270 likes | 321 Views
Learn about Internet Protocol (IP), TCP/IP and OSI Models, subnetting examples, IP packet structure, and more. Explore ARP, ICMP, TCP, UDP, DNS, and HTTP for a thorough understanding.
E N D
Internet Protocol (IP) ITEC 370 George Vaughan Franklin University
Sources for Slides • Material in these slides comes primarily from course text, Guide to Networking Essentials,Tomsho, Tittel, Johnson (2007). • Other sources are cited in line and listed in reference section.
Subnetting with Classless IP Addressing: Example 1 (Continued)
Subnet 0 194.10.3.0 - 194.10.3.31 Subnet 1 194.10.3.32 - 194.10.3.63 Subnet 2 194.10.3.64 - 194.10.3.95 Subnet 3 194.10.3.96 - 194.10.3.127 Subnet 4 194.10.3.128 - 194.10.3.159 Subnet 5 194.10.3.160 - 194.10.3.191 Subnet 6 194.10.3.192 - 194.10.3.223 Subnet 7 194.10.3.224 - 194.10.3.255 Network Diagram of Subnets
IP Packet Structure (Cont.) (IP Structure, n.d.) • Version (4 bits) • IP Version (e,g, IPv4) • IHL (4 bits) • Internet header length in 32 bit words • Minimum length is 5 (32 bit words) • Type of Service (8 bits) • A set of values used to specify desired Quality of Service (QoS). • Total Length (16 bits) • Length of datagram in octets, including header (max 65, 535)
IP Packet Structure (Cont.) (IP Structure, n.d.) • Identification (16 bits) • A unique value for sender, receiver to aid in assembling fragments of a datagram • Flags (3 bits) • Fragmentation control flags • Fragment Offset (13 bits) • Fragment position in datagram • Time to Live (8 bits) • Time to live in seconds • Each hop decrements this field be at least 1 (even if less than a second per hop) • Prevents packets from floating around forever in a misconfigured network.
IP Packet Structure (Cont.) (IP Structure, n.d.) • Protocol (8 bits) • The upper layer protocol that generated this datagram • Examples: ICMP, TCP, UDP, GRE, etc. • Header Checksum (16 bits) • Used to detect errors in IP header only • Since ‘Time to Die’ changes at each hop, checksum is also recomputed at each hop. • Source IP Address (32 bits) • Destination IP Address (32 bits) • Options (Variable in bit size) • Padding (Variable in bit size) • Enough bits to round out the last word to 32 bits.
Internet Protocol (IP) • Network Layer • Supports packet data communication across an internetwork. • Source and Destination logical addressing, routing • IP addresses (not layer 2 MAC addressing) • Connectionless • No circuit setup before use • Fast but not reliable • Best effort delivery
Internet Control Message Protocol (ICMP) • Network Layer • Used to send error and control messages • Used by ‘Ping’ utility • Used when ‘Time to Live’ (TTL) value reaches zero • An ICMP message is sent back to the source
Address Resolution Protocol (ARP) • Network Layer • Used to resolve logical (IP) address to physical (MAC) address • Can only be used for two systems in same network (subnet).
ARP Example • Device A needs to send a message to Device B • Before device A can send message, it needs the following addresses for device B: • IP (logical address) • MAC (physical address) • Device A sends out ARP broadcast message to all devices in same network as Device A. • Device B recognizes IP address in ARP and sends back MAC address to Device A • Device A now has 2 addresses necessary for send message to device B.
Transmission Control Protocol (TCP) • Transport Layer • Accepts messages of any length from upper layers • Connection-Oriented • Uses 3-way handshake to establish connection • A sends ‘Synchronize’ (SYN) message to B • B sends ‘Synchronize Acknowledgement’ (SYN-ACK) message back to A • A sends a ‘Forward Acknowledgment’ (ACK) to B • Connection between A and B is now established. • TCP is responsible for fragmenting application into segments • TCP is responsible for reassembling the application data from segments. • TCP uses Acknowledgment messages to: • Ensure that data is properly received. • Manage flow control
User Datagram Protocol (UDP) • Transport Layer • Connectionless • Similar to IP, but operates at Transport Layer, therefore, directly accessible to applications • Faster, but less reliable than TCP • UDP itself does not segment application data • UDP does not use acknowledgements • UDP is used by some higher layer protocols such as NFS and DNS.
Domain Name System (DNS) • Application Layer • Domain Name-to- IP Address resolution system • Used for translating domain name based URLs and email addresses into IP addresses • einstein.franklin.edu 65.24.7.3 (try ‘nslookup einstein.franklin.edu’) • Once a name has been resolved, it is often cached to limit traffic on Domain Name Servers • Cache has figured value for ‘Time To Live’. • When an IP to Domain Name mapping is changed, it may take on the order of hours for caches to catch up
Hypertext Transport Protocol (HTTP) • Application Layer • Web-pages, browsers, servers • Runs on top of TCP
File Transfer Protocol (FTP) • Application Layer • Runs on top of TCP • Used to send and/or manipulate text and binary files from one computer to another. • Example FTP Application: WinSCP
Telnet Protocol • Application Layer • Runs on top of TCP • Used to establish a remote, text-based session from one computer to another • Example Telnet application: PuTTY.
Simple Mail Transport Protocol (SMTP) • Application Layer • Runs on top of TCP • De facto standard protocol for email programs.
Dynamic Host Configuration Protocol (DHCP) • Application Layer • UDP Based • Allows a device to obtain a temporary IP address from a DHCP server. • Server must be configured with a block of IP available IP addresses. • In addition to providing a temporary IP address, DHCP can also provide the following information: • Default Gateway • Subnet Mask • Broadcast based protocol sent during boot: • Client leases the address the server assigns to it • If no answer is received, in an APIPA-enabled OS, the computer assigns itself an address (169.254.x.x)
Network Address Translation (NAT) • Allows a company to use private IP addresses within the company. • Router maps private IP addresses to a smaller pool of public IP addresses. • Home routers use this technique for private IP addresses such as 192.168.1.x • Also provides security since devices outside of private network can’t see private IP addresses. • NAT has greatly extended the life of IPv4 • IPv4 supports less than 4 billion IP addresses • NAT uses these IP addresses very efficiently.
Port Address Translation (PAT) • PAT extends the efficiency of NAT • PAT maps private IP address, port combination to public IP address, public port. • Example: • 192.168.1.3, port 5005 -> 201.35.2.33 port 80 • 192.168.1.4, port 5006 -> 201.35.2.33 port 23 • PAT can allow thousands of workstations to reuse the same IP address. • Ports 1024 through 65535 can be used by router for remapping
IP Addressing Tools • Looking up an IP address: • http://psacake.com/web/eg.asp • Subnetting: • http://ccna.exampointers.com/subnet.phtml
IPv6 Address Scheme • Hexidecimal grouped in 16 bit sections: • 2001:1b20:302:442a:110:2fea:ac4:2b • Leading zeroes are eliminated • 2 or more 16 bit fields of all zeros can be ignored, as long as there is only one double colon in the address: • 2001:260:0:0:0:2ed3:340:ab (long form) • 2001:260::2ed3:340:ab (short form) • IPv6 has 3 parts:
References Tomsho, Tittel, Johnson (2007). Guide to Networking Essentials. Boston: Thompson Course Technology. Odom, Knott (2006). Networking Basics: CCNA 1 Companion Guide. Indianapolis: Cisco Press Wikipedia (n.d.). OSI Model. Retrieved 09/12/2006 from http://en.wikipedia.org/wiki/OSI_Model IP Structure (n.d.). IP Packet Structure. Retrieved 03/04/07 from http://www.freesoft.org/CIE/Course/Section3/7.htm