1 / 130

TCP/ IP BCS-061

TCP/ IP BCS-061. SESSION -1. 2. Presentation Title | July 27, 2010 | <document classification>. Introduction.

Download Presentation

TCP/ IP BCS-061

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TCP/ IP BCS-061

  2. SESSION -1 2 Presentation Title | July 27, 2010 | <document classification>

  3. Introduction • Transmission Control Protocol (TCP)/Internet Protocol (IP) is a set of protocols developed to allow computers of all sizes from different vendors, running different operating systems, to communicate or to share resources across a network. • A packet switching network research project was started by the USA Government in late 1960s, became the most widely used form of computer networking. This project centered around ARPANET. • ARPANET is the best known TCP/IP network. 3 Presentation Title | July 27, 2010 | <document classification>

  4. TCP/IP is the principal UNIX networking protocol. This was designed to provide a reliable end-to-end byte stream over an unreliable inter network. • TCP is a connection_oriented protocol while IP is a connection less protocol. • TCP supplies logic to give a reliable connection-oriented protocol above IP. • It provides a virtual-circuit that two processes can use to communicate. 4 Presentation Title | July 27, 2010 | <document classification>

  5. 1P (Internet Protocol) provides a connection less and unreliable delivery system. • It considers each data gram independently. • UDP (user data gram protocol) is a connectionless and unreliable protocol. • It adds a checksum to IP for the contents of the data gram and pass members. 5 Presentation Title | July 27, 2010 | <document classification>

  6. Origin of TCP / IP : HOW? • Communication (i) Early Methods (drumbeats / smoke / fire /pigeon / flashing lights) (ii) Postal Services (East India company in Metro cities introduced postal system in 1766) (iii) Telegraph (first electronic medium for global communication: which send / receive electrical signals over long distance wires) (iv) Telephone (v) Computers and Internet 6 Presentation Title | July 27, 2010 | <document classification>

  7. ARPANET first electronic-mail network • National science foundation (NSF) helped connect universities and non-military research sites to the ARPANET • Router : It is used to connect physically distinct networks by NIC (Network Interface Card) ROUTER NETWORK X -------- NETWORK Y • A router is a device with more than one NICs. Router can connect incompatible networks as it has the necessary hardware and protocols (TCP / IP) 7 Presentation Title | July 27, 2010 | <document classification>

  8. TCP/IP LAYERING Transmission Control Protocol (TCP) : Provides a reliable data stream service to network application programs. * The various gateways uses TCP to communicate with mail programs on other TCP/IP nodes. * Third-party applications written with the TCP/UDP programming interface can also use TCP. 8 Presentation Title | July 27, 2010 | <document classification>

  9. User-Datagram Protocol (UDP): • Provides an unreliable datagram service to network applications. 9 Presentation Title | July 27, 2010 | <document classification>

  10. TCP /IP Protocol suit at software level defines a packet size, routing algorithms, error control, flow control methods universally • Since it is difficult to deal with complex set of rules, and functions required for computer networking , these rules and functions are divided with logical groups called layers • Each layer can be implemented interdependently with an interface to other layer 10 Presentation Title | July 27, 2010 | <document classification>

  11. ARPANET (Advanced Research Projects Agency) • ARPA in the US Department of Defence (DoD) wanted to find a way to connect computers so that their researchers could share their findings. • 1n 1967, , ARPA proposed its idea for ARPANET, a small network for connecting computers • ARPANET aims to connect different networks together. • Gateway as an intermediate hardware to transfer data from one network to another. 11 Presentation Title | July 27, 2010 | <document classification>

  12. In 1977, the communication between networks was made possible , internet consisting of three different networks- • 1. ARPANET • 2. Packet radio • 3. Packet satellite 1n 1978 ARPA signed a contract with Berkley under which TCP / IP software was incorporated in the operating system itself. 12 Presentation Title | July 27, 2010 | <document classification>

  13. Time Line • In 1983 original ARPANET protocols were abolished and TCP/IP was made standard for internet. • 1969 4-node ARPA established • 1972 internetting project begins • 1973 development of TCP/IP suite begins • 1977 an internet tested using TCP/IP • 1978 Unix distributed to universities • 1983 TCP/IP became the official protocol for ARPANET 13 Presentation Title | July 27, 2010 | <document classification>

  14. TCP / IP Layers & Protocols • The TCP/IP model is made up of 4-Layers • Interface layer • Network or Internet layer • Transport layer • Application layer Interface layer includes the services of data link layer and physical layer of OSI model. In OSI model each layer takes the services of the lower layer. Whereas the layers of TCP/IP protocol contain independent protocols 14 Presentation Title | July 27, 2010 | <document classification>

  15. 15 Presentation Title | July 27, 2010 | <document classification>

  16. 16 Presentation Title | July 27, 2010 | <document classification>

  17. Interface layer: • Interface layer or (Physical + Data Link Layer) • The physical layer deals with the hardware level like transmission media , connections and the voltage for digital signals. • The data link layer deals with media access and control strategies , frame format etc. 17 Presentation Title | July 27, 2010 | <document classification>

  18. Network Layer : • At this layer, TCP/IP supports internetworking protocol. • IP is a host-to-host protocol. • This layer is responsible for the format of data gram as defined by IP and routing a datagram or packet to the next hop. • This layer is not responsible for the accurate and timely delivery of datagrams to the destination in proper sequence. 18 Presentation Title | July 27, 2010 | <document classification>

  19. IP allows raw transmission functions allowing user to add functionalities necessary for given application . • Ensuring maximum efficiency • TCP/IP supports 4-other protocols – in this layer-: • ARP • RARP • ICMP • IGMP 19 Presentation Title | July 27, 2010 | <document classification>

  20. ARP (Address Resoulution Protocol) • ARP is used to find the physical address of a machine when its IP address is known. • RARP (Reverse address resolution protocol ) It is used to find the IP address of a machine when its physical address is known 20 Presentation Title | July 27, 2010 | <document classification>

  21. ICMP (Internet Control Message protocol) In case of failures ICMP is used to notifications to the sender about packet problems . It sends error and query messages IGMP (Internet Group Message protocol) It is used for multicasting, which is transmission of a single message to a group of recipients 21 Presentation Title | July 27, 2010 | <document classification>

  22. Various Protocols at different Layers in TCPIP protocol • In the TCPIIP architecture, application protocols such as SMTP and FTP perform session and presentation layer functions. * A distinct session layer or presentation layer does not exist. • The protocols in each layer provide services to the protocols in the layer above it. For example, TCP relies on IP to move TCP messages through the network.. 22 Presentation Title | July 27, 2010 | <document classification>

  23. In order for your computer to connect to the Internet, it must be installed with a correctly configured TCPIP stack. • A TCP/IP stack is the software that provides an implementation of the TCPIP suite of protocols. This software works in the middle, between the TCP/lP applications running on your computer and your computer's network hardware and associated drivers. 23 Presentation Title | July 27, 2010 | <document classification>

  24. Some TCPIP applications come with their own built-in TCP stack • On Macintosh computers, the standard TCPIIP stack is called Open Transport. 24 Presentation Title | July 27, 2010 | <document classification>

  25. TCP/IP Fundamentals • TCP ( "transmission control protocol") is responsible for breaking up the message into datagram, reassembling them at the other end, resending anything that gets lost, and putting things back in the right order. • IP (the "internet protocol") is responsible for routing individual datagrams. 25 Presentation Title | July 27, 2010 | <document classification>

  26. Demultiplexing • To transfer any datagram TCP keeps track of multiple connections to a given system. • Clearly it is not enough to get a datagram to the right destination. TCP has to know While connecting this datagram is part of. This task is referred to as Demultiplexing" 26 Presentation Title | July 27, 2010 | <document classification>

  27. What is the role of Header in TCP/IP transmission? • The information needed to do this demultiplexing is contained in a series of "headers". • A header is • simply a few extra octets tacked onto the beginning of a datagram by some protocol in order to keep track of it. It's lot like putting a letter into an envelope and putting an address on the outside of the envelope 27 Presentation Title | July 27, 2010 | <document classification>

  28. TCP puts a header at the front of each datagram. • This header actually contains at least 20 octets, but the most important ones are a source and destination "port number" and a "sequence number The port numbers are used to keep track of different conversations. 28 Presentation Title | July 27, 2010 | <document classification>

  29. Parameters of Datagram: • Source Port ( Destination Port Sequence Number • Acknowledgement Number • If we abbreviate the TCP header as "T", the whole file now looks like this: • Data • Offset 29 Presentation Title | July 27, 2010 | <document classification>

  30. The IP Level • TCP sends each of these datagram to IP. Of course it has to tell IP the Internet address • of the computer at the other end. Note that this is all IP is concerned about. • It doesn't care about what is in the datagram, or even in the TCP header. IP's job is simply to find • Checksum • Urgent Pointer • your data ... next 500 octets • Note that TCP and IP have separate checksums 30 Presentation Title | July 27, 2010 | <document classification>

  31. SESSION -2 31 Presentation Title | July 27, 2010 | <document classification>

  32. Ethernet Ethernet designers allocated 48 bits for the Ethernet address. Ethernet is a "broadcast medium". That is, it is in effect like an old party line telephone. When you send a packet out on the Ethernet, every machine on the network sees the packet. So something is needed to ensure that the right machine gets it. This involves the Ethernet header. 32 Presentation Title | July 27, 2010 | <document classification>

  33. Every Ethernet packet has a 14-octet header that includes the source and destination Ethernet address, and a type code There is no connection between the Ethernet address and the Internet address. 33 Presentation Title | July 27, 2010 | <document classification>

  34. How Ethernet controller works? • The Ethernet controller computes a checksum of the entire packet. When the other end receives the packet, it recomputes the checksum, and throws the packet away if the answer disagrees with the original. • The checksum is put on the end of the packet, not in the header. The final result is that your message looks like this: • Ethernet destination address (first 32 bits) ' • Type code 34 Presentation Title | July 27, 2010 | <document classification>

  35. IP header, then TCP header, then your data • Ethernet dest (last 16'bits) • end of your data • Ethernet source (first 16 bits) • Ethernet Checksum • Ethernet source address (last 32 bits) 35 Presentation Title | July 27, 2010 | <document classification>

  36. DOMAIN NAME SYSTEM (DNS) • For human beings wanting to access Internet resources, names are much easier to remember than IP addresses; • The Domain Name System (DNS) was created to provide a mapping between names for Internet resources and their associated IP addresses; • Characteristics of DNS: The fallowing are the characteristics of DNS 36 Presentation Title | July 27, 2010 | <document classification>

  37. Hierarchical naming scheme • Delegation of authority for names • Distributed databases of name to IP address (and IP to name) mappings • Each name authority must operate at least two DNS database servers (name • servers) for their authorized domain • Every TCP/IP implementation has a software routine called the name 37 Presentation Title | July 27, 2010 | <document classification>

  38. CLIENT SERVER MODEL • Most of the TCP/IP applications that you will use across the Internet operate on a client-server model. In this model, the actual machines and applications that you use to get information (World-Wide-Web browsers, Gopher browsers, electronic mail programs, News reading programs, IRC chat programs, etc.) are the clients. The machines and programs that provide the information are the servers. 38 Presentation Title | July 27, 2010 | <document classification>

  39. Clients and Servers • a specific machine can be both a client and a server. For example, if you are using your PC to browse the World Wide Web, your PC is a client. When a colleague of yours connects to that same machine to copy a file to his machine, your machine is a server.m 39 Presentation Title | July 27, 2010 | <document classification>

  40. 40 Presentation Title | July 27, 2010 | <document classification>

  41. 41 Presentation Title | July 27, 2010 | <document classification>

  42. Client server computing • An application that initiates peer-to-peer communication is called a client. • Most client Software consists of conventional application programs. • Each time a client application executes, it contacts a server, sends a request and awaits a response. When the response arrives client continues processing 42 Presentation Title | July 27, 2010 | <document classification>

  43. 43 Presentation Title | July 27, 2010 | <document classification>

  44. Server must contain code that handles issue of : Authentication : verifying the identity. Of client; Authorization: determining whether a given client is permitted to access the. server supplies; Data Security: guaranteeing that data is not unintentionally revealed or compromised Protection: guarantees the network application cannot abuse technically. 44 Presentation Title | July 27, 2010 | <document classification>

  45. Internet addresses • TCP supplies logic to give a reliable connection-oriented protocol above IP. • It provides virtual circuit that two processes can use to communicate. • In order to use a service one must be able to find it. The Internet uses an address scheme for machines so that they can be located. 45 Presentation Title | July 27, 2010 | <document classification>

  46. The address is a 32 bit integer which gives the: • IP address This encodes a network ID and more addressing. The network ID falls into various classes according to the size of the network address. Network address • Class A use 8 bits for the network address with 24 bits left over for other addressing. • Class B uses 16 bit network addressing. • Class C uses 24 bit network addressing and class D uses all 32. 46 Presentation Title | July 27, 2010 | <document classification>

  47. Host address : 8 bits are finally used for host addresses within subnet (if it exists-typically for class B network addressing). • This places a limit of 256 machines that can be on the subnet. • Total address : The 32 bit address is usually written as 4 integers separated by dots. 47 Presentation Title | July 27, 2010 | <document classification>

  48. 48 Presentation Title | July 27, 2010 | <document classification>

  49. 49 Presentation Title | July 27, 2010 | <document classification>

  50. 50 Presentation Title | July 27, 2010 | <document classification>

More Related