Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods



Similar documents
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Transport and Network Layer

Computer Networks CS321

SSVVP SIP School VVoIP Professional Certification

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Internet Protocols. Background CHAPTER

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Networking 4 Voice and Video over IP (VVoIP)

8.2 The Internet Protocol

Introduction to IP v6

Review: Lecture 1 - Internet History

SSVP SIP School VoIP Professional Certification

IPv6 Fundamentals: A Straightforward Approach

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

The Internet. Internet Technologies and Applications

TCP/IP Basis. OSI Model

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Chapter 1 Personal Computer Hardware hours

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

The OSI and TCP/IP Models. Lesson 2

Networking Technology Online Course Outline

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

IP - The Internet Protocol

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Overview of TCP/IP. TCP/IP and Internet

Internetworking and IP Address

10CS64: COMPUTER NETWORKS - II

HP VSR1000 Virtual Services Router Series

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Internetworking. Problem: There is more than one network (heterogeneity & scale)

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Network Configuration Settings

Basic Network Configuration

How To Design A Layered Network In A Computer Network

Technical Support Information Belkin internal use only

6LoWPAN Technical Overview

Network Security TCP/IP Refresher

Address Resolution Protocol (ARP)

CSCI 362 Computer and Network Security

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Data Communication Networks and Converged Networks

Introduction to TCP/IP

Networks University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

Ethernet. Ethernet. Network Devices

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Interconnecting Cisco Networking Devices Part 2

Prefix COMP Course# 429 Title Computer Networks Units (3) 3 hours lecture per week 3 hours lecture per week

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Interconnecting Cisco Network Devices 1 Course, Class Outline

How To Learn Cisco Cisco Ios And Cisco Vlan

Assignment 6: Internetworking Due October 17/18, 2012

IP Addressing A Simplified Tutorial

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Designing and Developing Scalable IP Networks

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

User Datagram Protocol - Wikipedia, the free encyclopedia

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Chapter 12 Supporting Network Address Translation (NAT)

CSE 3214: Computer Network Protocols and Applications

Communication Networks MAP-TELE 2012/13

Network Programming TDC 561

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Networking Basics and Network Security

(d-5273) CCIE Security v3.0 Written Exam Topics

finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...

"Charting the Course...

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst

Layered Architectures and Applications

2. IP Networks, IP Hosts and IP Ports

The OSI Model and the TCP/IP Protocol Suite

How To Understand And Understand Network Theory

Table of Contents. Index. Search the text of TCP/IP Network Administration. Symbols A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Communications and Computer Networks

Protocols and Architecture. Protocol Architecture.

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

ProCurve Networking IPv6 The Next Generation of Networking

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

TCP/IP Network Essentials. Linux System Administration and IP Services

Cisco Configuring Commonly Used IP ACLs

Objectives of Lecture. Network Architecture. Protocols. Contents

How do I get to

Industry Automation White Paper Januar 2013 IPv6 in automation technology

Firewalls und IPv6 worauf Sie achten müssen!

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

: Interconnecting Cisco Networking Devices Part 2 v1.1

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Transcription:

The Internet and its Protocols Protocol Specification & Design Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???) Course Information Course conducted in English Everything in English But: This is NOT an English class The qualify of student s English is not relevant to the course, or to the student s results. Interactive Classes Students MUST talk! Do not attempt to copy down the contents of the slides, Everything will eventually appear on the Web. Previous years slides there now Course Outline (trivia) Introduction to the Subject Teaching Methods Lectures Books Assignments Exams

Course Outline (intro) Introduction to Protocols What is a Protocol? ISO Reference Model Addressing Multiplexing Course Outline Aspects of Protocol design Correctness Scaling Adaptability Case Studies Internet Protocols Course Outline (IP intro) Internet Protocol Suite Examples of Internet Applications & their protocol stacks SMTP TFTP HTTP (& SSL) SNMP NFS

Course Outline (Link) Link Layers LAN addressing Unicast, Broadcast, Multicast Repeaters, Bridges, Switches, Routers Course Outline (IP) IP The IP Header IP Addresses History & Development IPv6, IPv6 Addressing, IPv6 Header Course Outline (ICMP) ICMP Its Uses ICMPv6 IPv6 Autoconfiguration DHCP DHCPv6

Course Outline (Forwarding) Packet Forwarding Forwarding Tables ARP (Address Resolution Protocol) Neighbour Discovery (IPv6) Link Layer Limitations Course Outline (PMTU) PMTU Path Maximum Transmission Unit PMTU Discovery Fragmentation and Reassembly Course Outline (UDP) Overview of Internet Transport Protocols Transport Addressing UDP (User Datagram Protocol) The Protocol Applications

Course Outline (TCP) TCP (Transmission Control Protocol) Lost Packets Duplicate Packets Erroneous Packets Recovery Acknowledgments Retransmission Course Outline (TCP2) TCP (continued) Sliding Window One way data flow Two way data flow Network Congestion Detection Recovery Course Outline (TCP3) TCP (continued) Connection Establishment 3-way handshake Problem of graceful termination Old duplicate packets

Course Outline Review of UDP & its applications Error Recovery T/TCP Review of the underlying protocols Course Outline (Names) Naming and Addressing The Domain Name System DNS Protocols DNS Name tree Mapping Addresses to Names Course Outline (Directories) Well Known Names Well Known Ports Service Location Directory Services LDAP (Lightweight Directory Access Protocol)

Course Outline (Apps) Some Internet Applications Brief History of Human Computer Interaction The TELNET Protocol NETASCII FTP SMTP HTTP DHCP Communicating without addresses Course Outline (RPC) Remote Procedure Calls NFS (Network File System) Associated protocols The Portmapper Course Outline (Routing) Routing Protocols IGPs vs EGPs Interior Gateway Protocols Exterior Gateway Protocols Distance Vector Protocols RIP RIPv2 RIPng Link State Protocols OSPF BGP4 Policy Routing

Course Outline (Management) Network Management SNMP - Simple Network Management Protocol MIBs - Management Information Bases Course Outline (Security) Network Security IPsec SSL HTTP & SSL Public Key Encryption Secure E-Mail Non-security Security mechanisms Reserved Ports Course Outline (Firewalls) Firewalls Purposes and Limitations Network Address Translation (NAT) Its Limitations Its effects upon the Internet assumptions

Course Outline (Multicast) Multicast IP Multicast Packet Forwarding Multicast Applications Multicast Routing DVMRP PIM Dense Mode Sparse Mode Course Outline (Conclusion) Summary of the Protocols Overview of Protocol Design Review of the Course Course Style Take a selected Protocol Find out what it is supposed to do How it does that And why - how it got to be that way How it is specified Why is it specified that way Does it work properly? Always? Is the specification complete? How do we know? What could be improved? Always ask WHY?

Books W. Richard Stevens TCP/IP Illustrated (3 Volumes, Vols 1 & 3 most relevant) Douglas Comer Internetworking with TCP/IP, Vol 1 (Also Vol 2 - variants for ANSI C, BSD, Linux, SvR4, AT&T TLI, Windows,...) Christian Huitema IPv6, The New Internet Protocol Christian Huitema Routing in the Internet Books Radia Perlman Interconnections: Bridges, Routers, Switches, and Internetworking Protocols Cheswick & Bellovin Firewalls and Internet Security Kaufman, Perlman & Speciner Network Security: Private Communication in a Public World Mohamed G Gouda Elements of Network Protocol Design Assessment To be advised later Mid-semester Test (~20%) Final Exam (~50%) Project (assignment) (~30%)???

Protocols A mechanism for agreeing HOW to communicate NOT concerned with WHAT is to be communicated BUT different protocols for different communications What is data to one protocol is control information to another Protocols (cont) Rules for: How to begin communication How to carry on communication Sequencing Ending communication Protocol Specification Text English, or... State Machines Grammars Formal specification methods

ISO Reference Model 7 6 1 2 3 4 5 Application Presentation Session Transport Network Link Physical NOTE: This is a MODEL Data Exchange Model 6 7 Application Presentation 6 7 Application Presentation 5 Session 5 Session 4 3 Transport Network 3 4 Transport Network 2 Link 2 Link 1 Physical 1 Physical Apparent Data Flow Logical Data Flow Actual Data Transfer NOTE: This is a MODEL The Model Layers: Physical Wires (sometimes) Currents & Voltages (sometimes) Plugs and Connectors

The Model Layers: Link Node to Node communications (apparently direct) Uses Physical Layer to move bits May have addressing Usually has error detection Occasionally has error recovery The Model Layers: Network Node to Node communications (indirect) Network Connections Physical / Link Layer Connections The Model Layers: Network Uses Link Layer to transfer bits (usually bytes/octets) Follows Path: From End System ( to Intermediate System )... ( to Intermediate System ) To End System Always uses addressing Relies upon forwarding Forwarding uses routing Usually has error detection Sometimes has error recovery

The Model Layers: Transport Application to Application ie: a process on one node to a process on (another) node Always uses addressing Usually has error detection Usually has error recovery Usually has sequencing/duplicate elimination/flow control The Model Layers: Session Continuous Transport Recovers broken transport connections Multiplexing Multiple sessions on one transport connection Multiple transport connections for one session Connection Recovery checkpoints The Model Layers: Presentation Data Encoding Rules How are numbers represented Data typing

The Model Layers: Application All the "useful" work The part the users see. NOTE: All the above is a MODEL Protocol Specification Text English, or... State Machines Grammars Formal specification methods Addresses Identify the location of a node Often contain many levels of information cf: a postal address Person Name Number and Street Town [Province/State] Country

Addresses (cont) Person Name Number and Street Town [Province/State] Country Person Name not used by the post office it is not part of the address that they use. The address is hierarchical distant post offices notice only the country nearer ones look at the town as well and even nearer ones, the street delivery person uses street number Not necessarily strictly hierarchical can skip steps Addresses (cont) Note Distinguish where an addresses references from the path used to reach the address Some Possible Paths Links Addresses (cont) Network Addresses represented by bit patterns Not unusual for computer data! Bits usually represented as numbers (decimal or hexadecimal) Different protocols different address forms Different layers different address forms Often a higher layer uses a lower layer s address With something extra added

The Internet Protocols Applications (many) Transport TCP UDP T/TCP 5 6 7 4 IGMP ICMP I P 3 Link Physical (many) (many) 2 1 Internet Examples (SMTP) Simple Mail Transfer Protocol RFC821 RFC2821 SMTP TCP I P Link (many) Physical (many) Internet Examples (TFTP) Trivial File Transfer Protocol RFC1350 TFTP UDP I P Truly a trivial protocol Get me block N of file named X No authentication In fact, nothing...

Internet Examples (HTTP) Hyper Text Transfer Protocol HTTP SSL TCP I P Optional Secure Socket Layer (Encryption) Internet Examples (SNMP) Simple Network Management Protocol SNMP ASN.1 UDP I P Anything but simple... Uses Abstract Syntax Notation One (ASN.1) a presentation layer Internet Examples (NFS) Network File System NFS XDR RPC UDP TCP Uses External Data Representation (XDR) presentation layer Uses Remote Procedure Calls (RPC) session layer Originally used UDP now optionally uses TCP I P