(4.4) Internet Protocols Layered approach to Internet Software 1.

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

CCNA – Network Fundamentals
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Network Layer and Transport Layer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
COMPUTER NETWORKS.
Gursharan Singh Tatla Transport Layer 16-May
Lecturer: Tamanna Haque Nipa
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
CS 356 Systems Security Spring Dr. Indrajit Ray
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Chapter 4 Networking and the Internet Introduction to CS 1 st Semester, 2015 Sanghyun Park.
CSI315 Web Development Technologies Continued. Communication Layer information needs to get from one place to another –Computer- Computer –Software- Software.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
Copyright © 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Copyright © 2012 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh.
©Brooks/Cole, 2003 Model and protocol  A model is the specification set by a standards organization as a guideline for designing networks.  A protocol.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
Network and the internet Part eight Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Chapter 5 Network and Transport Layers
LESSON Networking Fundamentals Understand TCP/IP.
The OSI Model and the TCP/IP Protocol Suite
Network Architecture Introductory material
The OSI Model and the TCP/IP Protocol Suite
Topic 5: Communication and the Internet
Review of Important Networking Concepts
TCP/IP Protocol Suite: Review
TCP/IP Protocol Suite: Review
Lecture 2: Overview of TCP/IP protocol
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Network and the internet
Protocol Application TCP/IP Layer Model
The OSI Model and the TCP/IP Protocol Suite
Review of Important Networking Concepts
Presentation transcript:

(4.4) Internet Protocols Layered approach to Internet Software 1

Internet Protocols In this section we investigate how messages are transferred over the Internet. 2

4-3 Figure 4.12 Package-shipping example

4-4 Internet Software Layers Application: Constructs message with address Transport: Chops message into packets Network: Handles routing through the Internet Link: Handles actual transmission of packets

4-5 Figure 4.13 The Internet software layers

Application layer: The application layer consists of those software units such as clients and servers that use Internet Communication to carry out there tasks. The application layer uses transport layer to sends and receives messages over the Internet. The responsibility of application layer is to provide an address that is compatible with the transport layer. 6

Application layer: Application layer use the services of the name servers within the Internet to translate mnemonic addresses used by humans into Internet-compatible. 7

Transport layer: The major task of transport layer is to accept messages from the application layer and to ensure that the messages are properly formatted for transmission over the Internet. Transport layer divides long messages into small segments, which are transmitted over the Internet as individual units. 8

Transport layer: This division is necessary because a single long message can obstruct the flow of other messages at the points on the Internet where numerous messages must cross paths. Small segments are interweave at these points, whereas a long message forces others to wait while it passes. Transport layer adds sequence numbers to the small segments it produces so that, the segments can be reassembled at the message’s destination. 9

Transport layer: Then it attaches the destination address to each segment and hands these address segments, known as packets, to the network layer. 10

Network layer: Has the task for forwarding the packets it receives from one network within the Internet to another until they reach their final destinations. Thus, network layer that must deal with the Internet topology. 11

Network layer: The decision is made a follows: If the final destination of the packet is within the current network, the network layer will send the packet there. Otherwise, the network layer will send the packet to a router in the current network through which the packet can be transferred into an adjacent network. 12

Network layer: The network layer appends this address to the packet as an intermediate address and hands the packet to the link layer. 13

Link layer: The link layer has a responsibility of transferring the packet to the intermediate address that was determined by the network layer. Thus the link layer must deal with the communication details particular to the individual network in which the computer resides. If that network is a token ring, the link layer must be wait for possession of the token before transmitting. if the network uses CSMA/CD, the link layer must listen for a silent bus before transmitting. 14

Note : Only the link layer and network layer are involved at intermediate stops. 15

In the opposite side : When the packet transmitted, it is received by the link layer at the computer designated by the local address attached to the message. Then hand it to its network layer where the packet final destination is compared to the current location. Then it hands to its transport layer. 16

In the opposite side : As transport layer receives packets from the network layer, it extracts the underlying message segments and reconstructs the original message according to the sequence numbers that were provided by the transport layer at the message’s origin. Ones the message is assembled, transport layer hands it to the appropriate unit within the application layer. 17

Port number: The units within the application layer should receive an incoming message is an important task of the transport layer. This is handle by assigning unique port numbers to the various units and requiring that the appropriate port number be appended to a message’s address before starting the transmission. 18

Port number: For example: If web browser asked to retrieve the document whose URL is The browser assume that it should contact the HTTP server at via port number 80. But FTP client should communicate with the FTP server through port number 20 and 21 19

4-20 Figure 4.14 Following a message through the Internet

4-21 TCP/IP Protocol Suite Is a collection of protocols used by the Internet to implement the four level communication hierarchy implemented in the Internet. TCP/IP is for Transmission Control Protocol/ Internet Protocol

4-22 Where TCP/IP and UDP Transport Layer – TCP – UDP (User Datagram Protocol) Network Layer IP: – (IPv4) use 32 bits – (IPv6) use 128 bits

4-23 The differences between TCP and UDP The first one: before sending the message as requested by the application layer, a transport layer based on TCP sends its own message to the transport layer at the destination telling it that a message is about to be sent. It then be waits for this message to be acknowledged before starting to sent the application layer’s message.

4-24 The differences between TCP and UDP For this manner, TCP transport layer is said to establish a connection before sending a message. But a transport layer based on UDB does not establish such a connection prior to sending a message. Just send a message to the address and forget about it. UDB is called a connectionless protocol.

4-25 The differences between TCP and UDP The second: TCP transport layers at the origin and destination work together by means of acknowledgments and packet retransmissions to confirm that all segments of a message are successfully transferred to the destination. TCP called a reliable protocol. But UDP is unreliable protocol. Because it does not offer such retransmission services.

4-26 Figure 4.15 Choosing between TCP and UDP

4-27 Security Attacks – Malware (viruses, worms, Trojan horses, spyware, phishing software) – Denial of service – Spam Protection – Firewalls – Spam filters – Proxy Servers – Antivirus software

4-28 Encryption FTPS, HTTPS, SSL Public-key Encryption – Public key: Used to encrypt messages – Private key: Used to decrypt messages Certificates and Digital Signatures

4-29 Figure 4.16 Public-key encryption