Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
TCP/IP Training Basic Concepts.
1. TCP/IP Protocol Suite 1
TCP/IP Protocol Suite
پروتكلهاي معرفي
TCP/IP
دهنده ارائه
پناهي اميرحسين
خرداد1391
خدا بنام
2. TCP/IP Protocol Suite 2
The OSI Model
Established in 1947, the International Standards Organization (ISO) is
a multinational body dedicated to worldwide agreement on
international standards. An ISO standard that covers all aspects of
network communications is the Open Systems Interconnection (OSI)
model. It was first introduced in the late 1970s.
The topics discussed in this section include:
Layered Architecture
Peer-to-Peer Processes
Encapsulation
7. TCP/IP Protocol Suite 7
Layers in the OSI Model
The functions of each layer in the OSI model is briefly described.
The topics discussed in this section include:
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Summary of Layers
8. TCP/IP Protocol Suite 8
The physical layer is responsible for Movement of individual bits from
one hop (node) to the next.
•Includes electrical and mechanical connection features
•Determines bit rates
•Should be synchronized in transmission clock
•Transmission modes: Simplex, Half and Full duplex
Note:
Physical layer
9. TCP/IP Protocol Suite 9TCP/IP Protocol Suite 9
The data link layer is responsible for moving frames from one hop
(node) to the next
•Framing
•Physical addressing
•Flow control
•Bit error control
•Access control in shared link(CSMA/CD/CA)
Note:
Data link layer
12. TCP/IP Protocol Suite 12
The network layer is responsible for the delivery of individual
packets from the source host to the destination host.
•Physical addressing
•Routing
Network layer
Note:
14. TCP/IP Protocol Suite 14
The transport layer is responsible for the delivery of a message from one process to
another.
•Port addressing (Process Addressing)
•Segmentation and Reassembly by sequencing
•Connection control (connection-less/connection-oriented)
• flow control (window size)
•Error control (Acknowledgement)
Note:
Transport layer
15. TCP/IP Protocol Suite 15
The Session layer is responsible for synchronization of a message
•Synchronization point insertion and deletion for integrity
validation of message
•Dialog control by changing mode of transmission (half/full duplex)
Note:
Session layer
16. TCP/IP Protocol Suite 16
The presentation layer is responsible for:
•Translation (coding/decoding)
•Encryption/Decryption
•Compression/Decompression
Note:
Presentation layer
19. TCP/IP Protocol Suite 19
TCP/IP Protocol Suite
The TCP/IP protocol suite is made of five layers: physical, data link,
network, transport, and application. The first four layers provide
physical standards, network interface, internetworking, and transport
functions that correspond to the first four layers of the OSI model. The
three topmost layers in the OSI model, however, are represented in
TCP/IP by a single layer called the application layer.
The topics discussed in this section include:
Physical and Data Link Layers
Network Layer
Transport Layer
Application Layer
21. TCP/IP Protocol Suite 21
Addressing
Three different levels of addresses are used in an internet using the
TCP/IP protocols: physical (link) address, logical (IP) address, and
port address.
The topics discussed in this section include:
Physical Address
Logical Address
Port Address
23. TCP/IP Protocol Suite 23
Physical addresses
In Figure a node with physical address 10 sends a frame to a node with physical
address 87. The two nodes are connected by a link. At the data link level this
frame contains physical (link) addresses in the header. These are the only
addresses needed. The rest of the header contains other information needed at
this level. The trailer usually contains extra bits needed for error detection.
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
24. TCP/IP Protocol Suite 24
IP addresses
•In Figure we want to send data from a node
with network address A and physical
address 10, located on one LAN, to a node
with a network address P and physical
address 95, located on another LAN.
Because the two devices are located on
different networks, we cannot use link
addresses only; the link addresses have only
local jurisdiction. What we need here are
universal addresses that can pass through
the LAN boundaries. The network (logical)
addresses have this characteristic.
•The packet at the network layer contains
the logical addresses, which remain the
same from the original source to the final
destination (A and P, respectively, in the
figure). They will not change when we go
from network to network. However, the
physical addresses will change as the packet
moves from one network to another. The
boxes labeled routers are internetworking
devices.
132.24.75.9
An internet address in IPv4 in decimal
numbers
25. TCP/IP Protocol Suite 25
Figure 2.20 Port addresses
753
A 16-bit port address represented
as one single number.
26. TCP/IP Protocol Suite 26
•Figure shows an example of transport layer communication. Data
coming from the upper layers have port addresses j and k ( j is the
address of the sending process, and k is the address of the receiving
process). Since the data size is larger than the network layer can handle,
the data are split into two packets, each packet retaining the service-point
addresses ( j and k). Then in the network layer, network addresses (A and
P) are added to each packet.
•The packets can travel on different paths and arrive at the destination
either in order or out of order. The two packets are delivered to the
destination transport layer, which is responsible for removing the
network layer headers and combining the two pieces of data for delivery
to the upper layers
Port addresses
27. TCP/IP Protocol Suite 27
IP Versions
IP became the official protocol for the Internet in 1983. As the Internet
has evolved, so has IP. There have been six versions since its inception.
We look at the latter three versions here.
The topics discussed in this section include:
Version 4
Version 5
Version 6
28. TCP/IP Protocol Suite 28
Connecting Devices
LANs or WANs do not normally operate in isolation. They are
connected to one another or to the Internet. To connect LANs or
WANs, we use connecting devices. Connecting devices can operate in
different layers of the Internet model. We discuss three kinds of
connecting devices: repeaters (or hubs), bridges (or two-layer
switches), and routers (or three-layer switches). Repeaters and hubs
operate in the first layer of the Internet model. Bridges and two-layer
switches operate in the first two layers. Routers and three-layer
switches operate in the first three layers
The topics discussed in this section include:
Repeaters
Hubs
Bridges
Router
31. TCP/IP Protocol Suite 31
A repeater connects segments of a LAN.
Notes:
A repeater forwards every bit;
it has no filtering capability.
A repeater is a regenerator, not an amplifier.
37. TCP/IP Protocol Suite 37
A router is a three-layer
(physical, data link, and network)
device.
Note:
38. TCP/IP Protocol Suite 38
A repeater or a bridge connects segments
of a LAN.
A router connects independent LANs or
WANs to create an internetwork
(internet).
Note:
41. TCP/IP Protocol Suite 41
CLASSFUL ADDRESSING
IP addresses, when started a few decades ago, used the concept of
classes. This architecture is called classful addressing. In the mid-
1990s, a new architecture, called classless addressing, was introduced
and will eventually supersede the original architecture. However, part
of the Internet is still using classful addressing, but the migration is
very fast.
46. TCP/IP Protocol Suite 46
The network address is the beginning
address of each block. It can be found
by applying the default mask to any
of the addresses in the block
(including itself). It retains the netid
of the block and sets the hostid to
zero.
Note:
47. TCP/IP Protocol Suite 47
Upon completion you will be able to:
ARP and RARP
• Understand the need for ARP
• Understand the cases in which ARP is used
• Understand the components and interactions in an ARP
package
• Understand the need for RARP
Objectives
49. TCP/IP Protocol Suite 49
ARP
ARP associates an IP address with its physical address. On a typical physical network,
such as a LAN, each device on a link is identified by a physical or station address that is
usually imprinted on the NIC.
58. TCP/IP Protocol Suite 58
Upon completion you will be able to:
Internet Protocol
• Understand the format and fields of a datagram
• Understand the need for fragmentation and the fields involved
• Understand the options available in an IP datagram
• Be able to perform a checksum calculation
• Understand the components and interactions of an IP package
Objectives
60. TCP/IP Protocol Suite 60
DATAGRAM
A packet in the IP layer is called a datagram, a variable-length packet consisting of
two parts: header and data. The header is 20 to 60 bytes in length and contains
information essential to routing and delivery.
61. TCP/IP Protocol Suite 61
Service type or differentiated services
The precedence subfield was designed, but
never used in version 4.
Types of service
66. TCP/IP Protocol Suite 66
TTL field
•This filed is used to make limitation of movement of a packet in the
internet
•After any hop in a router this filed is decremented one.
•If TTL equals zero, the packet will be discarded.
67. TCP/IP Protocol Suite 67
FRAGMENTATION
The format and size of a frame depend on the protocol used by the
physical network. A datagram may have to be fragmented to fit the
protocol regulations.
70. TCP/IP Protocol Suite 70
CHECKSUM
The error detection method used by most TCP/IP protocols is called
the checksum. The checksum protects against the corruption that may
occur during the transmission of a packet. It is redundant information
added to the packet.
The topics discussed in this section include:
Checksum Calculation at the Sender
Checksum Calculation at the Receiver
Checksum in the IP Packet
71. TCP/IP Protocol Suite 71
To create the checksum the sender does the following:
❏ The packet is divided into k sections, each of n bits.
❏ All sections are added together using 1’s complement
arithmetic.
❏ The final result is complemented to make the
checksum.
Note:
74. TCP/IP Protocol Suite 74
Upon completion you will be able to:
User Datagram
Protocol
• Be able to explain process-to-process communication
• Know the format of a UDP user datagram
• Be able to calculate a UDP checksum
• Understand the operation of UDP
• Know when it is appropriate to use UDP
• Understand the modules in a UDP package
Objectives
76. TCP/IP Protocol Suite 76
11.1 PROCESS-TO-PROCESS
COMMUNICATION
Before we examine UDP, we must first understand host-to-host
communication and process-to-process communication and the
difference between them.
The topics discussed in this section include:
Port Numbers
Socket Addresses
86. TCP/IP Protocol Suite 86
11.3 CHECKSUM
UDP checksum calculation is different from the one for IP and ICMP.
Here the checksum includes three sections: a pseudoheader, the UDP
header, and the data coming from the application layer.
The topics discussed in this section include:
Checksum Calculation at Sender
Checksum Calculation at Receiver
Optional Use of the Checksum
88. TCP/IP Protocol Suite 88
Figure 11.9 Checksum calculation of a simple UDP user datagram
89. TCP/IP Protocol Suite 89
UDP OPERATION
UDP uses concepts common to the transport layer. These concepts will
be discussed here briefly, and then expanded in the next chapter on the
TCP protocol.
The topics discussed in this section include:
Connectionless Services
Flow and Error Control
Encapsulation and Decapsulation
Queuing
Multiplexing and Demultiplexing
93. TCP/IP Protocol Suite 93
Upon completion you will be able to:
Transmission
Control Protocol
• Be able to name and understand the services offered by TCP
• Understand TCP’s flow and error control and congestion control
• Be familiar with the fields in a TCP segment
• Understand the phases in a connection-oriented connection
• Understand the TCP transition state diagram
• Be able to name and understand the timers used in TCP
• Be familiar with the TCP options
Objectives
95. TCP/IP Protocol Suite 95
12.1 TCP SERVICES
We explain the services offered by TCP to the processes at the
application layer.
The topics discussed in this section include:
Process-to-Process Communication
Stream Delivery Service
Full-Duplex Communication
Connection-Oriented Service
Reliable Service
100. TCP/IP Protocol Suite 100
TCP FEATURES
To provide the services mentioned in the previous section, TCP has
several features that are briefly summarized in this section.
The topics discussed in this section include:
Numbering System
Flow Control
Error Control
Congestion Control
101. TCP/IP Protocol Suite 101
The bytes of data being transferred in
each connection are numbered by TCP.
The numbering starts with a randomly
generated number.
Note:
102. TCP/IP Protocol Suite 102
The value in the sequence number
field of a segment defines the number
of the first data byte contained
in that segment.
Note:
103. TCP/IP Protocol Suite 103
The value of the acknowledgment
field in a segment defines the number
of the next byte a party expects to
receive.
The acknowledgment number is
cumulative.
Note:
104. TCP/IP Protocol Suite 104
SEGMENT
A packet in TCP is called a segment
The topics discussed in this section include:
Format
Encapsulation
110. TCP/IP Protocol Suite 110
A TCP CONNECTION
TCP is connection-oriented. A connection-oriented transport protocol
establishes a virtual path between the source and destination. All of the
segments belonging to a message are then sent over this virtual path. A
connection-oriented transmission requires three phases: connection
establishment, data transfer, and connection termination.
The topics discussed in this section include:
Connection Establishment
Data Transfer
Connection Termination
Connection Reset
120. TCP/IP Protocol Suite 120
STATE TRANSITION DIAGRAM
To keep track of all the different events happening during connection
establishment, connection termination, and data transfer, the TCP
software is implemented as a finite state machine. .
The topics discussed in this section include:
Scenarios
129. TCP/IP Protocol Suite 129
FLOW CONTROL
Flow control regulates the amount of data a source can send before
receiving an acknowledgment from the destination. TCP defines a
window that is imposed on the buffer of data delivered from the
application program.
The topics discussed in this section include:
Sliding Window Protocol
Silly Window Syndrome
131. TCP/IP Protocol Suite 131
A sliding window is used to make
transmission more efficient as well as
to control the flow of data so that the
destination does not become
overwhelmed with data.
TCP’s sliding windows are byte
oriented.
Note:
134. TCP/IP Protocol Suite 137
ERROR CONTROL
TCP provides reliability using error control, which detects corrupted,
lost, out-of-order, and duplicated segments. Error control in TCP is
achieved through the use of the checksum, acknowledgment, and time-
out.
The topics discussed in this section include:
Checksum
Acknowledgment
Acknowledgment Type
Retransmission
Out-of-Order Segments
Some Scenarios
135. TCP/IP Protocol Suite 138
ACK segments do not consume
sequence numbers and are not
acknowledged.
Note:
136. TCP/IP Protocol Suite 139
In modern implementations, a
retransmission occurs if the
retransmission timer expires or three
duplicate ACK segments have arrived.
Note:
138. TCP/IP Protocol Suite 141
Data may arrive out of order and be
temporarily stored by the receiving TCP,
but TCP guarantees that no out-of-order
segment is delivered to the process.
Note: