TCP /IP Fundamentals Mr. Cantu

Similar documents
CHAPTER-2 IP CONCEPTS

TSIN02 - Internetworking

Interconnecting Networks with TCP/IP

OSI Transport Layer. objectives

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

TSIN02 - Internetworking

Chapter 2 Advanced TCP/IP

Hands-On Ethical Hacking and Network Defense

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Networking Technologies and Applications

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005

Sirindhorn International Institute of Technology Thammasat University

EE 610 Part 2: Encapsulation and network utilities

IP - The Internet Protocol

TSIN02 - Internetworking

TSIN02 - Internetworking

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Introduction to TCP/IP networking

Chapter 7. Local Area Network Communications Protocols

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

Introduction to Internetworking

ECE4110 Internetwork Programming. Introduction and Overview

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Linux Networking: tcp. TCP context and interfaces

Packet Header Formats

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Lesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

The Internet Protocol (IP)

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

Vorlesung Kommunikationsnetze

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols

TCP/IP Protocol Suite

Internet and Intranet Protocols and Applications

ch02 True/False Indicate whether the statement is true or false.

Transport Protocols. Raj Jain. Washington University in St. Louis

User Datagram Protocol

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Layer/IP Protocols

Internetwork Protocols

Internet Protocols (chapter 18)

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

Review of Important Networking Concepts

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

Introduction to Network. Topics

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

CSCI-GA Operating Systems. Networking. Hubertus Franke

Lecture 3: The Transport Layer: UDP and TCP

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

ECE 358 Project 3 Encapsulation and Network Utilities

The Transport Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

The Transport Layer. Part 1

Application. Transport. Network. Link. Physical

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Introduction Layer 3. IP-Header: and RFC-760 Addressing schemes Subnetting Routing. Layer 3 Solution in Trains

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

4. The transport layer

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Networking: Network layer

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

Network+ Guide to Networks 5 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

ET4254 Communications and Networking 1

6. The Transport Layer and protocols

TCP/IP and the OSI Model

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

Assignment - 1 Chap. 1 Wired LAN s

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Redesde Computadores(RCOMP)

QUIZ: Longest Matching Prefix

Introduction to TCP/IP

Defining Networks with the OSI Model. Module 2

Need For Protocol Architecture

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

Need For Protocol Architecture

network security s642 computer security adam everspaugh

This talk will cover the basics of IP addressing and subnetting. Topics covered will include:

Simulation of TCP Layer

Congestion / Flow Control in TCP

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

II. Principles of Computer Communications Network and Transport Layer

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

05 Transmission Control Protocol (TCP)

Chapter 5 End-to-End Protocols

Network Basic v0.1. Network Basic v0.1. Chapter 3 Internet Protocol. Chapter 3. Internet Protocol

Transcription:

TCP /IP Fundamentals Mr. Cantu

OSI Model and TCP/IP Model Comparison

TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions: HTTP DNS DHCP FTP SNMP Telnet IMAP, SMTP, and POP

TCP / IP Addressing (Network layer) Internet Protocol Version 4 (IPv4) 32 bits of data Each address is divided into four groups called octets Each octet contains 8 bits of data Binary IP address example: 10000000.00100110.00101100.11100010 Binary is difficult for people to understand

TCP / IP Addressing (Network layer) Cont. IP address consist of two parts: Network Identifier - the part of an IP address shared among computers in a network segment Host Identifier - is unique to each computer on the network segment Two identifiers are defined by another dotted decimal value called the Subnet Mask.

Network Address Translation (NAT) Translate your private network s internal addresses into the address of the NAT server s external interface connected to the Internet. Private addresses are not routable on the Internet Increase security Used due to limited public addresses

IP Address Classes

IP Address Classes Cont. Class A addresses 8 bits for the network portion of the address and 24 bits for the host Class B addresses 16 bits for the network portion of the address and 16 bits for the host Class C addresses 24 bits for the network portion of the address and 8 bits for the host

Private IP Address Ranges To obtain a public IP address, individuals and organizations must register and pay a fee for each address. RFC (Request for Comments) 1918 defined ranges of reserved private IP addresses Lowest address -> Network Address Highest -> Broadcast Address

Subnetting Subnetting is used to segment internal networks logically Can also be used for the following: Mirroring the organization s physical layout Mirroring the organization s administrative structure Planning for future growth Reducing and controlling network traffic Increasing network security

Subnetting Cont. Bits borrowed from the host portion of the IP address to make a set of subnetworks Some addresses are lost Calculated in binary

Subnetting Class B table

Subnetting Example Number of Subnets = 2Number of Subnet Bits or 1s Number of Valid Hosts = 2 Number of Host Bits or 1s 2 Example: 192.168.1.0 255.255.255.240 (/28) 11111111.11111111.11111111.11110000

Subnetting Example Cont. 192.168.1.0 -> is a class C address 255.255.255.240 (/28) <- is the number of 1s 11111111.11111111.11111111.11110000 Never Changes Never Changes Never Changes Subnet Host Bits Bits Number of Subnets = 2 4 = (2x2x2x2) = 16 Number of Valid Hosts = 2 4 = 16 2 =14

Unicast, Multicasting, and Broadcasting unicast transmission, one packet is sent from a server computer to each client computer that requests a file or an application, such as a streaming video presentation. multicast transmission means the server can treat all five clients as a group and send one transmission that reaches all of them. broadcast sends a communication to all points on a specific network. Flooded broadcasts are sent to any subnet. Directed broadcasts are sent to a specific subnet

IPv4 in Detail The portion of the packet that IP is responsible for routing through networks is called an IP datagram. Network of OSI model Divided into sections Header, data, and footer

IP Header Structure

IP Header Structure Header Version: 4-bit field identifies the IP version Header Length: length of the header in 32-bit words, and is a 4-bit value Differential Services Code Point (DSCP): This 6-bit field expresses the quality of service Explicit Congestion Notification (ECN): 2-bit field allows ECN-compliant routers on ECNcompliant network infrastructures to signal congestion minimize dropping of packets. Total Length: 16-bit field specifies the datagram s total length to a maximum of 65,535 bytes Identification: 16-bit value helps divide the data stream into packets receiving computer reassembles packets in correct order

IP Header Structure Cont. Flags: 3-bit value indicates whether the datagram is a fragment Fragment Offset: this value indicates where the fragment belongs in the sequence Time to Live (TTL): 8-bit value identifies the maximum amount of time the packet can remain in a network before it is dropped Protocol: type of protocol being carried 1 = ICMP 6 = TCP 17 = UDP Header Checksum: Sum of the 16-bit values in the datagram header; it is calculated at every hop to ensure accuracy Source IP Address: device that sent the IP datagram Destination IP Address: that received the IP datagram Options: security field and several source routing fields

ICMP Messages Internet Control Message Protocol (ICMP) is designed to assist TCP/IP networks with troubleshooting communication problems. Ping commands ICMP Codes - https://www.iana.org/assignments/icmp-parameters/icmpparameters.xml

TCP Headers

TCP Flags NS (Nonce Sum) Associated with ECN CWR (Congestion Window Reduced) Associated with ECN ECE (ECN Echo) Associated with ECN URG (Urgent) When set to 1, data should be considered significant ACK (Acknowledgement) Indicates that the previous packet was received PSH (Push) Forces TCP to deliver data rather than buffer it on the receiver RST (Reset) Resets the connection SYN (Synchronize) Synchronizes the sequence numbers FIN (Finish) Indicates that no more data will come from the sender

UDP Headers User Datagram Protocol (UDP), like TCP, is processed at the Transport layer of the OSI model. Considered unreliable because it is connectionless. Real time streaming, speed over reliability

The TCP Three-Way Handshake (Start) Connection Request (SYN) Acknowledgement (ACK/SYN) Acknowledgement (ACK)

The TCP Three-Way Handshake (End) Finished (FIN) Finished Acknowledgement (FIN/ACK) Acknowledgement (ACK) What would happen if you send a SYN and FIN at the start of the connection?