IP fields. TCP/IP Support Protocols. IP datagram structure. IP fields. are another reason TCP/IPs popularity. total length

Similar documents
Introduction to the TCP/IP protocol suite

ISO OSI 7 Layer model and the TCP/IP protocol stack. Introduction to the TCP/IP protocol suite. Networking Glossary

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

TSIN02 - Internetworking

TSIN02 - Internetworking

CHAPTER-2 IP CONCEPTS

TSIN02 - Internetworking

TCP /IP Fundamentals Mr. Cantu

Networking Technologies and Applications

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005

ECE4110 Internetwork Programming. Introduction and Overview

TSIN02 - Internetworking

Computer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University

History of TCP/IP and Internet (continued) TCP/IP. History of TCP/IP and Internet. History of TCP/IP and Internet

EEC-682/782 Computer Networks I

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

Introduction to TCP/IP networking

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

IP Protocols. ALTTC/Oct

User Datagram Protocol

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Packet Header Formats

OSI Transport Layer. objectives

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

EE 610 Part 2: Encapsulation and network utilities

User Datagram Protocol (UDP):

EEC-484/584 Computer Networks. Lecture 16. Wenbing Zhao

Lecture 11: Networks & Networking

Lecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2)

Network and Security: Introduction

ECE 650 Systems Programming & Engineering. Spring 2018

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Chapter 5 TCP/IP SUITE

Lecture 11: IP routing, IP protocols

Network Layer. The Network Layer. Contents Connection-Oriented and Connectionless Service. Recall:

Network Layer. Recall: The network layer is responsible for the routing of packets The network layer is responsible for congestion control

The Internetworking Problem. Internetworking. A Translation-based Solution

CSC 634: Networks Programming

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Software Engineering 4C03 Answer Key

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

Hands-On Ethical Hacking and Network Defense

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

The Internet Protocol (IP)

Vorlesung Kommunikationsnetze

EEC-684/584 Computer Networks

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

QUIZ: Longest Matching Prefix

Chapter 09 Network Protocols

7. TCP 최양희서울대학교컴퓨터공학부

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

App. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (7 points) Anonymous ID: stick number HERE

Network Layer: Internet Protocol

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CSCI-GA Operating Systems. Networking. Hubertus Franke

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis

Networking interview questions

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

Introduction to Internetworking

TCP/IP Networking Basics

Connection-oriented (virtual circuit) Reliable Transfer Buffered Transfer Unstructured Stream Full Duplex Point-to-point Connection End-to-end service

Redesde Computadores(RCOMP)

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Sirindhorn International Institute of Technology Thammasat University

20-CS Cyber Defense Overview Fall, Network Basics

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

CSCI-1680 Network Layer: IP & Forwarding John Jannotti

Unit 2.

Cisco Cisco Certified Network Associate (CCNA)

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Internetworking models

IS370 Data Communications and Computer Networks. Chapter 5 : Transport Layer

Introduction to Networks and the Internet

ICS 351: Networking Protocols

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

Introduction to Network. Topics

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Internet Control Message Protocol (ICMP)

TCP/IP Protocol Suite and IP Addressing

AppleTalk. Chapter Goals. Introduction CHAPTER

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

Transport Layer (TCP/UDP)

ICS 451: Today's plan

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

7010INT Data Communications Lecture 7 The Network Layer

Transcription:

IP fields slide 3 TCP/IP Support Protocols slide are another reason TCP/IPs popularity version IHL type of service total length identification D F M F fragment offset time to live protocol source address header checksum user process user process OSI Layers 5..7 destination address options TCP UDP OSI Layer 4 32 bits ICMP IP ARP RARP OSI Layer 3 hardware interface OSI Layer..2 IP fields slide 4 IP datagram structure slide 2 total length length of both header and data an IP datagram consists of a header parts and a text part header has a 20 byte fixed part and a variable length optional part identification all fragments of a datagram contain the same id value host can determine which datagram an incoming fragment belongs DF do not fragment type of service field allows different combinations of reliability and speed to be chosen for digital speech IP can be told to emphasize fast delivery for file transfer is taking IP can be told that accuracy isparamount at the expense of speed more fragments All fragments except last one must have this bit set to true

IP addressing slide 7 IP fields slide 5 internet is a virtual structure implemented entirely in software packet frames and addresses were designed on merit Fragment offset must be a multiple of 8. Tells receiver where this fragment belongs in the datagram. addresses contained with 4 bytes conceptually the 32 bit number has two parts hostid netid three primary classes of IP addresses Time to live in seconds. Decrements each second or each hop, when it reaches 0 it is thrown away Protocol field tells which of the various transport processes the datagram belongs. Ie TCP or UDP Header checksum verifies header only IP address classes slide 8 IP fields slide 6 Source and destination address indicate the network number 7 24 Class A 0 netid hostid 4 6 Class B 0 netid hostid 2 8 Class C 0 netid hostid Class D 0 mutlicast address Class E 0 reserved for future use

Network structure slide Address Classes slide 9 machine R is a router has at least two IPnumbers - one for each network card class A ahandful of network which have more than 65536 hosts because Internet addresses encode both a network and a host on that network; they donot specify a host, but a connection to a network class B addresses for intermediate size networks. 256..65535 hosts. 4 bits for netid 6 bits for hostid class C networks which have less than 256 hosts class D multicast, hosts may dynamically join/leave multicast group hosts may be in many different multicast groups Network and Broadcast addresses slide 2 Network structure slide 0 two reserved hostid s consider the following IP network 28.8.5.2 95..2.8 Internet addresses can be used to refer to networks as well as network cards. By convention the network address has hostid all bits 0 R abroadcast address conversely has hostid bits all A B C D one of the weakness of IP addressing is that if a machine changes network - its IP address must change 28.8.0. 28.8.8.2 95..2. 95..2.3

IP Support Protocols slide 5 Fragmentation and reassembly slide 3 ICMP (Internet Control Message Protocol) sends control information between the hosts routers generate most of this information IP datagrams may be fragmented en route if intermediate nodes cannot cope with a large datagram (MTU (maximum transmission unit) is smaller than datagram size) routers use ICMP to inform hosts that a packet could not be delivered because of an error or a better route exists to a particular destination ICMP messages are send using IP frames ICMP messages use the IP protocol field and set it to IP datagrams may be reassembled en route although not a good idea as routing is dynamic. (So datagrams may not always travel the same route) to fragment a datagram into two anode creates two new datagrams with same fragment ids the first offset is 0, MF = the second offset is n, MF = 0 Typical ICMP messages are slide 6 Fragmentation and reassembly slide 4 destination unreachable -when a router cannot find a routing table entry for the destination of an IP packet consider trying to send a 420 byte datagram when the MTU is 620 420 = 400 data + 20 IP header routing redirect -arouter sends a routing redirect message to inform a host that a better route exists via another router time expired -message indicates a packets ttl field has reached 0 usually because of a configuration error malfunctioning router echo request and echo reply -echo request messages request that the destination return the data in an echo reply message (ping) split into 3 packets first packet length = 620 = 20 new IPheader + 600 old data, offset 0 second packet length = 620 = 20 new IPheader + 600 old data, offset 600 third packet length = 220 = 20 new IPheader + 200 old data, offset 200 the new fragments have the same unique frag id as the original why? reassembly reverses this process

RARP (Reverse ARP) slide 9 Address Resolution Protocol slide 7 ARP maps from network addresses to datalink addresses sometimes you require the opposite mapping many machines can read their datalink hardware to find out the datalink address but then needs to find out its IP address for example, disk less workstation, X terminal, printer IP address space is virtual and has no addressing relationship with the underlying datalink protocols every network interface has an IP address every network interface has a datalink address datalink addresses vary in format and size suppose IP is sending a packet to a remote host on the same Ethernet IP needs destination Ethernet address could manually keep track of hosts and their interface card datalink addresses RARP (Reverse ARP) slide 20 Address Resolution Protocol slide 8 at least one host on the IP network must contain a list of IP addresses with corresponding datalink addresses whereas ARP does not require that this list is present ararp is a broadcast request - any host may reply the sender fills in its datalink address its network address is filled with zeros specifies the target datalink address (normally the same as sender) the RARP server fills in the requested IP (network) address clearly on a large network this becomes unmanageable ARP (Address Resolution Protocol) is an automatic method which maps any network level address (IP address) to datalink address ARP does this by exploiting the broadcast capability commonly found in most LAN datalink protocols

TCP and UDP slide 23 RARP (cont) slide 2 primarily there are two transport protocols used with IP: TCP and UDP remember that IP may provide an unreliable service Transmission Control Protocol (TCP) provides a flexible two-way byte stream protocol (byte stream allows addressing within ahost - to user, process or service) provides a bidirectional pipe the source and destination address are called a Port TCP is the most popular transport protocol on top of IP it uses sliding window technique to provide a reliable service it uses a three way handshake toestablish a connection and a two way handshake todisconnect RARP is normally the first step taken when a diskless workstation it powered up once it knows its own IP address it can then proceed to load its operating system from a network server by using a simple file transfer protocol (TFTP) TCP slide 24 typically it is used for: mail file transfer remote login protocols technically it provides areliable duplex byte stream eliminating duplicate packets handling retransmission of lost packets and ensuring data is delivered in order

TCP/IP services slide 27 TCP slide 25 Internet services are usually designed and implemented using the client/server model of computing divides the service into three distinct parts. ftp client ftp protocol ftp server Client/Server model each performs a distinct function in implementing the client/server model: client process. The user who is using this service server process. Maybe on another machine - providing the service the protocol which the client and server are using to communicate User Datagram Protocol (UDP) is an unreliable datagram protocol and is deliberately simple it does not ensure that packets arrive in order, unduplicated, or even atall! it sends discrete datagrams, and delivers messages that arrive to the appropriate Port (same addressing schema as TCP) a port may belong to a user, process or service the standard Internet name service, DNS, uses UDP it can be regarded as multiplexing many users, processes and services through one IP address UDP has no standard connection procedure and no disconnect procedure References slide 26 refer the interested reader to explore UNIX BSD socket interface Stevens UNIX Network Programming, Prentice-Hall 990 Bach The design of the UNIX operating system, Prentice-Hall 986

TCP Header format slide 3 TCP/IP services slide 29 HL EN 4 0 6 24 32 source port reserved sequence number acknowledgement number checksum code bits destination port window urgent pointer note that this client server model is different to that discussed by business schools and management information systems as the client server model used by TCP/IP involves processes running on machines which are not dedicated as clients or servers using TCP/IP users may dictate which machines are client or servers one machine maybe a client for one application and a server for another options (if any) DATA padding TCP/IP clients and servers are software processes whereas MIS treats clients and servers as machines (Ie mainframes and PCs) TCP Header format slide 32 TCP/UDP model slide 30 HLEN 4 bits header length = n 32 Application Reliable Stream (TCP) User Datagram (UDP) URG ACK PSH RST SYN FIN CODE field meaning urgent pointer field valid ack field valid segment needs push reset connection synchronize sequence no.s sender reached end Internet (IP) Network Interface (X25, Ethernet, FDDI)

Telnet slide 35 Services offered by TCP/IP slide 33 uses TCP Layer Protocols Virtual Terminal Protocol was the Internet standard for remote login (now replaced by ssh) Process Application NN TP HT PO RC TP P3 MDS X rpc xdr NFS D N S TF TP SN NP N T P DH CP users can remotely login to another machine on the same LAN or any machine on the TCP/IP offering this service eg. login to a machine in Japan passwords are sent in plain text Transport Internet Network TCP [ICMP, ARP, RARP] Ethernet X25 IP UDP [EGP, BGP, IGMP] SLIP PPP ssh slide 36 File Transfer Protocol slide 34 uses TCP uses TCP asecure replacement for ftp and telnet both ftp and telnet should be retired if at all possible as they pass login name and password across the network in plain text.. allows users to transfer files from one machine to another machine providing that the user has an account on both machines requires little configuration ssh also comes with scp secure shell copy aspecial FTP service called anonymous FTP does not require users to have accounts on both machines but needs more configuration sftp, secure shell ftp all username passwords and data contents are heavily encrypted

Services (continued) slide 39 Services offered by TCP/IP slide 37 Printer Spooling many PCusers still think erroneously that print spooling is a network s only use the most common UNIX print spooling protocol is Line Printing Protocol (LPP)" this was introduced in 4.2 BSD (released in 98) allows a central server to be connected to a print resource users can access this resource for other clients inetd: the servers server ahost wanting to support many services could require a process for aserver for each service even onunix systems, the number of idle processes can quickly grow beyond a reasonable size, thus absorbing system resources unnecessarily (servers typically spend most of their time waiting for connections from clients) inetd server accepts connections for a range of protocols and invokes the appropriate servers when needed Services (continued) slide 40 Services (continued) slide 38 System logging (syslog) important for system administrators - it permits logging information to be directed to any host on the network. Remote Shell Protocol (RSH) permits the user to run a shell command on the remote machine. (A form of remote job execution). It uses the same protocol as rcp (remote copy) and rlogin (remote login) commonly known as the R commands Network File System (NFS) provides transparent file access over the network so that remote file appear as if they are local NFS was designed for use over the LANs and is widely used in such environments NFS is widely available for different operating systems: UNIX, Macintosh, DOS clients exist. (Ie at University. ofsouthwales. we use NFS between GNU/Linux, Sun OS)

Naming and infrastructure slide 43 Afew R commands slide 4 there is a need for a mapping of textual domain names to numeric IP addresses difficult to remember 93.63.30.52 is the class C address for floppsie! also require services such as a consistent time between different machines rup list all machines which are up and running and report their load average rusers list all users logged in over the (local!) network rwho list all (local) users and where they are logged in Domain Name Service (DNS) slide 44 More Rcommands slide 42 the Internet standard DNS maps host names, such as floppsie.comp.glam.ac.uk to IP addresses such as 93.63.30.52 DNS namespace is partitioned hierarchically into a tree glam.ac.uk - may map onto several class C networks floppsie.comp - indicates a machine within the computer studies network an interface card on class C network 93.63.30.xx netfind try to find a particular user and give this persons email address. rcp allows a user to copy files between machines ie: rcp merlin:/user/fred/foo lancelot:/user/mary/bar copying from source to destination

Communication services slide 47 Naming and infrastructure (continued) slide 45 many different services provided above TCP/IP one of the most widespread use of computer networks is to communicate with other people we could have a simple lookup table that is manually updated soon becomes unmanageable use a dynamic mechanism, domain name service one of the oldest utility is Electronic mail users compose a message with a user agent (UA) auser agent is an editor which passes the composed message to a MTA one of the oldest is the UNIX program/bin/mail one of the newest isoutlook have a machine which will keep track of IP addresses and ASCII names if it cannot resolve aname it requests help from another machine higher up the tree the DNS protocol specifies how DNS clients ask DNS servers for mappings and how DNS servers communicate with each other. Communication services slide 48 Network Time Protocol slide 46 these programs send the message to a message transfer agent (MTA) typically this information is sent using SMTP (Simple Mail Transfer Protocol) SMTP is the Internet standard protocol and all MTAs on the Internet use SMTP. one of the dangers of SMTP is that it is relatively insecure (it is possible to forge email messages!) used so that different hosts can keep the same time of day required by many applications - email to ensure that you don t receive a message before it was sent! Network News Transfer Protocol (NNTP) protocol for delivering and accessing USENET news over Internet

IP Configuration slide 5 Example IP configuration slide 49 every IP address actually refers to the interface card and NOT the machine! thus a gateway machine will have at least two interface cards to add a new machinefloppsie onto the Computer Studies network floppsie s interface card has to be assigned a unique IP address first three numbers the same as the Computer Studies network (93.63.30) class C network - means first 3 bytes are always the same last number is the interface card number (hostid) 52 93.63.30.52 Case study - adding a machine onto the Computer Studies network the IP network in Computer Studies connects: Apple computers NT SPARC machines GNU/Linux routers and various print services, etc IP Configuration slide 52 Example IP configuration slide 50 software on the new machine needs to know: the gateway onthe Computer Studies network to other networks its own interface card IP address! the nameserver IP address. The nameserver translates all ASCII names to IP numerical addresses. hop metric given with each gateway each machine may run a different protocol above the IP layer if they wish but most machines will run the IP protocol the Computer Studies IP network is connected (via a gateway) to the University of Southwales IP network in turn is connected to the world IP network via another gateway (through the University of Southwales M bit line)

IP Configuration slide 53 World IP network University of Southwales 93.63.34.00 DNS (Nameserver) 93.63.34.2 Gateway 93.63.34.x Somemachine Floppsie 93.63.30.52 Dept of Computer Studies 93.63.30.0 Gateway 93.63.30.254