

51 Reserved – for future use Control –Urgent bit – validates the urgent pointer field –ACK bit – validates the acknowledgment number field –PSH bit – used to inform the sender that a higher throughput is needed –Reset bit – used to reset the connection when there is confusion in the sequence numbers. –SYN bit – used for sequence number synchronization –FIN bit – used in connection termination Types of segments Connection request/ Termination request Connection confirmation/ Termination confirmation Confirmation acknowledgment/ Termination confirmation acknowledgment

52 Window size (16 bit) – defines the size of the sliding window Checksum – used in error detection Urgent pointer – valid only if the URG bit is set Options and padding – optional field –Additional information to the receiver or alignment purposes


Download ppt "10/13/20151 TCP/IP Transmission Control Protocol Internet Protocol."

Similar presentations


Ads by Google