1 / 60

How the Internet Works? ( TCP/IP, DNS … )

Learn how the internet works, how computers send data, and the different protocols and connection methods used. Explore various communication channels, including telephone lines, modems, DSL, cable modems, satellite, microwave, and wireless connections. Understand the role of network interface cards, routers, hubs, and repeaters in interconnecting networks. Discover the basics of internet structure, packet switching, IP addresses, and network numbering.

courtneya
Download Presentation

How the Internet Works? ( TCP/IP, DNS … )

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How the Internet Works?( TCP/IP, DNS… )

  2. How computers send data? Protocol Connection method Channel Address

  3. what kind of media? Communication Channel • Telephone line (Twist pair, Optical fiber) • Modulator-Demodulator (Modem) • Digital Subscriber Line (DSL) • Cable modem • Satellite, Microwave • Wireless connection (IR, RF)

  4. Different medium • Twisted pair • RJ45 connector • Coaxial cable • BNC connector • Fiber optic cable • Different cabling length • Optic > coaxial > Twisted pair

  5. Use Modem Digital data - 10101010101 • Modulation / De-modulation • E.g. CU Dialup Pool (56kbps max.) Telephone line Analog data

  6. Why ADSL? Use Digital Subscriber Line (DSL) Traditional phone line ADSL modem

  7. Why ADSL? • Asymmetric DSL • A slower upstream (upload) can trade off a faster downstream (download) speed. • 128 to 640 kbps (upstream) • 1.5M to 5M bps (downstream)

  8. Use Cable Modems • Use coaxial cable to carry TV signal and High speed Internet access

  9. Satellite & Microwave • Satellite systems • Use satellites orbiting above the Earth to relay signals from one part of a WAN to another, cause 0.5 to 5 sec delays. • Microwave • Costly to install but cheaper than satellite. • It is very useful for connecting networks that are separated by a barrier, such as a highway or a lake. • Requires line of sight.

  10. Using A Computer To Interconnect Networks • Special-purpose computers are used to interconnect networks. • Using standard hardware (CPU, memory, and network interfaces) • Running special-purpose software

  11. Network Interface CardNIC • Physically connects a computer to the transmission medium on a network.

  12. Hardware/Physical/MAC (Media Access Control) address • When a NIC is manufactured, the card is given a unique hardware address. • It never changes.

  13. Routers • Interconnecting computers are called routers by using the same protocol. • Determining where to send packets Router

  14. Hubs • A network cable connects a computer via a network card to a hub. • Provides a central location.

  15. Ports • A hub contains sockets or ports. • Some LED indicates information transferred through the port.

  16. Ethernet Repeater • A repeater is a device that strengthens and retransmits signals on a network.

  17. Network Architecture • It refers how information transfers on networks. • Ethernet • It the most popular architecture used to build networks. • Least expensive and easiest to setup • Token-ring architecture • It was developed by IBM in 1984. • They are popular found in large organizations, such as banks and insurance companies. • Others: ARCnet, AppleTalk, …

  18. Ethernet & Token Ring • Ethernet, Fast Ethernet, Gigabit Ethernet (transmit data at 1Gbps).

  19. Postal Services • You have to write a complete address on the envelope specifying the country, state, city, district, street, and so on. • After put the letter put into the mailbox, it will be delivered (routed) to its destination in a hierarchical way. • California Post Office knows the letter is sent to NC, without concerning the actual address to be routed within NC.

  20. Basic Internet Structure • The Internet works in a similar way as postal services. • Roughly speaking, you may consider states within this country, as individual networks connecting to each other. • The different pieces of the Internet are connected by a set of computers (Gateways) • Translates between protocols

  21. Postage over the Internet • When delivering information via the Internet, the information is split into small units called data packets (1500 byte each) • When a packet is sent from California to a particular host in UNC. • The packet is first delivered to NC, • then is further transmitted to UNC, • then is further transmitted to the appropriate department, • finally arrived to the specific host. • The data is reassembled at the destination. • The data packet is continuously being switched from the source to destination. • The Internet is said to be Packet Switching Network.

  22. Packet Switching Network

  23. Packet switching example Figure 16.1 An example internet with four networks connected by routers. Figure 16.2 Cars from two roads merging onto another road are analogous to packets from two networks merging onto a third network.

  24. IP address • Each host in the Internet is assigned to a specific and unique number for identification. • This number is called the IP address of the specific host. • This number is divided into 4 parts for improving the readability. • The range of each number is between 0 and 255. • E.g. 0.0.0.0 • 255.255.255.255 • For example, the host “UNC.edu” has its IP address of “152.2.240.8”

  25. Network Number / Host Number • IP addresses are split into 2 parts • A network number + a host number • For example, 152.2 is the network number of UNC, 240.8 is the host number of the host “UNC.edu” • Network numbers are assigned by a central authority, the Internet Corporation for Assigned Names and Numbers (ICANN).

  26. Network Classes • There are 5 classes of IP address • Class A comprises networks 1.0.0.0 to 127.255.255.255, the network address is in first quad. It allows roughly 16 million hosts per network. • Class B comprises network 128.0.0.0 to 191.255.255.255, the network address is in the first two quads. It allows for 16,382 networks with up to 64K hosts.

  27. Network Classes • Class C comprises networks 192.0.0.0 to 223.255.255.255, with the network number contained in the first three quads. It allows about 2 million networks with up to 254 hosts in each network. • Class D and E are falling into the range of 224.0.0.0 to 254.0.0.0 which are reserved for multicast address and for special purpose use.

  28. Subnet • The Internet is structured hierarchically. UNC consists of many academic departments and administrative bodies. • IP allows you to subdivide a network into several subnets. E.g. SILS and Davis Library are two subnets inside UNC. • Each subnet is identified by a subnet number. • E.g. we have a different way to interpret the IP address 152.2.62.223 (the ILS server) • 152.2 refers to the network number of UNC, • 62 refers to the subnet number of Davis Library, • 223 refers to the host number of “afton”.

  29. Dynamic Host Configuration Protocol (DHCP) • A Protocol for assigning dynamic IP address to devices on a network. • It is built on client and server models. • Server is the machine running DHCPD. • Client can be any network devices. • Advantage? • Eliminates manual configuration of network parameters and utilizes the use of IP address

  30. IP Routing • The process of transmitting a data packet from the source to the destination via a series of intermediate stations is called “Routing”. • IP routing works as follow: • Each data packet is labeled with IP address of the destination host 152.2.90.1841500 bytes Data here

  31. IP Packet • Includes Header, payload, data

  32. Packets Are Not The Same Size • Packets may be any size up to the maximum. • Can be as small as a single keystroke • Can be larger, depending on application

  33. IP Routing • For example, when a packet is routing to “UNC.edu” (152.2.62.223), the network number is extracted as 152.2 which is the network number of UNC. The packet is then sent to NC and then to UNC. • Inside UNC, the subnet number is examined and it is 62 which is the subnet number of Davis. Then it is sent to Afton. • Inside Davis, the host number is examined and it is 223 which is the host number of Afton. Finally, it is routed to the destination.

  34. IP enough for routing? • A single packet is limited in length, usually 1-1500 bytes. • Network may lose packets, or damage the data in transit. • Packets may arrive out of sequence (different routing path). • TCP is used to solve the problems.

  35. Protocol and Addressing • To communicate over the Internet, the computers must: • use a common language or a protocol to govern the exchange of messages. • have a way to address one another. • Protocol: • specifies exact format, order of messages sent and received among network entities, and actions taken on message transmission and receipt. • Addressing: • defines where to deliver the messages.

  36. Protocol and AddressingTCP/IP model

  37. Protocol and Addressing • Internet has a large collections of protocols organized in a layering model. • Application: enables the user, whether human or software, to access the network. • Transport: responsible for source-to-destination (end-to-end) data transfer. • Network: responsible for routing packets from source-to-dest across multiple networks. • Data link: responsible for data transfer between neighboring network elements. • Physical: coordinates the functions required to transmit a bit stream over a physical medium.

  38. L5 data L5 data Protocol and Addressing • Lower layer adds header to the data from upper layer. Header includes addressing and other fields.

  39. Protocol Stack - Open Systems Interconnection (OSI) model

  40. Protocol and Addressing • TCP/IP Protocol Suite.

  41. What is TCP/IP? • “TCP would be in charge of the breaking up the packets and messages then reassembling them at the destination, and the IP would be responsible for transmitting the individual packets. For example: the TCP protocol would split up the letter and place it into multiple envelops, while the IP protocol would be in charge of addressing the envelop and making sure it arrived at its proper destination.” • – from “Where Wizards Stay Up Late”

  42. TCP/IP • A protocol is a collection of rules for formatting, ordering, and error-checking data sent across a network. • In 1974, Vincent Cerf and Robert Kahn developed the Transmission Control Protocol (TCP) which was further split into the Internet Protocol (IP) and TCP in 1978. • In 1982, DoD adopted TCP/IP as the standard protocol in the Internet. • Because the significance of TCP/IP in the history of the Internet, Cerf and Kahn are considered to be the Father of the Internet.

  43. Transmission Control Protocol - TCP • Basic functions • Decompose a lengthy data into multiple packets for transmission • Error detection, ensure validity • Packet loss? • No problem, packet retransmission

  44. Sequence Numbers • TCP breaks the information into multiple packets. • Each packet is associated with a sequence number for identification. 152.2.90.184 Number 1Data here 152.2.90.184 Number 2Data here 152.2.90.184 Number 3Data here • Each packet is individually routed in the Internet, and arrive in random order. • The data is reassembled in the correct order according to the sequence number.

  45. Packet Retransmission • A packet may be lost during the transmission across the Internet (host down, link failure, … ) • When the destination host has been waiting for a particular packet for a certain time (timeout), it will request the source host to retransmit the packet. • There is no need to retransmit all data packets. Instead, only the missing packet, which is identified by the sequence number, needs to be retransmitted.

  46. Error detection - Checksums • Transmission errors occur even if a data packet is received by the destination successfully. • How to ensure the data is correctly received? • A method to detect possible transmission errors. • At the destination, checksum is recalculated based on the received data. • The attached checksum and the newly calculated checksum are compared. Mismatch means there is transmission errors occurred.

  47. IPv6 (IP version 6) • Major changes: • More addresses • IP address size from 32 bits to 128 bits • Simplified IP headers • Reduction of header fields in IP packet • Added security features

  48. IPX/SPX Protocol • IPX/SPX makes up the protocol suite that is used to transfer information on networks running the Novell NetWare operating system. • Internetwork Packet Exchange (IPX) - Transfer information between devices. • Sequenced Packet Exchange (SPX) - An extension of the IPX protocol.

  49. NetBEUI Protocol • NetBIOS Extended User Interface • Is a network protocol used on small local area networks. • A very small and efficient protocol, use little computer resources. • NetBIOS • Network Basic Input/Output System • Develop by IBM and allow computers to communicate with each other on a network.

  50. Why DNS? • What is DNS? • Domain Name System • IP address is difficult to remember. • 152.2.92.1 is which machine? • Names are given to each computer on the Internet for the convenience of human users. • Besides IP addresses, all internet applications allow users to use computer names.

More Related