Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak

Similar documents
TCP/IP and the OSI Model

Chapter 16 Networking

Defining Networks with the OSI Model. Module 2

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Lecture-4. TCP/IP-Overview:

Chapter Motivation For Internetworking

Chapter 6. The Protocol TCP/IP. Introduction to Protocols

TCP /IP Fundamentals Mr. Cantu

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

OSI Model with Protocols. Layer Name PDU Address Protocols Device

Networking midterm. 5. As a data unit moves up from one protocol layer to another, control headers are:

Interconnecting Networks with TCP/IP

ch02 True/False Indicate whether the statement is true or false.

Networking and TCP/IP. John Kalbach November 8, 2004

IP Address Assignment

System Programming. Introduction to computer networks

Chapter 7. Local Area Network Communications Protocols

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

TCP/IP Protocol Suite and IP Addressing

Special expressions, phrases, abbreviations and terms of Computer Networks

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Networking Fundamentals

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

Hands-On Ethical Hacking and Network Defense

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

Vorlesung Kommunikationsnetze

TCP/IP THE TCP/IP ARCHITECTURE

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

1. Which OSI layers offers reliable, connection-oriented data communication services?

SYSTEMS ADMINISTRATION USING CISCO (315)

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

CHAPTER-2 IP CONCEPTS

Applied Networks & Security

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Chapter 6: Network Communications and Protocols

TSIN02 - Internetworking

Network Model. Why a Layered Model? All People Seem To Need Data Processing

CCNA MCQS with Answers Set-1

Copyleft 2005, Binnur Kurt. Objectives

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

Network Protocols - Revision

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Module 15: Network Structures

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Chapter 2 Network Models 2.1

Lecture (02) Network Protocols and Standards

Introduction to Internetworking

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION

Cisco Cisco Certified Network Associate (CCNA)

Local Area Networks and the Network Protocol Stack

Sirindhorn International Institute of Technology Thammasat University

Chapter 5 Network Layer

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Communicating over the Network

Review of Important Networking Concepts

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

KillTest ᦝ䬺 䬽䭶䭱䮱䮍䭪䎃䎃䎃ᦝ䬺 䬽䭼䯃䮚䮀 㗴 㓸 NZZV ]]] QORRZKYZ PV ٶ瀂䐘މ悹伥濴瀦濮瀃瀆ݕ 濴瀦

Introduction to TCP/IP

Computer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University

TSIN02 - Internetworking

Cisco Interconnecting Cisco Networking Devices Part 1.

Principles behind data link layer services:

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

McGraw-Hill The McGraw-Hill Companies, Inc., 2000

DATA COMMUNICATION AND NETWORKS

Transport Layer TCP & UDP Week 7. Module : Computer Networks Lecturers : Lucy White Office : 324

CISCO SYSTEM ADMINISTRATION (41)

UNIT 2 TRANSPORT LAYER

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for

Chapter 2 Network Models 2.1

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi

Fundamentals of Computer Networking AE6382

Network Architecture Models

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

1: Review Of Semester Provide an overview of encapsulation.

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

Linux System Administration

Network Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

Lecture 11: Networks & Networking

Module 11. OSI Model, Network Devices, and Network Standards

Overview of Ethernet Networking

Computer Networks (Unit wise Questions)

CS61C Machine Structures Lecture 37 Networks. No Machine is an Island!

Transcription:

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Abstract: TCP/IP (Transmission Control Protocol/Internet Protocol) is a set of protocols independent of the physical medium used to transmit data, but most data transmission for Internet communication begins and ends with Ethernet frames. The Ethernet can use either a bus or star topology. A bus topology attaches all devices in sequence on a single cable. In a star topology all devices are wired directly to a central hub. 10Base-T uses a combination called a star-shaped bus topology because while the attached devices can share all data coming in on the cable, the actual wiring is in a star shape. The access method used by the Ethernet is called Carrier Sense Multiple Access with Collision Detect (CSMA/CD). This is a contention protocol, meaning it is a set of rules to follow when there is competition for shared resources. Keywords: TCP/IP, Model, Hub, Ethernet, Transmission. Introduction All Ethernet interfaces have a unique 48-bit address that is supplied by the manufacturer. It is called the Ethernet address (also known as the MAC address, for Media Access Control). Ethernet-enabled Z-World boards store this value in Flash Memory (EEPROM) that is programmed at the factory. A Realtek RTL8019 10Base-T interface chip provides a 10 Mbps Ethernet connection. This chip is used on many Ethernet-enabled Z-World boards. The corresponding port can be connected directly to an Ethernet network. By using hubs and routers, a network can include a large number of computers. A network might include all the computers in a particular building. A local network can be connected to the Internet by means of a gateway. The gateway is a computer that is connected both to the local network and to the Internet. Data that must be sent out over the Internet are sent to the local network interface of the gateway, and then the gateway sends them on to the Internet for routing to some other computer in the world. Data coming in from the Internet are directed to the gateway, which then sends them to the correct recipient on the local network. Ethernet cables are similar to U.S. telephone plug cables, except they have eight connectors. For our purposes, there are two types of cables crossover and straight-through. In most instances, the straightthrough cables are used. It is necessary to use a crossover cable when two computers are connected directly without a hub (for example, if you want to connect your PC s Ethernet directly to the Rabbit Semiconductor TCP/IP Development Board.) Some hubs have one input that can accept either a straightthrough or crossover cable depending on the position of a switch. In this case make sure that the switch position and cable type agree. TCP/IP Protocol Stack TCP/IP is the protocol suite upon which all Internet communication is based. Different vendors have developed other networking protocols, but even most network operating systems with their own protocols, such as Netware, support TCP/IP. It has become the de facto standard. Protocols are sometimes referred to as protocol stacks or protocol suites. A protocol stack is an appropriate term because it indicates the layered approach used to design the networking software. Each host or router in the internet must run a protocol stack. The details of the underlying physical connections are hidden by the software. The sending software at each layer communicates with the corresponding layer at the receiving side through information stored in headers. Each layer adds its header A UGC Recommended Journal Page 49

to the front of the message from the next higher layer. The header is removed by the corresponding layer on the receiving side. Figure : Flow of data between two computers using TCP/IP stacks. Figure : TCP/IP Protocol Flow A UGC Recommended Journal Page 50

IP IP provides communication between hosts on different kinds of networks (i.e., different data-link implementations such as Ethenet and Token Ring). It is a connectionless, unreliable packet delivery service. Connectionless means that there is no handshaking, each packet is independent of any other packet. It is unreliable because there is no guarantee that a packet gets delivered; higherlevel protocols must deal with that. IP Address IP defines an addressing scheme that is independent of the underlying physical address (e.g, 48-bit MAC address). IP specifies a unique 32-bit number for each host on a network. This number is known as the Internet Protocol Address, the IP Address or the Internet Address. These terms are interchangeable. Each packet sent across the internet contains the IP address of the source of the packet and the IP address of its destination. For routing efficiency, the IP address is considered in two parts: the prefix which identifies the physical network, and the suffix which identifies a computer on the network. A unique prefix is needed for each network in an internet. For the global Internet, network numbers are obtained from Internet Service Providers (ISPs). ISPs coordinate with a central organization called the Internet Assigned Number Authority (IANA). IP Address Classes The first four bits of an IP address determine the class of the network. The class specifies how many of the remaining bits belong to the prefix (aka Network ID) and to the suffix (aka Host ID). The first three classes, A, B and C, are the primary network classes. When interacting with mere humans, software uses dotted decimal notation; each 8 bits is treated as an unsigned binary integer separated by periods. IP reserves host address 0 to denote a network. 140.211.0.0 denotes the network that was assigned the class B prefix 140.211. Netmasks Netmasks are used to identify which part of the address is the Network ID and which part is the Host ID. This is done by a logical bitwise-and of the IP address and the netmask. For class A networks the netmask is always 255.0.0.0; for class B networks it is 255.255.0.0 and for class C networks the netmask is 255.255.255.0. Subnet Address All hosts are required to support subnet addressing. While the IP address classes are the convention, IP addresses are typically subnetted to smaller address sets that do not match the class system. The suffix bits are divided into a subnet ID and a host ID. This makes sense for class A and B networks, since no one attaches as many hosts to these networks as is allowed. Whether to subnet and how many bits to use for the subnet ID is determined by the local network administrator of each network. If subnetting is used, A UGC Recommended Journal Page 51

then the netmask will have to reflect this fact. On a class B network with subnetting, the netmask would not be 255.255.0.0. The bits of the Host ID that were used for the subnet would need to be set in the netmask. IP Routing Each IP datagram travels from its source to its destination by means of routers. All hosts and routers on an internet contain IP protocol software and use a routing table to determine where to send a packet next. The destination IP address in the IP header contains the ultimate destination of the IP datagram, but it might go through several other IP addresses (routers) before reaching that destination. Routing table entries are created when TCP/IP initializes. The entries can be updated manually by a network administrator or automatically by employing a routing protocol such as Routing Information Protocol (RIP). Routing table entries provide needed information to each local host regarding how to communicate with remote networks and hosts. When IP receives a packet from a higher-level protocol, like TCP or UDP, the routing table is searched for the route that is the closest match to the destination IP address. ARP The Address Resolution Protocol is used to translate virtual addresses to physical ones. The network hardware does not understand the software-maintained IP addresses. IP uses ARP to translate the 32-bit IP address to a physical address that matches the addressing scheme of the underlying hardware (for Ethernet, the 48-bit MAC address). TCP/IP can use any of the three. ARP employs the third strategy, message exchange. ARP defines a request and a response. A request message is placed in a hardware frame (e.g., an Ethernet frame), and broadcast to all computers on the network. Only the computer whose IP address matches the request sends a response. The Transport Layer There are two primary transport layer protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). They provide end-to-end communication services for applications. TCP is a connection-oriented transport service; it provides end-to-end reliability, resequencing, and flow control. TCP enables two hosts to establish a connection and exchange streams of data, which are treated in bytes. The delivery of data in the proper order is guaranteed. TCP can detect errors or lost data and can trigger retransmission until the data is received, complete and without errors. Sequence Number - This 32-bit number contains either the sequence number of the first byte of data in this particular segment or the Initial Sequence Number (ISN) that identifies the first byte of data that will be sent for this particular connection. The ISN is sent during the connection setup phase by setting the SYN control bit. An ISN is chosen by both client and server. The first byte of data sent by either side will be identified by the sequence number ISN + 1 because the SYN control bit consumes a sequence number. The following figure illustrates the three-way handshake. Internet Control Message Protocol is a set of messages that communicate errors and other conditions that require attention. ICMP messages, delivered in IP datagrams, are usually acted on by either IP, TCP or UDP. Some ICMP messages are returned to application protocols. A common use of ICMP is pinging a host. The Ping command (Packet INternet Groper) is a utility that determines whether a specific IP address is accessible. It sends an ICMP echo request and waits for a reply. Ping can be used to transmit a series of packets to measure average roundtrip times and packet loss percentages. The Application Layer There are many applications available in the TCP/IP suite of protocols. Some of the most useful ones are for sending mail (SMTP), transferring files (FTP), and displaying web pages (HTTP). These applications A UGC Recommended Journal Page 52

are discussed in detail in the TCP/IP User s Manual. Another important application layer protocol is the Domain Name System (DNS). Domain names are significant because they guide users to where they want to go on the Internet. The Domain Name System is a distributed database of domain name and IP address bindings. A domain name is simply an alphanumeric character string separated into segments by periods. It represents a specific and unique place in the domain name space. DNS makes it possible for us to use identifiers such as zworld.com to refer to an IP address on the Internet. Name servers contain information on some segment of the DNS and make that information available to clients who are called resolvers. References 1. A two-part article, Introduction to TCP/IP, in Embedded Systems Programming discusses issues related to programming embedded systems. http://www.embedded.com/internet/9912/9912ia1.htm 2. Ethereal is a good, free program for viewing network traffic. It works under various Unix operating systems and under Windows. http://www.ethereal.com 3. Computer Networks and Internets, Douglas E. Comer. Published by Prentice Hall. ISBN 0-13-239070-1. This book gives an excellent high-level description of networks and their interfaces. 4. TCP/IP Illustrated, Volume 1 The Protocols, W. Richard Stevens. Published by AddisonWesley. ISBN 0-20-163346-9. This book gives many useful low-level details about TCP/IP, UDP and ICMP. A UGC Recommended Journal Page 53