1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.

Slides:



Advertisements
Similar presentations
Chapter 11: The Internet.
Advertisements

1 Chapter 11 The Internet Data Communications and Computer Networks: A Business User’s Approach.
Network Services Networking for Home & Small Business.
Chapter Ten The Internet Data Communications and Computer Networks: A Business User’s Approach Sixth Edition.
The Internet Useful Definitions and Concepts About the Internet.
Layer 7- Application Layer
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
1 Chapter 11 The Internet. 2 Introduction Today’s present Internet is a vast collection of thousands of networks and their attached devices. The Internet.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
網際網路協定基礎介紹 Data Communications and Computer Networks: A Business User’s Approach Fifth Edition (Chap 10)
Inside of a computer… What happens when you turn your computer on? What loads? Where are applications stored? How are do they run? In what form is information.
Chapter 10 The Internet. 2 Internet  Today’s present Internet is a vast collection of thousands of networks and their attached devices  Internet began.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Chapter Overview TCP/IP Protocols IP Addressing.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
1 Chapter 11 The Internet Data Communications and Computer Networks: A Business User’s Approach.
WXES2106 Network Technology Semester /2005 Chapter 4 TCP/IP CCNA1: Module 9, 10.3 and 11.
Chapter 11 The Internet Data Communications and Computer Networks: A Business User’s Approach.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Copyright ©2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible web site, in whole.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
1 Chapter 11 The Internet. 2 Introduction ARPANET in the 1960s. NSFnet in 1980s Internet in 1990s.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Network Services Networking for Home & Small Business.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Chapter Ten The Internet. Data Communications and Computer Networks: A Business User's Approach, Fifth Edition2 Objectives Discuss the responsibilities.
Data Communications & Computer Networks, Second Edition1 Chapter 11 The Internet.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
TCP/IP (Transmission Control Protocol / Internet Protocol)
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
Networking Material taken mainly from HowStuffWorks.com.
Chapter Ten The Internet Data Communications and Computer Networks: A Business User’s Approach Eighth Edition.
Chapter Ten The Internet Data Communications and Computer Networks: A Business User’s Approach Sixth Edition.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Chapter Ten The Internet Data Communications and Computer Networks: A Business User’s Approach Seventh Edition.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to TCP/IP.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Chapter Ten The Internet Data Communications and Computer Networks: A Business User’s Approach Eighth Edition © Cengage Learning. All Rights Reserved.
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
The OSI Model and the TCP/IP Protocol Suite
Networking for Home and Small Businesses – Chapter 6
Networking for Home and Small Businesses – Chapter 6
The OSI Model and the TCP/IP Protocol Suite
Topic 5: Communication and the Internet
TCP/IP Protocol Suite: Review
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Data Communications and Computer Networks: A Business User’s Approach
Networking for Home and Small Businesses – Chapter 6
The OSI Model and the TCP/IP Protocol Suite
OSI Reference Model Unit II
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol (IP) –Transmission Control Protocol (TCP) –Address Resolution Protocol (ARP) –Dynamic Host Configuration Protocol (DHCP) –Network Address Translation (NAT)

2 Internet Protocols (continued) Recall that the Internet with all its protocols follows the TCP/IP protocol suite (Internet model) –An application, such as , resides at the highest layer –A transport protocol, such as TCP, resides at the transport layer –The Internet Protocol (IP) resides at the Internet or network layer –A particular media and its framing resides at the network access (or data link) layer

3 Internet Protocols (continued)

4 The Internet Protocol (IP) IP prepares a packet for transmission across the Internet The IP header is encapsulated onto a transport data packet The IP packet is then passed to the next layer where further network information is encapsulated onto it

5 The Internet Protocol (IP) (continued)

6 Using IP, a router: –Makes routing decisions based on the destination address –May have to fragment the datagram into smaller datagrams (rare today) using Fragment Offset –May determine that the current datagram has been hopping around the network too long and delete it (Time to Live)

7 The Internet Protocol (IP) (continued)

8 The Transmission Control Protocol (TCP) TCP layer creates a connection between sender and receiver using port numbers –The port number identifies a particular application on a particular device (IP address) TCP can multiplex multiple connections (using port numbers) over a single IP line

9 The Transmission Control Protocol (TCP) (continued) The TCP layer can ensure that the receiver is not overrun with data (end-to-end flow control) using the Window field TCP can perform end-to-end error correction –Checksum TCP allows for the sending of high priority data –Urgent Pointer

10 The Transmission Control Protocol (TCP) (continued)

11 Internet Control Message Protocol (ICMP) ICMP –Used by routers and nodes –Performs error reporting for the Internet Protocol ICMP reports errors such as invalid IP address, invalid port address, and the packet has hopped too many times

12 User Datagram Protocol (UDP) A transport layer protocol used in place of TCP Where TCP supports a connection-oriented application, UDP is used with connectionless applications UDP also encapsulates a header onto an application packet, but the header is much simpler than TCP

13 Address Resolution Protocol (ARP) When an IP packet has traversed the Internet and encounters the destination LAN, how does the packet find the destination workstation? Even though a destination workstation may have an IP address, a LAN does not use IP addresses to deliver frames –A LAN uses MAC layer address ARP translates an IP address into a MAC layer address so the frame can be delivered to the proper workstation

14 Dynamic Host Configuration Protocol (DHCP) An IP address can be assigned to a workstation permanently (static assignment) or dynamically –Dynamic IP address assignment is a more efficient use of scarce IP addresses –When DHCP client issues an IP request, DHCP server looks in its static table If no entry exists, the server selects an IP address from available pool

15 Dynamic Host Configuration Protocol (DHCP) (continued) The address assigned by DHCP server is temporary –Part of agreement includes specific period of time If no time period specified, the default is one hour –DHCP clients may negotiate for a renewal before the time period expires

16 Network Address Translation (NAT) NAT lets the router represent the entire local area network to the Internet as a single IP address –Thus, all traffic leaving the LAN appears as originating from a global IP address –All traffic coming into this LAN uses this global IP address This security feature allows a LAN to hide all the workstation IP addresses from the Internet

17 Network Address Translation (NAT) (continued) Since the outside world cannot see into the LAN, you do not need to use registered IP addresses on an inside LAN We can use the following blocks of addresses for private use: – – – – – –

18 Network Address Translation (NAT) (continued) When a user on the inside sends a packet to the outside, the NAT interface changes the user’s inside address to a global IP address –This change is stored in a cache When the response comes back, the NAT looks in cache and switches the addresses back –If not, the packet is dropped Unless NAT has a service table of fixed IP address mappings –This service table allows packets to originate from the outside

19 Tunneling Protocols and Virtual Private Networks (VPNs) The Internet is not normally a secure system If someone wants to use the Internet to access a corporate computer system, how can a secure connection be created? –One possible technique is to create a virtual private network (VPN) VPN creates a secure connection through the Internet by using a tunneling protocol

20 The World Wide Web The World Wide Web (WWW) – immense collection of Web pages and other resources that can be downloaded across the Internet and displayed on a workstation via a Web browser and is the most popular service on the Internet Basic Web pages are created with the Hypertext Markup Language (HTML) Hypertext Transport Protocol (HTTP) is protocol to transfer a Web page

21 Locating a Document on the Internet Every document on the Internet has a unique Uniform Resource Locator (URL) All URLs consist of four parts: –Service type –Host or domain name –Directory or subdirectory information –Filename

22 Locating a Document on the Internet (continued)

23 Locating a Document on the Internet (continued) When a user, running a Web browser, enters a URL, how is URL translated into an IP address? –Domain Name System (DNS) – large, distributed database of URLs and IP addresses The first operation performed by DNS is to query a local database for URL/IP address information –If local server does not recognize address, the server at next level will be queried –Eventually root server for URL/IP addresses will be queried »If root server has answer, results are returned »If root server recognizes domain name but not extension in front of domain name, root server will query server at domain name’s location »When domain’s server returns results, they are passed back through chain of servers (and their caches)

24 IP Addresses All devices connected to Internet have 32-bit IP address associated with them Think of the IP address as a logical address (possibly temporary), while the 48-bit address on every NIC is the physical, or permanent address Computers, networks, and routers use the 32-bit binary address, but a more readable form is the dotted decimal notation

25 IP Addresses (continued) For example, the 32-bit binary address translates to in dotted decimal notation

26 Creating Web Pages (continued)

27 Creating Web Pages (continued)

28 Electronic Mail ( ) programs can create, send, receive, and store s, as well as reply to, forward, and attach non-text files Multipurpose Internet Mail Extension (MIME) is used to send attachments Simple Mail Transfer Protocol (SMTP) is used to transmit messages Post Office Protocol version 3 (POP3) and Internet Message Access Protocol (IMAP) are used to hold and later retrieve messages

29 File Transfer Protocol (FTP) Used to transfer files across the Internet User can upload or download a file The URL for an FTP site begins with ftp://… The three most common ways to access an FTP site are: –Through a browser –Using a canned FTP program –Issuing FTP commands at a text-based command prompt

30 Remote Login (Telnet) Allows a user to remotely log in to a distant computer site User usually needs a login and password to access a remote computer site User saves money on long-distance telephone charges

31 Voice Over IP The transfer of voice signals using a packet- switched network and the IP protocol Voice over IP (VoIP) can be internal to a company (private VoIP) or can be external using the Internet VoIP consumes many resources and may not always work well, but can be cost-effective in certain situations

32 Voice Over IP (continued) Three basic ways to make a telephone call using VoIP: –PC to PC using sound cards and headsets (or speakers and microphone) –PC to telephone (need a gateway to convert IP addresses to telephone numbers) –Telephone to telephone (need gateways)