EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst



Similar documents
The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

The OSI and TCP/IP Models. Lesson 2

Protocol Data Units and Encapsulation

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Ethernet. Ethernet. Network Devices

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

Chapter 9. IP Secure

The OSI Model and the TCP/IP Protocol Suite

Chapter 11. User Datagram Protocol (UDP)

Network Layer: Network Layer and IP Protocol

CS335 Sample Questions for Exam #2

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Networking Test 4 Study Guide

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Objectives of Lecture. Network Architecture. Protocols. Contents

Overview of Computer Networks

CPS221 Lecture: Layered Network Architecture

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Protocol Architecture

Transport Layer. Chapter 3.4. Think about

Protocols and Architecture. Protocol Architecture.

Access Control: Firewalls (1)

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Transport and Network Layer

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Data Communication and Computer Network

Data Communication Networks and Converged Networks

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Network layer: Overview. Network layer functions IP Routing and forwarding

RARP: Reverse Address Resolution Protocol

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Internet Packets. Forwarding Datagrams

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

The OSI Model: Understanding the Seven Layers of Computer Networks

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Module 7 Internet And Internet Protocol Suite

Lecture 28: Internet Protocols

Computer Networks CS321

How To Understand The Layered Architecture Of A Network

Lecture Computer Networks

Internet Architecture and Philosophy

IP - The Internet Protocol

THE TCP/IP PROTOCOL SUITE

21.4 Network Address Translation (NAT) NAT concept

ELEC3030 Computer Networks

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

6LoWPAN Technical Overview

Communication Networks. MAP-TELE 2011/12 José Ruela

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Zarządzanie sieciami telekomunikacyjnymi

Protocol Security Where?

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Transport Layer Protocols

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internet Protocol: IP packet headers. vendredi 18 octobre 13

OPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Network Programming TDC 561

Architecture and Performance of the Internet

Layered Architectures and Applications

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

SUPPORT DE COURS. Dr. Omari Mohammed Maître de Conférences Classe A Université d Adrar Courriel : omarinmt@gmail.com

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Mathatma Gandhi University

The Network Layer Functions: Congestion Control

8.2 The Internet Protocol

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Internet Protocols. Background CHAPTER

UPPER LAYER SWITCHING

Network Security TCP/IP Refresher

Communications and Computer Networks

ICTTEN8195B Evaluate and apply network security

IP address format: Dotted decimal notation:

CS101 Lecture 19: Internetworking. What You ll Learn Today

PART IV. Network Layer

WAN Data Link Protocols

Lecture 8. IP Fundamentals

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

Network Models and Protocols

Encapsulating Voice in IP Packets

NETWORK LAYER/INTERNET PROTOCOLS

Network Models OSI vs. TCP/IP

A PPENDIX L TCP/IP and OSI

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

Overview of TCP/IP. TCP/IP and Internet

IP addressing and forwarding Network layer

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

technology standards and protocol for ip telephony solutions

TCP/IP Basis. OSI Model

Network Address Translation (NAT)

The TCP/IP Reference Model

Transcription:

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for example web surf. Internet 2

Internetworking Therefore, we need protocols and mechanisms for sending data across networks of different types. LAN LAN LAN LAN 3

Link protocols are not enough 4

Addressing and routing We need an address system that is universal for all networks. This is called the network address. We need rules for how data is forwarded from network to network to the destination. This is called routing. We need network entities that are connected to several networks and can forward data between networks. These entities are called routers. 5

Network protocol Therefore, we need a universal network protocol that handles the connection across networks. source destination Application Application Network Network protocol router Network Network protocol Network Link Link Link PHY PHY PHY 6

Host-to-host delivery 7

Datagram networks In this course, we basically only consider packet switched datagram networks, where each packet is treated independently of all others. 4 3 2 1 3 1 4 1 2 2 4 1 3 2 3 4 1 8

Transmission delay Each router has buffers so that packets can be stored when waiting for service. The end-to-end transmission delay includes both waiting time and transmission time on links. 9

One network protocol: IP Internet protocol (IP) is the only network protocol used in the Internet. Addressing with IP addresses Example: 130.235.18.158 (IPv4) Data is sent as IP packets (or datagrams) Datagram delivery Checksum used but no Error control or Flow control. 10

IP addresses (IPv4) Every host and router that are connected to the Internet have a unique network address (IP address) that is 32 bits long. The address is usually written in a dotted-decimal format. 11

Routing table Each router has a table with information about the next hop. The routing decision is based on the destination address. The source and destination address are included in the packet header. 12

Routing algorithm Routing tables are updated using a routing algorithm. The general idea is to find the route with the least cost between source and destination. Note: The networks between the routers are only represented as costs. 13

Transport protocol Each client computer may have several applications running. Therefore, you need a protocol that handles the end-to-end control for each application. This protocol is called the Transport Protocol. The main objective of the Transport protocol is to ensure that the data is transmitted from source to destination applications. 14

Transport protocol application transport network link PHY Application protocol Transport protocol application transport network link PHY 15

Process-to-process delivery 16

Logical end-to-end connection The transport protocol creates a logical (virtual) connection between source and destination. 17

Function of transport protocol The transport protocol encapsulates the data from the application and ensures that it is sent to the correct receiving application where the data is decapsulated. 18

Port numbers The transport protocol uses port numbers (addresses) for separating applications.

Socket address The IP address + port number becomes the socket address. 20

IP addresses versus port numbers 21

Multiplexing of applications Also, the transport protocol multiplexes and demultiplexes data from/to different applications. 22

A Transport protocol: TCP Transmission Control Protocol (TCP) is one of the transport protocols used in the Internet. Provides a connection-oriented service with error and flow control. TCP uses a Go-back-N ARQ algorithm for error control. 23

Connection-oriented service Packet 2 24

A Transport protocol: UDP User Datagram Protocol (UDP) is another transport protocol used in the Internet. UDP provides a connectionless service without error or flow control. 25

Connectionless service 26

Layered protocol models By using layers of protocols, the development process becomes easier since each protocol has specific tasks. The development of new applications also becomes much easier since they don t have to know that much of the underlying network infrastructures or protocols. 27

The OSI model In the middle of the 70s, the standardisation organisation ISO started work on a standard that should cover all aspects of network communication. In 1983, the Open System Interconnection (OSI) model was presented. The OSI model has since then been used as a framework for the design of network systems. 28

The OSI-model 29

Protocol interaction in several layers 30

Physical layer The physical layer is responsible for movements of individual bits from one hop (node) to the next. 31

Data link layer The data link layer is responsible for moving frames from one hop (node) to the next. 32

Network layer The network layer is responsible for the delivery of individual packets from the source host to the destination host. 33

Transport layer The transport layer is responsible for the delivery of a message from one process to another. 34

Session layer The session layer is responsible for dialog control and synchronization. 35

Presentation layer The presentation layer is responsible for translation, compression, and encryption. 36

Application layer The application layer is responsible for providing services to the user. 37

Connecting devices (1) Sender Application Data Protocol Receiver Application Presentation Presentation Session Session Transport Transport Network Link Physical Switch Link PHY PHY Network Link Physical 38

Switches are used within a network 39

Connecting devices(2) Sender Application Data Protocol Receiver Application Presentation Presentation Session Session Transport Network Router Network Transport Network Link Link Link Link Physical PHY PHY Physical 40

Routers are used between networks using the same network protocol IP network IP network 41

Connecting devices (3) Sender Application Data Gateway Application Receiver Application Presentation P. P. Presentation Session S. S. Session Transport T. T. Transport Network Net Net Network Link Link Link Link Physical PHY PHY Physical 42

Gateways are used between networks of different types (However, the definition is not really clear) IP-network Mobile network 43

So what happens with the data? Assume that the sender application wants to send a message to a receiver. What happens with this message in the different protocol layers on the way to the destination? Network 1 router Network 2 44

The sender side application transport network NH S AH S TH S AH S AHS TH S link LH S NH S TH S AH S PHY 11010101100011100011... 45

Switches A switch changes the link header so that it fits the next link. To outgoing link LH X NH S TH S AH S New link header LH S NH S TH S AH S Old link header 11010101100... PHY 46

Routers A Router handles both the link and network protocol. To next network NH Z TH S AH S LH U NH S TH S AH S LH X New headers Old headers 11010101100... PHY 47

The receiver side application AH S transport TH S AH S network NH Z TH S AH S link NH Z LH U TH S AH S PHY 110100111011000011... 48

Layered data communication 49

Fragmentation If data from an upper layer cannot fit in one data packet, the data is fragmented (according to some prespecified rules) Layer 1 H1 data Layer 2 H2 H1+data H2 data 50

Reassembly At the receiver side the data is reassembled. Layer 1 H1 data Layer 2 H2 H1+data H2 data 51

Maximum transfer unit (MTU) A protocol may define a Maximum Transfer Unit (MTU) that specifies the maximum length of the payload that can be encapsulated. Example: 52