ARPANET. On the Way to Today's Internet. The Beginning of ARPANET ARPANET. Result: ARPANET (predecessor of today's Internet) California

Size: px
Start display at page:

Download "ARPANET. On the Way to Today's Internet. The Beginning of ARPANET ARPANET. Result: ARPANET (predecessor of today's Internet) California"

Transcription

1 On the Way to Today's ARPANET Goal: Interconnection of computers and networks using uniform protocols A particularly important initiative was initiated by the ARPA (Advanced Research Project Agency, with military interests) The participation of the military was the only sensible way to implement such an ambitious and extremely expensive project The OSI specification was still in developing phase Design objective for ARPANET The operability of the network should remain intact even after a largest disaster possible, e.g. a nuclear war, thus high connectivity and connectionless transmission Network computer and host computer are separated ARPA Advanced Research Projects Agency Result: ARPANET (predecessor of today's ) Subnet ARPANET 1969 Page 1 Page 2 ARPANET The Beginning of ARPANET A node consists of an IMP a host -host Protocol XDS 940 Stanford Research Institutes (SRI) A subnet consists of: Interface Message Processors (IMPs), which are connected by leased transmission circuits High connectivity (in order to guarantee the demanded reliability) Several protocols for the communication between IMP-IMP, host-imp, -IMP Protocol Source IMP to destination IMP protocol Subnet IMP-IMP protocol IMP IBM 360/75 IMP University of California Santa Barbara (UCSB) IMP IMP XDS 1-7 IMP California University of California Los Angeles (UCLA) DEK PDP-10 University of Utah ARPANET (December 1969) Page 3 Page 4

2 UCSB Evolution by ARPANET Very fast evolution of ARPANET within shortest time: SRI UCLA Utah USC Illinois WITH Harvard UCSB UCLA SRI Utah Illinois WITH Stanford USC Harvard Aberdeen ARPANET in April 1972 ARPANET in September 1972 CMU Interworking Problem: Interworking! Simultaneously to the ARPANET further (smaller) networks were developed. All the LANs, MANs, WANs had different protocols, media, could not be interconnected at first and were not be able to communicate with each another. Therefore: Development of uniform protocols on the transport- and network level (without a too accurate definition of these levels, in particular without exact coordination with the respective OSI levels). Result: TCP/IP networks. Page 5 Page 6 TCP/IP TCP/IP and the OSI Reference Model Developed 1974: Transmission Control Protocol/ Protocol (TCP/IP) Requirements: Fault tolerance Maximal possible reliability and availability Flexibility (i.e. suitability for applications with very different requirements) The result: Network protocol IP; ( Protocol; connectionless) End-to-end protocols TCP (Transmission Control Protocol; connection-oriented) and UDP (User Datagram Protocol; connectionless) Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer ISO/OSI Application Layer Transport Layer (TCP/UDP) Layer (IP) -to-network Layer TCP/IP Page 7 Page 8

3 From the ARPANET to the 1983 TCP/IP became the official protocol of ARPANET. ARPANET was connected with many other USA networks. Intercontinental connecting with networks in Europe, Asia, Pacific. The total network evolved this way to a world-wide available network (called ) and gradually lost its early militarily dominated character. What does it mean: a computer is connected to the? - Use of the TCP/IP protocol suite - Accessibility over an IP address - Ability to send IP packets In its early period, the was limited to the following applications: No central administrated network, but a world-wide union from many individual, different networks under local control (and financing) the consisted of 3,000 networks with 200,000 computers. That was however only the beginning of a rapid evolution. Remote login File transfer electronic mail (partly because the US post was not very reliable and the different time zones made telephone accessibility of the telephone partner more difficult) running jobs on external computers exchange of data between computers Page 9 Page 10 Evolution of the Evolution of the Until 1990: the was comparatively small, only used by universities and research institutions. 1990: The WWW (World Wide Web) - first developed by the CERN for the simplification of communication within the field of high-energy physics - became, together with HTML and Netscape browsers, a from nobody foreseen killer application ; this was the breakthrough for the acceptance of the. Emergence of so-called Service Providers (ISP), i.e. companies, which make their computers available as access points to the. Millions of new (predominantly non-academic) users! New applications, e.g. E-Commerce 1995: Backbones, ten thousands LANs, millions attached computers, exponentially rising number of users 1998: The number of attached computers is doubled approx. all 6 months 1999: The transferred data volume is doubled in less than 4 months At mid of 2005: (estimated) 350 million of hosts attached to the Page 11 Page 12

4 Evolution in Europe and Intranet Communication via the TCP/IP protocols Local operators control and finance Global coordination by some organizations Providers provide access points for private individuals Intranet Enterprise-internal communication with the same protocols and applications as in the. Computers are sealed off from the global (data security) Heterogeneous network structures from different branches can be integrated with TCP/IP easily Use of applications like in the WWW for internal data exchange Date Page 13 Page 14 The TCP/IP Protocol Suite Sandglass Model Protocols HTTP IGMP FTP Telnet SMTP DNS SNMP TFTP TCP UDP ICMP IP ARP RARP Application Layer Transport Layer Layer , File Transfer, Video Conferencing, HTTP, SMTP, FTP, Because of the small number of central protocols but the large number of applications and communication networks, the TCP/IP protocol stack (and applications/networks) can be represented like a sandglass. Networks Ethernet Token Ring Token Bus Wireless LAN -tonetwork Layer Twisted Pair, Optical Fiber, Radio, Page 15 Page 16

5 Layer IP Protocol Raw division into three tasks: Data transfer over a global network Route decision at the sub-nodes Control of the network or transmission status Routing Protocols Routing Tables Transfer Protocols: IPv4, IPv6 Control Protocols: ICMP, ARP, RARP, IGMP IP: connectionless, unreliable transmission of datagrams/packets ( Best Effort ) Transparent end-to-end communication between the hosts Routing, interoperability between different network types IP addressing (IPv4): Uses logical 32-bit addresses Hierarchical addressing 3 network classes 4 address formats (including multicast) Fragmenting and reassembling of packets Maximum packet size: 64 kbyte (in practice: 1500 byte) At present commonly used: Version 4 of IP protocol: IPv4 Page 17 Page 18 IP Packet Version IHL Time to Live Identification 32 Bits (4 Bytes) Type of Service Protocol DM F F Source Address Destination Address Options (variable, 0-40 Byte) DATA (variable) Total Length Fragment Offset Header Checksum Padding IP Header, usually 20 Bytes Header Data The IP Header (1) Version: IP version number (for simultaneous use of several IP versions) IHL: IP Header Length (in words of 32 bit; between 5 and 15, depending upon options) Type of Service: Indication of the desired service: Combination of reliability (e.g. file transfer) and speed (e.g. audio) 3 bit priority (0 = normal data, 7 = control packet) Precedence Delay Total Length: Length of the entire packet (in byte, = bytes) Identification: definite marking of a packet Time to Live (TTL): Lifetime of packets is limited to maximal 255 Hops (endless circling of packets in the network is prevented). In principle, also the processing time in routers is to be considered, which does not happen in practice. The counter is reduced with each hop, with 0 the packet is discarded. D T R unused Throughput Reliability Page 19 Page 20

6 The IP Header (2) DF: Don't Fragment. All routers must forward packets up to a size of 576 byte, everything beyond that is optional. Larger packets with set DF-bit therefore cannot take each possible way in the network. MF: More Fragments. 1 - further fragments follow. 0 - last fragment of a datagram) Fragment Offset: Sequence number of the fragments of a packet (2 13 = 8192 possible fragments). The offset states, at which place of a packet (counted in multiples of 8 byte) a fragment belongs. From this a maximum length of 8192 * 8 byte = byte results for a packet. Protocol: Which transport protocol is used in the data part (UDP, TCP, )? To which transport process the packet is to be passed on? Header Checksum: 1 s complement of the sum of the 16-bit half words of the. Must be computed with each hop (since TTL changes) Source Address/Destination address: Network and host numbers of sending and receiving computer. This information is used by routers for the routing decision. Fragmentation A too large or too small packet length prevents a good performance. Additionally there are often size restrictions (buffer, protocols with length specifications, standards, allowed access time to a channel, ) The data length must be a multiple of 8 byte. Exception: the last fragment, there only the remaining data are packed, padding to 8 byte units does not take place. If the DF -bit is set, the fragmentation is prevented. Ident. Flags Offset Data 777 x bytes IP 777 x x x Page 21 Page 22 The IP Header (3) IP Addressing Options: Prepare for future protocol extensions. Coverage: Multiple of 4 byte, therefore possibly padding is necessary. At present, 5 options are defined, however none is supported by common routers: Security: How secret is the transported information? (Application e.g. in military: Avoidance of crossing of certain countries/networks.) Strict Source Routing: Complete path defined from the source to the destination host by providing the IP addresses of all routers which are crossed. (Use by system managers e.g. in case of damaged routing tables or for time measurements) Loose Source Routing: The carried list of routers must be passed in indicated order. Additional routers are permitted. Record Route: Recording of the IP addresses of the routers passed. (Maximally 9 IP addresses possible, nowadays too few.) Time Stamp: Records router addresses (32 bits) as well as a time stamp for each router (32 bits). Application e.g. in fault management. Page 23 Unique IP address for each host and router. IP addresses are 32 bits long and are used in the Source Address as well as in Destination Address field of IP packets. The IP address is structured hierarchical and refers to a certain network, i.e. machines with connection to several networks have several IP addresses. Structure of the address: Network address for physical network (e.g ) and host address for a machine in the addressed network (e.g ) 32 bits 126 networks with 2 24 host each Class (starting from ) A 0 Network networks with 2 16 hosts each B 10 Network (starting from ) C D E 110 Network 1110 Multicast address 1111 Reserved for future use networks (LANs) with 256 hosts each (starting from ) Page 24

7 IP Addresses Destination IP Address IP Addresses and Routing 12.x.x.x x.x Connection x x.x Network Interface b a x.x direct a Router x x.x.x.x direct default b a a b Binary format Dotted Decimal Notation Each node has (at least) one world-wide unique IP address Router or gateways, which link several networks with one another, have for each network an assigned IP address Page 25 Page 26 IP Addressing - Examples Address Space The representation of the 32-bit addresses is divided into 4 sections of each 8 bits: ,25% 6,25% Class B address Special addresses: Class B address of RWTH Aachen Subnet (Computer science 4) This host Terminal Shadow 50,00% 12,50% Klasse Class A Klasse Class B Klasse Class C Klasse Class D Klasse Class E in this network Broadcast in own local area network 25,00% Network Broadcast in the remote network 127 arbitrary Loop, no sending to the network Page 27 Page 28

8 Problems IP Addresses are scarce Nobody had thought about such a strong growth of the (otherwise one would have defined longer addresses from the beginning). Too many Class A address blocks were assigned in the first years. Inefficient use of the address space. Example: if 500 devices in an enterprise are to be attached, a Class B address block is needed, but by this unnecessarily more than host addresses are blocked. Solution approach Extension of the address space within IPv6 against the actual version IPv4 IP version 6 has 128 bit for addresses 7 x IP addresses per square meter of the earth's surface (including the oceans!) one address per molecule on earth's surface! But: The success of IPv6 is not by any means safe! (The introduction of IPv6 is tremendously difficult: Interoperability, costs, migration strategies,.) Page 29 IP Subnets Problem: Class C-networks are very small, Class B-networks often already too large. Therefore exists the possibility of dividing an through the IP-address identified network into so-called subnets. Rest of the All traffic for Examples for subnets: subnet mask Router Ethernet A Ethernet A Ethernet B Ethernet B Ethernet A Ethernet A Ethernet B Ethernet B Page 30 IP Subnets Within an IP network address block, several physical networks can be addressed Some bits of the host address part are used as network ID A Subnet mask identifies the abused bits Class B address Subnet Mask Network All hosts of a network should use the same subnet mask Routers can determine through combination of an IP address and a subnet mask, into which subnet a packet must be sent Network Subnet Page 31 IP Subnets - Computation of the Destination The entrance router of the RWTH, which receives the IP packet, does not know, where host is located AND IP address Subnet mask Network of the addressed host The router computes the subnet and sends the packet to the router, which links this subnet. Page 32

9 Example of a Subnet Assigned network address for the RWTH: Info IV Subnet mask for each subnet = Other format for writing of addresses in subnets: /24 Number of bits for (sub)network address 254 hosts per subnet: s have the addresses is reserved for the subnet 255 is reserved for broadcast in the subnet More flexible Addressing Problem: static categorization of IP addresses - how to use the very small class C networks efficiently? Remedy: Classless Inter-Domain Routing (CIDR) Weakening of the rigid categorization by replacing the static classes by network prefixes of variable length Example: /17: The first 17 bits of the IP address are used for the network identification Used together with routing: Backbone router, e.g. on transatlantic links only considers the first 13 bits; thus small routing tables, little cost of routing decision Routers of an ISP considers e.g. only the first 15 bits Routers in company networks consider e.g. the first 25 bits Page 33 Page 34 NAT Network Address Translation NAT Variants Each internal computer in the Intranet needs an own IP address to communicate with the others. For this purpose, private address blocks are reserved, which everyone may use within its own networks and which are never routed in the : When using addresses of those range, the internal computers can communicate with each other But: packets with those addresses are not forwarded by a router. Thus: routers, which are attached to the external world need a global address Assign a few IP addresses to a company which are known by a NAT box which usually is installed with the router When data are leaving the own network, an address translation takes place: the NAT box exchanges the private address with a globally valid one Side effect: hiding of the internal network structure (security) Page 35 NAT is available in several variants, known under different names: Basic NAT (also: Static NAT) Each private IP address is translated into one certain external IP Either, you need as much external addresses as private ones, otherwise no retranslation is possible when a reply arrives Or, you manage a pool of external IP addresses and assign one dynamically when a request is sent out Private IP router with NAT box Map to Private IP router with NAT box Currently mapped: Page 36

10 NAT Variants NAPT Network Address Port Translation Disadvantages of static NAT: With static mapping, you need as much official IP addresses as you have computers With dynamic mapping, you need less official IP addresses, but for times of high traffic you nevertheless need nearly as much addresses as local computers Those approaches help to hide the network structure, but not to save addresses Hiding NAT (also: NAPT: Network Address Port Translation, Masquerading) Translate several local addresses into the same external address Now: some more details are necessary to deliver a response router with NAT box destination? Private IP to: Map to Protocol TCP TCP Port (local) IP (local) Port (global) IP (global) IP (destination) Port (destination) Page 37 Page 38 Problems with NAPT The new IP - IPv6 IPv6 (December 1995, RFC 1883) NAPT works well with communication initiated from the Intranet. But: how could someone from outside give a request to the Intranet (e.g. to the webserver)? NAPT box needs to be a bit more intelligent Some static information has to be stored, e.g. each incoming request with port 80 has to be mapped to the private address of the webserver Still problems with applications like e.g. ICQ Thus, only more IP addresses really help to solve the problem Publication of the standard (January 1995, RFC 1752) Specification for IPng (December 1994, RFC 1726) First requirements for IPng (December 1993, RFC 1550). Simpler structure of the s More automatism Simpler configuration Performance improvements Migration strategies More security Larger address space IPv4 (September 1981, RFC 791) Page 39 Page 40

11 IPv6 Why changing the protocol, when IPv4 works well? Dramatically increasing need for new IP addresses Improved support of real time applications Security mechanisms (Authentication and data protection) Differentiation of types of service, in particular for real time applications Support of mobility (hosts can go on journeys without address change) Simplification of the protocol in order to ensure a faster processing Reduction of the extent of the routing tables Option for further development of the protocol Page 41 IPv6 - Characteristics Address size 128-bit addresses (8 groups of each 4 hexadecimal numbers) Improved option mechanism Simplifies and accelerates the processing of IPv6 packets in routers Auto-configuration of addresses Dynamic allocation of IPv6-addresses Improvement of the address flexibility Anycast address: Reach any one out of several Support of the reservation of resources Marking of packets for special traffic Security mechanisms Authentication and Privacy Simpler structure: IHL: redundant, no variable length of by new option mechanism Protocol, fragmentation fields: redundant, moved into the options Checksum: Already done by layer 2 and 4 Page 42 IPv6 Main Header IPv6 Extension Headers Version: IP version number Priority: 4 bits for priority. 1 - News, 4 - ftp, 6 - telnet, 8 to 15 - real time traffic Flow label: virtual connection with certain characteristics/requirements PayloadLen: packet length after the 40- byte Next Header: 8-bit selector. Indicates the type of the following extension (or the transport ) HopLimit: At each node decremented by one. At zero the packet is discarded Source Address: The address of the original sender of the packet Destination Address: The address of the receiver (not necessarily the final destination, if there is an optional routing ) Next Header/Data: if an extension is specified, it follows after the main. Otherwise, the data are following Version (4) Priority (4) PayloadLen (16) Flow label (24) Source Address (128) Destination Address (128) Next Header/Data Next Header (8) HopLimit (8) The prefix of an address characterizes geographical areas, providers, local internal areas, Page 43 Optional data follows in extension s. There are 6 s defined: Hop by Hop (information for single links) All routers have to examine this field. Momentarily only the support of Jumbograms (packets exceeding the normal IP packet length) is defined (length specification). Routing (definition of a full or partly specified route) Fragmentation (administration of fragments) Difference to IPv4: Only the source can do fragmentation. Routers for which a packet is too large, only send an error message back to the source. Authentication (of the sender) Ciphered data Destination options (additional information for the destination) Page 44

12 IPv4 vs. IPv6: Header Priority Version En IHL Type OF of Service service Identification Time to Live Protocol SOURCE Source ADDRESS Address Destination ADDRESS Address Totally Length length Fragment offset Header Checksum Options (variable)/padding Version En Flow Label label NEXT Next PayloadLen Hop Limit limit Header s SOURCE Source ADDRESS Address SOURCE Source ADDRESS Address SOURCE Source ADDRESS Address SOURCE Source ADDRESS Address Coexistence of IPv4 and IPv6 IPv6 cannot be introduced over night for some time both IP variants will be used in parallel. New network interface card drivers support both versions of IP, thus they are able to communicate with the newer version But: how to enable two modern IPv6-based hosts to communicate if only an IPv4- based network is in between? 1. Header Conversion Router translates an incoming IPv6 packet into a IPv4 packet, receiving router retranslates But: reconstruction of e.g. flow label??? DATA Data The IPv6 is longer, but this is only caused by the longer addresses. Otherwise it is better sorted and thus faster to process by routers. Destination ADDRESS Address Destination ADDRESS Address Destination ADDRESS Address Destination ADDRESS Address NEXT Next Header /DATA/ Data Page 45 payload IPv6 IPv6 network payload IPv4 mostly IPv4 Routers which speak IPv4 and IPv6 in parallel payload IPv6 IPv6 network Page 46 Coexistence of IPv4 and IPv6 Virtual Private Network (VPN) 2. Tunneling Router at the entry to the IPv4-based network encapsulate an incoming IPv6 packet into a new IPv4 packet with destination address of the next router also supporting IPv6 payload IPv6 payload IPv6 mostly IPv4 IPv4 payload IPv6 By a Virtual Private Network (VPN) a network infrastructure is understood, in which distributed components belonging to one logical private network communicate with one another over a public network (e.g. ) VPNs are used frequently for the connection of geographically distributed organizations (Intranet in the ) VPNs ensure authenticated access and permit the protection of sensitive data in distributed networks by encryption of data The logical connection between private components over a public network is achieved again by tunneling an IPv4 connection with e.g. IPsecure IPv6 network IPv6 tunnel through IPv4 IPv6 network More overhead because of two s for one packet, but no information loss due to conversion Tunneling is a general concept also used for multicast, VPN, etc: it simply means pack a whole packet as it is into a new packet of different protocol VPN Page 47 Page 48

13 Tunneling Mechanism Tunneling here: Encapsulate packets into encrypted IP packets, e.g. by using IPsecure. Packets directed to the remote network part by this remain unchanged, but are the payload of an encrypted packet. Page 49

OSI Reference Model. Application Layer. Presentation Layer. Session Layer. Transport Layer. Chapter 4: Application Protocols.

OSI Reference Model. Application Layer. Presentation Layer. Session Layer. Transport Layer. Chapter 4: Application Protocols. Chapter 3: Protocols and Services 3.1: 3 - The Internet Protocol IP 3.2: Routing in the Internet 3.3: Auxiliary Protocols 3.4: Quality of Service 3.5: 4 - Transport Protocols TCP and UDP OSI Reference

More information

Telematics Chapter 6: Network Layer

Telematics Chapter 6: Network Layer Telematics Chapter 6: Network Layer User watching video clip Application Layer Presentation Layer Session Layer Transport Layer Server with video clips Application Layer Presentation Layer Session Layer

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

The Internet Protocol (IP)

The Internet Protocol (IP) The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

The Internetworking Problem. Internetworking. A Translation-based Solution

The Internetworking Problem. Internetworking. A Translation-based Solution Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem

More information

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements? 95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model

More information

Lecture 11: Networks & Networking

Lecture 11: Networks & Networking Lecture 11: Networks & Networking Contents Distributed systems Network types Network standards ISO and TCP/IP network models Internet architecture IP addressing IP datagrams AE4B33OSS Lecture 11 / Page

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri Department of Computer and IT Engineering University of Kurdistan Network Layer By: Dr. Alireza Abdollahpouri What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld millions

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

LOGICAL ADDRESSING. Faisal Karim Shaikh.

LOGICAL ADDRESSING. Faisal Karim Shaikh. LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address

More information

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab bacademy for Science &T Technology and Maritime Transport Internet Protocol Suite IP Suite Dr.

More information

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008 Networks an overview dr. C. P. J. Koymans Informatics Institute University of Amsterdam February 4, 2008 dr. C. P. J. Koymans (UvA) Networks February 4, 2008 1 / 53 1 Network modeling Layered networks

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

7th Slide Set Computer Networks

7th Slide Set Computer Networks Prof. Dr. Christian Baun 7th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/49 7th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

The Internet. The Internet is an interconnected collection of netw orks.

The Internet. The Internet is an interconnected collection of netw orks. The Internet The Internet is an interconnected collection of netw orks. Internetw orking-1 Internetworking! Communications Network: A facility that provides a data transfer service among stations attached

More information

Network Protocols - Revision

Network Protocols - Revision Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4

More information

Communication Systems DHCP

Communication Systems DHCP Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol 1 Orientation IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network Layer ARP Network Access Link Layer Media 2 IP:

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Unit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham

More information

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network Question No: 1( M a r k s: 1 ) A ---------- Relies on the hardware manufacturer to assign a unique physical

More information

End-to-End Communication

End-to-End Communication End-to-End Communication Goal: Interconnect multiple LANs. Why? Diverse LANs speak different languages need to make them talk to each other Management flexibility global vs. local Internet Problems: How

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols Computer Networks Lecture 9 Network and transport layers, IP, TCP, UDP protocols Network layer The Network layer, or OSI Layer 3, provides services to exchange the individual pieces of data over the network

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

CSCI-1680 Network Layer: IP & Forwarding John Jannotti

CSCI-1680 Network Layer: IP & Forwarding John Jannotti CSCI-1680 Network Layer: IP & Forwarding John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Administrivia IP out today. Your job: Find partners, get setup with Github

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Lecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2)

Lecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2) Last Lecture Internet Protocol (1) This Lecture Internet Protocol (2) Lecture 18 Overview Source: chapters 19.1, 19.2, 22,1 22.2, 26.6 Next Lecture Transport Control Protocol (1) Source: chapters 24.1,

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Chapter 5 OSI Network Layer

Chapter 5 OSI Network Layer Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

Internet protocols, TCP/IP suite

Internet protocols, TCP/IP suite Internet protocols, TCP/IP suite S-72.353 March 20, 2000 L353_8.shw Slide 1 of 23 Layered structure of TCP/IP /D\HU 6HUYL FHV 6073 '16 KWWS )73 7(/1(7 7 &3 8 '3 193,3,& 03,3 $53 5$53 &60$&' 7RNHQ ULQJ

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any

More information

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Network Layer PREPARED BY AHMED ABDEL-RAOUF Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.

More information

ECE 158A: Lecture 7. Fall 2015

ECE 158A: Lecture 7. Fall 2015 ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers

More information

ECE 435 Network Engineering Lecture 13

ECE 435 Network Engineering Lecture 13 ECE 435 Network Engineering Lecture 13 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 19 October 2016 Announcements HW#5 posted, due next Wednesday 1 ARP address resolution protocol

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today Network layer: Internet Protocol (v4) Forwarding Next 2 classes:

More information

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer Dr. Jean-Claude Franchitti New York University Computer Science

More information

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols REMINDER Student Evaluations 4 Objectives Identify the major needs and stakeholders

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the

More information

OSI Data Link & Network Layer

OSI Data Link & Network Layer OSI Data Link & Network Layer Erkki Kukk 1 Layers with TCP/IP and OSI Model Compare OSI and TCP/IP model 2 Layers with TCP/IP and OSI Model Explain protocol data units (PDU) and encapsulation 3 Addressing

More information

Chapter 5 TCP/IP SUITE

Chapter 5 TCP/IP SUITE Chapter 5 TCP/IP SUITE Objectives:- TCP/ IP Model Concept. Defining/functioning of different Layers of TCP / IP suite. 5.1 Introduction Addressing mechanism in the Internet An IP address is an address

More information

OSI Network Layer. Chapter 5

OSI Network Layer. Chapter 5 OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network

More information

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Topics This week: Network layer (IP, ARP, ICMP) Next week: More network layer (Routers and routing protocols)

More information

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

IP Address Assignment

IP Address Assignment IP Address Assignment An IP address does not identify a specific computer. Instead, each IP address identifies a connection between a computer and a network. A computer with multiple network connections

More information

Where we are in the Course

Where we are in the Course Network Layer Where we are in the Course Moving on up to the Network Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Network Layer How to connect different link layer

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

Network Layer: Control/data plane, addressing, routers

Network Layer: Control/data plane, addressing, routers Network Layer: Control/data plane, addressing, routers CS 352, Lecture 10 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors)

More information

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses Internet Organization Addresses TCP/IP Protocol stack Forwarding Jörg Liebeherr, 1998-2003 1 What defines the Internet? 1. Use of a globally unique address space based on Internet Addresses 2. Support

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia IP out today. Your job: Find partners and tell us Implement

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Let s Build a Scalable Global Network - IP Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #4 preview ICMP ARP DHCP NAT

More information

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall: Network Layer The Network Layer Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control 1 2 Contents 4.1.1 Connection-Oriented and Connectionless

More information