Networking Theory (part 2)

Slides:



Advertisements
Similar presentations
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Advertisements

OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Lecturer: Tamanna Haque Nipa
Chapter Overview TCP/IP Protocols IP Addressing.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Process-to-Process Delivery:
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
UNIT-V Computer Network Transport Layer 1 Prepared by - ROHIT KOSHTA.
Chapter 1 Networking Theories. What is a network? A collection of devices that share a common communication protocol and a common communication medium.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
TCP/IP Yang Wang Professor: M.ANVARI.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Mukesh N. Tekwani Elphinstone College Mumbai
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
1 Version 3.0 Module 11 TCP Application and Transport.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
TCP/IP Transport and Application (Topic 6)
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Net 221D:Computer Networks Fundamentals
Transmission Control Protocol (TCP) Internet Protocol (IP)
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Lecture 4 : Network Architectures (cont..) 1. 2 Summary of OSI Layers.
Introduction Chapter 1. TCP/IP Reference Model Why Another Model? Although the OSI reference model is universally recognized, the historical and technical.
11/18/2016Basic TCP/IP Networking 1 TCP/IP Overview Basic Networking Concepts.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
CompTIA Security+ Study Guide (SY0-401)
Chapter 5 Network and Transport Layers
Computer Networks.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
The OSI Model and the TCP/IP Protocol Suite
Chapter 1 Introduction Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Understand the OSI Model Part 2
Networking for Home and Small Businesses – Chapter 6
Lecture 6: TCP/IP Networking By: Adal Alashban
Network Architecture Introductory material
Networking for Home and Small Businesses – Chapter 6
CompTIA Security+ Study Guide (SY0-401)
The OSI Model and the TCP/IP Protocol Suite
Topic 5: Communication and the Internet
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
Review of Important Networking Concepts
I. Basic Network Concepts
Process-to-Process Delivery:
Lecture 4 Communication Network Protocols
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
Lecture 2: Overview of TCP/IP protocol
Net 323 D: Networks Protocols
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Network Architecture Models
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
OSI Reference Model Unit II
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Networking Theory (part 2)
Networking Theory (part 2)
Presentation transcript:

Networking Theory (part 2)

Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication protocols (TCP/IP). It is an open system, built on common network, transport and application layer protocols, while granting the flexibility to connect a variety of computers, devices and operating systems to it.

Design of the Internet The Internet is the result of many decades of innovation and experimentation. The TCP/IP protocols have been carefully designed, tested and improved over the years.

Design of the Internet Major design goals: Resource sharing between networks Hardware and software independence Reliability and robustness Fault tolerant protocols - data could be rerouted depending on the state of the network "Good" protocols that are efficient and simple.

TCP/IP Protocol Suite Major protocols: Internet Protocol (IP) Internet Control Message Protocol (ICMP) Transmission Control Protocol (TCP) User Datagram Protocol (UDP)

Internet Protocol (IP) IP is a Layer 3 protocol (network layer) It is used to transmit data packets over the Internet It is the most widely used networking protocol in the world. IP acts as a bridge between networks of different types

Internet Protocol (IP) IP is a packet-switching network protocol. Information is exchanged between two hosts in the form of IP packets (IP datagrams). Each datagram is treated as a discrete unit - there are no "connections" between machines at the network layer. Connection services are provided by the higher-level protocols at the transport layer.

Internet Protocol (IP) The IP datagram consists of a header and the actual data being sent. The header contains essential information for controlling how it will be delivered. Refer Figure 1.4 (pg 12).

Internet Protocol (IP) Although each machine has its own physical address, each host machine under the Internet Protocol must be assigned a unique IP address. The IP address is a four-byte (32-bit) address. Example: 192.168.1.5 The IP address is not bound to a particular physical machine. Network programming in Java does not require the use of the physical address; only the IP address is used.

Internet Protocol (IP) Humans do not find IP addresses easy to remember. An addressing scheme is also used which allows the use of textual names (hostnames) instead of numerical values. Example: java.sun.com

Internet Control Message Protocol (ICMP) The Internet Protocol provides absolutely no guarantee of datagram delivery. The Internet Control Message Protocol (ICMP) is a mechanism for error-control. It is used in conjunction with the Internet Protocol to report errors when and if they occur.

Internet Control Message Protocol (ICMP) The relationship between IP and ICMP is a strong one. E.g: IP uses ICMP if it needs to notify another host of an error. ICMP requires IP to send the error message. Note that a host cannot rely solely on ICMP to guarantee delivery as there is no guarantee that ICMP messages will be sent or that they will reach their intended destination.

Internet Control Message Protocol (ICMP) Five error messages are defined: Destination Unreachable If a gateway is unable to pass a datagram on to its destination, this message is sent back to the original host. Parameter Problem This message is sent to the sending host if a gateway is unable to process the header parameters of an IP datagram.

Internet Control Message Protocol (ICMP) Redirect If a shorter path, or alternate route, is available, a gateway may send this message to the router that passed on a datagram Source Quench This message may be sent in an attempt to reduce the number of incoming datagrams when a router, gateway or host becomes overloaded. Time Exceeded Whenever the TTL value of a datagram reaches zero is discarded. This message may be sent if this event occurs.

Internet Control Message Protocol (ICMP) ICMP supports several informational messages such as: Echo Request/Echo Reply Used to determine whether a host is alive and can be reached. Address Mask Request/Address Mask Reply Provides the functionality to determine the address mask which controls which bits of an IP address correspond to a host, and which bits determine the network/subnet portion.

Transmission Control Protocol (TCP) TCP is a Layer 4 protocol (transport layer) that provides guaranteed delivery and ordering of bytes. TCP uses IP to send TCP segments, which contain additional information that allows it to order packets and resend them if they go astray.

Transmission Control Protocol (TCP) TCP uses communication ports to distinguish one application or service from another. A host machine can have many applications connected to one or more ports. Although TCP provides a simpler programming interface, it may reduce network performance.

User Datagram Protocol (UDP) UDP is a Layer 4 protocol (transport layer) that applications can use to send packets of data across the Internet (as opposed to TCP, which sends a sequence of bytes). UDP also supports communication ports. UDP does not guarantee delivery packets. It also does not guarantee that they will arrive in the right order. Although unreliable, UDP offers faster communication.

Internet Application Protocols Network programmers are more interested in the protocols at the application layer. Examples: Protocols for accessing and sending email Protocols for transferring files Protocols for reading Web pages

File Transfer Protocol (FTP) Telnet A service that allows users to open a remote-terminal session to a specific machine. Uses TCP port 23. File Transfer Protocol (FTP) Allows file transfers Uses TCP port 21 (to control sessions) and TCP port 20 (for the actual transfer). Post Office Protocol version 3 (POP3) Used to access e-mail Allows users to read mail offline. Uses TCP port 110.

Internet Message Access Protocol (IMAP) Less popular than POP3 as it requires continual connection to the mail server. Message are stored on a server and not on the user's system. Uses port 143. Simple Mail Transfer Protocol (SMTP) Allows messages to be delivered over the Internet. Uses port 25.

HyperText Transfer Protocol (HTTP) One of the most popular protocols in use on the Internet; it made the World Wide Web possible. Java provides good HTTP support. Uses TCP port 80.

TCP/IP Protocol Suite Layers Although there are seven OSI network layers, not all are used in Internet programming. The layers beneath the network layer are encapsulated from the network programmer.

TCP/IP Protocol Suite Layers HTTP SMTP FTP POP3 TCP UDP ICMP Internet Protocol TCP/IP Stack

TCP/IP Protocol Suite Layers POP3 command: RETR1 Application layer TCP segment: TCP header RETR1 Transport layer IP datagram: IP header TCP header RETR1 Network layer Modem frame: Data link layer Modem header IP header TCP header RETR1 Carrier wave: Physical layer

Security Issues: Firewalls and Proxy Servers