Topics: 1. HTTP, DNS, and SMTP Examples 2. Layered Architectures 3. OSI Reference Model 4. TCP/IP Reference Model. Garcia: Sections

Size: px
Start display at page:

Download "Topics: 1. HTTP, DNS, and SMTP Examples 2. Layered Architectures 3. OSI Reference Model 4. TCP/IP Reference Model. Garcia: Sections 2.1 2."

Transcription

1 COSC 3213: Computer Networks I Module 2 Instructor: Dr. Marvin Mandelbaum Department of Computer Science York University Section A Handout # 2 Topics: 1. HTTP, DNS, and SMTP Examples 2. Layered Architectures 3. OSI Reference Model 4. TCP/IP Reference Model Garcia: Sections

2 Protocol Set of rules and conventions used by two communicating parties. How a communication will be initiated and terminated, How data and control information are arranged in a datagram, What control information is included, etc. Examples Hypertext transfer protocol (HTTP), File transfer protocol (FTP), Simple mail transfer protocol (SMTP), and Transmission control protocol (TCP). * HTTP, FTP, and SMTP are application layer protocols while TCP is the transport layer protocol. Basic Definitions 2

3 Client/Server configuration A server is a powerful machine that houses data and other shared resources. Clients are smaller machines that connect to the server to retrieve shared information. The two communicate based on the following protocol: Client makes a request over the network to the server Client waits When server gets the request, it performs the requested job and returns a reply Basic Definitions 3

4 Some Other Basic Definitions 3. Port: A server process waits for incoming requests by listening to a port. Analogous to a wall socket in a telephone network. Widely used ports are well known. 3. Daemon: Process that runs in the background and listens for a request. 3. Networks consist of two components: Hardware that forms the infrastructure connecting the computers, e.g., twisted pair wire / optical fibre / cable, routers, switches, servers, etc. Software that forms a cohesive connection such that the user sees the entire network as a single coherent system. The design of software is highly structured and is the focus of our discussion in this presentation. Basic Definitions 4

5 EG1: Browsing a Homepage (1): comm.utoronto.ca/comm.html Event. User clicks URL comm.utoronto.ca/comm.html a. Client process determines the IP address corresponding to the host name using the Domain Name Server (DNS) query. 2b. Using the IP address, client process sets up a 2- way TCP connection with port 80 (the well known port number for http protocol) with the WWW server. 2c. TCP connection is reliable and connection-oriented.. Client HTTP daemon sends a request (GET) for the document (comm.html) specified in the URL. HTTP version used by the browser is HTTP/1.1. Server HTTP daemon receives the GET command by listening at TCP port 80 and interprets the message. Server HTTP daemon sends result code with a description of the document. HTTP/1.1 specifies the protocol version used by the server. Result code 200 indicates that the client request was successful. Apache/ specifies the server including its operating system (Unix) 8218 specifies the length of the document in bytes text/html specifies the type (text using HyperText Markup language) of file. Server HTTP daemon sends <comm.html> through the TCP port.. HTML text is interpreted by Client browser and displayed. Server HTTP daemon disconnects after completing the transmission Message Content IP address: GET /comm.html HTTP/1.1 HTTP/ OK Date: Mon, 06 Jan Server: Apache/ (Unix) Last modified: 03 Sep Content Length: 8218 Content Type: text/html <html> <head><title></title> <font face= Arial > What is communications <\font>... 5

6 Browsing a Homepage (2): comm.utoronto.ca/comm.html 1. HTTP protocol requires a two-way, reliable (without errors), connection-oriented connection (in correct sequential order) to be set up. 2. Establishment of connection is outside the scope of HTTP. 3. HTTP uses the services of TCP to transfer the file reliably (without errors) and in a correct sequence order (connection-oriented). 4. Similarly, TCP builds on other layers to provide the requested service to HTTP. 5. Communication between HTTP peers (and TCP peers) is virtual. HTTP client Virtual Communication HTTP server Application Layer GET Response Port 1127 GETCP80, 1127 Port 80 TCP 1127, 80 Response bytes TCP Transport Layer Lower Layers 6

7 EG2: Address Resolution (1) The HTTP example requires a DNS query to resolve the address of server. In other words, an IP address is to be retrieved from the domain name The address resolution is performed by a domain name system (DNS), which is a distributed database (consisting of several servers) used to convert names into addresses. A process in the host called resolver composes the question for the DNS. The resolver contacts the local DNS server first. Only if it fails to resolve an address, a higher level DNS server is accessed. The communication between resolver and the DNS server is carried out using the UDP protocol of the transport layer. UDP protocol is unreliable and provides connectionless service. Resolver (client) Virtual Communication Resolver HTTP (DNS) server Application Layer QUERY Response Port 1120 QUERY GETCP80, TCP53, Port 53 UDP TCP 1120, 53 Response bytes TCP UDP Transport Layer Lower Layers 7

8 Address Resolution (2) Event. Client application requests its resolver for translation of the name to an IP address.. Client resolver composes query message. The OPCODE value indicates that is a Standard QUERY (SQUERY) The QNAME value specifies the address to be resolved. The QTYPE and QCLASS values ask for translation to an IP address. Resolver sends a UDP datagram with query message (step 2) including information of its port (53 for DNS).. DNS server looks up address and prepares response. Note that the question asked by the Client resolver is repeated followed by the answer (IP address). DNS server sends UDP datagram encapsulating the response message Message Content Header: OPCODE=SQUERY Question: QNAME=comm.utoronto.ca, QCLASS=IN, QTYPE=A Header: OPCODE=SQUERY,RESPONSE, AA Question: QNAME=comm.utoronto.com, QCLASS=IN, QTYPE=A Answer: tesla.comm.utoronto.ca IN A

9 EG3: Electronic (1) The mail client (Outlook) contacts a local SMTP (simple mail transfer protocol) server for delivery of an . The user prepares an message with Recipient s address, subject, and body. The mail client prepares a binary file encoding the above information. The mail client contacts the local SMTP server (may require DNS resolution if IP address is not known) using the TCP protocol of the transport layer and transmits the file to the local SMTP server. The local SMTP server repeats the above process with the destination SMTP server, which in turn repeats the process with the destination SMTP. Four machines involved; only the first two are shown. Port 1125 SMTP (Sender) client TCP Virtual Communication GETCP 80, TCP25, , 25 Response bytes SMTP HTTP (Receiver) server TCP UDP Response Port 25 Application Layer Transport Layer Lower Layers 9

10 (2) Event. Mail application establishes a TCP connection with its local SMTP server.. Local SMTP server issues an available message to the mail application.. The mail application identifies itself by sending a HELO message.. SMTP server issues a 250 message indicating the mail application to proceed.. The mail application sends the sender s address.. SMTP server replies with a 250 message to proceed.. The mail application sends the destination s address.. SMTP server replies with a 250 message to proceed.. The mail application sends a DATA message requesting permission to send the mail. 0. SMTP server gives permission to client by sending a 354 message. 1. The mail application sends the mail file containing the message. 2. SMTP server indicates mail file is received. A message ID is returned. 3. The mail application indicates that the mail session is over. 4. SMTP server sends a 221 message confirming the end of the session. HELO bhaskara.comm.utoronto.ca 250 bhaskara.comm.utoronto.ca HELO bhaskara.comm.utoronto.ca pleased to meet you MAIL FROM: <asif@comm.utoronto.ca> 250 <asif@comm.utoronto.ca> Sender ok RCPT TO: <registrar@ece.cmu.edu> 250 <registrar@ece.cmu.edu> Recipient ok DATA Message Content Port number for SMTP is tesla.comm.toronto.edu ESMTP Sendmail 8.9.0/8.9.0; Thu, 25 Dec Enter mai, end with. on a line by itself. Hi Registrar, I am interested in CS program 250 FFF717 Message accepted for delivery QUIT tesla.comm.toronto.edu closing connection

11 OSI Reference Model (1) OSI (Open Systems Interconnection) reference model was the first attempt made by ISO (International Organization of Standardization) towards a networking standard. OSI reference model partitions the overall communication process in seven layers. Why layers? Reduces the complexity of design Analogous to the concept of functions: Layer (n 1) provides a service to layer n keeping its internal details hidden from layer n. Applications can be developed at the top most layer without worrying about the intrinsic details in the lower layer. Example: a company president in Germany wishes to send a thank-you note to his counterpart in Vancouver, Canada. Both presidents only know their home language. 11

12 A Network Analogy A company president in Germany, who speaks and writes only German, wishes to send a thank-you note and small gift to the marketing manager of a company in Vancouver at the completion of a successful deal. (Application). The letter and gift are sent by mail or courier. (Communication system). The communications system must be able to guarantee to the company in Germany that the letter and gift have arrived safely at the company in Vancouver. (Reliability). An electronic communications system or computer network must be able to provide the same kinds of facilities and guarantee. Layered Process: 1. German company president tells PR director to send a thank-you letter and gift. 2. PR director, who doesn t speak English either, dictates the letter in German and gives the recording and gift to a secretary. 3. Secretary, who speaks German and English, translates letter to English, types letter in Canadian format and gives letter and gift to an administrative assistant. 4. The administrative assistant makes a file copy of the letter and makes note of the gift, ensuring that addressee s name and title are exactly correct, and notes other details. The letter and gift are passed on to the manager, shipping and receiving. 12

13 Analogy in Detail (Transmitter) 5. The manager of shipping and receiving is responsible for guaranteeing that the shipment arrives safely at the final destination: 5.1 The manager makes a copy of the letter and notes details of the gift so that duplicates can be send if necessary. 5.2 The manager assigns a shipment number (e.g ) and sequential parcel number to each parcel, so they become 12345:1 and 12345:2. Parcel 12345:2 is marked so that it is known that there are only 2 parcels in this shipment. 5.3 The parcels, tagged with both numbers and postal addresses, are given to a shipping clerk. 6. The shipping clerk calls the German company s Toronto office and learns that the shipment should be sent to Toronto by mail and then by courier to Vancouver. A routing slip is attached to each parcel independently. The parcels are then put into the mail cart labeled Toronto, and the mail cart is sent to the mail room. The shipping clerk advises the manager of shipping and receiving of the routing through Toronto. 7. The mailroom staff make copies of everything, put the mail in bags and weigh the bags on very accurate scales. The destination and weight of each bag is recorded on an attached tag. The bags are then sent to the loading dock. 13

14 Analogy in Detail (Transmitter) German Prez Instructions PR Director Dictation Secretary Translation, Gift Admin Assistant Address, Reliability Manager S&H Packetization Shipping Clerk Routing Bagging, Reliability Mailroom Staff To Loading Dock 14

15 Analogy in Detail (Router) The loading dock staff put the mail bags on the transportation medium required to send the bags to their destination 1. When the mail bag arrives in the loading dock in Toronto, it is sent to the mailroom where it is weighed. If there is a discrepancy from what is recorded on the tag, the whole shipment is rejected and the mailroom in Germany is notified to send a replacement. Assuming the weights match, the mailroom in Germany is told that the shipment is OK. At this point the mailroom in Germany destroys its copies. 2. The mailbag is sent to the shipping clerk in Toronto, who unpacks it and routes the mail. Some mail gets sent to the shipping and receiving manager in Toronto, while other mail is put in a courier bag for Vancouver with other documents. 3. The shipping and receiving manager in Toronto looks at the content of the letter and checks for any wear and tear. Also, the gift is checked for damage. If none found, the two packages are returned to the shipping clerk to continue processing the shipment. If there is some indiscrepancy, the shipping and receiving manager in Germany is asked to send new letter or gift with the damaged destroyed. 15

16 Analogy in Detail (Transmitter) Instructions German Prez PR Director Dictation Secretary Translation, Gift Admin Assistant Address, Reliability Manager S&H Packetization Shipping Clerk Routing Mailroom Staff Bagging, Reliability Toronto Manager S&H Shipping Clerk Mailroom Staff Medium of Transmission (Mail / Courier) 16

17 Analogy in Detail (Receiver) The courier bag for Vancouver is sent to the mailroom and eventually finds it way to Vancouver, where the same process takes place in reverse order as happened in Toronto. (7 5) The two parcels arrive at the shipping and receiving manager in Vancouver via the mailroom staff and shipping clerk. The shipping and receiving manager in Vancouver notes that the parcels have arrived and telephones the shipping and receiving manager in Germany to confirm arrival, The shipping and receiving manager in Germany can now destroy the copies (4 2) The shipping and receiving manager passed the mail to as administrative assistant who logs the letter as received and passes the letter to a secretary who passes the letter to the VP of PR. In this case the secretary has no specific function to perform. (2 1) The VP of PR reads the letter and tells the marketing manager that the president of the German company says Thank you and has sent a small gift. 17

18 Analogy German Prez Instructions PR Director Dictation Secretary Translation, Gift Admin Assistant Address, Reliability Manager S&H Packetization Shipping Clerk Routing Mailroom Staff Bagging, Reliability Toronto Manager S&H Shipping Clerk Mailroom Staff Vancouver Prez PR Director Secretary Admin Assistant Manager S&H Shipping Clerk Mailroom Staff Medium of Transmission (Mail / Courier) 18

19 Lesson Learned (1) 1. A process at layer n are referred to as a layer n entity. In our earlier example, dictation of letter in German by the PR director to its secretary is layer-6 entity. 2. Layer n communicates virtually with the corresponding layer on the other machine using a protocol data unit (PDU) comprising of service data unit (SDU) and a header. n entity H SDU n entity PDU In our analog example, German president communicated with the Vancouver president virtually by instructing his employee to send a letter and a gift. The SDU are the instructions while the header contains the destination address and port number. 3. The combination of layer n entities are referred to as peer processes. 4. Layer n entity communicates only virtually with its peer on the other machine. The actual transmission takes place via the lower layers. 19

20 Lesson Learned (2) n PDU n-sap n entity n entity n PDU n-sap (n - 1) entity (n - 1) entity (n 1) PDU 5. Layer n will pass a n-layer PDU to layer (n - 1) through a software port referred to as service access point (SAP). In our example, the president s office is a SAP. 6. Layer (n - 1) will create its (n - 1)-layer PDU by using the n-layer PDU as its SDU and adding some header information. This process is called encapsulation. H n-pdu (n - 1)PDU 20

21 Lesson Learned (3) 7. On receiving (n -1)layer PDU, the(n - 1) entity will remove the header information and use it to perform its own controls. If the controls are correct, the (n - 1) SDU, which is n- layer PDU, will be passed on to the higher layer. 8. The header typically contains source address, destination address, checksum for error detection / correction, size of data to follow in SDU, and sequencing information. 9. If the layer n PDU is too large to be handed as a (n 1)-layer SDU, it is broken into smaller segments and several (n 1)-layer PDUs are generated. This process is called segmentation. 10. It is also possible to combine several layer n PDUs and place them as one SDU in (n 1) PDU. 21

22 OSI Reference Model (1) APDU Application Presentation Session Application Layer: 1. Provides frequently requested services. 2. Request for a service is made by following a protocol. 3. Uses the service offered by the presentation layer by passing an application protocol data unit (APDU) to the presentation layer. Transport Data AH Network Data Link Physical 4. Example: To access a WWW document, HTTP protocol is used by the web browser (Internet Explorer or Netscape). 5. Other application layer protocols include FTP for file transfer, SMTP for , and TELNET for remote login. 22

23 OSI Reference Model (2) APDU PPDU Application Presentation Session Transport Network Data Link Physical Presentation Layer: 1. Concerned with the syntax and semantics of the information transmitted. 2. Makes common data structures compatible on different machines. 3. Example: T in ASCII representation is T in EBCDIC representation is It is the function of the presentation layer to ensure that the transmitted bits are properly mapped to the correct alphabet. 4. Allows higher level data structures to be defined. 5. Communicates with the session layer using a presentation protocol data unit (PPDU) composed of APDU PH 6. Especially useful for banks and hospitals. 23

24 OSI Reference Model (3) APDU PPDU SPDU Application Presentation Session Transport Network Data Link Session Layer: 1. Allows users to establish sessions between them. 2. Sessions are defined based on the requirements for users and may vary from half duplex to full duplex and inclusion or omission of synchronization point 3. Services include: Dialog control: tracking whose turn is to transmit Token management: preventing parties from attempting the same operation at the same time. Synchronization: Check pointing long transmission by including synchronization points. 4. Communicates with the transport layer with a session protocol data unit (SPDU) composed of Physical PPDU SH 24

25 OSI Reference Model (4) APDU PPDU SPDU TPDU Application Presentation Session Transport Network Data Link Transport Layer: 1. Responsible for end-to-end transfer of data from a session entity in source to its peer session entity at destination. 2. Accepts SPDU from session layer, labels source and destination addresses, segments the data if needed, and passes segments to the network layer. 3. Kinds of Services include: Reliable Connection-oriented: Error-free transmission of data in sequence to its destination Unreliable Connectionless: No guarantee of being error-free or as a matter of fact, even of delivering. 4. Communicates with the network layer using a TPDU Physical SPDU2 TH2 SPDU1 TH1 25

26 OSI Reference Model (5) APDU PPDU SPDU TPDU Packet Application Presentation Session Transport Network Data Link Network Layer: 1. Provides for transfer of data in packets. 2. Deals with routing and congestion Routing implies not the actual route but the procedure used for selecting the route, i.e., in terns of distance or traffic condition or other criterion. Checks for congestion. If it exists, try congestion control mechanism like slowing down the rate of transmission of packets. 3. Provides compatibility between hosts connected to different networks using a procedure called internetworking. 4. Packet is composed of frame with Network header Physical TPDU NH 26

27 OSI Reference Model (6) APDU PPDU SPDU TPDU Packet Frame Application Presentation Session Transport Network Data Link Physical Data Link Layer: 1. Provides for transfer of frames across a transmission line. 2. Packets are further composed as frames with framing information on the boundaries. DT Packet DH 3. Does checksum on each frame allowing error detection. 4. Also includes a medium access control (MAC) sublayer that allows for LAN connectivity. 27

28 OSI Reference Model (7) APDU PPDU SPDU TPDU Packet Frame Bits Application Presentation Session Transport Network Data Link Physical Physical: 1. Performs actual transmission of bits (0 or 1) over a communication medium such as twisted pair wire, cable, or optical fibre. 2. Design issues are largely electrical, mechanical, timing interfaces, and physical medium. Electrical: Deals with different bit representation such as what voltage is used to represent a 0 or a 1, what is the duration of the pulse, how the initial connection is established, how the connection is terminated, and so on. Mechanical: Socket type and number of pins in each socket. Medium: Compatibility issues between different mediums say a cable with optical fibre. To Transmission Medium 28

29 Critique of OSI 1. Bad Timing: Came too late. The competing TCP/IP was already widely in use (especially in research institutions) by the time OSI was standardized. 2. Bad Technology: Choice of seven layers was more political than technical. Two layers (session and presentation) are nearly empty while two layers (data link and network) are overfull and complex. 3. Bad Implementations: Initial implementations were huge and slow. Though the products improved later but the initial impression lingered on. 4. Bad Politics: OSI was widely perceived as an European product while many people thought of TCP/IP as an extension of Unix. 5. Bad Government Policy: Government support of OSI was thought of as an attempt to shove a technically inferior product down the throat of poor researchers (A. S. Tanenbaum). 29

30 TCP/IP Reference Model (1) Application Transport Internet Network Interface Application Layer: is similar to its counterpart in OSI except that it can bypass the layers and communicate directly with any layer. Transport Layer: 1. Similar in many respects to transport layer in OSI; Provides for communication between the peer entries at the source and destination. 2. Provides two end-to-end transport protocols: Transmission Control Protocol (TCP): Reliable connection oriented service. Source: segments the input stream, passes each one to the internet layer. Receiver: reassembles the received message,placing the segments in sequence and checking for an error. It is duty of TCP to ensure error-free transmission. User Datagram Protocol (UDP): Unreliable connectionless service. No sequencing or error control is done. 30

31 TCP/IP Reference Model (2) Application Transport Internet Network Interface Internet Layer: 1. is the linchpin holding TCP/IP together. 2. Allows hosts to injects packets (or datagrams) into the network and allow them to travel independently to the destination. 3. Packets may arrive out of order or in error. It is the job of the transport layer to correct for such problems. 4. Main job of the internet layer is to deliver IP packets and avoid congestion. 5. Uses the Internet Protocol (IP). Network Interface: 1. Is derived mainly from the network that TCP/IP connects. 2. In other words, TCP/IP allows networks to use their technology at the lowest level. TCP/IP provides a means of connecting them 31

32 TCP/IP Protocols: A list of protocols used in TCP/IP: Application DNS FTP SMTP HTTP Transport TCP UDP Internet IP Interface ARPANET SATNET Packet Radio LAN 32

33 Example: (1,1), s Server LAN (1,2), w Workstation (1,3), r Router (2,1) PPP (2,2) PC Infrastructure: 1. A LAN comprising of a server and a workstation is connected via a router to a PC. The connection between the router and PC is a point-to-point (PPP) connection. 2. Each machine on the LAN typically have two addresses: An IP address known globally An Ethernet address determined by its network interface card (NIC) 3. The router has as many addresses as the number of networks connected to it. IP Ether net Serve r (1,1) s Wstat ion (1,2) w Route r (1,3) r PC (2,2) Route r (2,1) 33

34 Example: Protocols: used for an HTTP request made by PC to server (1,1), s Server LAN Server / workstation HTTP PC HTTP TCP Router TCP IP IP IP (1,2), w Workstation Interface Interface Interface (1,3), r Router (2,1) Ethernet PPP PPP (2,2) PC 34

35 Example 1: Interaction on LAN Task: Transfer of an IP datagram from workstation to server 1. IP datagram contains source & destination addresses in header (1,1), s Server. (1,1) (1,2) Data LAN Header (1,2), w Workstation (1,3), r Router (2,1) 2. IP entity in the workstation looks at its routing table to see if an entry exits for the server IP address, (1,1). 3. Indeed it does, mapping IP address (1,1) to Ethernet address s. 4. IP datagram is passed to the Ethernet interface layer that prepares an Ethernet frame as follows. s w IP datagram C (2,2) PC PPP Header Checksum 5. Ethernet frame is broadcasted across the LAN 6. All on LAN except server rejects datagram. Server retrieves IP datagram by following (1-5) in reverse order. 35

36 Example 2: Interaction btw different networks (1) Task: Transfer of an IP datagram from server to PC 1. IP datagram contains source & destination addresses in header (1,1), s Server. (2,2) (1,1) Data LAN (1,2), w Workstation (1,3), r Router (2,1) Header 2. IP entity in the source looks at its routing table to see if an entry exits for the PC IP address, (2,2). 3. Answer to (2) is no. Server looks for the default entry which is that of the router with Ethernet address r. 4. IP datagram is passed to the Ethernet interface layer that prepares an Ethernet frame as follows. r s IP datagram C PPP Header Checksum 5. Ethernet frame is broadcasted across the LAN (2,2) PC 6. All on LAN except router rejects datagram. 36

37 Example 2: Interaction btw different networks (2) 7. The IP datagram is extracted by the Ethernet interface layer in the router and passed on the Internet layer. (1,1), s Server LAN (1,2), w Workstation (1,3), r Router (2,1). (2,2) (1,1) Data Header 8. The Internet layer extracts the destination IP address (2,2) and consults the routing table for a match. 9. The routing table shows that a PC with PPP protocol is connected directly to the router. 10. The IP datagram is encapsulated in a PPP frame and passed on to the PC. PPP header IP datagram C (2,2) PC PPP Checksum 11. The interface layer in the PC accepts the frame, extracts the IP datagram and passes it on to the Internet layer. 37

38 Example 3: HTTP application (1) (1,1), s Server LAN Task: Transfer of a request for a HTML document from PC to Server 1. For simplicity, assume a TCP connection is established between the server and PC (more on connections later). 2. HTTP request GET/infocom/index.html HTTP/1.0 is passed on to the TCP layer of PC that creates a TCP segment containing source port number (SP#) & client port number (CP#) (1,2), w Workstation. SP# CP# HTTP request (1,3), r Router (2,1) Header 3. TCP segment is passed to IP layer that creates an IP datagram. (1,1) (2,2) PF TCP segment PPP Header (2,2) PC where protocol field (PF) shows that upper layer has asked for the information. IP datagram passed on to interface layer. 38

39 Example 3: HTTP application (2) 4. Interface layer encapsulates the IP datagram into a PPP frame (1,1), s Server PPP header IP datagram C LAN (1,2), w Workstation (1,3), r Router (2,1) Checksum and sends the PPP frame to the router. 5. The IP datagram is extracted by the interface layer of the router and passed on to the Internet layer. The Internet layer extracts the destination address (1,1) and checks the routing table for a match. 6. Since a match exists, the Interface layer prepares an Ethernet frame encapsulating the IP datagram plus the Ethernet addresses in the header and broadcasts the Ethernet frame on the LAN. s r IP datagram C PPP Header Checksum (2,2) PC 39

40 Example 3: HTTP application (3) (1,1), s Server LAN 4. Interface layer of the Server compares the Ethernet address with the address on its network interface card (NIC). The address matches so the Ethernet frame is accepted. 5. A Checksum is performed to check for errors. In case of no errors, the IP datagram is extracted. (1,1) (2,2) PF TCP segment (1,2), w Workstation (1,3), r Router (2,1) Header and passed on to the Internet layer. 6. The Internet layer maps the IP address and sees that the IP datagram is meant for it. It extracts the TCP segment. SP# CP# HTTP request (2,2) PC PPP Header and passes it on to the TCP layer. 7. HTTP request GET/infocom/index.html HTTP/1.0 is extracted by TCP layer and passed on to specified port number. 40

41 Example 3: HTTP application (4) (1,1), s Server LAN 8. Recall that the protocol used by the Transport layer is TCP, which is a reliable connection-oriented protocol. An acknowledgment is therefore sent to the PC in exactly the same manner as the request was received. 9. The Application layer retrieves the HTML document and transmits it to the PC following steps (1-8) in reverse order. (1,2), w Workstation (1,3), r Router (2,1) PPP (2,2) PC 41

42 Common IP Utilities (1) PING: used to determine whether a host is online. >> ping Pinging ece.cmu.edu [ ] with 32 bytes of data: Reply from : bytes=32 time=42ms TTL=241 Reply from : bytes=32 time=41ms TTL=241 Reply from : bytes=32 time=41ms TTL=241 Reply from : bytes=32 time=41ms TTL=241 Ping statistics for : Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 41ms, Maximum = 42ms, Average = 41ms IPCONFIG (only on Windows): used to display the TCP/IP information about the local host. >> ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific DNS Suffix. : cs.yorku.ca IP Address : Subnet Mask : Default Gateway :

43 Common IP Utilities (2) TRACEROUTE (TRACERT on Windows): used to trace the route between the source and the destination. >> tracert Tracing route to WEB3.ANDREW.cmu.edu [ ] over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms gateway-90.cs.yorku.ca [ ] 2 <1 ms <1 ms <1 ms mosquito.gw.yorku.ca [ ] 3 <1 ms <1 ms <1 ms gladiator.gw.yorku.ca [ ] 4 <1 ms <1 ms <1 ms ORION-YORK-RNE.DIST1-TORO.IP.orion.on.ca [ ] 5 1 ms <1 ms <1 ms BRDR2-TORO-GE2-2.IP.orion.on.ca [ ] 6 25 ms 1 ms 1 ms c4-tor01.canet4.net [ ] 7 11 ms 11 ms 13 ms abilene-chinng.canet4.net [ ] 8 27 ms 27 ms 27 ms nycmng-chinng.abilene.ucaid.edu [ ] 9 32 ms 32 ms 32 ms washng-nycmng.abilene.ucaid.edu [ ] ms 41 ms 41 ms beast-abilene-p3-0.3rox.net [ ] ms 41 ms 41 ms bar-beast-ae1-0.3rox.net [ ] ms 42 ms 42 ms cmu-i2.3rox.net [ ] ms 42 ms 41 ms CORE0-VL501.GW.CMU.NET [ ] ms 41 ms 42 ms CYH-A100-VL1000.GW.CMU.NET [ ] 43

44 Common IP Utilities (3) NETSTAT: provides the TCP/IP network status of the local machine. >> netstat s (s stands for protocol statistics option. With s option IP, ICMP, UDP, and TCP statistics are provided. Only IP and ICMP statistics below. ) IPv4 Statistics Packets Received = Received Header Errors = 0 Received Address Errors = 524 Datagrams Forwarded = 0 Unknown Protocols Received = 0 Received Packets Discarded = Received Packets Delivered = Output Requests = Routing Discards = 0 Discarded Output Packets = 0 Output Packet No Route = 0 Reassembly Required = 0 Reassembly Successful = 0 Reassembly Failures = 0 Datagrams Successfully Fragmented = 0 Datagrams Failing Fragmentation = 0 Fragments Created = 0 ICMPv4 Statistics Received Send Messages Errors 0 0 Destination Unreachable Time Exceeded Parameter Problems 0 0 Source Quenches 0 0 Redirects 0 0 Echos Echo Replies Timestamps 0 0 Timestamp Replies 0 0 Address Masks 0 0 Address Mask Replies

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

How To Understand The Layered Architecture Of A Network

How To Understand The Layered Architecture Of A Network COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Layered Architectures and Applications

Layered Architectures and Applications 1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Protocol Architecture

Protocol Architecture Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Professor of CIS Columbus, OH 43210 Jain@cse.ohio-state.edu http://www.cse.ohio-state.edu/~jain/cis677-98/ 1B-1 Data Communication vs Networking q Communication: Two Nodes. Mostly

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

How To Design A Layered Network In A Computer Network

How To Design A Layered Network In A Computer Network A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Module 1. Introduction. Version 2 CSE IIT, Kharagpur Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Module 1: Reviewing the Suite of TCP/IP Protocols

Module 1: Reviewing the Suite of TCP/IP Protocols Module 1: Reviewing the Suite of TCP/IP Protocols Contents Overview 1 Lesson: Overview of the OSI Model 2 Lesson: Overview of the TCP/IP Protocol Suite 7 Lesson: Viewing Frames Using Network Monitor 14

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

The TCP/IP Reference Model

The TCP/IP Reference Model The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

IP addressing and forwarding Network layer

IP addressing and forwarding Network layer The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Subnetting,Supernetting, VLSM & CIDR

Subnetting,Supernetting, VLSM & CIDR Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe

More information

TCP/IP Protocol Suite. Marshal Miller Chris Chase

TCP/IP Protocol Suite. Marshal Miller Chris Chase TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

PART OF THE PICTURE: The TCP/IP Communications Architecture

PART OF THE PICTURE: The TCP/IP Communications Architecture PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

TCP/IP Network Essentials. Linux System Administration and IP Services

TCP/IP Network Essentials. Linux System Administration and IP Services TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Ethernet and IP A slightly less introductory networking class. Drew Saunders Networking Systems Stanford University

Ethernet and IP A slightly less introductory networking class. Drew Saunders Networking Systems Stanford University Ethernet and IP A slightly less introductory networking class Drew Saunders Networking Systems Stanford University Goals of Class Slightly more in-depth knowledge of Ethernet. Internet Protocol, TCP, UDP,

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Network Models and Protocols

Network Models and Protocols 669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols

More information

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture

More information

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

1 Introduction to mobile telecommunications

1 Introduction to mobile telecommunications 1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

THE TCP/IP PROTOCOL SUITE

THE TCP/IP PROTOCOL SUITE CHAPTER 1 Protocols and Layers 25 a truck or plane. It sounds like a very complicated way to deliver one message, but this system makes the overall task of delivering many messages easier, not harder.

More information

Unix System Administration

Unix System Administration Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,

More information

Data Communications and Networking Overview

Data Communications and Networking Overview Data Communications and Networking Overview Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 2-1

More information

Network Programming TDC 561

Network Programming TDC 561 Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Homework 3 TCP/IP Network Monitoring and Management

Homework 3 TCP/IP Network Monitoring and Management Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents Unit 4 Introduction to TCP/IP Overview Description This unit contains one lesson: This lesson will introduce protocols in general. You will look at how a protocol functions, the differences between a routable

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

CSCI 362 Computer and Network Security

CSCI 362 Computer and Network Security The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,

More information

ELEC3030 Computer Networks

ELEC3030 Computer Networks ELEC3030 Computer Networks Professor Sheng Chen: Building 86, Room 1021 E-mail: sqc@ecs.soton.ac.uk Download lecture slides from: http://www.ecs.soton.ac.uk/ sqc/el336/ or get them from Course Office (ECS

More information

The OSI Model and the TCP/IP Protocol Suite

The OSI Model and the TCP/IP Protocol Suite The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer

More information

Instructor Notes for Lab 3

Instructor Notes for Lab 3 Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in

More information

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP.

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP. Advanced TCP/IP Overview There is one primary set of protocols that runs networks and the Internet today. In this lesson, you will work with those protocols: the Transmission Control Protocol (TCP) and

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

Introduction to Analyzer and the ARP protocol

Introduction to Analyzer and the ARP protocol Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

524 Computer Networks

524 Computer Networks 524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

Basic Operation & Management of TCP/IP Networks

Basic Operation & Management of TCP/IP Networks Basic Operation & Management of TCP/IP Networks SYSTEMS, Inc. For the MU-SPIN Coordination Office Slide 1 Presentation Contents Introduction to the Internet, Protocols and TCP/IP IP addressing, Name Resolution

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information