SlideShare a Scribd company logo
Introduction to TCP/IP
networking
Source: Ganesh Sittampalam
TCP/IP protocol family
• IP : Internet Protocol
– UDP : User Datagram Protocol
• RTP, traceroute
– TCP : Transmission Control Protocol
• HTTP, FTP, ssh
What is an internet?
• A set of interconnected networks
• The Internet is the most famous
example
• Networks can be completely different
– Ethernet, ATM, modem, …
– (TCP/)IP is what links them
What is an internet? (cont)
• Routers are devices on multiple
networks that pass traffic between them
• Individual networks pass traffic from one
router or endpoint to another
• TCP/IP hides the details as much as
possible
ISO/OSI Network Model
• Seven network “layers”
– Layer 1 : Physical – cables
– Layer 2 : Data Link – ethernet
– Layer 3 : Network – IP
– Layer 4 : Transport – TCP/UDP
– Layer 5 : Session
– Layer 6 : Presentation
– Layer 7 : Application
You don’t need to know the layers just the idea that it is layered
TCP/IP Network Model
• Different view – 4 layers
– Layer 1 : Link
– Layer 2 : Network
– Layer 3 : Transport
– Layer 4 : Application
OSI and Protocol Stack
OSI: Open Systems Interconnect
OSI Model TCP/IP Hierarchy Protocols
7th
Application Layer
6th
Presentation Layer
5th
Session Layer
4th
Transport Layer
3rd
Network Layer
2nd
Link Layer
1st
Physical Layer
Application Layer
Transport Layer
Network Layer
Link Layer
Link Layer : includes device driver and network interface card
Network Layer : handles the movement of packets, i.e. Routing
Transport Layer : provides a reliable flow of data between two hosts
Application Layer : handles the details of the particular application
Packet Encapsulation
 The data is sent down the protocol stack
 Each layer adds to the data by prepending headers
22Bytes 20Bytes 20Bytes 4Bytes
64 to 1500 Bytes
IP
• Responsible for end to end transmission
• Sends data in individual packets
• Maximum size of packet is determined
by the networks
– Fragmented if too large
• Unreliable
– Packets might be lost, corrupted,
duplicated, delivered out of order
IP addresses
• 4 bytes
– e.g. 163.1.125.98
– Each device normally gets one (or more)
– In theory there are about 4 billion available
• But…
Routing
• How does a device know where to send
a packet?
– All devices need to know what IP
addresses are on directly attached
networks
– If the destination is on a local network,
send it directly there
Routing (cont)
• If the destination address isn’t local
– Most non-router devices just send
everything to a single local router
– Routers need to know which network
corresponds to each possible IP address
Allocation of addresses
• Controlled centrally by ICANN
– Fairly strict rules on further delegation to
avoid wastage
• Have to demonstrate actual need for them
• Organizations that got in early have
bigger allocations than they really need
IP packets
• Source and destination addresses
• Protocol number
– 1 = ICMP, 6 = TCP, 17 = UDP
• Various options
– e.g. to control fragmentation
• Time to live (TTL)
– Prevent routing loops
IP Datagram
Vers Len TOS Total Length
Identification Flags Fragment Offset
TTL Protocol Header Checksum
Source Internet Address
Destination Internet Address
Options... Padding
Data...
0 4 8 16 19 24 31
Field Purpose
Vers IP version number
Len Length of IP header (4 octet units)
TOS Type of Service
T. Length Length of entire datagram (octets)
Ident. IP datagram ID (for frag/reassembly)
Flags Don’t/More fragments
Frag Off Fragment Offset
Field Purpose
TTL Time To Live - Max # of hops
Protocol Higher level protocol (1=ICMP,
6=TCP, 17=UDP)
Checksum Checksum for the IP header
Source IA Originator’s Internet Address
Dest. IA Final Destination Internet Address
Options Source route, time stamp, etc.
Data... Higher level protocol data
You just need to know the IP addresses, TTL and protocol #
IP Routing
• Routing Table
Destination IP address
IP address of a next-hop router
Flags
Network interface specification
Application
Transport
Network
Link
Application
Transport
Network
Link
Network
Link
Source Destination
Router
UDP
• Thin layer on top of IP
• Adds packet length + checksum
– Guard against corrupted packets
• Also source and destination ports
– Ports are used to associate a packet with a
specific application at each end
• Still unreliable:
– Duplication, loss, out-of-orderness possible
UDP datagram
Destination Port
Source Port
Application data
0 16 31
Checksum
Length
Field Purpose
Source Port 16-bit port number identifying originating application
Destination Port 16-bit port number identifying destination application
Length Length of UDP datagram (UDP header + data)
Checksum Checksum of IP pseudo header, UDP header, and data
Typical applications of UDP
– Where packet loss etc is better handled by
the application than the network stack
– Where the overhead of setting up a
connection isn’t wanted
• VOIP
• NFS – Network File System
• Most games
TCP
• Reliable, full-duplex, connection-
oriented, stream delivery
– Interface presented to the application
doesn’t require data in individual packets
– Data is guaranteed to arrive, and in the
correct order without duplications
• Or the connection will be dropped
– Imposes significant overheads
Applications of TCP
• Most things!
– HTTP, FTP, …
• Saves the application a lot of work, so
used unless there’s a good reason not
to
TCP implementation
• Connections are established using a
three-way handshake
• Data is divided up into packets by the
operating system
• Packets are numbered, and received
packets are acknowledged
• Connections are explicitly closed
– (or may abnormally terminate)
TCP Packets
• Source + destination ports
• Sequence number
• Acknowledgement number
• Checksum
• Various options
TCP Segment
Destination Port
Acknowledgment Number
Options... Padding
Data...
0 4 10 16 19 24 31
Source Port
Window
Len
Sequence Number
Reserved Flags
Urgent Pointer
Checksum
Field Purpose
Source Port Identifies originating application
Destination Port Identifies destination application
Sequence Number Sequence number of first octet in the segment
Acknowledgment # Sequence number of the next expected octet (if ACK flag set)
Len Length of TCP header in 4 octet units
Flags TCP flags: SYN, FIN, RST, PSH, ACK, URG
Window Number of octets from ACK that sender will accept
Checksum Checksum of IP pseudo-header + TCP header + data
Urgent Pointer Pointer to end of “urgent data”
Options Special TCP options such as MSS and Window Scale
You just need to know port numbers, seq and ack are added
TCP : Data transfer
Host
Client
Send Packet 1
Start Timer
Retransmit Packet1
Start Timer
Packet should arrive
ACK should be sent
ACK would normally
Arrive at this time
Receive Packet 1
Send AXK 1
Time Expires
Receive ACK 1
Cancel Timer
Packet Lost
Timer
Timer
IPv6
• 128 bit addresses
– Make it feasible to be very wasteful with
address allocations
• Lots of other new features
– Built-in autoconfiguration, security options,
…
• Not really in production use yet
Ethernet
• Computer <-> Computer communication on same
network
• Each device has unique MAC address (48-bit)
example: 00-C0-4F-48-47-93
Ethernet Packet:
Dest.
address
Data CRC
Source
address
Type
MAC: Media Access Control
6bytes 6bytes 2bytes
Preamble
8bytes 64 - 1500bytes 4bytes
Do not worry about this slide
ARP : Address Resolution
Protocol
• ARP provides mapping
32bit IP address <-> 48bit MAC address
128.97.89.153 <-> 00-C0-4F-48-47-93
• ARP cache
maintains the recent mappings from IP addresses to MAC addresses
Protocol
1. ARP request broadcast on Ethernet
2. Destination host ARP layer responds
Do not worry about this slide
DHCP
• Dynamic Host Configuration Protocol
– Used to tell a computer what IP address to use
– Device broadcasts a request from IP 0.0.0.0
• If it had an IP address before, asks for the same one
again
– Server (or relay) on local network responds telling
it which to use (or ignores it, or tells it go away)
• “Lease time” telling it how long that IP will be valid for
• Device requests renewal of lease after ¾(?) elapsed
Do not worry about this slide
Ad

More Related Content

Similar to Introduction to TCP / IP in networking Technology (20)

Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
Sam Bowne
 
ADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IP
Jennifer Daniel
 
QSpiders - Upper layer-protocols
QSpiders - Upper layer-protocolsQSpiders - Upper layer-protocols
QSpiders - Upper layer-protocols
Qspiders - Software Testing Training Institute
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
VINAYTANWAR18
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
Taymoor Nazmy
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
VIKAS SINGH BHADOURIA
 
Networking.ppt
Networking.pptNetworking.ppt
Networking.ppt
MayurJagtap53
 
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
MathivananP4
 
15-netwoppppppppppppppppppppppppppprk.ppt
15-netwoppppppppppppppppppppppppppprk.ppt15-netwoppppppppppppppppppppppppppprk.ppt
15-netwoppppppppppppppppppppppppppprk.ppt
abhirana59
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
Syed Zaid Irshad
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
Taymoor Nazmy
 
ENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdfENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdf
shaker402
 
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
VINAYTANWAR18
 
Vulnerabilities in IP Protocols
Vulnerabilities in IP ProtocolsVulnerabilities in IP Protocols
Vulnerabilities in IP Protocols
babak danyal
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
tmavroidis
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
tmavroidis
 
tcp-140613123317-phpapp01.pptx
tcp-140613123317-phpapp01.pptxtcp-140613123317-phpapp01.pptx
tcp-140613123317-phpapp01.pptx
touseeqzulfiqar1
 
Network protocol
Network protocolNetwork protocol
Network protocol
Online
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
Sam Bowne
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
Sam Bowne
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
Sam Bowne
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
VINAYTANWAR18
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
Taymoor Nazmy
 
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
MathivananP4
 
15-netwoppppppppppppppppppppppppppprk.ppt
15-netwoppppppppppppppppppppppppppprk.ppt15-netwoppppppppppppppppppppppppppprk.ppt
15-netwoppppppppppppppppppppppppppprk.ppt
abhirana59
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
Taymoor Nazmy
 
ENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdfENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdf
shaker402
 
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.pptip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
ip nnnnnnnnnnnnnnnnnnbbbbbbblecture06.ppt
VINAYTANWAR18
 
Vulnerabilities in IP Protocols
Vulnerabilities in IP ProtocolsVulnerabilities in IP Protocols
Vulnerabilities in IP Protocols
babak danyal
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
tmavroidis
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
tmavroidis
 
tcp-140613123317-phpapp01.pptx
tcp-140613123317-phpapp01.pptxtcp-140613123317-phpapp01.pptx
tcp-140613123317-phpapp01.pptx
touseeqzulfiqar1
 
Network protocol
Network protocolNetwork protocol
Network protocol
Online
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
Sam Bowne
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
Sam Bowne
 

Recently uploaded (20)

Musicfy lolMusicfy lolMusicfy lolMusicfy lol
Musicfy lolMusicfy lolMusicfy lolMusicfy lolMusicfy lolMusicfy lolMusicfy lolMusicfy lol
Musicfy lolMusicfy lolMusicfy lolMusicfy lol
bilalshah786104
 
Lecture 1 BASIC TERMINOLOGY of kinematics.ppt
Lecture 1 BASIC TERMINOLOGY of kinematics.pptLecture 1 BASIC TERMINOLOGY of kinematics.ppt
Lecture 1 BASIC TERMINOLOGY of kinematics.ppt
MusniAhmed1
 
ENSA_Module_12 - Network Troubleshooting.pdfchapterchapter-11.pdf.pdf
ENSA_Module_12 - Network Troubleshooting.pdfchapterchapter-11.pdf.pdfENSA_Module_12 - Network Troubleshooting.pdfchapterchapter-11.pdf.pdf
ENSA_Module_12 - Network Troubleshooting.pdfchapterchapter-11.pdf.pdf
edget1
 
Spin_LED_Presentation_Mustaqeem_2025.pptx
Spin_LED_Presentation_Mustaqeem_2025.pptxSpin_LED_Presentation_Mustaqeem_2025.pptx
Spin_LED_Presentation_Mustaqeem_2025.pptx
mustaqeemmujahid
 
Crim-Proc-PPT-for-lecture-in-May-2025-Learners.pptx
Crim-Proc-PPT-for-lecture-in-May-2025-Learners.pptxCrim-Proc-PPT-for-lecture-in-May-2025-Learners.pptx
Crim-Proc-PPT-for-lecture-in-May-2025-Learners.pptx
russelrosas
 
REAL ILLUMINATI UGANDA CALL WhatsApp number on0782561496/0756664682
REAL ILLUMINATI UGANDA CALL WhatsApp number on0782561496/0756664682REAL ILLUMINATI UGANDA CALL WhatsApp number on0782561496/0756664682
REAL ILLUMINATI UGANDA CALL WhatsApp number on0782561496/0756664682
REAL ILLUMINATI UGANDA CALL WhatsApp number on0782561496/0756664682
 
Week 2 lecture PCD 203skoacolacbabolabiocasoc
Week 2 lecture PCD 203skoacolacbabolabiocasocWeek 2 lecture PCD 203skoacolacbabolabiocasoc
Week 2 lecture PCD 203skoacolacbabolabiocasoc
saidraqb5
 
Ch 2 The Microprocessor and its Architecture.ppt
Ch 2 The Microprocessor and its Architecture.pptCh 2 The Microprocessor and its Architecture.ppt
Ch 2 The Microprocessor and its Architecture.ppt
ermiasgesgis
 
Feed sampling MLA&dfsfdsfdsfsdfPPLA.pptx
Feed sampling MLA&dfsfdsfdsfsdfPPLA.pptxFeed sampling MLA&dfsfdsfdsfsdfPPLA.pptx
Feed sampling MLA&dfsfdsfdsfsdfPPLA.pptx
newhopemojokerto90
 
Parmila_nsnsnjnsnsnnwDevi_Rajbanshi.pptx
Parmila_nsnsnjnsnsnnwDevi_Rajbanshi.pptxParmila_nsnsnjnsnsnnwDevi_Rajbanshi.pptx
Parmila_nsnsnjnsnsnnwDevi_Rajbanshi.pptx
rahulrajbanshi981052
 
JOINING ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON WHATSAPP+256782561496/0756...
JOINING ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON WHATSAPP+256782561496/0756...JOINING ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON WHATSAPP+256782561496/0756...
JOINING ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON WHATSAPP+256782561496/0756...
REAL ILLUMINATI UGANDA CALL WhatsApp number on0782561496/0756664682
 
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctr
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctrMayur Seminar.pptxbgvyezuvdt as bijvyivutctr
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctr
vaishnavishitole195
 
Unidad Pedagogica 3ro-4to.documento090904
Unidad Pedagogica 3ro-4to.documento090904Unidad Pedagogica 3ro-4to.documento090904
Unidad Pedagogica 3ro-4to.documento090904
maylingcastro9
 
ideapad_330S_14IKB_Shhjjkjhghhvbhjjjpec.pdf
ideapad_330S_14IKB_Shhjjkjhghhvbhjjjpec.pdfideapad_330S_14IKB_Shhjjkjhghhvbhjjjpec.pdf
ideapad_330S_14IKB_Shhjjkjhghhvbhjjjpec.pdf
MichaelDexterBalanta1
 
TR INGLES TECNICO ECCU-211 1[mmmm1].pptx
TR INGLES TECNICO ECCU-211 1[mmmm1].pptxTR INGLES TECNICO ECCU-211 1[mmmm1].pptx
TR INGLES TECNICO ECCU-211 1[mmmm1].pptx
EnocngelArcentalesVa
 
Py-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.ppt
Py-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.ppt
Py-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.ppt
v65176016
 
Concavity_Presentation_Updated.pptx rana
Concavity_Presentation_Updated.pptx ranaConcavity_Presentation_Updated.pptx rana
Concavity_Presentation_Updated.pptx rana
ranamumtaz383
 
chapter-11.pdfchapter-11.pdfchapter-11.pdfchapter-chapter-11.pdf.pdf
chapter-11.pdfchapter-11.pdfchapter-11.pdfchapter-chapter-11.pdf.pdfchapter-11.pdfchapter-11.pdfchapter-11.pdfchapter-chapter-11.pdf.pdf
chapter-11.pdfchapter-11.pdfchapter-11.pdfchapter-chapter-11.pdf.pdf
edget1
 
Chapter Five main management of memory .ppt
Chapter Five main management of memory  .pptChapter Five main management of memory  .ppt
Chapter Five main management of memory .ppt
YoomifTube
 
Intro to Windows Presentation for CSS NC-2.pptx
Intro to Windows Presentation for CSS NC-2.pptxIntro to Windows Presentation for CSS NC-2.pptx
Intro to Windows Presentation for CSS NC-2.pptx
HelenAvila17
 
Musicfy lolMusicfy lolMusicfy lolMusicfy lol
Musicfy lolMusicfy lolMusicfy lolMusicfy lolMusicfy lolMusicfy lolMusicfy lolMusicfy lol
Musicfy lolMusicfy lolMusicfy lolMusicfy lol
bilalshah786104
 
Lecture 1 BASIC TERMINOLOGY of kinematics.ppt
Lecture 1 BASIC TERMINOLOGY of kinematics.pptLecture 1 BASIC TERMINOLOGY of kinematics.ppt
Lecture 1 BASIC TERMINOLOGY of kinematics.ppt
MusniAhmed1
 
ENSA_Module_12 - Network Troubleshooting.pdfchapterchapter-11.pdf.pdf
ENSA_Module_12 - Network Troubleshooting.pdfchapterchapter-11.pdf.pdfENSA_Module_12 - Network Troubleshooting.pdfchapterchapter-11.pdf.pdf
ENSA_Module_12 - Network Troubleshooting.pdfchapterchapter-11.pdf.pdf
edget1
 
Spin_LED_Presentation_Mustaqeem_2025.pptx
Spin_LED_Presentation_Mustaqeem_2025.pptxSpin_LED_Presentation_Mustaqeem_2025.pptx
Spin_LED_Presentation_Mustaqeem_2025.pptx
mustaqeemmujahid
 
Crim-Proc-PPT-for-lecture-in-May-2025-Learners.pptx
Crim-Proc-PPT-for-lecture-in-May-2025-Learners.pptxCrim-Proc-PPT-for-lecture-in-May-2025-Learners.pptx
Crim-Proc-PPT-for-lecture-in-May-2025-Learners.pptx
russelrosas
 
Week 2 lecture PCD 203skoacolacbabolabiocasoc
Week 2 lecture PCD 203skoacolacbabolabiocasocWeek 2 lecture PCD 203skoacolacbabolabiocasoc
Week 2 lecture PCD 203skoacolacbabolabiocasoc
saidraqb5
 
Ch 2 The Microprocessor and its Architecture.ppt
Ch 2 The Microprocessor and its Architecture.pptCh 2 The Microprocessor and its Architecture.ppt
Ch 2 The Microprocessor and its Architecture.ppt
ermiasgesgis
 
Feed sampling MLA&dfsfdsfdsfsdfPPLA.pptx
Feed sampling MLA&dfsfdsfdsfsdfPPLA.pptxFeed sampling MLA&dfsfdsfdsfsdfPPLA.pptx
Feed sampling MLA&dfsfdsfdsfsdfPPLA.pptx
newhopemojokerto90
 
Parmila_nsnsnjnsnsnnwDevi_Rajbanshi.pptx
Parmila_nsnsnjnsnsnnwDevi_Rajbanshi.pptxParmila_nsnsnjnsnsnnwDevi_Rajbanshi.pptx
Parmila_nsnsnjnsnsnnwDevi_Rajbanshi.pptx
rahulrajbanshi981052
 
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctr
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctrMayur Seminar.pptxbgvyezuvdt as bijvyivutctr
Mayur Seminar.pptxbgvyezuvdt as bijvyivutctr
vaishnavishitole195
 
Unidad Pedagogica 3ro-4to.documento090904
Unidad Pedagogica 3ro-4to.documento090904Unidad Pedagogica 3ro-4to.documento090904
Unidad Pedagogica 3ro-4to.documento090904
maylingcastro9
 
ideapad_330S_14IKB_Shhjjkjhghhvbhjjjpec.pdf
ideapad_330S_14IKB_Shhjjkjhghhvbhjjjpec.pdfideapad_330S_14IKB_Shhjjkjhghhvbhjjjpec.pdf
ideapad_330S_14IKB_Shhjjkjhghhvbhjjjpec.pdf
MichaelDexterBalanta1
 
TR INGLES TECNICO ECCU-211 1[mmmm1].pptx
TR INGLES TECNICO ECCU-211 1[mmmm1].pptxTR INGLES TECNICO ECCU-211 1[mmmm1].pptx
TR INGLES TECNICO ECCU-211 1[mmmm1].pptx
EnocngelArcentalesVa
 
Py-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.ppt
Py-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.ppt
Py-Slides-1.pptPy-Slides-1.pptPy-Slides-1.pptPy-Slides-1.ppt
v65176016
 
Concavity_Presentation_Updated.pptx rana
Concavity_Presentation_Updated.pptx ranaConcavity_Presentation_Updated.pptx rana
Concavity_Presentation_Updated.pptx rana
ranamumtaz383
 
chapter-11.pdfchapter-11.pdfchapter-11.pdfchapter-chapter-11.pdf.pdf
chapter-11.pdfchapter-11.pdfchapter-11.pdfchapter-chapter-11.pdf.pdfchapter-11.pdfchapter-11.pdfchapter-11.pdfchapter-chapter-11.pdf.pdf
chapter-11.pdfchapter-11.pdfchapter-11.pdfchapter-chapter-11.pdf.pdf
edget1
 
Chapter Five main management of memory .ppt
Chapter Five main management of memory  .pptChapter Five main management of memory  .ppt
Chapter Five main management of memory .ppt
YoomifTube
 
Intro to Windows Presentation for CSS NC-2.pptx
Intro to Windows Presentation for CSS NC-2.pptxIntro to Windows Presentation for CSS NC-2.pptx
Intro to Windows Presentation for CSS NC-2.pptx
HelenAvila17
 
Ad

Introduction to TCP / IP in networking Technology

  • 2. TCP/IP protocol family • IP : Internet Protocol – UDP : User Datagram Protocol • RTP, traceroute – TCP : Transmission Control Protocol • HTTP, FTP, ssh
  • 3. What is an internet? • A set of interconnected networks • The Internet is the most famous example • Networks can be completely different – Ethernet, ATM, modem, … – (TCP/)IP is what links them
  • 4. What is an internet? (cont) • Routers are devices on multiple networks that pass traffic between them • Individual networks pass traffic from one router or endpoint to another • TCP/IP hides the details as much as possible
  • 5. ISO/OSI Network Model • Seven network “layers” – Layer 1 : Physical – cables – Layer 2 : Data Link – ethernet – Layer 3 : Network – IP – Layer 4 : Transport – TCP/UDP – Layer 5 : Session – Layer 6 : Presentation – Layer 7 : Application You don’t need to know the layers just the idea that it is layered
  • 6. TCP/IP Network Model • Different view – 4 layers – Layer 1 : Link – Layer 2 : Network – Layer 3 : Transport – Layer 4 : Application
  • 7. OSI and Protocol Stack OSI: Open Systems Interconnect OSI Model TCP/IP Hierarchy Protocols 7th Application Layer 6th Presentation Layer 5th Session Layer 4th Transport Layer 3rd Network Layer 2nd Link Layer 1st Physical Layer Application Layer Transport Layer Network Layer Link Layer Link Layer : includes device driver and network interface card Network Layer : handles the movement of packets, i.e. Routing Transport Layer : provides a reliable flow of data between two hosts Application Layer : handles the details of the particular application
  • 8. Packet Encapsulation  The data is sent down the protocol stack  Each layer adds to the data by prepending headers 22Bytes 20Bytes 20Bytes 4Bytes 64 to 1500 Bytes
  • 9. IP • Responsible for end to end transmission • Sends data in individual packets • Maximum size of packet is determined by the networks – Fragmented if too large • Unreliable – Packets might be lost, corrupted, duplicated, delivered out of order
  • 10. IP addresses • 4 bytes – e.g. 163.1.125.98 – Each device normally gets one (or more) – In theory there are about 4 billion available • But…
  • 11. Routing • How does a device know where to send a packet? – All devices need to know what IP addresses are on directly attached networks – If the destination is on a local network, send it directly there
  • 12. Routing (cont) • If the destination address isn’t local – Most non-router devices just send everything to a single local router – Routers need to know which network corresponds to each possible IP address
  • 13. Allocation of addresses • Controlled centrally by ICANN – Fairly strict rules on further delegation to avoid wastage • Have to demonstrate actual need for them • Organizations that got in early have bigger allocations than they really need
  • 14. IP packets • Source and destination addresses • Protocol number – 1 = ICMP, 6 = TCP, 17 = UDP • Various options – e.g. to control fragmentation • Time to live (TTL) – Prevent routing loops
  • 15. IP Datagram Vers Len TOS Total Length Identification Flags Fragment Offset TTL Protocol Header Checksum Source Internet Address Destination Internet Address Options... Padding Data... 0 4 8 16 19 24 31 Field Purpose Vers IP version number Len Length of IP header (4 octet units) TOS Type of Service T. Length Length of entire datagram (octets) Ident. IP datagram ID (for frag/reassembly) Flags Don’t/More fragments Frag Off Fragment Offset Field Purpose TTL Time To Live - Max # of hops Protocol Higher level protocol (1=ICMP, 6=TCP, 17=UDP) Checksum Checksum for the IP header Source IA Originator’s Internet Address Dest. IA Final Destination Internet Address Options Source route, time stamp, etc. Data... Higher level protocol data You just need to know the IP addresses, TTL and protocol #
  • 16. IP Routing • Routing Table Destination IP address IP address of a next-hop router Flags Network interface specification Application Transport Network Link Application Transport Network Link Network Link Source Destination Router
  • 17. UDP • Thin layer on top of IP • Adds packet length + checksum – Guard against corrupted packets • Also source and destination ports – Ports are used to associate a packet with a specific application at each end • Still unreliable: – Duplication, loss, out-of-orderness possible
  • 18. UDP datagram Destination Port Source Port Application data 0 16 31 Checksum Length Field Purpose Source Port 16-bit port number identifying originating application Destination Port 16-bit port number identifying destination application Length Length of UDP datagram (UDP header + data) Checksum Checksum of IP pseudo header, UDP header, and data
  • 19. Typical applications of UDP – Where packet loss etc is better handled by the application than the network stack – Where the overhead of setting up a connection isn’t wanted • VOIP • NFS – Network File System • Most games
  • 20. TCP • Reliable, full-duplex, connection- oriented, stream delivery – Interface presented to the application doesn’t require data in individual packets – Data is guaranteed to arrive, and in the correct order without duplications • Or the connection will be dropped – Imposes significant overheads
  • 21. Applications of TCP • Most things! – HTTP, FTP, … • Saves the application a lot of work, so used unless there’s a good reason not to
  • 22. TCP implementation • Connections are established using a three-way handshake • Data is divided up into packets by the operating system • Packets are numbered, and received packets are acknowledged • Connections are explicitly closed – (or may abnormally terminate)
  • 23. TCP Packets • Source + destination ports • Sequence number • Acknowledgement number • Checksum • Various options
  • 24. TCP Segment Destination Port Acknowledgment Number Options... Padding Data... 0 4 10 16 19 24 31 Source Port Window Len Sequence Number Reserved Flags Urgent Pointer Checksum Field Purpose Source Port Identifies originating application Destination Port Identifies destination application Sequence Number Sequence number of first octet in the segment Acknowledgment # Sequence number of the next expected octet (if ACK flag set) Len Length of TCP header in 4 octet units Flags TCP flags: SYN, FIN, RST, PSH, ACK, URG Window Number of octets from ACK that sender will accept Checksum Checksum of IP pseudo-header + TCP header + data Urgent Pointer Pointer to end of “urgent data” Options Special TCP options such as MSS and Window Scale You just need to know port numbers, seq and ack are added
  • 25. TCP : Data transfer Host Client Send Packet 1 Start Timer Retransmit Packet1 Start Timer Packet should arrive ACK should be sent ACK would normally Arrive at this time Receive Packet 1 Send AXK 1 Time Expires Receive ACK 1 Cancel Timer Packet Lost Timer Timer
  • 26. IPv6 • 128 bit addresses – Make it feasible to be very wasteful with address allocations • Lots of other new features – Built-in autoconfiguration, security options, … • Not really in production use yet
  • 27. Ethernet • Computer <-> Computer communication on same network • Each device has unique MAC address (48-bit) example: 00-C0-4F-48-47-93 Ethernet Packet: Dest. address Data CRC Source address Type MAC: Media Access Control 6bytes 6bytes 2bytes Preamble 8bytes 64 - 1500bytes 4bytes Do not worry about this slide
  • 28. ARP : Address Resolution Protocol • ARP provides mapping 32bit IP address <-> 48bit MAC address 128.97.89.153 <-> 00-C0-4F-48-47-93 • ARP cache maintains the recent mappings from IP addresses to MAC addresses Protocol 1. ARP request broadcast on Ethernet 2. Destination host ARP layer responds Do not worry about this slide
  • 29. DHCP • Dynamic Host Configuration Protocol – Used to tell a computer what IP address to use – Device broadcasts a request from IP 0.0.0.0 • If it had an IP address before, asks for the same one again – Server (or relay) on local network responds telling it which to use (or ignores it, or tells it go away) • “Lease time” telling it how long that IP will be valid for • Device requests renewal of lease after ¾(?) elapsed Do not worry about this slide
  翻译: