Presentation is loading. Please wait.

Presentation is loading. Please wait.

6-1 Business Data Communications and Networking, 6 th ed. FitzGerald and Dennis.

Similar presentations


Presentation on theme: "6-1 Business Data Communications and Networking, 6 th ed. FitzGerald and Dennis."— Presentation transcript:

1 6-1 Business Data Communications and Networking, 6 th ed. FitzGerald and Dennis

2 6-2 Copyright © 1999 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for redistribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

3 6-3 Objectives of Chapter 6 Become familiar with… u four standard network protocols, u network addressing, u different types of routing, Understand how TCP/IP works.

4 6-4 INTRODUCTION

5 6-5 Introduction The network layer sits between the application layer and the data link layer. It accepts messages from the application layer and formats and addresses them for transmission by the data link layer. Both the sender and receiver have to agree on the rules or protocols that govern how their network layers will communicate with each other.

6 6-6 Introduction A network protocol provides three functions: Breaks large messages into packets for transmission and reassembles them at the receiver’s end (packetizing). Determines the correct network layer and data link layer addresses. (addressing). Determines where the message should be send next on its way to its final destination (routing).

7 6-7 Introduction Some network layers are compatible with a variety of different data link layer protocols and can be used interchangeably in the same network.

8 6-8 NETWORK PROTOCOLS

9 6-9 Network Protocols There are many different network layer protocols.Each protocol performs essentially the same functions, but each is incompatible with others unless there is a special device to translate between them. The four most commonly used network protocols are: TCP/IPIPX/SPX X.25SNA

10 6-10 Transmission Control Protocol/ Internet Protocol (TCP/IP) The Transmission Control Protocol/ Internet Protocol (TCP/IP) was developed for the U.S. Dept of Defense’s Advanced Research Project Agency Network (ARPANET) in 1974. TCP/IP allows reasonable efficient and error- free transmission.

11 6-11 Transmission Control Protocol/ Internet Protocol (TCP/IP) TCP/IP has two parts: TCP - performs packetizing: breaking the data into smaller packets, numbering them, ensuring each packet is reliably delivered, and putting them into the proper order at the destination. TCP is only active at the sender and receiver. IP - performs routing and addressing. A typical TCP packet has 192-bit header of control information.

12 6-12 Transmission Control Protocol/ Internet Protocol (TCP/IP) Two forms of IP are currently in use: IPv4 also has a 192-bit header. IPv6 has a 320-bit header. The primary reason for the increase in packet size is an increase in the address size from 32 bits to 128 bits, due to the dramatic growth in the usage of the Internet. The size of the message field depends on the data link layer protocol used. TCP/IP is commonly combined with Ethernet.

13 6-13 1234567891011User Data 1Source ID16 bits 2Destination ID16 bits 3Sequence number32 bits 4ACK number32 bits 5Header length4 bits 6Unused6 bits 7Flags6 bits 8Flow control16 bits 9CRC 1616 bits 10Urgent pointer16 bits 11Options16 bits TCP Packet

14 6-14 IP Packet version 1234567891011 1Version number4 bits 2Header length4 bits 3Type of Service8 bits 4Total length16 bits 5Identifiers16 bits 6Flags3 bits 7Packet offset13 bits 8Hop limit8 bits IP4 9Protocol8 bits 10 CRC 16 16 bits 11Source address32 bits 12Destination Address32 bits 13 Optionsvaries 14User datavaries 15Flow name24 bits 16Next header8 bits 115416811 (128 bits)12 (128 bits)14 IP6 121314

15 6-15 IPX/SPX Internet Packet Exchange /Sequenced Packet Exchange (IPX/SPX) is based on a routing protocol developed by Xerox in the 1970s, and is the primary network protocol used by Novell Netware, although Novell plans to replace IPX/SPX with TCP/IP.

16 6-16 IPX/SPX IPX/SPX has two parts: SPX performs the same packetizing functions of TCP: breaking the data into smaller packets, numbering them, ensuring each packet is reliably delivered, and putting them into the proper order at the destination. IPX performs the same routing and addressing functions as IP. IPX/SPX is similar to TCP/IP in concept, but different in structure.

17 6-17 IPX/SPX A typical SPX packet has a 12-byte header of control information. IPX has a 30-byte header. The size of the message field depends on the data link layer protocol used. IPX/SPX is often used with Ethernet.

18 6-18 IPX/SPX 1234567 User Data 1 Control1 byte 2 Type1 byte 3 Source ID2 bytes 4 Destination ID2 bytes 5 Sequence number2 bytes 6 ACK number2 bytes 7 Allocation number2 bytes 12345678910 User Data 1 Checksum2 bytes 2 Lensill2 byte 3 Control1 byte 4 Type1 byte 5 Destination address6 bytes 6 Destination network address4 bytes 7 Destination socket2 bytes 8 Source address6 bytes 9 Source network address4 bytes 10 Source socket2 bytes SPX packet IPX packet

19 6-19 X.25 X.25 is a standard developed by ITU-ISS for use in wide area networks. X.25 also has two parts: Packet layer protocol (PLP) the routing protocol that performs routing and addressing functions similar to IP X.3 performs the packetizing functions of TCP.

20 6-20 X.25 There are several types of PLP packets. A typical packet used to transmit data has a 3-byte header. PLP typically combined with LAP-B at the data link layer.

21 6-21 System Network Architecture (SNA) System Network Architecture (SNA) is an approach to networking developed by IBM in 1974. SNA is used only on IBM and compatible mainframes. As with the other network layer protocols, SNA has two parts. The transmission control layer performs functions similar to TCP, and the path control layer performs functions similar to IP. SNA typically uses SDLC as its data link layer protocol.

22 6-22 ADDRESSING

23 6-23 Addressing Before you can send a message, you must know the destination address. When the users work with application software, they typically use the application layer address. The network layer translates this application layer address into a network layer address.

24 6-24 Types of addresses Address Example SoftwareExample Address Application LayerWeb browserwww.cba.uga.edu Network LayerTCP/IP128.192.98.5 Data Link LayerEthernet00-0C-00-F5-03-5A

25 6-25 Addressing The network layer then determines the best route through the network to the final destination. Based on this routing, the network layer identifies the data link layer address of the next computer to which the message should be sent.

26 6-26 Assigning Addresses In general, the data link layer address is permanently encoded in each network card, and as part of the hardware cannot be changed. Network layer addresses are generally assigned by software. Every network layer software package usually has a configuration file that specifies the network layer address for that computer.

27 6-27 Assigning Addresses Application layer addresses (or server addresses) are also assigned by a software configuration file. Virtually all servers have an application layer address, but most client computers do not. Network layer addresses and application layer addresses go hand in hand. (www.uga.edu -application means 192.128.98.53 at the network layer.

28 6-28 Internet Addresses On the Internet, InterNIC is responsible for network layer addresses (IP addresses) and application layer addresses or domain names (www.uga.edu). There are five classes of Internet addresses. Classes A, B, and C are presented in Figure 6-7 Class D and E are reserved for special purposes and are not assigned to organizations.

29 6-29 Internet Address Classes Number of Addresses Class Available to User Address StructureExample Class A16 millionFirst byte fixed 50.x.x.x Organization assigns last three bytes Class B16,000First two bytes fixed 128.192.x.x Organization assigns last two bytes Class C250First three bytes fixed192.1.56.x Organization assigns last byte

30 6-30 Internet Addresses One of the problems with the current address class system is that the Internet is quickly running out of addresses. Although there are more than 1 billion possible addresses, the fact that they are assigned in sets (or groups) significantly restricts the number of usable addresses. The IP address shortage was one of the reasons behind the IPv6, providing in theory, 3.2 x 10 38 possible addresses.

31 6-31 Subnets Each organization must assign the IP addresses it has received to specific computers on its networks. In general, IP addresses are assigned so that all computers on the same local area network have a similar address.

32 6-32

33 6-33 Subnets Each LAN that is logically grouped together by IP number is called a TCP/IP subnet. While it is customary to use the last byte of the IP address to indicate different subnets it is not required. Any portion of the IP address can be designated as a subnet by using a subnet mask. IP addresses are binary numbers, so partial bytes can be used as subnets.

34 6-34 Dynamic Addressing Every computer knows its network layer address from a configuration file that is installed when the computer is first attached to the network. However, each time the computer is moved, or its network is assigned a new address, the software on each individual computer must be updated.

35 6-35 Dynamic Addressing The easiest way around this problem is dynamic addressing. With this approach, a server is designated to supply a network layer address to a computer each time the computer connects to the network. Two standards for dynamic addressing are commonly used in TCP/IP networks: Bootstrap Protocol (bootp) Dynamic Host Control Protocol (DHCP)

36 6-36 Dynamic Addressing The boot or DHCP server can be configured to assign the same network layer address to the computer each time it requests an address or it can lease the address to the computer by picking the “next available” network layer address from a list of authorized addresses. Dynamic addressing greatly simplifies network management in non-dial-up networks too.

37 6-37 Address Resolution In order to send a message, the sender must be able to translate the application layer address (or server name) of the destination into a network layer address and in turn translate that into a data link layer address. This process is called address resolution. TCP/IP uses two different approaches, one for resolving application layer addresses into IP addresses and one for resolving IP addresses into data link layer addresses.

38 6-38 Server Name Resolution Server name resolution is the translation of application layer addresses into network layer addresses. This is done using the Domain Name Service (DNS). Whenever you receive a set of Internet addresses, you must inform InterNIC of the name and IP addresses of the name server that will provide DNS information for all addresses in that Class.

39 6-39 Server Name Resolution When TCP/IP needs to translate an application layer address into an IP address, it sends a special TCP-level packet to the nearest DNS server. This packet asks the DNS server to send the requesting computer the IP address that matches the Internet address provided. This is why it sometimes takes a long time to access certain sites. IP addresses are then temporarily stored in a server address table.

40 6-40 Data Link Layer Address Resolution In order to actually send a message, the network layer software must know the data link layer of the destination computer. In the case of a distant computer, the network layer would route the message by selecting a path through the network that would ultimately lead to the destination.

41 6-41 Data Link Layer Address Resolution To send a message to a computer in its network, a computer must know the correct data link layer address. In this case, TCP/IP software sends a broadcast message (using Address-Resolution- Protocol or ARP) to all computers in its subnet requesting the data link layer address.

42 6-42 ROUTING

43 6-43 Routing In many networks, there are many possible routes or paths a message can take to get from one computer to another. Routing is the process of determining the route or path through the network that a message will travel from the sender to the receiver. Every computer that performs routing has a routing table developed by the network manager that specifies how message will travel through the network.

44 6-44 Routing

45 6-45 Routing Table Destination RouteAC DAE FE GC

46 6-46 Routing There are two fundamental approaches to routing: Centralized routing - all routing decisions are made by one central computer. Decentralized Routing - allows all computers in the network to make their own routing decisions following a formal routing protocol. Most decentralized routing protocols are self- adjusting, adapting to changes in the network configurations.

47 6-47 Static Routing There are two types of dynamic routing: u Static Routing - where the routing table developed by the network manager, and changes made only when computers are added or removed from network.

48 6-48 Dynamic Routing u Dynamic Routing (adaptive routing)- is used when there are multiple routes through a network and it is important to select the best (or fastest) route, in order to route messages away from traffic on busy circuits. An initial routing table is developed by the network manager, but is continuously updated by the computers themselves to reflect changing network conditions, such as network traffic.

49 6-49 Dynamic Routing There are three commonly used dynamic routing protocols Routing Information Protocol (RIP)- used by the network manager to develop the routing table. Used by both TCP/IP and IPX/SPX. Internet Control Message Protocol (ICMP)-used on the internet with TCP/IP. Open Shortest Path First (OSPF) uses the number of computers in a route as well as network traffic and error rates to select the best route.

50 6-50 Dynamic Routing OSPF is more efficient than RIP because it normally doesn’t use broadcast messages. Instead it selectively sends status update messages directly to selected computes (used by TCP/IP). Two drawbacks to Dynamic Routing. It requires more processing by each computer in the network than centralized or static routing. The transmission of status information “wastes” network capacity.

51 6-51 Connectionless vs. Connection-Oriented Routing Some messages or blocks of application data are small enough that they can be transmitted in one packet or frame at the data link layer. In other cases the application data in one message is too large and must be broken into several packets.

52 6-52 Connectionless vs. Connection-Oriented Routing There are two ways these sets of packets can be routed through a network. Connectionless routing means each packet is treated separately and makes its own way through the network. Connection-Oriented routing Sets up a virtual circuit between the sender and receiver. Appears to use point-to-point circuit-switching, but actually uses store-and-forward. Has greater overhead than connectionless, due to the routing information.

53 6-53 Connectionless vs. Connection-Oriented Routing TCP/IP can operate as connection-oriented or connectionless. When connection-oriented routing is needed, both TCP and IP are used. TCP establishes the virtual circuit and IP routes the messages. When connectionless routing is desired, only IP is needed, and the TCP packet is replaced with a User Datagram Protocol (UDP) packet.

54 6-54 Connectionless vs. Connection-Oriented Routing IPX/SPX can also operate as either as connection-oriented or connectionless. When connection-oriented routing is needed, both IPX and SPX are used. SPC establishes the virtual circuit and IPX routes the messages. When connectionless routing is desired, only IPX is needed.

55 6-55 Connectionless vs. Connection-Oriented Routing Quality of Service (QoS) routing is a special type of connection-oriented dynamic routing in which different messages or packets are assigned different priorities. With QoS routing, different classes of service are defined each with different priorities. QoS routing is common in certain kinds of networks (e.g. ATM).

56 6-56 Multicasting The most common type of message in a network is the usual transmission between two computers. This is called a unicast message. A broadcast message can also be sent to all computers on a LAN or subnet. A third type of message, called a multicast message is used to send the same message to a group of computers.

57 6-57 Multicasting Computers wishing to participate in a multicast end a message to the sending computer or some other computer performing routing along the way using a special type of TCP-level packet called Internet Group Management Protocol. Each multicast group is temporarily assigned a special Class D IP address to identify the group, thus allowing a restricted broadcast of messages to this specific group.

58 6-58

59 6-59 Data transmission using TCP/IP and Ethernet Ethernet packet header IP packet TCP packet HTTP packet User Data Ethernet packet trailer

60 6-60 End of Chapter 6


Download ppt "6-1 Business Data Communications and Networking, 6 th ed. FitzGerald and Dennis."

Similar presentations


Ads by Google