Communication Protocols III Tenth Meeting. Connections in TCP A wants to send to B. What is the packet next move? A travels through hub and bridge to.

Slides:



Advertisements
Similar presentations
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Advertisements

Network Certification Preparation. Module - 1 Communication methods OSI reference model and layered communication TCP/IP model TCP and UDP IP addressing.
1 Reading Log Files. 2 Segment Format
Transparent TCP Connection Failover 2003 IEEE Dependable Systems and Networks UC Department of Electrical and Computer Engineering R. R. Koch, S. Hortikar,
IS 247 Introduction to Web Application Development Tim Wu.
Page: 1 Director 1.0 TECHNION Department of Computer Science The Computer Communication Lab (236340) Summer 2002 Submitted by: David Schwartz Idan Zak.
source router Destination IP packet IP packet fragments Reassembly Required Fragments Created.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Bob Baker Communications Bob Baker September 1999.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Overview of simple LANs. Networking basics: LAN TCP/IP is the protocol used in the Internet and dominates the internet and transport layers The subnet.
Computer Networks IGCSE ICT Section 4.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Understanding Networks Charles Zangla. Network Models Before I can explain how connections are made from across the country, I would like to provide you.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 12 Transmission Control Protocol (TCP) Basics.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
OSI Model Routing Connection-oriented/Connectionless Network Services.
Slide 1 What is a Computer Network? A computer network is a linked set of computer systems capable of sharing computer power and resources such as printers,
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
INTERNET DATA FLOW Created by David Whitchurch for ISDS 4120 Louisiana State University.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Huda AL_Omairl - Network 71 Protocols and Network Software.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
A system sharing informati on and services with individuals and groups webster.com/dictionary/ne tworking webster.com/dictionary/ne.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 13 Transmission Control Protocol (TCP) Connections.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 26.
Routers and Routing Basics CCNA 2 Chapter 10.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
ITEC 370 George Vaughan Franklin University
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Networking Basics CCNA 1 Chapter 11.
1 Introduction to TCP/IP. 2 OSI and Protocol Stack OSI: Open Systems Interconnect OSI ModelTCP/IP HierarchyProtocols 7 th Application Layer 6 th Presentation.
WINDOWS NT Network Architecture Amy, Mei-Hsuan Lu CML/CSIE/NTU August 19, 1998.
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
Hands-On Ethical Hacking and Network Defense
Transmission Control Protocol (TCP) Internet Protocol (IP)
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
DIYTP Network Basics  How do computers communicate?  Network Interface Card (NIC)  Media Access Control Address (MAC)  Unique to each NIC 
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Mr C Johnston ICT Teacher G055 - Lecture 10 Network Protocols.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
© 2002, Cisco Systems, Inc. All rights reserved..
LO2 Understand the key components used in networking.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
CIS 173 Networking Week #9 OBJECTIVES Chapter #6 Network Communications Protocols.
PORT CONNECTION STATUS CT Lab#4. TCP packet UDP packet Ports Background.
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
Chapter Objectives In this chapter, you will learn:
COMP2322 Lab 6 TCP Steven Lee Mar 29, 2017.
or call for office visit,
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Lecture 4 Communication Network Protocols
Figure 3-23: Transmission Control Protocol (TCP) (Study Figure)
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
Process-to-Process Delivery: UDP, TCP
TCP Connection Management
Presentation transcript:

Communication Protocols III Tenth Meeting

Connections in TCP A wants to send to B. What is the packet next move? A travels through hub and bridge to router X X reads destination address (B) X know that B is through Z Which one is a valid route?

TCP States SYN ReceivedSYN Sent Listen Established Closed ACK SYN+ACK ACK Close RESET SYN SYN + ACK

TCP:Three Way Handshake Computer A Set sequence # = 100 (randomly) Sends SYN message Computer B Receives message Set sequence # = 259 (randomly) Set ACK sequence # = 101 Why? Sends SYN ACK Computer A Receive message Set ACK sequence # = 260 Why? Computer A Computer B Sequence # = 100 Acknowledgment # = 0 SYN Sequence # = 259 Acknowledgment # 101 SYN ACK Acknowledgment # 260 ACK

434 TCP Sliding Window Sent and already ACKed Sent not ACKed Can be sent ASAP Can’t be sent until window moves up Time Packets or (octets)

Network BIOS To connect a PC to a LAN, you need Network interface card (NIC), and LAN. The interface includes the address of the PC in the LAN. The netBIOS (network BIOS) Is part of the windows OS Communicate through the NIC to access the LAN. Provides an application program interface (API) for application programs to use the TCP/IP.

Network Operation System It is installed in a stand-alone PC It Has the following: a Redirector, Determine whether a request from the PC’s operating system is for a local or remote resource. a server message block (SMB) protocol, allows one computer (the client) to request resources such as files from another computer netBIOS and a TCP/IP protocol stack.

Server Message Block (SMB) The SMB peer-to-peer protocol defines four categories of messages: session control create and close a Redirector connection to a shared resource at a server. File are used by the Redirector to gain access to files at a server Printer used by the Redirector to send data to a print queue at a server and to get status information about the print queue message. allows an application to send messages to or receive messages from a server.