html5-img
1 / 148

TCOM 509: TCP/IP - Internet Protocols

TCOM 509: TCP/IP - Internet Protocols. Instructor: Scott T. Tran. * Obtained permission to use Raj Jain’s technical material. Understand concept of datagram processing and delivery (layering and encapsulation) Understand the client-server model as applied to networking

hallam
Télécharger la présentation

TCOM 509: TCP/IP - Internet Protocols

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TCOM 509:TCP/IP - Internet Protocols Instructor: Scott T. Tran * Obtained permission to use Raj Jain’s technical material

  2. Understand concept of datagram processing and delivery (layering and encapsulation) Understand the client-server model as applied to networking Understand IP Addressing and Subnet Masking Schemes (CIDR/VLSM) Understand IP routing (RIP, OSPF, IS-IS) Understand service (e.g., application) addressing and access to services across an IP network Understand TCP performance parameters and metrics Advanced topics (IP Multicast, IP Tunneling, NAT, DHCP, IP Security, etc…) Course Objectives

  3. Look at the website at least once per week http://osf1.gmu.edu/~stran4 On-Line Course Info

  4. IP Header

  5. UDP Header

  6. TCP Header

  7. Communications Between LAN Hosts (TCP/IP) Via Wide Area Networks (IP)

  8. Chapter 1:Introduction

  9. Concept of Peer Entities – Logical Relationships

  10. A protocol is a set of rules and formats that govern the communication between communicating peers set of valid messages meaning of each message A protocol is necessary for any function that requires cooperation between peers Protocols

  11. Syntax of a message what fields does it contain? in what format? Semantics of a message what does a message mean? for example, not-OK message means receiver got a corrupted file Actions to take on receipt of a message for example, on receiving not-OK message, retransmit the entire file What does a protocol tell us?

  12. Standards-based – the TCP/IP protocol suite An Open System – not linked to a single vendor US Gov’t research resulted in quite and extensible set of protocols Best spent tax money I know of  Evolution from gov’t-orientation to research-orientation to business-orientation Why is it so good? Why did it beat out “OSI Networking”? Let’s start in on the details… The Internet

  13. IP is a form of packet switching Data is broken up into discrete chucks and then sent toward destination Each packet has to find its own route to the destination. There is no predetermined path; the decision as to which node to hop to in the next step is taken only when a node is reached. Each packet finds its way using the information it carries, such as the source and destination IP addresses. Network resources (routers, links) are shared between different data streams - multiplexing The phone network: circuit switching Sender calls receiver and establishes a logical connection The connection is maintained for the duration of the data flow Two distinct paradigms Both have value The TCP part of TCP/IP provides a logical connection, when necessary Getting Data from Here to There

  14. Is a conceptual, reference model. Is the primary architectural model for inter-computer communications. Is the only common language spoken by different manufacturers. Mastery of the OSI model is mandatory Motivation behind OSI Model

  15. The goal of an OSI layer is to communicate with its peer layer on another host. The information exchanged is called a Protocol Data Unit (PDU). Motivation behind OSI Model

  16. Communication between OSI Layers

  17. Fragmentation and Reassembly Breaking up data into pre-defined sized blocks Encapsulation Adding control info to data (address, error detection code, etc…) Connection Control Providing connection establishment, data transfer, connection termination Flow Control Throttling of data rate exchanged between source and destination Error Control Error detection Synchronization Timeouts, Send state, Receive state. Etc… Sequencing Numbering of data blocks (applicable only for connection-oriented mode) Addressing Has local and global significance, Used for routing purposes in IP Multiplexing Allowing multiple logical connections to use one physical connections Mapping of connections from one protocol layer to another Transmission Services Security, Priority, Grade of Service Motivation behind OSI Model – Protocol Functionality

  18. The OSI Reference Model

  19. Need a top and a bottom -- 2 Need to hide physical link, so need datalink -- 3 Need both end-to-end and hop-by-hop actions; so need at least the transport (TCP) and network (IP) layers -- 5 Session and presentation layers are not so important, and are often ignored So, we need at least 5, and 7 seems to be excessive Note that we can place functions in different layers Why seven layers?

  20. Moves bits between physically connected end-systems Standard prescribes coding scheme to represent a bit shapes and sizes of connectors bit-level synchronization Supported transmission: electric voltages, radio frequencies, pulses of infrared or ordinary light Postal network technology for moving letters from one point to another (trains, planes, vans, bicycles, ships…) Internet technology to move bits on a wire, wireless link, satellite channel etc. Physical layer

  21. Introduces the notion of a frame set of bits that belong together Idle markers tell us that a link is not carrying a frame Begin and end markers delimit a frame On a broadcast link (such as Ethernet) end-system must receive only bits meant for it need datalink-layer address also need to decide who gets to speak next these functions are provided by Medium Access sublayer (MAC) Some data links also retransmit corrupted packets and pace the rate at which frames are placed on a link part of logical link control sublayer layered over MAC sublayer Datalink layer

  22. Datalink layer protocols are the first layer of software Very dependent on underlying physical link properties Usually bundle both physical and datalink layer on host adaptor card example: Ethernet Postal service mail bag ‘frames’ letters Internet a variety of datalink layer protocols most common is Ethernet others are FDDI, SONET, HDLC Datalink layer (contd.)

  23. Logically concatenates a set of links to form the abstraction of an end-to-end link Allows an end-system to communicate with any other end-system by computing a route between them Hides idiosyncrasies of datalink layer Provides unique network-wide addresses Found both in end-systems and in intermediate systems At end-systems primarily hide details of datalink layer segmentation and reassembly error detection Network layer

  24. At intermediate systems participates in routing protocol to create routing tables responsible for forwarding packets scheduling the transmission order of packets choosing which packets to drop Network layer (contd.)

  25. In datagram (connection-less) networks provides both routing and data forwarding Ex: Internet using IP protocol In connection-oriented networks we distinguish between data plane and control plane data plane only forwards and schedules data (touches every byte) control plane responsible for routing, call-establishment, call-teardown (doesn’t touch data bytes) Ex: TCP protocol running over IP Two types of network layers

  26. Postal network set up internal routing tables forward letters from source to destination static routing multiple qualities of service Internet network layer is provided by Internet Protocol found in all end-systems and intermediate systems segmentation and reassembly packet-forwarding, routing, scheduling unique IP addresses can be layered over anything, but only best-effort service Network layer

  27. Network provides a ‘raw’ end-to-end service Transport layer creates the abstraction of an error-controlled, flow-controlled and multiplexed end-to-end link Error control message will reach destination despite packet loss, corruption and duplication retransmit lost packets; detect, discard, and retransmit corrupted packets; detect and discard duplicated packets Flow control match transmission rat to rate currently sustainable on the path to destination, and at the destination itself Transport layer - TCP

  28. Transport Layer - TCP

  29. Transport Layer (TCP) – Relationships with Other Layers Below Process-to-process delivery

  30. Transport Layer Addressing • Addresses • Data link layer  MAC address • Network layer  IP address • Transport layer  Port number (choose among multiple processes running on destination host)

  31. Multiplexes multiple applications to the same end-to-end connection adds an application-specific identifier (port number) so that receiving end-system can hand in incoming packet to the correct application Some transport layers provide fewer services e.g. simple error detection, no flow control, and no retransmission lightweight transport layer Transport layer (contd.)

  32. Postal system doesn’t have a transport layer implemented, if at all, by customers detect lost letters (how?) and retransmit them Internet two popular protocols are TCP and UDP TCP provides error control, flow control, multiplexing UDP provides only multiplexing Transport layer (contd.)

  33. Not common Provides full-duplex service, expedited data delivery, and session synchronization Duplex if transport layer is simplex, concatenates two transport endpoints together Expedited data delivery allows some messages to skip ahead in end-system queues, by using a separate low-delay transport layer endpoint Synchronization allows users to place marks in data stream and to roll back to a pre-specified mark Session layer

  34. Postal network suppose a company has separate shipping and receiving clerks chief clerk can manage both to provide abstraction of a duplex service chief clerk may also send some messages using a courier (expedited service) chief clerk can arrange to have a set of messages either delivered all at once, or not at all Internet doesn’t have a standard session layer Example

  35. Unlike other layers which deal with headers, presentation layer touches the application data Hides data representation differences between applications e.g. endian-ness Can also encrypt data Usually ad hoc Postal network translator translates contents before giving it to chief clerk Internet no standard presentation layer only defines network byte order for 2- and 4-byte integers Presentation layer

  36. The set of applications that use the network Doesn’t provide services to any other layer Postal network the person who uses the postal system suppose manager wants to send a set of recall letters translator translates letters going abroad chief clerk sends some priority mail, and some by regular mail mail clerk sends a message, retransmits if not acked postal system computes a route and forwards the letters datalink layer: letters carried by planes, trains, automobiles physical layer: the letter itself Application layer

  37. OSI TCP / IP Application (Layer7) Application Presentation (Layer6) Session (Layer 5) Transport (Layer 4) Transport Network (Layer 3) Internet Data Link (Layer 2) Subnet Physical (Layer 1) OSI Reference Model vs. TCP/IP Protocol Stack

  38. Layering and Encapsulation

  39. A system that is too complex to comprehend in its entirety. A system that is difficult to maintain. A system whose least stable elements are not isolated. A system whose most reusable elements are difficult to identify. A system that is to be built by different teams, possibly with different skills. Why Layering Required For Networking?

  40. Preserve content of layers which is private but allow interfacing between them Allows management of complexity and change within layers Why Need Encapsulation?

  41. A specialized computer Interconnects multiple physical networks Allows construction of a LOGICAL network topology that is independent from the PHYSICAL networks Notation Show-and-tell What is a Router?

  42. How does a router's forwarding logic differ from a bridge's forwarding logic? Packet Filtering: A router examines only those data packets specifically addressed to it, as opposed to a bridge, which reads the destination address of every data packet on the LAN to which it is attached. Route Determination: A bridge checks the frame's data-link protocol for source as well as destination address. It then checks its table of known local nodes. The destination address is compared with the contents of the known local nodes in order to determine whether the frame should be allowed to cross the bridge or not whether the destination is local or not). The bridge does not determine the path; it merely allows or disallows the packet to cross. Destination routes must be obtained through other network devices, such as the originating workstation for source routing bridges. Bridges are thus sometimes known as "forward if not local" devices. Routers actually maintain dynamic tables of "best routes", which depend on network conditions. Based the latest traffic conditions, the router chooses the best path for the data packet to reach its destination, and sends the data packet on its way. After reading the network layer destination address and the protocol of the network layer data, the router consults its routing tables in order to determine the best path on which to forward this data packet. Having found the best path, the router has the ability to repackage the data packet as required for the chosen delivery route. For example, if the packet were to be sent out over an X.25 packet-switched network, the router would encapsulate the packet in an X.25-compliant envelope. 3. Routing Logic: A bridge reads the destination address of each data frame on a LAN, decides whether the address is local or remote (on the other side of the bridge), and only allows those data frames with non-local destination addresses to cross the bridge. A router is more discriminating. The router first confirms the existence of the destination address as well as the latest information on available network paths to reach that destination. Unlike a bridge, which merely allows access to the internetwork (forward-if-not-local logic), a router specifically addresses the data packet to a distant router. However, before a router actually releases a data packet on to the internetwork, is confirms the existence of the destination address to which the data packet is bound. Only once the router is satisfies with the viability of the destination address as well as with the quality of the intended path, will it release the packaged packet. The router's meticulous processing is known as "forward if proven remote" logic.

  43. TCP/IP Protocol Suite Layers

  44. TCP/IP Layering

  45. Multiplexing and Demultiplexing

  46. Two hosts interact in a predefined manner One side is the client – it wants information One side is the server – it provides the information EX: WWW – web browser is the client, website is the server A host is not “locked down” to be only a client or only a server Multiple client and server programs can be running on a single host at the same time The Client-Server Model

  47. Client/Server on the same LAN

  48. Client/Server on two different LANs

More Related