SlideShare une entreprise Scribd logo
1  sur  66
Networking &
Internetworking
Connecting People, Places, and
Everything Else
Networks
 Any connection between two or more computers
 e.g. Even when you connect two computers via a USB
cable
 Networks use a set of low-level protocols (rules for
communication)
 e.g. TCP/IP, IPX/SPX (Internetwork Packet Exchange/Sequenced
Packet Exchange)
 Networks use standardized hardware
 e.g. Twisted pair cabling & Ethernet hubs, ATM
switches & optical fibre cabling
Network Speed
 A network’s speed can be summed up with two
values:
 Bit rate:
 How many bits can be placed on the network in a
given time interval (e.g. 1 second)?
 This is often called bandwidth, but this is a misnomer
since bandwidth has to do with the range of
frequencies to be used
 Bit rate becomes the dominant factor when sending
many packets (e.g. a large file)
 Latency:
 How long does it take a bit to be received by the
destination node?
 Latency becomes the dominant factor when sending
individual packets, or alternating sending/receiving
A Local Area Network (LAN)
Networks: Purpose
 Sharing files
 FTP, NFS, SMB(server message block)
 Communicating
 E-Mail, instant messaging, games
 Executing programs remotely
 rlogin, telnet
Network Messaging
 Most local area networks use electrostatic
network hardware
 The wires transmit messages using electricity
 The transmission hardware charges the wire
positively or negatively to indicate 1 and 0
respectively
 The reception hardware senses the charge
Internetworking: internets (WANs)
 e.g. The Internet
 Any connection between two or more
networks
 e.g. An Ethernet network connected to another
Ethernet network by glass fibre cable and
ATM switches
An Internet
LAN A LAN B
LAN C LAN E
LAN D
Backbone A
Internets: Purpose
 Larger scope
 Access more shared files
 Communicate with more people
 Execute programs on more machines
Network Properties
Networking Fundamentals for Specific
Network Types
Important Network Properties
 Scope: A network should provide services to
several applications
 Scalability: A network should operate
efficiently when deployed on a small-scale as
well as on a large-scale
 Robustness: A network should operate in
spite of failures or lost data
Important Network Properties
 Self-Stabilization: A network, after a failure
or other problem, should return to normal (or
near normal) without human intervention
 Autoconfigurability: A network should
optimize its own parameters in order to
achieve better performance
 Safety: A network should prevent failures as
well as prevent failures from affecting other
areas of the network
Important Network Properties
 Configurability: A network’s parameters
should be configurable to improve
performance
 Determinism: Two networks with identical
conditions should yield identical results
 Migration: It should be possible to add new
features to a network without disruption of
network service
Network Usage
 Ideally, the network usage should be
maximized
 If network resources are unused, the network
is not being used efficiently
 Unused network resources could be used to
provide higher throughput to hosts
 This typically becomes a problem in routing
 If all routers choose the single optimal path,
some (less than optimal) regions of the
network will be unused
The Internet
The Information Age
Internet History
A Condensed Timeline of Internet
Development and Research Projects
The Birth of Arpanet
 Developed by ARPA (Advanced Research
Projects Agency)
 A packet-switched network connecting a
number of LANs, called Arpanet
 Used primarily for connecting the networks of
the U.S. Government’s defense initiative
(DARPA, which was a branch of the DoD)
 Became a useable internet in 1977
The Internet Split
 Originally, Arpanet was strictly military and defense-
oriented
 Arpanet was converted to use the new standard
TCP/IP protocol set (1980)
 The Defense Communication Agency (DCA) split
Arpanet into two networks (1983):
 Arpanet: To be used for internetworking research
projects
 Milnet: To be used strictly for military purposes
A Military & University Internet
 The University of California (at Berkeley)
incorporated TCP/IP programming into its
BSD UNIX operating system (1983)
 ARPA funded research projects at many
Universities in order to make then internet-
capable (1983-1989)
 BSD UNIX developed the socket network
programming model commonly used today
 It was now possible for anyone to write
internet applications
 This resulted in a boom of internet applications,
many of which survive to this day
A Public Internet
 It became practical for private organizations
to connect to the Internet (mid-late 1980s)
 Due to inexpensive hardware
 The Internet Architecture Board (IAB) was
empowered to manage research
 Coordinates and focuses research and
development with regards to the Internet and
TCP/IP
Internet Implementation
Under the Hood
TCP/IP
 A considerably large part of this course
 The underlying network protocols upon which
application-level protocols are built
 e.g. HTTP, SMTP, IMAP(Internet Message Access Protocol
 TCP/IP is the framework for the Internet
TCP/IP
 TCP/IP is actually two protocols:
 TCP: Transport control protocol
 Creates reliable transport (handles lost
messages), offers a logical stream of data
(reorders mixed up messages)
 IP: Internet protocol
 Defines addressing (e.g. 137.207.32.2), routing
protocols (how to get messages from source to
destination), etc.
Internet Messaging
 TCP is a reliable protocol
 If a message does not arrive, it is re-sent
 Messages must be acknowledged by their
recipients before a certain time expires
 The message’s time-to-live (TTL) value
Layered Architectures
Schemes for Organizing the
Responsibility of Networking Components
Network Service Models
 Provide a layered abstraction for networking
 Each layer performs specific tasks
 Between each layer is an interface
 e.g. The hardware access layer might interact directly with
the hardware, providing a hardware-independent interface
to higher layers
 The same layer at the source and the destination are known
as ‘peer’ layers
 e.g. A ‘transport’ layer may provide reliable messaging, so
the transport layer in the source and destination will
communicate to ensure each message arrived in tact
Network Service Model
Sender Receiver
Layer n Layer n
……
Layer 2 Layer 2
Layer 1Layer 1
Network
Lowerlevel
Higherlevel
The OSI Reference Model
 A layered service model developed by the
International Standardization Organization
(ISO)
 Defines 7 conceptual layers
 Each serves a very specific purpose
 OSI: Open System Interconnection
 Developed as a reference to be used for all
future protocols
The OSI Reference Model
 The 7 layers are (highest to lowest level):
1. Application
2. Presentation
3. Session
4. Transport
5. Network
6. Data link
7. Physical
The OSI Reference Model
Application Application
Presentation Presentation
Session Session
TransportTransport
Network Network
Data linkData link
Physical Physical
protocol
protocol
protocol
protocol
protocol
protocol
protocol
The OSI Reference Model
 Represents the actual network hardware
 Deals with problems such as:
 Sending signals across wires
 e.g. Charging a wire with a specific voltage
 Converting bits to signals
 Even two Ethernet cards may have different physical
layers, as this layer deals with hardware specific
concerns
Physical Layer
The OSI Reference Model
 Represents the interface to the network
hardware
 Deals with problems such as:
 Transmission of groups of bits
 e.g. Groups of bits might represent an ASCII text
string, a floating point number, or a chunk of
binary data
 Verifying data integrity (using checksums)
Data Link Layer
The OSI Reference Model
 Handles the connection between sender and receiver
 Deals with problems such as:
 Determining a path from the sender node to the
recipient node (i.e. routing)
 Determining the correct recipient (i.e. addressing)
 Network congestion
 Fragmenting data into packets
 Reassembly of packets
Network Layer
The OSI Reference Model
 Represents an end-to-end reliable
communication stream
 Deals with problems such as:
 Lost (unacknowledged) packets
 Duplicate packets
 Reordering packets
Transport Layer
The OSI Reference Model
 Represents a dialogue between sender and receiver
 Somewhat irrelevant in today’s networks
 Handles the establishment of an authenticated
connection to the receiver
 Deals with problems such as:
 Authentication of the sender node on the packet
assembler and dissembler (PAD)
 This is a remote computer which provided the lower
layers in a shared manner, which required
authentication
Session Layer
The OSI Reference Model
 Specifies data representations so that both sides can
determine how to read data
 e.g. How many bytes to use for floating point values
(including compressed as well as uncompressed
values, encryption)
 e.g. What is the order of the bytes?
 Uses an ISO-defined standard for these
representations: Abstract Syntax Notation 1 (ASN.1)
Presentation Layer
The OSI Reference Model
 Defines what data is stored in the message
(specific to each application)
 e.g. An E-Mail application would store such
things as recipient, subject, and body text into
an E-Mail application-level message
 e.g. A web server would put header
information (information about the server & the
document) as well as the document itself into
its application-level messages
Application Layer
Session Message:
•Session Header
•Recipient
•Subject
•Body
Message:
•Recipient – CHAR(9)
•Subject – CHAR (17)
•Body – CHAR (243)
Frame:
•Data Link Header
•Network Header
•Transport Header
•Session Header
•Recipient
•Subject
•Body
OSI Reference Model: An Example
Application
Presentation
Session
Transport
Network
Data link
Physical
E-Mail:
•Recipient
•Subject
•Body
Network01001101111010010011001…
Network Frame:
•Network Header
•Transport Header
•Session Header
•Recipient
•Subject
•Body
Transport Message:
•Transport Header
•Session Header
•Recipient
•Subject
•Body
OSI Reference Model: Routing
Application
Presentation
Session
Transport
Network
Data link
Physical
Application
Presentation
Session
Transport
Network
Data link
Physical
Network
Data link
Physical
Router
OSI Reference Model Overview
 Each layer provides some abstraction to the higher
levels
 e.g. The physical layer actually charges the wire
 Higher layers need not worry about how to charge the
wire
 e.g. The transport layer ensures that message arrive
 Higher layers can assume that messages will arrive,
and will not be lost
 The OSI reference model was used as the basis for
X.25 networks.
The TCP/IP Service Model
 Researchers developing the TCP/IP protocol
suite also developed a layered reference
model
 The TCP/IP reference model consists of 5
layers
 3 software layers
 1 software & hardware layer
 1 hardware layer
The TCP/IP Service Model
 The 5 layers:
1. Application
2. Transport
3. Internet
4. Network Interface
5. Hardware
The TCP/IP Service Model
 Defines what data is stored in the message (specific
to each application)
 e.g. An E-Mail application would store such things as
recipient, subject, and body text into an E-Mail
application-level message
 e.g. A web server would put header information
(information about the server & the document) as well
as the document itself into its application-level
messages
 Essentially, this layer is identical to the application
layer in the OSI reference model
Application Layer
The TCP/IP Service Model
 Handles end-to-end communication
 Divides the data into manageable chunks of
information (packets)
 Provides reliable communication
 Ensures that all packets are received
 Provides error-free communication
 Uses a checksum to verify data integrity
 Implemented by the TCP protocol
 Transport control protocol
Transport Layer
The TCP/IP Service Model
 Handles communication between machines
 The path of a message is determined (routing)
 The destination of a message is determined
(addressing)
 Implemented by the IP protocol
 Internet protocol
Internet Layer
The TCP/IP Service Model
 Handles low level interaction with hardware
 Issues commands to the hardware to transmit a
number of bits (1 or 0)
 Deals with hardware-specific concerns
 Implemented by the device drivers for the hardware
installed into the operating system
 Essentially, this layer is identical to the data link layer
in the OSI model
Network Interface Layer
The TCP/IP Service Model
 Actually transmits signals onto the network
 Deals with issues such as:
 How to transmit signals (e.g. electrify the wire)
 How to detect problems (e.g. collisions)
 Represents the actual network hardware
 Essentially this layer is identical to the physical layer
in the OSI model
Hardware Layer
TCP/IP Service Model: Example
Application
Transport
Internet
Network
Interface
Hardware
Network01001101111010010011001…
IP Datagrams:
•IP Header
•TCP Header
•Data Bytes
Transport Packet:
•TCP Header
•Data Bytes
E-Mail:
•Data Bytes
Network Frame:
•IP Header
•TCP Header
•Data Bytes
TCP/IP Service Model: Routing
Application
Transport
Internet
Network
Interface
Hardware
Application
Transport
Internet
Network
Interface
Hardware
Internet
Network
Interface
Hardware
Router
TCP/IP Service Model: Overview
 Major differences between OSI and TCP/IP:
 TCP/IP has no presentation layer
 The applications must agree on a data format (how
many bytes for a floating point, etc)
 Thus, presentation/encoding is handled by the
application layer
 TCP/IP has no session layer
 Not significant: It does little in modern networks
 In TCP/IP a session is typically managed by the
application layer
The TCP/IP Protocol in Action
 Consider the following simplified network
route
 The source (S) and destination (D) are
separated by two routers (R1, R2)
S DR1 R2
The TCP/IP Protocol in Action
 Let’s consider a web browser, using HTTP
 The web browser on S sends a packet to the web
server on D
 The application layer (i.e. the browser) provides the
logical (IP) addresses for S (IPS) and D (IPD)
 The application layer also provides the port numbers
for the source (PortS) and destination (PortD)
S DR1 R2
HTTP Req
The TCP/IP Protocol in Action
 The Transport layer (TCP) uses the port
numbers (e.g. 2765 and 80) to create a TCP
packet (sometimes called a segment):
S DR1 R2
Source Port: 2765
Destination Port: 80
HTTP Req
Source IP: 137.207.140.71
Dest IP: 24.87.204.16
The TCP/IP Protocol in Action
 The Internet (i.e. IP) layer uses the IP
addresses specified by the application layer
to create an IP datagram
 e.g. 137.207.140.71, 24.87.204.16
 Next, a route is determined for the packet,
using S’s routing table
 S only needs one router’s address (R1)
S DR1 R2
TCP Segment
HTTP Req
Source MAC: MACS
Dest MAC: MACR1
IP Datagram
The TCP/IP Protocol in Action
 The MAC addresses of S and R1 (MACS and
MACR1) are used to create a network frame
 If the MAC address of R1 is not known, ARP
(address resolution protocol) is used
S DR1 R2
TCP Segment
HTTP Req
Source MAC: MACS
Dest MAC: MACR1
IP Datagram
The TCP/IP Protocol in Action
 Let’s simplify the picture (for clarity)
 In subsequent steps the IP datagram and its
contents will not change very much
S DR1 R2
Source MAC: MACS
Dest MAC: MACR1
IP Datagram
The TCP/IP Protocol in Action
 The network frame is transmitted on the
network to R1
 This is possible since S and R1 are both
members of the same network
S DR1 R2
IP Datagram
The TCP/IP Protocol in Action
 R1 will extract the IP datagram from the
payload of the network frame
 R1 looks up the destination IP address (IPD) in
it’s routing table, to determine which router
should get the datagram next (R2)
S DR1 R2
Source MAC: MACR1
Dest MAC: MACR2
IP Datagram
The TCP/IP Protocol in Action
 R1 uses its own MAC address (MACR1) and
R2’s MAC address (MACR2) to create another
network frame
S DR1 R2
Source MAC: MACR1
Dest MAC: MACR2
IP Datagram
The TCP/IP Protocol in Action
 The network frame is received by R2, and the
IP datagram is extracted from it’s payload
 R2 uses its routing table to lookup IPD
 In this case, R2 is directly connected to D
 This is called direct routing
S DR1 R2
ARP Request
IP: 24.87.204.16
MAC: ?
IP Datagram
The TCP/IP Protocol in Action
 Most likely, R2 does not have the MAC
address of D (MACD)
 The address resolution protocol (ARP) is used
to determine the MAC address:
S DR1 R2
ARP Response
IP: 24.87.204.16
MAC: 08-7F-3C-90-0C-DF
IP Datagram
The TCP/IP Protocol in Action
 D recognizes it’s IP address and responds
with its MAC address (MACD)
 e.g. 08-7F-3C-90-0C-DF
S DR1 R2
Source MAC: MACR2
Dest MAC: MACD
IP Datagram
The TCP/IP Protocol in Action
 A network frame is created by R2 now that
the MAC address is known
 The frame is sent directly to D
S DR1 R2
Source MAC: MACR2
Dest MAC: MACD
IP Datagram
The TCP/IP Protocol in Action
 D extracts the IP datagram from the network
frame (which is discarded)
 The IP datagram’s payload is passed to the
transport layer
S DR1 R2
The TCP/IP Protocol in Action
 The Transport layer (within D’s operating
system), will use the port numbers specified
in the TCP segment to determine to which
application it should send the segment
 In this case, to the application bound to port
80 (the web server)
S DR1 R2
Source Port: 2765
Destination Port: 80
HTTP Req
The TCP/IP Protocol in Action
 Now, the web server on D has the HTTP
request, and it processes it
 An HTTP response is sent back using the
same process
 The web server uses the same IP addresses
and logical addresses as the last message
S DR1 R2
HTTP Req

Contenu connexe

Tendances

Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Network protocols
Network protocolsNetwork protocols
Network protocolsHemnath R.
 
Networking Basics
Networking BasicsNetworking Basics
Networking BasicsR G Mani
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcpAgrippa Mungazi
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basicsRomeo Alonzo
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overviewscooby_doo
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologiesAnup Pandey
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer NetworksMukesh Chinta
 
Peer To Peer Protocols
Peer To Peer ProtocolsPeer To Peer Protocols
Peer To Peer Protocolsanishgoel
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesMSA Technosoft
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49myrajendra
 

Tendances (20)

Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
OSI Layering
OSI Layering OSI Layering
OSI Layering
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basics
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Osi model
Osi modelOsi model
Osi model
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
 
Peer To Peer Protocols
Peer To Peer ProtocolsPeer To Peer Protocols
Peer To Peer Protocols
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
 
Computer networks-2
Computer networks-2Computer networks-2
Computer networks-2
 
Network Models in Networking.
Network Models in Networking.Network Models in Networking.
Network Models in Networking.
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Computer networks-3
Computer networks-3Computer networks-3
Computer networks-3
 
Chap 1 introduction
Chap 1 introductionChap 1 introduction
Chap 1 introduction
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
 

En vedette

Internetworking device
Internetworking deviceInternetworking device
Internetworking deviceRay Mkindo
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking OverviewShisir123
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworkingAbDul ThaYyal
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices21viveksingh
 
Computer Network Complete Introduction
Computer Network Complete IntroductionComputer Network Complete Introduction
Computer Network Complete IntroductionAhmar Hashmi
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 

En vedette (11)

Internetworking device
Internetworking deviceInternetworking device
Internetworking device
 
Unit Iv
Unit IvUnit Iv
Unit Iv
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Gateway Networking
Gateway NetworkingGateway Networking
Gateway Networking
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
Computer Network Complete Introduction
Computer Network Complete IntroductionComputer Network Complete Introduction
Computer Network Complete Introduction
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similaire à Connecting People, Places, and Everything Else: An Introduction to Networking & Internetworking

CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptdeeplearning6
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfskknowledge
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingMohsen Sarakbi
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptxDeepVala5
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Networking Basics
Networking BasicsNetworking Basics
Networking BasicsCarlo Fonda
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingMeenakshiGupta233101
 

Similaire à Connecting People, Places, and Everything Else: An Introduction to Networking & Internetworking (20)

Networks Basics
Networks BasicsNetworks Basics
Networks Basics
 
CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.ppt
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Osi model
Osi modelOsi model
Osi model
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
 
Network layers
Network layersNetwork layers
Network layers
 

Plus de Md. Mashiur Rahman (20)

Rule for creating power point slide
Rule for creating power point slideRule for creating power point slide
Rule for creating power point slide
 
Advance DBMS
Advance DBMSAdvance DBMS
Advance DBMS
 
Final exam in advance dbms
Final exam in advance dbmsFinal exam in advance dbms
Final exam in advance dbms
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routing
 
Routing and switching question1
Routing and switching question1Routing and switching question1
Routing and switching question1
 
Lec 7 query processing
Lec 7 query processingLec 7 query processing
Lec 7 query processing
 
Lec 1 indexing and hashing
Lec 1 indexing and hashing Lec 1 indexing and hashing
Lec 1 indexing and hashing
 
Cloud computing lecture 7
Cloud computing lecture 7Cloud computing lecture 7
Cloud computing lecture 7
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1
 
parallel Questions & answers
parallel Questions & answersparallel Questions & answers
parallel Questions & answers
 
Mis 8
Mis 8Mis 8
Mis 8
 
Mis 3
Mis 3Mis 3
Mis 3
 
Mis 1
Mis 1Mis 1
Mis 1
 
Mis 5
Mis 5Mis 5
Mis 5
 
Mis 2
Mis 2Mis 2
Mis 2
 
Mis 9
Mis 9Mis 9
Mis 9
 
Mis 6
Mis 6Mis 6
Mis 6
 
Mis 7
Mis 7Mis 7
Mis 7
 
Mis 4
Mis 4Mis 4
Mis 4
 
Computer network solution
Computer network solutionComputer network solution
Computer network solution
 

Dernier

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Dernier (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Connecting People, Places, and Everything Else: An Introduction to Networking & Internetworking

  • 2. Networks  Any connection between two or more computers  e.g. Even when you connect two computers via a USB cable  Networks use a set of low-level protocols (rules for communication)  e.g. TCP/IP, IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange)  Networks use standardized hardware  e.g. Twisted pair cabling & Ethernet hubs, ATM switches & optical fibre cabling
  • 3. Network Speed  A network’s speed can be summed up with two values:  Bit rate:  How many bits can be placed on the network in a given time interval (e.g. 1 second)?  This is often called bandwidth, but this is a misnomer since bandwidth has to do with the range of frequencies to be used  Bit rate becomes the dominant factor when sending many packets (e.g. a large file)  Latency:  How long does it take a bit to be received by the destination node?  Latency becomes the dominant factor when sending individual packets, or alternating sending/receiving
  • 4. A Local Area Network (LAN)
  • 5. Networks: Purpose  Sharing files  FTP, NFS, SMB(server message block)  Communicating  E-Mail, instant messaging, games  Executing programs remotely  rlogin, telnet
  • 6. Network Messaging  Most local area networks use electrostatic network hardware  The wires transmit messages using electricity  The transmission hardware charges the wire positively or negatively to indicate 1 and 0 respectively  The reception hardware senses the charge
  • 7. Internetworking: internets (WANs)  e.g. The Internet  Any connection between two or more networks  e.g. An Ethernet network connected to another Ethernet network by glass fibre cable and ATM switches
  • 8. An Internet LAN A LAN B LAN C LAN E LAN D Backbone A
  • 9. Internets: Purpose  Larger scope  Access more shared files  Communicate with more people  Execute programs on more machines
  • 10. Network Properties Networking Fundamentals for Specific Network Types
  • 11. Important Network Properties  Scope: A network should provide services to several applications  Scalability: A network should operate efficiently when deployed on a small-scale as well as on a large-scale  Robustness: A network should operate in spite of failures or lost data
  • 12. Important Network Properties  Self-Stabilization: A network, after a failure or other problem, should return to normal (or near normal) without human intervention  Autoconfigurability: A network should optimize its own parameters in order to achieve better performance  Safety: A network should prevent failures as well as prevent failures from affecting other areas of the network
  • 13. Important Network Properties  Configurability: A network’s parameters should be configurable to improve performance  Determinism: Two networks with identical conditions should yield identical results  Migration: It should be possible to add new features to a network without disruption of network service
  • 14. Network Usage  Ideally, the network usage should be maximized  If network resources are unused, the network is not being used efficiently  Unused network resources could be used to provide higher throughput to hosts  This typically becomes a problem in routing  If all routers choose the single optimal path, some (less than optimal) regions of the network will be unused
  • 16. Internet History A Condensed Timeline of Internet Development and Research Projects
  • 17. The Birth of Arpanet  Developed by ARPA (Advanced Research Projects Agency)  A packet-switched network connecting a number of LANs, called Arpanet  Used primarily for connecting the networks of the U.S. Government’s defense initiative (DARPA, which was a branch of the DoD)  Became a useable internet in 1977
  • 18. The Internet Split  Originally, Arpanet was strictly military and defense- oriented  Arpanet was converted to use the new standard TCP/IP protocol set (1980)  The Defense Communication Agency (DCA) split Arpanet into two networks (1983):  Arpanet: To be used for internetworking research projects  Milnet: To be used strictly for military purposes
  • 19. A Military & University Internet  The University of California (at Berkeley) incorporated TCP/IP programming into its BSD UNIX operating system (1983)  ARPA funded research projects at many Universities in order to make then internet- capable (1983-1989)  BSD UNIX developed the socket network programming model commonly used today  It was now possible for anyone to write internet applications  This resulted in a boom of internet applications, many of which survive to this day
  • 20. A Public Internet  It became practical for private organizations to connect to the Internet (mid-late 1980s)  Due to inexpensive hardware  The Internet Architecture Board (IAB) was empowered to manage research  Coordinates and focuses research and development with regards to the Internet and TCP/IP
  • 22. TCP/IP  A considerably large part of this course  The underlying network protocols upon which application-level protocols are built  e.g. HTTP, SMTP, IMAP(Internet Message Access Protocol  TCP/IP is the framework for the Internet
  • 23. TCP/IP  TCP/IP is actually two protocols:  TCP: Transport control protocol  Creates reliable transport (handles lost messages), offers a logical stream of data (reorders mixed up messages)  IP: Internet protocol  Defines addressing (e.g. 137.207.32.2), routing protocols (how to get messages from source to destination), etc.
  • 24. Internet Messaging  TCP is a reliable protocol  If a message does not arrive, it is re-sent  Messages must be acknowledged by their recipients before a certain time expires  The message’s time-to-live (TTL) value
  • 25. Layered Architectures Schemes for Organizing the Responsibility of Networking Components
  • 26. Network Service Models  Provide a layered abstraction for networking  Each layer performs specific tasks  Between each layer is an interface  e.g. The hardware access layer might interact directly with the hardware, providing a hardware-independent interface to higher layers  The same layer at the source and the destination are known as ‘peer’ layers  e.g. A ‘transport’ layer may provide reliable messaging, so the transport layer in the source and destination will communicate to ensure each message arrived in tact
  • 27. Network Service Model Sender Receiver Layer n Layer n …… Layer 2 Layer 2 Layer 1Layer 1 Network Lowerlevel Higherlevel
  • 28. The OSI Reference Model  A layered service model developed by the International Standardization Organization (ISO)  Defines 7 conceptual layers  Each serves a very specific purpose  OSI: Open System Interconnection  Developed as a reference to be used for all future protocols
  • 29. The OSI Reference Model  The 7 layers are (highest to lowest level): 1. Application 2. Presentation 3. Session 4. Transport 5. Network 6. Data link 7. Physical
  • 30. The OSI Reference Model Application Application Presentation Presentation Session Session TransportTransport Network Network Data linkData link Physical Physical protocol protocol protocol protocol protocol protocol protocol
  • 31. The OSI Reference Model  Represents the actual network hardware  Deals with problems such as:  Sending signals across wires  e.g. Charging a wire with a specific voltage  Converting bits to signals  Even two Ethernet cards may have different physical layers, as this layer deals with hardware specific concerns Physical Layer
  • 32. The OSI Reference Model  Represents the interface to the network hardware  Deals with problems such as:  Transmission of groups of bits  e.g. Groups of bits might represent an ASCII text string, a floating point number, or a chunk of binary data  Verifying data integrity (using checksums) Data Link Layer
  • 33. The OSI Reference Model  Handles the connection between sender and receiver  Deals with problems such as:  Determining a path from the sender node to the recipient node (i.e. routing)  Determining the correct recipient (i.e. addressing)  Network congestion  Fragmenting data into packets  Reassembly of packets Network Layer
  • 34. The OSI Reference Model  Represents an end-to-end reliable communication stream  Deals with problems such as:  Lost (unacknowledged) packets  Duplicate packets  Reordering packets Transport Layer
  • 35. The OSI Reference Model  Represents a dialogue between sender and receiver  Somewhat irrelevant in today’s networks  Handles the establishment of an authenticated connection to the receiver  Deals with problems such as:  Authentication of the sender node on the packet assembler and dissembler (PAD)  This is a remote computer which provided the lower layers in a shared manner, which required authentication Session Layer
  • 36. The OSI Reference Model  Specifies data representations so that both sides can determine how to read data  e.g. How many bytes to use for floating point values (including compressed as well as uncompressed values, encryption)  e.g. What is the order of the bytes?  Uses an ISO-defined standard for these representations: Abstract Syntax Notation 1 (ASN.1) Presentation Layer
  • 37. The OSI Reference Model  Defines what data is stored in the message (specific to each application)  e.g. An E-Mail application would store such things as recipient, subject, and body text into an E-Mail application-level message  e.g. A web server would put header information (information about the server & the document) as well as the document itself into its application-level messages Application Layer
  • 38. Session Message: •Session Header •Recipient •Subject •Body Message: •Recipient – CHAR(9) •Subject – CHAR (17) •Body – CHAR (243) Frame: •Data Link Header •Network Header •Transport Header •Session Header •Recipient •Subject •Body OSI Reference Model: An Example Application Presentation Session Transport Network Data link Physical E-Mail: •Recipient •Subject •Body Network01001101111010010011001… Network Frame: •Network Header •Transport Header •Session Header •Recipient •Subject •Body Transport Message: •Transport Header •Session Header •Recipient •Subject •Body
  • 39. OSI Reference Model: Routing Application Presentation Session Transport Network Data link Physical Application Presentation Session Transport Network Data link Physical Network Data link Physical Router
  • 40. OSI Reference Model Overview  Each layer provides some abstraction to the higher levels  e.g. The physical layer actually charges the wire  Higher layers need not worry about how to charge the wire  e.g. The transport layer ensures that message arrive  Higher layers can assume that messages will arrive, and will not be lost  The OSI reference model was used as the basis for X.25 networks.
  • 41. The TCP/IP Service Model  Researchers developing the TCP/IP protocol suite also developed a layered reference model  The TCP/IP reference model consists of 5 layers  3 software layers  1 software & hardware layer  1 hardware layer
  • 42. The TCP/IP Service Model  The 5 layers: 1. Application 2. Transport 3. Internet 4. Network Interface 5. Hardware
  • 43. The TCP/IP Service Model  Defines what data is stored in the message (specific to each application)  e.g. An E-Mail application would store such things as recipient, subject, and body text into an E-Mail application-level message  e.g. A web server would put header information (information about the server & the document) as well as the document itself into its application-level messages  Essentially, this layer is identical to the application layer in the OSI reference model Application Layer
  • 44. The TCP/IP Service Model  Handles end-to-end communication  Divides the data into manageable chunks of information (packets)  Provides reliable communication  Ensures that all packets are received  Provides error-free communication  Uses a checksum to verify data integrity  Implemented by the TCP protocol  Transport control protocol Transport Layer
  • 45. The TCP/IP Service Model  Handles communication between machines  The path of a message is determined (routing)  The destination of a message is determined (addressing)  Implemented by the IP protocol  Internet protocol Internet Layer
  • 46. The TCP/IP Service Model  Handles low level interaction with hardware  Issues commands to the hardware to transmit a number of bits (1 or 0)  Deals with hardware-specific concerns  Implemented by the device drivers for the hardware installed into the operating system  Essentially, this layer is identical to the data link layer in the OSI model Network Interface Layer
  • 47. The TCP/IP Service Model  Actually transmits signals onto the network  Deals with issues such as:  How to transmit signals (e.g. electrify the wire)  How to detect problems (e.g. collisions)  Represents the actual network hardware  Essentially this layer is identical to the physical layer in the OSI model Hardware Layer
  • 48. TCP/IP Service Model: Example Application Transport Internet Network Interface Hardware Network01001101111010010011001… IP Datagrams: •IP Header •TCP Header •Data Bytes Transport Packet: •TCP Header •Data Bytes E-Mail: •Data Bytes Network Frame: •IP Header •TCP Header •Data Bytes
  • 49. TCP/IP Service Model: Routing Application Transport Internet Network Interface Hardware Application Transport Internet Network Interface Hardware Internet Network Interface Hardware Router
  • 50. TCP/IP Service Model: Overview  Major differences between OSI and TCP/IP:  TCP/IP has no presentation layer  The applications must agree on a data format (how many bytes for a floating point, etc)  Thus, presentation/encoding is handled by the application layer  TCP/IP has no session layer  Not significant: It does little in modern networks  In TCP/IP a session is typically managed by the application layer
  • 51. The TCP/IP Protocol in Action  Consider the following simplified network route  The source (S) and destination (D) are separated by two routers (R1, R2) S DR1 R2
  • 52. The TCP/IP Protocol in Action  Let’s consider a web browser, using HTTP  The web browser on S sends a packet to the web server on D  The application layer (i.e. the browser) provides the logical (IP) addresses for S (IPS) and D (IPD)  The application layer also provides the port numbers for the source (PortS) and destination (PortD) S DR1 R2 HTTP Req
  • 53. The TCP/IP Protocol in Action  The Transport layer (TCP) uses the port numbers (e.g. 2765 and 80) to create a TCP packet (sometimes called a segment): S DR1 R2 Source Port: 2765 Destination Port: 80 HTTP Req
  • 54. Source IP: 137.207.140.71 Dest IP: 24.87.204.16 The TCP/IP Protocol in Action  The Internet (i.e. IP) layer uses the IP addresses specified by the application layer to create an IP datagram  e.g. 137.207.140.71, 24.87.204.16  Next, a route is determined for the packet, using S’s routing table  S only needs one router’s address (R1) S DR1 R2 TCP Segment HTTP Req
  • 55. Source MAC: MACS Dest MAC: MACR1 IP Datagram The TCP/IP Protocol in Action  The MAC addresses of S and R1 (MACS and MACR1) are used to create a network frame  If the MAC address of R1 is not known, ARP (address resolution protocol) is used S DR1 R2 TCP Segment HTTP Req
  • 56. Source MAC: MACS Dest MAC: MACR1 IP Datagram The TCP/IP Protocol in Action  Let’s simplify the picture (for clarity)  In subsequent steps the IP datagram and its contents will not change very much S DR1 R2
  • 57. Source MAC: MACS Dest MAC: MACR1 IP Datagram The TCP/IP Protocol in Action  The network frame is transmitted on the network to R1  This is possible since S and R1 are both members of the same network S DR1 R2
  • 58. IP Datagram The TCP/IP Protocol in Action  R1 will extract the IP datagram from the payload of the network frame  R1 looks up the destination IP address (IPD) in it’s routing table, to determine which router should get the datagram next (R2) S DR1 R2
  • 59. Source MAC: MACR1 Dest MAC: MACR2 IP Datagram The TCP/IP Protocol in Action  R1 uses its own MAC address (MACR1) and R2’s MAC address (MACR2) to create another network frame S DR1 R2
  • 60. Source MAC: MACR1 Dest MAC: MACR2 IP Datagram The TCP/IP Protocol in Action  The network frame is received by R2, and the IP datagram is extracted from it’s payload  R2 uses its routing table to lookup IPD  In this case, R2 is directly connected to D  This is called direct routing S DR1 R2
  • 61. ARP Request IP: 24.87.204.16 MAC: ? IP Datagram The TCP/IP Protocol in Action  Most likely, R2 does not have the MAC address of D (MACD)  The address resolution protocol (ARP) is used to determine the MAC address: S DR1 R2
  • 62. ARP Response IP: 24.87.204.16 MAC: 08-7F-3C-90-0C-DF IP Datagram The TCP/IP Protocol in Action  D recognizes it’s IP address and responds with its MAC address (MACD)  e.g. 08-7F-3C-90-0C-DF S DR1 R2
  • 63. Source MAC: MACR2 Dest MAC: MACD IP Datagram The TCP/IP Protocol in Action  A network frame is created by R2 now that the MAC address is known  The frame is sent directly to D S DR1 R2
  • 64. Source MAC: MACR2 Dest MAC: MACD IP Datagram The TCP/IP Protocol in Action  D extracts the IP datagram from the network frame (which is discarded)  The IP datagram’s payload is passed to the transport layer S DR1 R2
  • 65. The TCP/IP Protocol in Action  The Transport layer (within D’s operating system), will use the port numbers specified in the TCP segment to determine to which application it should send the segment  In this case, to the application bound to port 80 (the web server) S DR1 R2 Source Port: 2765 Destination Port: 80 HTTP Req
  • 66. The TCP/IP Protocol in Action  Now, the web server on D has the HTTP request, and it processes it  An HTTP response is sent back using the same process  The web server uses the same IP addresses and logical addresses as the last message S DR1 R2 HTTP Req

Notes de l'éditeur

  1. <number> The application layer has an E-Mail message to send. When sent through the presentation layer, the data types are well defined for each component of the E-Mail message. The session layer typically would do very little in modern networks. The transport layer would add a message ID to the message, and set its time-to-live value. If an acknowledgement is not received by that time, the message will be reissued. The network layer adds a recipient address as well as the sender’s address to the message. These addresses will be used by routers to direct the message through the correct path to the recipient. The network layer may also divide the message into smaller parts, called Frames, which are manageable by the network. Some networks have a maximum message size, some even have an exact length that all messages must be. The data link layer issues commands to the network device to send the appropriate bytes. The physical layer responds to these device commands and transmits a signal on the network wire. Which wires to charge, how, and how much are determined by the hardware and the type of network.
  2. <number> The application layer has an E-Mail message to send. When sent through the presentation layer, the data types are well defined for each component of the E-Mail message. The session layer typically would do very little in modern networks. The transport layer would add a message ID to the message, and set its time-to-live value. If an acknowledgement is not received by that time, the message will be reissued. The network layer adds a recipient address as well as the sender’s address to the message. These addresses will be used by routers to direct the message through the correct path to the recipient. The network layer may also divide the message into smaller parts, called Frames, which are manageable by the network. Some networks have a maximum message size, some even have an exact length that all messages must be. The data link layer issues commands to the network device to send the appropriate bytes. The physical layer responds to these device commands and transmits a signal on the network wire. Which wires to charge, how, and how much are determined by the hardware and the type of network.
  3. <number> The application layer has an E-Mail message to send. When sent through the presentation layer, the data types are well defined for each component of the E-Mail message. The session layer typically would do very little in modern networks. The transport layer would add a message ID to the message, and set its time-to-live value. If an acknowledgement is not received by that time, the message will be reissued. The network layer adds a recipient address as well as the sender’s address to the message. These addresses will be used by routers to direct the message through the correct path to the recipient. The network layer may also divide the message into smaller parts, called Frames, which are manageable by the network. Some networks have a maximum message size, some even have an exact length that all messages must be. The data link layer issues commands to the network device to send the appropriate bytes. The physical layer responds to these device commands and transmits a signal on the network wire. Which wires to charge, how, and how much are determined by the hardware and the type of network.
  4. <number> The application layer has an E-Mail message to send. When sent through the presentation layer, the data types are well defined for each component of the E-Mail message. The session layer typically would do very little in modern networks. The transport layer would add a message ID to the message, and set its time-to-live value. If an acknowledgement is not received by that time, the message will be reissued. The network layer adds a recipient address as well as the sender’s address to the message. These addresses will be used by routers to direct the message through the correct path to the recipient. The network layer may also divide the message into smaller parts, called Frames, which are manageable by the network. Some networks have a maximum message size, some even have an exact length that all messages must be. The data link layer issues commands to the network device to send the appropriate bytes. The physical layer responds to these device commands and transmits a signal on the network wire. Which wires to charge, how, and how much are determined by the hardware and the type of network.