Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning of each presentation.

Similar presentations


Presentation on theme: "1 The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning of each presentation."— Presentation transcript:

1 1 The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning of each presentation. You may customize the presentations to fit your class needs. Some figures from the chapters are included. A complete set of images from the book can be found on the Instructor Resources disc. About the Presentations

2 Guide to TCP/IP Fourth Edition Chapter 1: Introducing TCP/IP

3 Objectives Describe TCP/IP’s origins and history Explain the process by which TCP/IP standards and other documents, called Requests for Comments (RFCs), are created, debated, and formalized (where appropriate) Describe the “huge difference” between IPv4 and IPv6 and explain why a switch to IPv6 is both necessary and inevitable Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved. 3

4 Objectives (cont’d.) Describe the Open Systems Interconnection network reference model, often used to characterize network protocols and services, and how it relates to TCP/IP’s own internal networking model Define the terms involved and explain how TCP/IP protocols, sockets, and ports are identified Describe data encapsulation and how it relates to the four layers of the TCP/IP protocol stack Describe and apply the basic practices and principles that underlie network protocol analysis 4Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

5 5 What is TCP/IP? Large collection of networking protocols and services Two key protocols –Transmission Control Protocol (TCP) Reliable delivery of messages –Internet Protocol (IP) Manages the routing of network transmissions Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

6 6 The Origins and History of TCP/IP 1969 –Advanced Research Projects Agency (ARPA) funded research for packet-switched networking –ARPANET Network built as a result of this project In a packet-switched network –Sender and receiver are identified by unique network addresses –Packets are not required to follow the same path in transit Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

7 7 TCP/IP’s Design Goals To withstand a potential nuclear strike To permit different computer systems to communicate easily To interconnect systems across long distances Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

8 TCP/IP Chronology 1978 –Internet Protocol version 4 (IPv4) 1983 –Defense Communications Agency took over operation of ARPANET 1986 –NSF launches high-speed network (NSFNET) 1987 –Number of hosts on the Internet breaks 10,000 8Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

9 TCP/IP Chronology (cont'd.) 1989 –Number of hosts on the Internet breaks 100,000 1990 –World Wide Web is born at Centre European Researche Nucleaire (CERN) 1991 –Commercial Internet Exchange (CIX) is formed 1992 –Internet Society (ISOC) is chartered 9Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

10 TCP/IP Chronology (cont'd.) 1993 –InterNIC is chartered 1994 –Online junk mail begins to proliferate 1995 –Netscape launches Netscape Navigator 1996 –Microsoft launches Internet Explorer Web browser 1997 –31 million registered domain names 10Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

11 TCP/IP Chronology (cont'd.) 2000 –Love Letter worm infects over one million PCs 2001 –Number of hosts on the Internet breaks 150 million –Sircam virus and Code Red worm infect thousands 2002 –204 million Internet hosts 2003 –Public Interest Registry becomes.org registry operator 11Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

12 TCP/IP Chronology (cont'd.) 2005 –Number of hosts on the Internet breaks 250 million 2008 –Number of hosts on the Internet breaks 600 million 2009 –Number of hosts on the Internet breaks one billion –Number of Chinese users surpasses the number of U.S. users 12Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

13 13 Who “Owns” TCP/IP? TCP/IP –Falls squarely into the public domain –Funded with public monies since its inception –Owned by everybody and nobody Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

14 Standards Groups That Oversee TCP/IP Internet Society (ISOC) Internet Architecture Board (IAB) Internet Engineering Task Force (IETF) Internet Research Task Force (IRTF) Internet Corporation for Assigned Names and Numbers (ICANN) 14Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

15 IPv4 and IPv6 IPv4 –Established mid- to late-1980s –Uses 32-bit addresses (around four billion distinct network addresses) –Entire address space now occupied IPv6 –Supports 128-bit addresses –Address space roughly 8 * 1028 larger than IPv4 space 15Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

16 TCP/IP Standards and RFCs Request For Comments (RFCs) –Provide documentation to understand, implement, and use TCP/IP protocols Index for all RFCs available at: –www.faqs.org/rfcs/ RFC 2026 –Describes how a RFC is created 16Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

17 OSI Reference Model Overview OSI reference model –A network reference model –Formally known as ISO/OSI –Designed to replace TCP/IP –Standard way to explain how networks operate –TCP/IP is the open standard protocol suite of choice 17Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

18 Breaking Networking into Layers Divide and conquer approach –Separates networking hardware concerns from those related to networking software Key points about networking –Easier to solve problems when broken into series of smaller problems –Layers operate independently of one another –Changes to one layer need not affect other layers 18Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

19 Models Break Networking into Layers (cont'd.) Key points about networking –Individual layers work together on pairs of computers –Different expertise is needed at each layer –Layers in a network implementation work together to create a general solution –Network protocols usually map into one or more layers –TCP/IP is designed around a layered model 19Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

20 The ISO/OSI Network Reference Model Layers 20Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

21 How Protocol Layers Behave Layers –Exist to encapsulate or isolate specific types of functionality –Provide services to the layer above –Deliver data to or accept data from the layer below Protocol Data Units (PDUs) –Include “envelope information” in the form of specific headers and trailers 21Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

22 Physical Layer Includes the physical transmission medium Job is to activate, maintain, and deactivate network connections Manages communications with the network medium going down the protocol stack Handles conversion of outgoing data 22Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

23 Data Link Layer Situated between the Physical layer and the Network layer in the reference model Job is to –Enable reliable transmission of data through the Physical layer at the sending end –Check reliability at the receiving end Manages point-to-point transmission across the networking medium 23Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

24 Network Layer Handles logical addresses associated with individual machines on a network Uses addressing information to –Determine how to send a PDU Embodies notion of multiple simultaneous connections between different IP addresses Flexible enough to –Recognize and use multiple routes between a sender and a receiver 24Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

25 Transport Layer Ensures reliable end-to-end transmission of PDUs Includes end-to-end error-detection and error- recovery Segmentation –Involves cutting up a big message into a numbered sequence of chunks, called segments PDUs used at the Transport layer are called segments, or data segments 25Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

26 Session Layer Defines mechanisms to: –Permit senders and receivers to request that a conversation start or stop –Keep a conversation going even when traffic may not otherwise flow between the parties involved Checkpoints –Define the last point up to which successful communications are known to have occurred 26Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

27 Presentation Layer Handles transforming data from: –Generic, network-oriented forms of expression to more specific, platform-oriented forms of expression A redirector or network shell –Special computer facility that resides here Can supply special data-handling functions for applications 27Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

28 28 Application Layer Defines an interface that applications can use to request network services Defines a set of access controls over the network PDUs –Generically called Application PDUs Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

29 The TCP/IP Networking Model Design model that describes TCP/IP differs somewhat from OSI reference model Transport layers for both models map together quite well as does the –Network layer from the OSI reference model and the Internet layer from the TCP/IP model 29Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

30 30 The TCP/IP Networking Model (cont’d.) Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

31 31 TCP/IP Network Access Layer Includes Ethernet, token ring, and wireless media devices Includes WAN and connection-management protocols The IEEE standards for networking apply –Including the IEEE 802 family of standards Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

32 32 TCP/IP Network Access Layer Protocols PPP –Most important TCP/IP Network Access layer protocol PPPoE (“PPP over Ethernet” ) –Widely used on Ethernet networks or those with Ethernet-like characteristics Other non-TCP/IP protocol suites: –High-level Data Link Control (HDLC) –Frame relay –Asynchronous Transfer Mode (ATM) Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

33 TCP/IP Internet Layer Functions Handle routing between machines across multiple networks Three primary tasks –MTU fragmentation –Addressing –Routing 33Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

34 TCP/IP Internet Layer Protocols Protocols include: –Internet Protocol (IP) –Internet Control Message Protocol (ICMP) –Packet Internetwork Groper (PING) –Address Resolution Protocol (ARP) –Reverse ARP (RARP) –Bootstrap Protocol (BOOTP) –Routing Information Protocol (RIP) –Open Shortest Path First (OSPF) –Border Gateway Protocol (BGP) 34Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

35 TCP/IP Transport Layer Functions Functions –Reliable delivery of data from sender to receiver –Segmentation of outgoing messages and their reassembly prior to delivery to the Application layer Hosts –Devices that operate on the Internet 35Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

36 TCP/IP Transport Layer Protocols Two TCP/IP Transport layer protocols –The transmission Control Protocol (TCP) Connection-oriented –The User Datagram Protocol (UDP) Connectionless UDP –Transmits data in a “best-effort delivery” –Does no follow-up checking on its receipt 36Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

37 37 TCP/IP Application Layer Also known as the Process layer TCP/IP services depend on: –Special “listener process,” called a daemon Operates on a server to handle incoming user requests for specific services –Each TCP/IP service has an associated port address Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

38 TCP/IP Protocols, Services, Sockets, And Ports Multiplexing –Combining various sources of outgoing data into a single output data stream Demultiplexing –Breaking up an incoming data stream so separate portions may be delivered to the correct applications Well-known protocols –Assign a series of numbers to represent a sizable collection of TCP/IP-based network services 38Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

39 TCP/IP Protocol Numbers 39Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

40 TCP/IP Port Numbers TCP/IP application processes –Sometimes called network services –Identified by port numbers Source port number –Identifies the process that sent the data Destination port number –Identifies the process to receive that data 40Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

41 TCP/IP Sockets Well-known or registered ports –Represent preassigned port numbers Socket address (or socket) –The combination of a particular IP address and a dynamically assigned port address 41Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

42 Data Encapsulation In TCP/IP At each layer in the TCP/IP protocol stack –Outgoing data is packaged and identified for delivery to the layer underneath Header (or packet header) –PDU’s own particular opening component –Identifies the protocol in use, the sender, and the intended recipient Trailer (or packet trailer) –Provides data integrity checks for the payload 42Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

43 43 Protocol Analysis Protocol analysis is the process of: –Tapping into the network communications system –Capturing packets –Gathering network statistics –Decoding packets Protocol analyzer –“Eavesdrops” on network communications Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

44 44 Useful Roles for Protocol Analysis Used to troubleshoot network communications Used to test networks –Passive –Active Gather trends on network performance Analyzers available for variety of platforms Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

45 45 Protocol Analyzer Elements Elements include: –Promiscuous mode card and driver –Packet filters –Trace buffer –Decodes –Alarms –Statistics Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

46 Protocol Analyzer Elements (cont’d.) Figure 1-3 is watermarked and needs to be inserted here 46Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

47 Protocol Analyzer Elements (cont’d.) 47Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

48 Protocol Analyzer Elements (cont’d.) 48Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

49 49 Placing a Protocol Analyzer on a Network Protocol analyzer –Captures packets that it can see on the network On network connected with hubs –You can place analyzer anywhere on the network Options for analyzing switched networks –Hubbing out –Port redirection –Remote Monitoring (RMON) Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

50 50 Placing a Protocol Analyzer on a Network Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

51 Summary TCP/IP design goals –To support multiple, packet-switched pathways through the network –To permit dissimilar computer systems to easily exchange data –To offer robust, reliable delivery services for both short- and long-haul communications –To provide comprehensive network access with global scope 51Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

52 Summary (cont'd.) Initial implementations of TCP/IP –Funded by Advanced Research Projects Agency TCP/IP remains in the public domain As Standard RFCs go through approval process they begin as Proposed Standard documents Best Current Practice (BCP) –An informational (non-standard) RFC IPv6 supports an enormous number of network addresses 52Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.

53 Summary (cont'd.) ISO/OSI network reference model –Breaks networking into seven distinct layers TCP/IP uses a variety of encapsulation techniques at its various layers to –Label the type of data contained in the contents, or payloads, of its PDUs Protocol analysis –Network interface inspects all traffic moving across a segment of network medium 53Introducing TCP/IP © 2013 Course Technology/Cengage Learning. All Rights Reserved.


Download ppt "1 The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning of each presentation."

Similar presentations


Ads by Google