TCP/IP Tutorial. Transmission Control Protocol Internet Protocol
|
|
- Lewis Hensley
- 1 years ago
- Views:
Transcription
1 TCP/IP Tutorial Transmission Control Protocol Internet Protocol 1
2 TCP/IP & OSI In OSI reference model terminology -the TCP/IP protocol suite covers the network and transport layers. TCP/IP can be used on many data-link layers (can support many network hardware implementations). 2
3 Ethernet - A Real Data-Link Layer It will be useful to discuss a real datalink layer. Ethernet (really IEEE 802.3) is widely used. Supported by a variety of physical layer implementations. 3
4 Ethernet Multi-access (shared medium). Every Ethernet interface has a unique 48 bit address (a.k.a. hardware address). Example: C0:B3:44:17:21:17 The broadcast address is all 1 s. Addresses are assigned to vendors by a central authority. 4
5 CSMA/CD Carrier Sense Multiple Access with Collision Detection Carrier Sense: can tell when another host is transmitting Multiple Access: many hosts on 1 wire Collision Detection: can tell when another host transmits at the same time. 5
6 An Ethernet Frame The preamble is a sequence of alternating 1s and 0s used for synchronization. 2 - CRC is Cyclic Redundency Check Preamble Destination Source Address Address Len DATA CRC 6
7 Ethernet Addressing Each interface looks at every frame and inspects the destination address. If the address does not match the hardware address of the interface or the broadcast address, the frame is discarded. Some interfaces can also be programmed to recognize multicast addresses. 7
8 Internet Protocol The IP in TCP/IP IP is the network layer packet delivery service (host-to-host). translation between different data-link protocols. 8
9 IP Datagrams IP provides connectionless, unreliable delivery of IP datagrams. Connectionless: each datagram is independent of all others. Unreliable: there is no guarantee that datagrams are delivered correctly or at all. 9
10 IP Addresses IP addresses are not the same as the underlying data-link (MAC) addresses! 10
11 IP Addresses IP is a network layer - it must be capable of providing communication between hosts on different kinds of networks (different data-link implementations). The address must include information about what network the receiving host is on. This makes routing feasible. 11
12 IP Addresses IP addresses are logical addresses (not physical) 32 bits. Includes a network ID and a host ID. Every host must have a unique IP address. IP addresses are assigned by a central authority (the NIC at SRI International). 12
13 The four formats of IP Class A 0 NetID Addresses HostID B 10 NetID HostID C 110 NetID HostID D 1110 Multicast Address 8 bits 8 bits 8 bits 8 bits 13
14 Class A The four formats of IP Addresses Class 128 Bpossible network IDs 16K possible network IDs 64K host IDs per network ID over 4 million host IDs per network ID Class C over 2 million possible network IDs about 256 host IDs per network ID 14
15 Network and Host IDs A Network ID is assigned to an organization by a global authority. Host IDs are assigned locally by a system administrator. Both the Network ID and the Host ID are used for routing. 15
16 IP Addresses IP Addresses are usually shown in dotted decimal notation: cs.rpi.edu is CS has a class B network 16
17 Host and Network Addresses A single network interface is assigned a single IP address called the host address. A host may have multiple interfaces, and therefore multiple host addresses. Hosts that share a network all have the same IP network address (the network ID). 17
18 IP Broadcast and Network Addresses An IP broadcast addresses has a host ID of all 1s. IP broadcasting is not necessarily a true broadcast, it relies on the underlying hardware technology. An IP address that has a host ID of all 0s is called a network address and refers to an entire network. 18
19 Subnet Addresses An organization can subdivide it s host address space into groups called subnets. The subnet ID is generally used to group hosts based on the physical network topology. 10 NetID SubnetID HostID 19
20 Subnetting router Subnet x Subnet x Subnet x 20
21 Subnetting Subnets can simplify routing. IP subnet broadcasts have a hostid of all 1s. It is possible to have a single wire network with multiple subnets. 21
22 Mapping IP Addresses to Hardware Addresses IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware address? The process of finding the hardware address of a host given the IP address is called Address Resolution 22
23 ARP The Address Resolution Protocol is used by a sending host when it knows the IP address of the destination but needs the Ethernet address. ARP is a broadcast protocol - every host on the network receives the request. Each host checks the request against it s IP address - the right one responds. 23
24 ARP (cont.) ARP does not need to be done every time an IP datagram is sent - hosts remember the hardware addresses of each other. Part of the ARP protocol specifies that the receiving host should also remember the IP and hardware addresses of the sending host. 24
25 ARP conversation HEY - Everyone please listen! Will please send me his/her Ethernet address? not me Hi Green! I m , and my Ethernet address is 87:A2:15:35:02:C3 25
26 Services provided by IP Connectionless Delivery (each datagram is treated individually). Unreliable (delivery is not guaranteed). Fragmentation / Reassembly (based on hardware MTU). Routing. Error detection. 26
27 VERS IP Datagram 1 byte 1 byte 1 byte 1 byte HL Datagram ID Service FLAG Fragment Length Fragment Offset TTL Protocol Header Checksum Source Address Destination Address Options (if any) Data 27
28 IP Datagram Fragmentation Each fragment (packet) has the same structure as the IP datagram. IP specifies that datagram reassembly is done only at the destination (not on a hop-by-hop basis). If any of the fragments are lost - the entire datagram is discarded (and an ICMP message is sent to the sender). 28
29 IP Datagram Fragmentation If packets arrive too fast - the receiver discards excessive packets and sends an ICMP message to the sender (SOURCE QUENCH). If an error is found (header checksum problem) the packet is discarded and an ICMP message is sent to the sender. 29
30 ICMP Internet Control Message Protocol ICMP is a protocol used for exchanging control messages. ICMP uses IP to deliver messages. ICMP messages are usually generated and processed by the IP software, not the user process. 30
31 ICMP Message Types Echo Request Echo Response Destination Unreachable Redirect Time Exceeded Redirect (route change) there are more... 31
32 Transport Layer & TCP/IP Q: We know that IP is the network layer - so TCP must be the transport layer, right? A: No. TCP is only part of the TCP/IP transport layer - the other part is UDP (User Datagram Protocol). 32
33 Process Process Process Layer TCP UDP Transport Layer ICMP, ARP & RARP IP Network Layer Hardware Data-Link Layer 33
34 UDP User Datagram Protocol UDP is a transport protocol communication between processes UDP uses IP to deliver datagrams to the right host. UDP uses ports to provide communication services to individual processes. 34
35 Ports TCP/IP uses an abstract destination point called a protocol port. Ports are identified by a positive integer. Operating systems provide some mechanism that processes use to specify a port. 35
36 Host A Ports Host B Process Process Process Process Process Process 36
37 UDP Datagram Delivery Connectionless Unreliable Minimal UDP Datagram Format Source Port Destination Port Length Checksum Data 37
38 TCP Transmission Control Protocol TCP is an alternative transport layer protocol supported by IP. TCP provides: Connection-oriented Reliable Full-duplex Byte-Stream 38
39 Connection-Oriented Connection oriented means that a virtual connection is established before any user data is transferred. If the connection cannot be established - the user program is notified. If the connection is ever interrupted - the user program(s) is notified. 39
40 Reliable Reliable means that every transmission of data is acknowledged by the receiver. If the sender does not receive acknowledgement within a specified amount of time, the sender retransmits the data. 40
41 Byte Stream Stream means that the connection is treated as a stream of bytes. The user application does not need to package data in individual datagrams (as with UDP). 41
42 Buffering TCP is responsible for buffering data and determining when it is time to send a datagram. It is possible for an application to tell TCP to send the data it has buffered without waiting for a buffer to fill up. 42
43 Full Duplex TCP provides transfer in both directions. To the application program these appear as 2 unrelated data streams, although TCP can piggyback control and data communication by providing control information (such as an ACK) along with user data. 43
44 TCP Ports Interprocess communication via TCP is achieved with the use of ports (just like UDP). UDP ports have no relation to TCP ports (different name spaces). 44
45 TCP Segments The chunk of data that TCP asks IP to deliver is called a TCP segment. Each segment contains: data bytes from the byte stream control information that identifies the data bytes 45
46 TCP Segment Format 1 byte 1 byte 1 byte 1 byte Source Port Destination Port Sequence Number Request Number offset Reser. Control Window Checksum Urgent Pointer Options (if any) Data 46
47 Addressing in TCP/IP Each TCP/IP address includes: Internet Address Protocol (UDP or TCP) Port Number 47
48 TCP vs. UDP Q: Which protocol is better? A: It depends on the application. TCP provides a connection-oriented, reliable byte stream service (lots of overhead). UDP offers minimal datagram delivery service (as little overhead as possible). 48
49 TCP Lingo When a client requests a connection it sends a SYN segment (a special TCP segment) to the server port. SYN stands for synchronize. The SYN message includes the client s ISN. ISN is Initial Sequence Number. 49
50 More... Every TCP segment includes a Sequence Number that refers to the first byte of data included in the segment. Every TCP segment includes a Request Number (Acknowledgement Number) that indicates the byte number of the next data that is expected to be received. All bytes up through this number have already been received. 50
51 And more... There are a bunch of control flags: URG: urgent data included. ACK: this segment is (among other things) an acknowledgement. RST: error - abort the session. SYN: synchronize Sequence Numbers (setup) FIN: polite connection termination. 51
52 And more... MSS: Maximum segment size (A TCP option) Window: Every ACK includes a Window field that tells the sender how many bytes it can send before the receiver will have to toss it away (due to fixed buffer size). 52
53 TCP Connection Creation Programming details later - for now we are concerned with the actual communication. A server accepts a connection. Must be looking for new connections! A client requests a connection. Must know where the server is! 53
54 Client Starts A client starts by sending a SYN segment with the following information: Client s ISN (generated pseudo-randomly) Maximum Receive Window for client. Optionally (but usually) MSS (largest datagram accepted). No payload! (Only TCP headers) 54
55 Sever Response When a waiting server sees a new connection request, the server sends back a SYN segment with: Server s ISN (generated pseudo-randomly) Request Number is Client ISN+1 Maximum Receive Window for server. Optionally (but usually) MSS No payload! (Only TCP headers) 55
56 Finally When the Server s SYN is received, the client sends back an ACK with: Request Number is Server s ISN+1 56
57 Client Server SYN ISN=X 1 SYN 2 ISN=Y ACK=X+1 ACK=Y
58 TCP 3-way handshake 1 2 3? Client: I want to talk, and I m starting with byte number X. Server: OK, I m here and I ll talk. My first byte will be called number Y, and I know your first byte will be number X. Client: Got it - you start at byte number Y. 58
59 Why 3-Way? Why is the third message necessary? HINTS: TCP is a reliable service. IP delivers each TCP segment. IP is not reliable. 59
60 TCP Data and ACK Once the connection is established, data can be sent. Each data segment includes a sequence number identifying the first byte in the segment. Each segment (data or empty) includes a request number indicating what data has been received. 60
61 Buffering Keep in mind that TCP is part of the Operating System. It takes care of all these details asynchronously. The TCP layer doesn t know when the application will ask for any received data. TCP buffers incoming data so it s ready when we ask for it. 61
62 TCP Buffers Both the client and server allocate buffers to hold incoming and outgoing data The TCP layer does this. Both the client and server announce with every ACK how much buffer space remains (the Window field in a TCP segment). 62
63 Send Buffers The application gives the TCP layer some data to send. The data is put in a send buffer, where it stays until the data is ACK d. The TCP layer won t accept data from the application unless (or until) there is buffer space. 63
64 ACKs A receiver doesn t have to ACK every segment (it can ACK many segments with a single ACK segment). Each ACK can also contain outgoing data (piggybacking). If a sender doesn t get an ACK after some time limit (MSL) it resends the data. 64
65 TCP Segment Order Most TCP implementations will accept out-of-order segments (if there is room in the buffer). Once the missing segments arrive, a single ACK can be sent for the whole thing. Remember: IP delivers TCP segments, and IP in not reliable - IP datagrams can be lost or arrive out of order. 65
66 Termination The TCP layer can send a RST segment that terminates a connection if something is wrong. Usually the application tells TCP to terminate the connection politely with a FIN segment. 66
67 FIN Either end of the connection can initiate termination. A FIN is sent, which means the application is done sending data. The FIN is ACK d. The other end must now send a FIN. That FIN must be ACK d. 67
68 App1 App2 FIN SN=X 1 ACK=X FIN SN=Y 3 ACK=Y
69 TCP Termination App1: I have no more data for you. App2: OK, I understand you are done sending. dramatic pause App2: OK - Now I m also done sending data. App1: Roger, Over and Out, Goodbye, Astalavista Baby, Adios, It s been real... camera fades to black... 69
70 TCP TIME_WAIT Once a TCP connection has been terminated (the last ACK sent) there is some unfinished business: What if the ACK is lost? The last FIN will be resent and it must be ACK d. What if there are lost or duplicated segments that finally reach the destination after a long delay? TCP hangs out for a while to handle these situations. 70
71 Routing Tables Routers store information about the the network topology in routing tables. Lists known networks, distance and router sequence: which to send to next Manual or Dynamic Configuration RIP: TCP/IP Routing Information Protocol Enables routers to tell each other about the network they are minding. 71
72 Routing Tables Default Address: minimizes routing table size. Uses as the address Means Send the packet to me if you can t find the network address RIP broadcasts updates every 30 seconds. Impacts network. OSPF: Open Shortest Path First protocol. Dynamic information gathering 72
73 Routing Tables Distance: also the cost of a network. Simply the count of how many routers, hops, a packet goes through to reach a network. A distance of 0 means the destination host is on the same network as the source host. 73
74 Routing Table If a network is not recorded in the table, a packet can not be sent and is dropped (ignored). What could be wrong Sending node misconfigured Router misconfigured Routes to that network are down 74
75 TCP/IP Summary IP: network layer protocol unreliable datagram delivery between hosts. UDP: transport layer protocol unreliable datagram delivery between processes. TCP: transport layer protocol reliable, byte-stream delivery between processes. 75
76 Conclusion: TCP or UDP? Internet commerce? Video server? File transfer? ? Chat groups? Robotic surgery controlled remotely over a network? 76
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
TCP/IP Transmission Control Protocol / Internet Protocol
TCP/IP Transmission Control Protocol / Internet Protocol Based on Notes by D. Hollinger 1 Topics IPv6 TCP Java TCP Programming 2 IPv6 availability Generally available with (new) versions of most operating
TCP/IP and OSI model. TCP/IP Protocol (2) B.2
TCP/IP Protocol TCP/IP Transmission Control Protocol/Internetworking Protocol (TCP/IP) standard for the Internet five layers = physical = data link = network = transport = application B.1 TCP/IP and OSI
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Module 6. Internetworking. Version 2 CSE IIT, Kharagpur
Module 6 Internetworking Lesson 2 Internet Protocol (IP) Specific Instructional Objectives At the end of this lesson, the students will be able to: Explain the relationship between TCP/IP and OSI model
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
Internet Protocol. Raj Jain. Washington University in St. Louis.
Internet Protocol Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 13-1 Overview! Internetworking
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
Introduction to Networking S Y STEMS
Introduction to Networking CS 40: INTRODUCTION TO U NIX A ND L I NUX O P E R AT ING S Y STEMS Objectives Introduce networking, including what it is and what it contains, which includes: Networking layers
I. Internet Control Message Protocol (ICMP) Week 10
I. Internet Control Message Protocol (ICMP) Week 10 described in RFC 792 helper protocol for IP, but more like a 3 ½ layer protocol (like ARP as a 2 ½ layer protocol) since a helper protocol for IP, uses
- TCP and UDP - Transport Layer Protocols
1 Transport Layer Protocols - TCP and UDP - The Transport layer (OSI Layer-4) does not actually transport data, despite its name. Instead, this layer is responsible for the reliable transfer of data, by
Lecture 19 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (2) Transport Control Protocol (1) Source: chapters 23, 24
Lecture 19 Overview Last Lecture Internet Protocol (2) This Lecture Transport Control Protocol (1) Generic transport layer Connection management Source: chapters 23, 24 Next Lecture Transport Control Protocol
Chapter 2 NETWORK LAYER
Chapter 2 NETWORK LAYER This chapter provides an overview of the most important and common protocols associated with the TCP/IP network layer. These include: Internet Protocol (IP), Routing protocols Routing
Internet Protocol Suite. Srinidhi Varadarajan
Internet Protocol Suite Srinidhi Varadarajan Internet Protocol Suite: Transport TCP: Transmission Control Protocol Byte stream transfer Reliable, connection-oriented service Point-to-point (one-to-one)
Transport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
The Transmission Control Protocol (TCP): Lecture 1
Today s Lecture The Transmission Control Protocol (TCP): Lecture 1 I. TCP overview II. The TCP Header III. Connection establishment and termination Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State
Internet Protocols. Supporting Protocols and Framing. Updated: 9/30/14
Internet Protocols Supporting Protocols and Framing Updated: 9/30/14 Supporting Protocols ARP / RARP BOOTP ICMP DHCP NAT IP Supporting Protocols IP protocol only deals with the data transfer (best-effort)
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Chapter 8 TCP/IP. Chapter Figures
Chapter 8 TCP/IP Chapter Figures Application Application TCP UDP ICMP IP ARP RARP Network interface Figure 8. HTTP Request Header contains source & destination port numbers TCP header Header contains source
TCP. Raj Jain. Professor of CIS The Ohio State University Columbus, OH 43210 Raj Jain 20-1
TCP Professor of CIS Columbus, OH 43210 Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 20-1 Overview Key features, Header format Mechanisms, Implementation choices Slow start congestion avoidance, Fast
Transmission Control Protocol (TCP) / Internet Protocol (IP)
Transmission Control Protocol (TCP) / Internet Protocol (IP) Overview of TCP/IP Oldest networking standard developed for US department s ARPANET Most popular network protocol Allows reasonably efficient
Internet Transport Protocols
Internet Transport Protocols Transmission Control Protocol (TCP): TCP Socket Primitives. The TCP Segment Header. Establishing & Terminating TCP Connections: TCP Three-way Handshake. TCP Connection Management
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
Data Link Layer Protocol. CSCE 515: Computer Network Programming. Overview. TCP/IP Layering Architecture. Important Summary. Addresses at Layers
CSCE 515: Computer Network Programming -- Review (partial) Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Overview What is a computer network? What is the Internet?
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
TCP/IP Concepts Review. Ed Crowley
TCP/IP Concepts Review Ed Crowley 1 Objectives At the end of this unit, you will be able to: Describe the TCP/IP protocol stack For each level, explain roles and vulnerabilities Explain basic IP addressing
IP (Internet Protocol) -Offered Services -Packet Format -ICMP
IP (Internet Protocol) -Offered Services -Packet Format -ICMP IP Communication Service Connectionless packet-oriented (or datagram) paradigm Two packets meant for the same destination may be handled in
TCP - Part I. Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management. 1 Overview TCP = Transmission Control Protocol Connection-oriented protocol Provides
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
Tutorial Questions EG/ES The tutorial questions illustrate the style of examination questions for EG/ES 3567.
The tutorial questions illustrate the style of examination questions for EG/ES 3567. The paper will be of 3 hours duration, and each student should attempt four questions during this time. You should aim
TCP and UDP. Raj Jain. Professor of CIS The Ohio State University Columbus, OH
TCP and UDP Professor of CIS Columbus, OH 43210 Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 12-1 Overview Key features Header format Mechanisms Implementation choices Slow start congestion avoidance
Introduction to IP & Addressing
Introduction to IP & Addressing Internet Protocol The IP in TCP/IP IP is the network layer protocol packet delivery service (host-to-host). translation between different data-link protocols. IP Datagrams
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) Relates to Lab 2: A short module on the Internet Control Message Protocol (ICMP). 1 Overview The IP (Internet Protocol) relies on several other protocols to perform
William Stallings Data and Computer Communications. Chapter 15 Internetwork Protocols
William Stallings Data and Computer Communications Chapter 15 Internetwork Protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection
Guide to TCP/IP, Third Edition. Chapter 5: Transport Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 5: Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol Explain the mechanisms that drive segmentation,
Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.
Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
CIT 480: Securing Computer Systems. TCP/IP Security
CIT 480: Securing Computer Systems TCP/IP Security Topics 1. Internet Protocol (IP) 2. IP Spoofing and Other Vulnerabilities 3. ICMP 4. Transmission Control Protocol (TCP) 5. TCP Session Hijacking 6. UDP
OSI Network Layer OSI Layer 3
OSI Network Layer OSI Layer 3 Network Fundamentals Chapter 5 ١ Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device Examine the most
IP - The Internet Protocol. Magda El Zarki Dept. of CS UC Irvine
1 IP - The Internet Protocol Magda El Zarki Dept. of CS UC Irvine Email: elzarki@uci.edu http://www.ics.uci.edu/~magda 2 Overview IP (Internet Protocol) is a Network Layer Protocol. Several versions most
9025- TCP/IP Networking. History and Standards. Review of Numbering Systems. Local Signaling. IP Addressing
9025- TCP/IP Networking History and Standards ARPA NCP TCP, IP, ARPANET PARC Collaborative Network Requirements One Protocol? Peer-to-Peer Protocols Documentation and RFCs RFC Categories Where to Find
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
Lecture 3: The Transport Layer: UDP and TCP
Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 3-1 The Transport Layer Provides efficient and robust end-to-end
Transport Layer: UDP vs. TCP
EEC 189Q: Computer Networks Transport Layer: UDP vs. TCP Reading: 8.4 & 8.5 Review: Internet Protocol Stack Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
CS640: Introduction to Computer Networks. Transport Protocols. Functionality Split
CS640: Introduction to Computer Networks Aditya Akella Lecture 14 TCP I - Transport Protocols: TCP Segments, Flow control and Connection Setup Transport Protocols Lowest level endto-end protocol. Header
G.Bianchi, G.Neglia, V.Mancuso. Understanding TCP connection management
Understanding TCP connection management TCP connection Application (client) Socket TCP software State variables: - conn status -MSS -windows - buffer space normally 4 to 16 Kbytes 64+ Kbytes possible Logical
TCP/IP Page 1 of 5 TCP/IP. < 8 bits > < 8 bits > < 8 bits > < 8 bits > Sequence Number Acknowledgement Number R S T S Y N F I N
TCP/IP Page 1 of 5 TCP/IP INTRODUCTION The internet uses a variety of technologies to provide end-to-end communication between applications on different computers. Most applications use Transport Control
Internet Protocols. Background CHAPTER
CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected
CHAPTER 24. Questions PRACTICE SET
CHAPTER 24 PRACTICE SET Questions Q24-1. The protocol field of the datagram defines the transport-layer protocol that should receive the transport-layer packet. If the value is 06, the protocol is TCP;
04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
TCP/IP Concepts Review. A CEH Perspective
TCP/IP Concepts Review A CEH Perspective 1 Objectives At the end of this unit, you will be able to: Describe the TCP/IP protocol stack For each level, explain roles and vulnerabilities Explain basic IP
TCP/IP Concepts Review. A CEH Perspective
TCP/IP Concepts Review A CEH Perspective 1 Objectives At the end of this unit, you will be able to: Describe the TCP/IP protocol stack For each level, explain roles and vulnerabilities Explain basic IP
Guide to TCP/IP Fourth Edition. Chapter 9: TCP/IP Transport Layer Protocols
Guide to TCP/IP Fourth Edition Chapter 9: TCP/IP Transport Layer Protocols Objectives Explain the key features and functions of the User Datagram Protocol and the Transmission Control Protocol Explain,
Protocol Stack: ISO OSI Model. Layer 2: Data Link Layer. Layer 1: Physical Layer. Layer 4: Transport Layer. Layer 3: Network Layer
Protocol Stack: ISO OSI Model CSCE 515: Computer Programming OSI Models & layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Some slides are made by Dave Hollinger
Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
Institute of Computer Technology - Vienna University of Technology. L30 - IP Technology Basics
IP Technology Basics TCP/IP Protocol Suite, RFC, IP Addresses, IP Forwarding Agenda Introduction IP Address Address Classes Subnetting IP Forwarding Routing Basics Forwarding and ARP Forwarding and ICMP
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Transport Layer INF3190 / INF4190. Foreleser: Carsten Griwodz
Transport Layer INF3190 / INF4190 Foreleser: Carsten Griwodz Email: griff@ifi.uio.no Transport layer Flow Control: Generic approaches Flow Control on Transport Layer Fast sender shall not flood slow receiver
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
TCP (Transmission Control Protocol)
TCP (Transmission Control Protocol) Originally defined in RFC 793 (September 1981) UDP features: multiplexing + protection against bit errors Ports, checksum Connection-oriented Establishment and teardown
Internet Protocols. Addressing & Services. Updated: 9-29-2012
Internet Protocols Addressing & Services Updated: 9-29-2012 Virtual vs. Physical Networks MAC is the part of the underlying network MAC is used on the LAN What is the addressing mechanism in WAN? WAN is
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
Introduction OSI Model Open Systems Interconnection OSI OSI Seven Layer Model
OSI MODEL 1 Introduction Open Systems Interconnection Basic Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design.
Introduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
CS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
CS 520: Network Architecture I Winter Lecture 12: The Internet Control Message Protocol and Layering.
CS 520: Network Architecture I Winter 2007 Lecture 12: The Internet Control Message Protocol and Layering. The previous lecture completed a discussion of the IP address space and the latest attempts to
IP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
Computer Networks UDP and TCP
Computer Networks UDP and TCP Saad Mneimneh Computer Science Hunter College of CUNY New York I m a system programmer specializing in TCP/IP communication protocol on UNIX systems. How can I explain a thing
Internet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
Internet Protocols (IP)
Internet Protocols (IP) (1) Internet Protocols Internet Architecture and Philosophy A TCP/IP internet provides three sets of services as shown in the following figure Connectionless Delivery System The
Figure 5.1: Issues addressed by network layer protocols. (Figure by Forouzan)
Chapter 5 Network Layer The main responsibility of a network layer protocol is host-to-host data delivery. In doing this, the network layer has to deal with network layer addressing, packetization and
TCP/IP. IPv4 packet layout. IPv4 packet layout. Emin Gun Sirer
IP TCP/IP Emin Gun Sirer Internetworking protocol Network layer Common packet format for the Internet Specifies what packets look like Fragments long packets into shorter packets Reassembles fragments
CSE 3461: Introduction to Computer Networking and Internet Technologies. Packet Switching. Presentation G
CSE 3461: Introduction to Computer Networking and Internet Technologies Packet Switching Presentation G Study: 10.5, 10.6, 12.1, 12.2, 13.1, 13.2, 18.3, 18.4 Gojko Babić 10-09-2012 The Network Core mesh
Protocol Layering. An Engineering Approach to Computer Networking
Protocol Layering An Engineering Approach to Computer Networking Peer entities Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern
Due for Week Group of 3 (max) Percentage awarded for comments, coding practice, layout style, naming convention, completed task.
EE4607 Project Goals Details Due for Week 11-12. Group of 3 (max) Percentage awarded for comments, coding practice, layout style, naming convention, completed task. Task Create a SDL implementation of
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP.
Advanced TCP/IP Overview There is one primary set of protocols that runs networks and the Internet today. In this lesson, you will work with those protocols: the Transmission Control Protocol (TCP) and
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Autumn Oct 21, Oct 21, 2004 CS573: Network Protocols and Standards 1 Oct 21, 2004 CS573: Network Protocols and Standards 2
IPv4 IP: Addressing, ARP, Routing Protocols and Standards Autumn 2004-2005 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics Subnetting and Supernetting ICMP Address Translation (NAT) Dynamic
Vorlesung Kommunikationsnetze Research Topics: Protocol Family for Control Data Communication in Heterogeneous Network Environments
Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen Vorlesung Kommunikationsnetze Research Topics: