TCP/IP Basics Alvin Kwan.

Slides:



Advertisements
Similar presentations
CCNA – Network Fundamentals
Advertisements

IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
Network Certification Preparation. Module - 1 Communication methods OSI reference model and layered communication TCP/IP model TCP and UDP IP addressing.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Chapter 8 Administering TCP/IP.
Lesson 7 – THE BUSINESS OF NETWORKING. TCP/IP and UDP Other Internet protocols Important Internet protocols OVERVIEW.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction to TCP/IP
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
Chapter 2 Internet Protocol DoD Model Four layers: – Process/Application layer – Host-to-Host layer – Internet layer – Network Access layer.
TCP/IP TCP/IP Basics Alvin Kwan. TCP/IP What is TCP/IP?  It is a protocol suite governing how data can be communicated in a network environment, both.
1 Version 3.0 Module 9 TCP/IP Protocol and IP Addressing.
Institute of Technology Sligo - Dept of Computing Semester 2 Chapter 9 The TCP/IP Protocol Suite Paul Flynn.
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
Chapter Overview TCP/IP Protocols IP Addressing.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
1 26-Aug-15 Addressing the network using IPv4 Lecture # 2 Engr. Orland G. Basas Prepared by: Engr. Orland G. Basas IT Lecturer.
Chapter 4: Managing LAN Traffic
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Chapter 9.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
TCP/IP Yang Wang Professor: M.ANVARI.
Huda AL_Omairl - Network 71 Protocols and Network Software.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
1 Version 3.0 Module 11 TCP Application and Transport.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 2: Configuring Network Protocols.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
ITEC 370 George Vaughan Franklin University
Addressing Through the Layers  Data Link Layer Address  Network Layer Address.
1 TCP/IP, Addressing and Services S. Hussain Ali M.S. (Computer Engineering) Department of Computer Engineering King Fahd University of Petroleum and Minerals.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
1 Objectives Identify the basic components of a network Describe the features of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Networking Fundamentals Network Protocols. Protocol Rule for how networks communicate Each OSI layer handled by one or more protocols Protocol Suites.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. TCP/IP Addressing and Data Delivery  The TCP/IP Protocol Suite  IP Addressing.
Linux Operations and Administration Chapter Eight Network Communications.
Telecommunications Essentials John R. Durrett July 5, 2005.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
NETWORKING (2) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
1 Objectives Identify the basic components of a network Describe the features of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
11/18/2016Basic TCP/IP Networking 1 TCP/IP Overview Basic Networking Concepts.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Network Layer, and Logical Addresses
Chapter 5 Network and Transport Layers
Part I. Overview of Data Communications and Networking
Lec 2: Protocols.
Chapter Three Network Protocols.
The Open System Interconnection (OSI) Model & Network Protocols.
Module 9: TCP/IP Protocol Suite and IP Addressing
TCP/IP Protocol Suite: Review
TCP/IP Protocol Suite and IP Addressing
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Presentation transcript:

TCP/IP Basics Alvin Kwan

What is TCP/IP? It is a protocol suite governing how data can be communicated in a network environment, both local and globally. To remind you what a protocol is, please read http://www.leapforum.org/published/internetworkMobility/split/node10.html to learn a particular protocol known as ARQ (automatic repeat request) protocol

OSI vs. TCP/IP

History of TCP/IP (1/2) Stands for Transmission Control Protocol/Internet Protocol (TCP/IP) Developed by Defense Advanced Research Projects Agency (DARPA) under the sponsorship of U.S. Department of Defense (DoD) in since late 1960s 1972 – Telnet 1973 – File Transfer Protocol (FTP) 1974 – Transmission Control Protocol (TCP)

History of TCP/IP (2/2) 1980 – User Datagram Protocol (TCP) 1981 – Internet Protocol (IP) 1982 – TCP/IP as a protocol suite 1984 – Domain Name System (DNS) 1991 – Transfer of funding responsibility from DAPRA to National Science Foundation (NSF), which started to turn the military originated protocols into civic use, notably in education sector

Some TCP/IP features It is an open standard, which is also adopted by the Internet. It offers a routable protocol such that the path of every piece of data that moves through the network is traceable. It adopts a single and simple addressing scheme which is easy to understand IP is a connectionless protocol with data transferred in individual packets without prior arrangement with the recipient whereas TCP is connection-oriented.

Connectionless vs. Connection-oriented Protocols (1/2) Connectionless protocols The data communication method occurs between hosts with no previous setup Send data across the network to its destination without guaranteeing receipt Higher layers handle packet sequencing and certain data integrity control issues Fast; require little overhead Most LAN protocols at the data link layer are connectionless Data packets in a connectionless communication over the network layer are referred to as datagrams More to follow …

Connectionless vs. Connection-oriented Protocols (2/2) Establish a formal connection between two computers, guaranteeing the data will reach its destination Higher layers can rely on low layers to handle matters of packet sequencing, data integrity, and delivery timeouts Slower but more reliable ATM networks are connection oriented at the data link layer

Network Interface Layer (1/3) Lowest layer in the TCP/IP stack To define how a computer connects to a network It does not regulate the type of network that the host is on and thus TCP/IP can be run on an Ethernet, Token Ring or Fiber Distributed Data Interface (FDDI) or any other network topology

Network Interface Layer (2/3) Physical (or MAC) address, which is burnt into every network interface card (NIC) MAC address is usually represented in 12 hexadecimal digits (or 48 bits) First six hexadecimal digits uniquely represent the manufacturer Last six hexadecimal digits is a unique serial number that the card’s manufacturer has assigned to the NIC

Network Interface Layer (3/3) For a TCP/IP packet to be delivered, it must contain the destination node’s MAC address so that a host can check whether the packet is directed to it. A broadcast packet is designed to be attended by all hosts and it has a target MAC address of FFFFFFFF, i.e., all bits set.

Exercise: Finding Ethernet Card Manufacturer Get the MAC address by executing “ipconfig /all” in a Microsoft command window. Look for the first six hexadecimal digits of the physical address which is the Organizational Unique Identifier (OUI) Go to http://standards.ieee.org/regauth/oui/index.shtml and use the OUI to check the Ethernet card manufacturer

The Internet Layer The internal layer contains protocols for addressing and routing of packets. Internet Protocol (IP) Address Resolution Protocol (ARP) Internet Control Message Protocol (ICMP) Internet Group Message Protocol (IGMP) Routing protocols (e.g., RIP)

Internet Protocol (1/2) To determine the source and destination IP addresses of every packet, every host on a network is assigned a unique IP address (logical address) IP address is divided into two parts: network number and host address on that network Based on the subnet mask and IP address, it can be decided whether the target is a “remote” host or a “local” host (and details will be given later)

Internet Protocol (2/2) For a remote host, IP needs to send the packet through a gateway or a router (which is also identified by an IP address). IP is connectionless and thus support an unreliable transmission

Address Resolution Protocol (ARP) Protocol to resolve an IP address to a physical address (see details in Wikipedia) The hardware address will be cached for a short time (2-10 minutes). To resolve an IP address to a physical address Try the ARP cache (kept in RAM) If not found in cache, initiate an ARP request broadcast and keep the result in cache Try the command “ARP –A” in a command window

ARP Command

Internet Control Message Protocol (ICMP) For sending error messages, performing diagnostics and controlling data flow Try “ping cite.hku.hk” to test the network connection to another host

Ping Command ipconfig/all

Internet Group Message Protocol (IGMP) IGMP enables one host to send one stream of data to many hosts at the same time with the use of a multicast address Some routing protocols use IGMP to exchange routing tables (which will be discussed later)

Routing Protocols (More discussion on routing in another lesson) Routing Information Protocol (RIP) Simple IP-based routing protocol that collects and exchange information about network route and status Only suitable for small networks Open Shortest Path First (OSPF) Typically used by routers to determine the best path through a network

Transport Layer Transmission Control Protocol (TCP) Primary IP transport protocol Connection-oriented and thus guarantee a more reliable delivery Use port numbers to identify communicating applications Responsible for message fragmentation and reassembly (with the use of sequence number) User Datagram Protocol (UDP) A connectionless transport protocol which runs faster continued

Transmission Control Protocol TCP adopts a 3-way handshake to establish a connection for data communication. The client application sends a SYN to the server. In response, the server replies with a SYN-ACK. Finally the client sends an ACK (usually called SYN-ACK-ACK) back to the server.

TCP/IP Applications Domain Name System (DNS) For URL to IP-address translation File Transfer Protocol (FTP) Application protocol for file transfer and directory/file manipulation services Telnet For remote terminal sign-on Simple Mail Transport Protocol (SMTP) Provide messaging services (i.e., sending e-mails) continued

IP Addressing IP is responsible for addressing and routing in the TCP/IP environment IP addresses Logical addresses, which are 32 bits (4 bytes) long A decimal number from 0 to 255, separated by periods, represents each byte or octet Two sections One defines the network a computer is on (i.e. network ID) One defines the host ID for a computer (i.e. host ID) All devices on the same network share the same common network ID Example: 172.24.206.18

Classful Network (1/3) Originally, three classes of IP addresses (which is obsolete on modern internet) Class A Large corporations ID numbers between 1 and 126 (in its first octet, or 8 bits) Class B Medium-sized networks Network IDs between 128 and 191 (in its first octet, or 8 bits) Class C Small networks Range from 192 to 223 (in its first octet, or 8 bits) IP address registries manage the total collection of valid IP addresses

Classful Network (2/3)

Classful Network (3/3) The number of valid networks and hosts available is always 2N - 2 (where N is the number of bits used, and the 2 adjusts for the invalidity of the first and last addresses).

Subnetting (1/2) Subnetting allows a single larger network to have a number of smaller networks within it by allocating bits from the host portion as a network portion. Not connect all computer in the same network Distinguish those subnets from 1 to another. Use extra bit to do with it. Where to find, so find it in the latter part To see how many 1 in the subnet mask (last part) 2 bits=4 subnets If the first 26 bits are the same, then the computers are in the same network How many subnet can we create Up to user requirement (and how many computer in a network u want to install) Subnet Mask Successive 1 with successive 0 64= 2 6 32=2 5 8=2 3 01101000 126=2 7 11110000 1111 0110 =0110 How many bit=how many subnet we have 240=4bits (16 combination, network)

Subnetting (2/2) A subnet mask is made of a sequence of 1’s followed by a sequence of 0’s. To reduce network traffic, routers are usually used to separate subnets. Questions: How many subnets can be formed in the previous example for a classful network? What is the size of each subnet for a classful network in the previous example?

Problem of Classful Network The principal problem was that most sites were too big for a "class C" network number, and received a "class B" number instead. With the rapid growth of the Internet, the available pool of class B addresses was rapidly used up. To solve the problem, classful network was replaced by classless inter-domain routing (CIDR) around 1993.

Classless Inter-domain Routing (CIDR) A more efficient way to assign IP addresses than using IP address “classes” The network and host addresses boundary is not always made on octet boundaries, but may be made any specific number of bits from the beginning of the address A slash following IP address is used to indicate the number of bits of the network ID, e.g., 192.203.187.32 /22 Steal bits from the network address for use in the host address and this is also called supernetting What HKU computers is using Where to draw the boundary 22 represent network ID (problem: if class C, should b 24 bits, but this is 22supernetting) Way to treat the system, 2 system machines matches together. Giving 2 classC will be god, but the netowrk address is different, so need to fool the router When network ID in class c is similar As long as the 22 bits (first 6 numbers) are the same, then direct it to the same machine That /22 is to tell the router how many bits you should look at. 192 203 (187)1011 1011 1011 10fake router to use 22bit, then assigned class c Then 192 203 in the first part After 192 203, and then give 184-187 External (because fake router) , not internal (like subnetting) so u can use both methods e.g. using over 24 is subnetwork Less than 24 is supernetting

Class Ranges

Special Ranges of IP Address IP is unique in home organization, but use another IP (fake/actual, have mapping) to the work Private IP is for home organization, web server/ISP use translation from Private IP to actual IP (usually using ISP IP will be good) How to deliver message to different computer, the local server can translate and map and route into the single computer

Supernetting Example /23 (must add this)

Without Supernetting 1 router has many IP address, Send message from one computer to the whole network

With Supernetting 192.55.120.x (octec) Octec not 0 because 0 uses as the port no (of router IP address) 0 is for router And 255 is for boradcast e.g. 192.55.121.0—router—192.55.120.0

Pros and Cons of CIDR Advantages Disadvantage Subnet ID may now be all 0’s or 1’s Avoid of wasting a number of IP addresses when subnetting a Class C address Disadvantage Router support is needed Complexity

Exercise: Network Calculator Go to http://www.subnetmask.info/ to try to use the network calculator for computing the subnet mask.

Why IPv6 IP addresses are rapidly becoming scarce TCP/IP’s technical governing body has reserved a series of addresses for private networks IETF is working on a new implementation of TCP/IP (IPv6) that uses addresses that are 8 bytes long but retain backward compatibility with IPv4 4-byte addresses

Dynamic Host Configuration Protocol (DHCP) A TCP/IP protocol that allows automatic IP addresses and subnet mask assignment Major benefit is ease with which computers can be moved Not suitable for systems that require a static address, such as web servers A dedicated host, which can be a router or a computer, to take the role of DHCP server

References Relevant pages in Wikipedia http://www.firewall.cx/supernetting-intro.php http://www.wown.com/j_helmig/tcpip.htm http://www.yale.edu/pclt/COMM/TCPIP.HTM http://www.ii.uib.no/~magnus/TCP-1.html http://www.pcsupportadvisor.com/search/c04100.htm