1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.

Slides:



Advertisements
Similar presentations
CCNA1 v3 Module 9 v3 CCNA 1 Module 9 JEOPARDY K. Martin Galo Valencia.
Advertisements

Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
Introduction to TCP/IP TCP / IP –including 2 protocols Protocol : = a set of rules that govern the communication between different devices Protocol : =
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 2: Internet Protocols.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Lesson 7 – THE BUSINESS OF NETWORKING. TCP/IP and UDP Other Internet protocols Important Internet protocols OVERVIEW.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction to TCP/IP
Chapter 2 Internet Protocol DoD Model Four layers: – Process/Application layer – Host-to-Host layer – Internet layer – Network Access layer.
1 Introduction to TCP/IP. 2 Agenda What Is TCP/IP? IP Addressing.
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
1 Chapter Overview IP (v4) Address IPv6. 2 IPv4 Addresses Internet Protocol (IP) is the only network layer protocol with its own addressing system and.
Chapter Overview TCP/IP Protocols IP Addressing.
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Chapter Overview TCP/IP Overview Configuring TCP/IP Clients
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Five 1 Business Data Communications Chapter Five Network, Transport,
1 Internetworking : Internet architecture and TCP/IP Protocol TK3133 Computer Networking Technology.
WXES2106 Network Technology Semester /2005 Chapter 4 TCP/IP CCNA1: Module 9, 10.3 and 11.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Network Protocols.
Chapter 9.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
Chapter Three Network Protocols. Agenda Attendance, and Ch.2 Quiz questions TCP/IP Model IP Header (Using Ethereal to analyze the IP header) TCP Header.
TCP/IP. The Internet Protocol Suite is the set of communications protocols used for the Internet and other similar networks. It is commonly also known.
Huda AL_Omairl - Network 71 Protocols and Network Software.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
11 NETWORK LAYER PROTOCOLS Chapter 5 IP IPX NetBEUI AppleTalk.
TCP/IP fundamentals Unit objectives Discuss the evolution of TCP/IP Discuss TCP/IP fundamentals.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
Basic IP Protocol Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
Internet protocol Suite
Linux Operations and Administration Chapter Eight Network Communications.
Telecommunications Essentials John R. Durrett July 5, 2005.
Introduction to TCP/IP. Agenda What Is TCP/IP? IP Addressing.
TCP/IP Protocol Suite ©Richard L. Goldman September 25, 2002.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to TCP/IP.
Submitted to: Submitted by: Mrs. Kavita Taneja Jasleen kaur (lect.) Hitaishi verma MMICT & BM MCA 4 th sem.
Computer Networking 网络课件 双语教学 模拟实验 计算机网络教研室 Department of Computer Networking Application CHAPTER 14 INTERNETWORKING 1 The first section 2 Exercises.
Implementing TCP/IP.
Computer Communication and Networking
Understand the OSI Model Part 2
TCP/IP Protocol Suite and IP Addressing
Networking Theory (part 2)
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Networking Theory (part 2)
Networking Theory (part 2)
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing

2 TCP/IP History Developed in the 1970s Created for use on the ARPANET Used by UNIX Predates the PC, the Open Systems Interconnection (OSI) model, and Ethernet Platform and operating system independent

3 TCP/IP Standards Developed using a collaborative process Published as Requests for Comments (RFCs) by the Internet Engineering Task Force (IETF) In the public domain

4 Advantages of a Multilayered Design Platform independence – Separate protocols make it easier to support a variety of communicating Platforms Quality of service – Provide level of service required Simultaneous development – Can develop various protocols simultaneously

5 The OSI Model and the TCP/IP Model

6 The Four TCP/IP Layers Link. Includes Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol (PPP) Internet. Is exactly equivalent to the Network Layer in the OSI model and it Includes Internet Protocol (IP), Internet Control Message Protocol (ICMP), and Internet Group Membership Protocol (IGMP), plus some dynamic routing protocols

7 The Four TCP/IP Layers Transport. Is exactly equivalent to the Transport Layer in the OSI model and it Includes Includes Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Application. Includes Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP)

8 Link Layer Protocols in the TCP/IP Suite SLIP – A Nonstandard for transmission of IP Datagrams over Serial lines (modem or telephone line) and has very low overhead. PPP – Point to Point Protocol – Use in most cases when accesing the Internet by a dial up connection to an ISP.

9 ARP Characteristics and Functions ARP is the acronym for Address Resolution Protocol. ARP is defined in RFC 826, “Ethernet Address Resolution Protocol.” It can be considered a link layer protocol or an internet layer protocol. ARP resolves IP addresses into hardware addresses.

10 ARP Address Resolution Process 1. IP packages transport layer information into a datagram by inserting the IP address of the destination system into the Destination IP Address field of the IP header. 2. IP compares the network identifier in the destination IP address to its own network identifier and determines whether to send the datagram directly to the destination host or to a router on the local network. 3. IP generates an ARP Request packet containing its own hardware address and IP address in the Sender Hardware Address and Sender Protocol Address fields. 4. The system passes the ARP Request message down to the data-link layer protocol, which encapsulates it in a frame and transmits it as a broadcast to the entire local network.

11 ARP Address Resolution Process (Cont.) 5. The systems on the LAN receive the ARP Request message and read the contents of the Target Protocol Address field. 6. If the system receiving the ARP Request message recognizes its own IP address in the Target Protocol Address field, it generates an ARP Reply message. 7. The system transmits the ARP Reply message as a unicast message back to the computer that generated the request, using the hardware address in the Target Hardware Address field. 8. The system that originally generated the ARP Request message receives the ARP Reply and uses the newly supplied value in the Sender Hardware Address field to encapsulate the datagram in a data-link layer frame and transmit it to the desired destination as a unicast message.

12 The ARP Message Format

13 ICMP Characteristics ICMP is the acronym for Internet Control Message Protocol. ICMP is defined in RFC 792. It is used to perform network administration tasks such as Delivering error messages Carrying query and response messages ICMP messages are carried in IP datagrams.

14 The ICMP Message Format

15 ICMP Error Message Types Destination Unreachable Source Quench Redirect Time Exceeded

16 ICMP Redirect Messages – Enable routers to inform other systems of more efficient routes

17 Transport Layer Protocols in the TCP/IP Suite TCP UDP

18 Application Layer Protocols Commonly Used in the TCP/IP Suite Hypertext Transfer Protocol (HTTP) Secure Hypertext Transfer Protocol (S-HTTP or HTTPS) File Transfer Protocol (FTP) Trivial File Transfer Protocol (TFTP) Simple Mail Transport Protocol (SMTP) Post Office Protocol 3 (POP3) Internet Mail Access Protocol 4 (IMAP4) Network Time Protocol (NTP) Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Simple Network Management Protocol (SNMP) Telnet

19 IP Address Characteristics 32-bit value that contains a network identifier and a host identifier Expressed in dotted decimal notation Assigned to network interface adapters, not computers

20 IP Address Assignments Every network interface adapter on a network must have The same network identifier as the others on the network A unique host identifier The Internet Assigned Numbers Authority (IANA) assigns network identifiers, but you typically obtain network addresses from an Internet service provider (ISP). Network administrators assign host identifiers.

21 IP Address Classes

22 IP Address Class First Bit/Byte Values ClassFirst BitsFirst Byte Values A01–127 B10128–191 C110192–223

23 IP Address Class Network and Host Bits ClassNetwork ID Bits Host ID Bits Number of Networks Number of Hosts A ,777,214 B16 16,38465,534 C2482,097,152254

24 IP Addressing Rules All the bits in the network identifier cannot be set to zeros. All the bits in the network identifier cannot be set to ones. All the bits in the host identifier cannot be set to zeros. All the bits in the host identifier cannot be set to ones.

25 What Is a Subnet Mask? A subnet mask is a 32-bit binary number that indicates which bits of an IP address identify the network and which bits identify the host. The 1 bits are the network identifier bits and the 0 bits are the host identifier bits. A subnet mask is typically expressed in dotted decimal notation.

26 Subnet Masks for IP Address Classes ClassSubnet Mask A B C

27 Creating Subnets Borrow bits from the host identifier and use them as a subnet identifier. Increment the subnet and host identifiers separately. Convert the binary values to decimals.

28 Subnetting a Class B Address Subnet Masking

29 Private Network Addresses ClassNetwork Addresses A through B through C through

30 IPv6 Addressing Expands IP address space from 32 to 128 bits Designed to prevent the depletion of IP addresses Uses XX:XX:XX:XX:XX:XX:XX:XX notation

31 Chapter Summary TCP/IP protocols The TCP/IP protocols were developed to support systems that use any computing platform or operating system. The TCP/IP protocol stack consists of four layers: link, internet, transport, and application. IP uses the ARP protocol to resolve IP addresses into the hardware addresses needed for data-link layer protocol communications. The ICMP protocol performs numerous functions at the internet layer, including reporting errors and querying systems for information. Application layer protocols enable specific programs and services running on TCP/IP computers to exchange messages.

32 Chapter Summary (Cont.) IP addressing IP addresses are 32 bits long and consist of a network identifier and a host identifier, expressed as four decimal numbers separated by periods. Every network interface adapter on a TCP/IP network must have a unique IP address. The IANA assigns IP network addresses in three classes, and network administrators assign the host addresses to each individual system. The subnet mask specifies which bits of an IP address identify the network and which bits identify the host. Modifying the subnet mask for an address in a particular class lets you "borrow" some of the host bits to create a subnet identifier.