Introduction to TCP/IP networking Source: Ganesh Sittampalam.

Slides:



Advertisements
Similar presentations
Prentice HallHigh Performance TCP/IP Networking, Hassan-Jain Chapter 2 TCP/IP Fundamentals.
Advertisements

CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Transmission Control Protocol (TCP)
Intermediate TCP/IP TCP Operation.
Lecture 7 Transport Layer
Introduction1-1 message segment datagram frame source application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M destination application.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
Instructor: Sam Nanavaty TCP/IP protocol. Instructor: Sam Nanavaty Version – Allows for the evolution of the protocol IHL (Internet header length) – Length.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
BZUPAGES.COM 1 User Datagram Protocol - UDP RFC 768, Protocol 17 Provides unreliable, connectionless on top of IP Minimal overhead, high performance –No.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
TRANSPORT LAYER  Session multiplexing  Segmentation  Flow control (TCP)  Connection-oriented (TCP)  Reliability (TCP)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Introduction to TCP/IP networking Source: Ganesh Sittampalam.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Institute of Technology Sligo - Dept of Computing Semester 2 Chapter 9 The TCP/IP Protocol Suite Paul Flynn.
Transport Layer TCP and UDP IS250 Spring 2010
Gursharan Singh Tatla Transport Layer 16-May
CS 356 Systems Security Spring Dr. Indrajit Ray
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
TCP/IP Protocol Suite Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Chapter 4 TCP/IP Overview Connecting People To Information.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
1 IP : Internet Protocol Computer Network System Sirak Kaewjamnong.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Networking Basics CCNA 1 Chapter 11.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
1 Introduction to TCP/IP. 2 OSI and Protocol Stack OSI: Open Systems Interconnect OSI ModelTCP/IP HierarchyProtocols 7 th Application Layer 6 th Presentation.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
Introduction to TCP/IP networking. TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol TCP : Transmission Control Protocol.
Transport Protocols.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
1 Protocols A protocol is a set of rules and formats that govern the communication between communicating peers –set of valid messages –meaning of each.
Computer Networks 1000-Transport layer, TCP Gergely Windisch v spring.
IP - Internet Protocol No. 1  Seattle Pacific University IP: The Internet Protocol Kevin Bolding Electrical Engineering Seattle Pacific University.
© 2003, Cisco Systems, Inc. All rights reserved.
Introduction To TCP/IP Networking Mr. Zeeshan Ali, Asst. Professor
Introduction to TCP/IP networking
Introduction to TCP/IP
© 2003, Cisco Systems, Inc. All rights reserved.
TCP/IP Transmission Control Protocol / Internet Protocol
Process-to-Process Delivery:
TCP/IP Protocol Suite: Review
Net 323 D: Networks Protocols
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Process-to-Process Delivery: UDP, TCP
Transport Layer 9/22/2019.
Presentation transcript:

Introduction to TCP/IP networking Source: Ganesh Sittampalam

TCP/IP protocol family IP : Internet Protocol –UDP : User Datagram Protocol RTP, traceroute –TCP : Transmission Control Protocol HTTP, FTP, ssh

What is an internet? A set of interconnected networks The Internet is the most famous example Networks can be completely different –Ethernet, ATM, modem, … –(TCP/)IP is what links them

What is an internet? (cont) Routers are devices on multiple networks that pass traffic between them Individual networks pass traffic from one router or endpoint to another TCP/IP hides the details as much as possible

ISO/OSI Network Model Seven network “layers” –Layer 1 : Physical – cables –Layer 2 : Data Link – ethernet –Layer 3 : Network – IP –Layer 4 : Transport – TCP/UDP –Layer 5 : Session –Layer 6 : Presentation –Layer 7 : Application You don’t need to know the layers just the idea that it is layered

TCP/IP Network Model Different view – 4 layers –Layer 1 : Link –Layer 2 : Network –Layer 3 : Transport –Layer 4 : Application

OSI and Protocol Stack OSI: Open Systems Interconnect OSI ModelTCP/IP HierarchyProtocols 7 th Application Layer 6 th Presentation Layer 5 th Session Layer 4 th Transport Layer 3 rd Network Layer 2 nd Link Layer 1 st Physical Layer Application Layer Transport Layer Network Layer Link Layer Link Layer : includes device driver and network interface card Network Layer : handles the movement of packets, i.e. Routing Transport Layer : provides a reliable flow of data between two hosts Application Layer : handles the details of the particular application

Packet Encapsulation The data is sent down the protocol stack Each layer adds to the data by prepending headers 22Bytes20Bytes 4Bytes 64 to 1500 Bytes

IP Responsible for end to end transmission Sends data in individual packets Maximum size of packet is determined by the networks –Fragmented if too large Unreliable –Packets might be lost, corrupted, duplicated, delivered out of order

IP addresses 4 bytes –e.g –Each device normally gets one (or more) –In theory there are about 4 billion available But…

Routing How does a device know where to send a packet? –All devices need to know what IP addresses are on directly attached networks –If the destination is on a local network, send it directly there

Routing (cont) If the destination address isn’t local –Most non-router devices just send everything to a single local router –Routers need to know which network corresponds to each possible IP address

Allocation of addresses Controlled centrally by ICANN –Fairly strict rules on further delegation to avoid wastage Have to demonstrate actual need for them Organizations that got in early have bigger allocations than they really need

IP packets Source and destination addresses Protocol number –1 = ICMP, 6 = TCP, 17 = UDP Various options –e.g. to control fragmentation Time to live (TTL) –Prevent routing loops

IP Datagram VersLenTOSTotal Length IdentificationFlagsFragment Offset TTLProtocolHeader Checksum Source Internet Address Destination Internet Address Options...Padding Data FieldPurpose VersIP version number LenLength of IP header (4 octet units) TOSType of Service T. LengthLength of entire datagram (octets) Ident.IP datagram ID (for frag/reassembly) FlagsDon’t/More fragments Frag OffFragment Offset FieldPurpose TTLTime To Live - Max # of hops ProtocolHigher level protocol (1=ICMP, 6=TCP, 17=UDP) ChecksumChecksum for the IP header Source IAOriginator’s Internet Address Dest. IAFinal Destination Internet Address OptionsSource route, time stamp, etc. Data...Higher level protocol data You just need to know the IP addresses, TTL and protocol #

IP Routing Routing Table Destination IP address IP address of a next-hop router Flags Network interface specification Application Transport Network Link Application Transport Network Link Network Link Source Destination Router

UDP Thin layer on top of IP Adds packet length + checksum –Guard against corrupted packets Also source and destination ports –Ports are used to associate a packet with a specific application at each end Still unreliable: –Duplication, loss, out-of-orderness possible

UDP datagram Destination PortSource Port Application data ChecksumLength FieldPurpose Source Port16-bit port number identifying originating application Destination Port16-bit port number identifying destination application LengthLength of UDP datagram (UDP header + data) ChecksumChecksum of IP pseudo header, UDP header, and data

Typical applications of UDP –Where packet loss etc is better handled by the application than the network stack –Where the overhead of setting up a connection isn’t wanted VOIP NFS – Network File System Most games

TCP Reliable, full-duplex, connection- oriented, stream delivery –Interface presented to the application doesn’t require data in individual packets –Data is guaranteed to arrive, and in the correct order without duplications Or the connection will be dropped –Imposes significant overheads

Applications of TCP Most things! –HTTP, FTP, … Saves the application a lot of work, so used unless there’s a good reason not to

TCP implementation Connections are established using a three-way handshake Data is divided up into packets by the operating system Packets are numbered, and received packets are acknowledged Connections are explicitly closed –(or may abnormally terminate)

TCP Packets Source + destination ports Sequence number Acknowledgement number Checksum Various options

TCP Segment Destination Port Acknowledgment Number Options...Padding Data Source Port WindowLen Sequence Number ReservedFlags Urgent PointerChecksum FieldPurpose Source PortIdentifies originating application Destination PortIdentifies destination application Sequence NumberSequence number of first octet in the segment Acknowledgment #Sequence number of the next expected octet (if ACK flag set) LenLength of TCP header in 4 octet units FlagsTCP flags: SYN, FIN, RST, PSH, ACK, URG WindowNumber of octets from ACK that sender will accept ChecksumChecksum of IP pseudo-header + TCP header + data Urgent PointerPointer to end of “urgent data” OptionsSpecial TCP options such as MSS and Window Scale You just need to know port numbers, seq and ack are added

TCP : Data transfer HostClient Send Packet 1 Start Timer Retransmit Packet1 Start Timer Packet should arrive ACK should be sent ACK would normally Arrive at this time Receive Packet 1 Send AXK 1 Time Expires Receive ACK 1 Cancel Timer Packet Lost Timer

IPv6 128 bit addresses –Make it feasible to be very wasteful with address allocations Lots of other new features –Built-in autoconfiguration, security options, … Not really in production use yet

Ethernet Computer Computer communication on same network Each device has unique MAC address (48-bit) example: 00-C0-4F Ethernet Packet: Dest. address DataCRC Source address Type MAC: Media Access Control 6bytes 2bytes Preamble 8bytes bytes4bytes Do not worry about this slide

ARP : Address Resolution Protocol ARP provides mapping 32bit IP address 48bit MAC address C0-4F ARP cache maintains the recent mappings from IP addresses to MAC addresses Protocol 1.ARP request broadcast on Ethernet 2.Destination host ARP layer responds Do not worry about this slide

DHCP Dynamic Host Configuration Protocol –Used to tell a computer what IP address to use –Device broadcasts a request from IP If it had an IP address before, asks for the same one again –Server (or relay) on local network responds telling it which to use (or ignores it, or tells it go away) “Lease time” telling it how long that IP will be valid for Device requests renewal of lease after ¾(?) elapsed Do not worry about this slide