LAN Protocols. Learning Objectives. What is a protocol? Explain how the most used LAN protocols work.

Similar documents
Ethernet. Ethernet. Network Devices

Transport Layer Protocols

Transport Layer. Chapter 3.4. Think about

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Networking Test 4 Study Guide

Overview of TCP/IP. TCP/IP and Internet

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Computer Networks. Chapter 5 Transport Protocols

Objectives of Lecture. Network Architecture. Protocols. Contents

TCP/IP and the Internet

Chapter 11. User Datagram Protocol (UDP)

How do I get to

IP - The Internet Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Transport and Network Layer

Solution of Exercise Sheet 5

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)

PART OF THE PICTURE: The TCP/IP Communications Architecture

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Network Programming TDC 561

Lecture Computer Networks

Chapter 5. Transport layer protocols

8.2 The Internet Protocol

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

[Prof. Rupesh G Vaishnav] Page 1

Internet Architecture and Philosophy

TCP Performance Management for Dummies

The TCP/IP Reference Model

IP Subnetting and Addressing

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Internet Protocols. Background CHAPTER

Protocols. Packets. What's in an IP packet

Introduction to TCP/IP

Computer Networks UDP and TCP

(Refer Slide Time: 02:17)

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Computer Networks/DV2 Lab

Chapter 9. IP Secure

IP address format: Dotted decimal notation:

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services

Module 7 Internet And Internet Protocol Suite

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP.

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

The OSI and TCP/IP Models. Lesson 2

Networks: IP and TCP. Internet Protocol

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Computer Networks/DV2 Lab

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

LESSON Networking Fundamentals. Understand TCP/IP

Internet Control Protocols Reading: Chapter 3

The OSI Model and the TCP/IP Protocol Suite

User Datagram Protocol - Wikipedia, the free encyclopedia

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Network Security TCP/IP Refresher

Understanding Layer 2, 3, and 4 Protocols

Network layer: Overview. Network layer functions IP Routing and forwarding

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Protocols and Architecture. Protocol Architecture.

La couche transport dans l'internet (la suite TCP/IP)

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

CS335 Sample Questions for Exam #2

What is a DoS attack?

Vorlesung Kommunikationsnetze Research Topics: Protocol Family for Control Data Communication in Heterogeneous Network Environments

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Technical Support Information Belkin internal use only

How To Design A Layered Network In A Computer Network

CPS221 Lecture: Layered Network Architecture

Cisco Configuring Commonly Used IP ACLs

8-bit Microcontroller. Application Note. AVR460: Embedded Web Server. Introduction. System Description

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Kap. 2. Transport - Schicht

RARP: Reverse Address Resolution Protocol

Effect of Packet-Size over Network Performance

Lecture 28: Internet Protocols

q Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user

Access Control: Firewalls (1)

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Firewall Implementation

Introduction to IP networking

Distinct. Network Monitor. User s Guide

High Performance VPN Solutions Over Satellite Networks

EXPLORER. TFT Filter CONFIGURATION

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Network Layer: Network Layer and IP Protocol

DEVELOPING A WEB-BASED PACKET MONITORING TOOL

NETWORK LAYER/INTERNET PROTOCOLS

NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC

Transcription:

LAN Protocols (Week 3, Wednesday 9/10/2003) Abdou Illia, Fall 2003 1 Learning Objectives Explain how the most used LAN protocols work. TCP UDP IP 2 What is a protocol? Set of rules that govern data communication over a network Examples of protocols: Transmission Control Protocol (TCP), Internet Protocol (IP), Simple Mail Transfer Protocol (SMTP) Examples of protocol suites: TCP/IP IPX/SPX NetBEUI 3

Protocols in Windows 98 Network Dialog box in Windows 98 Figure 2.14: Network Dialog Box in Windows 98 Properties Button 4 TCP/IP protocol suite A suite of protocols rather than a protocol Protocol suite that govern data communication on the Internet Designed for use with wide range of network devices Main protocol of most computer operating systems Many troubleshooting and network analysis tools Understood by a large body of network professionals 5 continued 6

7 TCP/IP and Layered Communications Application HTTP req. req. Transport HTTP req. req. TCP-H Internet HTTP req. req. TCP-H IP-H IP-H Data Link DL-T HTTP req. req. TCP-H IP-H IP-H DL-H User Physical Q1: What are Transport layer messages called when TCP is used? Q2: What are Internet/Network layer messages called when UDP is used? 8 How TCP Works Establishes communication sessions between networked computers Provides reliable end-to-end delivery of data by controlling data flow Sequencing and acknowledging frames 9

TCP TCP Segment Bit 0 Bit 31 Source Port Number (16 bits) Destination Port Number (16 bits) Sequence Number (32 bits) Acknowledgment Number (32 bits) Header Length (4 bits) Reserved Flag Fields (6 bits) (6 bits) TCP Checksum (16 bits) Options (if any) Data Field Window Size (16 bits) Urgent Pointer (16 bits) Padding Flag fields are one-bit fields. They include SYN, ACK, FIN and RST. 10 TCP Segment Source Port Number and Dest. Port Number: Well-Known port number for server applications (See slide # 27) or Ephemeral port number (>1024 and < 65535) for client applications. Sequence Number: 32-bit sequential number for the frame. Enables TCP to ensure that all frames are received. Used to place frames back correct order. Acknowledgement Number: Number sent in ACK message to acknowledge frame reception. If ACK message not sent for a frame, frame is retransmitted. Header Length (Offset): Indicates the length of the header. Flag Fields: Used to identify the kind of TCP segment: SYN (Synchronization) for opening a connection, ACK (Acknowledgement) to acknowledge frame reception, FIN to close a connection. Used for control: RST (Reset) for an abrupt close, FLW (Flow control) to control transmission flow. Window Size: Indicates number of bytes to be transmitted before sender receives an ACK of receipt. When Window Size is reached Flow control is turned on to stop transmission until ACK is received. Checksum: 16-bit cyclic redundancy check computed based on values in all fields and placed in the frame by sending node. 11 TCP Segment Urgent Pointer: Provides a warning to the receiver that urgent data is coming. Also points to the end of the urgent data in the sequence. Options: Can hold additional information and flags about a transmission. Padding : Used when there is too little or no optional data to complete the required header length, which must be divisible by 32. 12

TCP Time Diagram 1. SYN (Open) Open 2. SYN, ACK (1) (Acknowledgement of 1) 3. ACK (2) 3-Way Open TCP is a Connection-Oriented Protocol 13 TCP Time Diagram Acknowledgements Each correct TCP segment is acknowledged (ACK), except for pure acknowledgements and resets Sender listens to be sure that each TCP segment is acknowledged If a segment is not acknowledged in a reasonable period of time, the sender resends it TCP is a reliable protocol 14 TCP Time Diagram Open (3) After Opening, Data are Transferred 1. SYN (Open) 2. SYN, ACK (1) (Acknowledgement of 1) 3. ACK (2) Carry HTTP Req & Resp (4) 4. Data = HTTP Request 5. ACK (4) 6. Data = HTTP Response 7. ACK (6) 15

TCP Time Diagram After Opening, Data are Transferred 8. Data = HTTP Request (Error) 9. Data = HTTP Request (No ACK so Retransmit) Carry HTTP Req & Resp (4) 10. ACK (9) 11. Data = HTTP Response 11. ACK (11) Q3: Is TCP a reliable protocol? Why? Q4: If there is an error in the transmission, which Transport process retransmits the damaged segment? 16 TCP Time Diagram Close (4) 12. FIN (Close) 13. ACK (12) 14. FIN 15. ACK (14) 4-Way Close is Normal 17 UDP Connectionless alternative to TCP that yields a lower overhead, but is less reliable Relies only on checksum to ensure reliability Handles and transmits data faster; performs no flow control, sequencing, or acknowledgment 18

UDP Datagrams UDP Datagram Bit 0 Bit 31 Sequence Port Number (16 bits) UDP Length (16 bits) Data Field Destination Port Number (16 bits) UDP Checksum (16 bits) 19 UDP Datagram UDP Datagram Connectionless and Unreliable Places a Lighter Load on the Network than TCP Useful Where the Loss of an Occasional Application Message is Not a Serious Problem As in Regular Network Status Messages Or Where There is No Time for Retransmission, As in Voice Transmission 20 TCP Versus UDP Layer Message name Processing power required Reliability Connections? TCP Transport TCP segment Heavyweight Reliable Connection-oriented UDP Transport UDP datagram Lightweight Unreliable Connectionless Q5: What protocol allows the sender to identify the Destination port number? 21

IP Enables packets to reach a destination on a local or remote network by using IP addresses Used in combination with TCP or UDP 22 IP 0100 IP Version 4 Packet Bit 0 Bit 31 Version (4 bits) Header Length (4 bits) Identification (16 bits) Time to Live (8 bits) Type of Service (8 bits) Total Length (16 bits) Flags Fragment Offset (13 bits) Protocol (8 bits) 1=ICMP, 6=TCP, Header Checksum (16 bits) 17=TCP Source IP Address (32 bits) Destination IP Address (32 bits) Options (if any) Padding Data Field 23 IPv4 Packets Version Has value of four (0100) Time to Live (TTL) Value is set by sender Decremented by one by each router along the way If reaches zero, router throws packet away Prevents the endless circulation of misaddressed packets 24

IPv4 Packets Protocol Identifies contents of data field 1 = ICMP 6 = TCP 17 =UDP Address Fields 32 bits long, of course Data Field ICMP, TCP, or UDP Message IP Header 25 Other slide 26 Port Numbers Port Number 20 23 25 53 80 139 From 172.171.18.22:20247 To: 172.168.17.13:80 Application (Service) File Transfer (FTP) Telnet applications (Telnet) E-mail (SMTP) DNS server applications Webservice (HTTP) NetBIOS applications From Ephemeral Port 20247 To Well-Known Port 80 Client 172.171.18.22 From 172.168.17.13:80 To: 128.172.18.22:20247 172.168.17.13 Port 80 From 172.171.18.22:19345 To: 1172.30.17.13:25 SMTP Server 172.30.17.13 Port 25 27