Xem mẫu
Computer Network Table of Content References:
1. Data- Computer Communication handbook- William Stallings
2. TCP/IP Illustrated, Volume I - W.R. Stevens 3. CCNA- semester1-2-3-4
1
Part3. TCP/IP Protocol Suite and
IP Addressing
1 Introduction to TCP/IP Model
2 Internet addresses
3 IP Format
3 ICMP
4 TCP
5 UDP
INTRODUCTION TO TCP/IP
TCP/IP protocol stack
TCP/IP model development
• The late-60s The Defense Advance Research Projects Agency (DARPA) originally developed Transmission Control Protocol/Internet Protocol (TCP/IP) to interconnect various defense department computer networks.
• The Internet, an International Wide Area Network, uses TCP/IP to connect networks across the world.
Cases of Access Network
• Focus on IP Network level:
•Multiple higher-layer protocols to applications
•Multiple lower-layer protocols to physical links
•Only IP protocol at the network layer.
WAN
WAN to WAN
LAN to WAN
LAN to LAN
Internal Using in ptithcm 1
IP Suite: End Hosts vs. Routers The Network Access Layer
host host
HTTP message
HTTP HTTP
• Provide the ways and means to access to the internal network (LAN) or external network (WAN)
• To LAN with Ethernet, Tokenring, FDDI
TCP segment
TCP TCP
router router
IP IP packet IP IP packet IP IP packet IP
• To WAN with dial-up/PSTN, Frame relay, ADSL/ATM, lease-line …
• Deals all the details in the OSI physical and data link layers.
– Connectors with electrical, mechanical, procedural and functional specifications.
– Media access control with
• Data rate, Distances, synchronization
Ethernet interface
Ethernet interface
SONET interface
SONET interface
Ethernet interface
Ethernet interface
• Frames, physical addressing, flow control, error control.
7
The internet layer
• IP provide provides an unreliable connectionless best effort service (also called: “datagram service”).
– Unreliable:IP does not make an attempt to recover lost packets
– Connectionless: Each packet (“datagram”) is handled independently. IP is not aware that packets between hosts may be sent in a logical sequence
– Best effort: IP does not make guarantees on the service (no throughput guarantee, no delay guarantee,…)
• Consequences:
– Higher layer protocols have to deal with losses or with duplicate packets
– Packets may be delivered out-of-sequence
Application layer
• Multiplexing
The Transport Layer
• Responsibility
– Provides reliable transport services from the source host to the destination host (end-to-end) over networks.
• Concerns
– Segments, data stream, datagram.
– Defines end-to-end connectivity between host applications.
– Transmission control protocol (TCP) – Connection oriented
– User datagram protocol (UDP) – Connectionless
Internet layer other protocols
• Responsibility
– Handles high-level protocols, issues of representation, encoding, and dialog control, and assures this data is properly packaged for the next layer.
• Concerned
– File Transfer ( TFTP, FTP, NFS)
– E-Mail (SMTP)
– Remote Login (Telnet, rlogin) – Network management (SNMP) – Name Management (DNS)
• Internet Control Message Protocol (ICMP) −Provides control and messaging capabilities.
– IP communication service messages like PING, TRACEROUTE and ROUTER
• Internet Group Message Protocol (IGMP)
– IP communications based on multicasting (sending to groups of hosts)
• Address Resolution Protocol (ARP)
−Determines the data link layer address, MAC address, for known IP addresses.
• Reverse Address Resolution Protocol (RARP)
−Determines IP addresses when the MAC address is known.
Internal Using in ptithcm 2
Internet layer other protocols
• Routing protocols:
– RIP/ RIPng (for IPv6) – OSPF v2, v3
– BGP
• For security: – 802.1x
– IPsec
– SSL/ TLS – SSH
• For QoS control: RSVP…
IP Datagram Format IP Datagram Format
bit # 0 7 8 15 16 23 24 31 bit # 0 7 8 15 16 23 24 31
version length DS ECN
D M QoS controlling at transit routers:F
total length (in bytes) version
Fragment offset
header length
Identification
ECN
D M F F
total length (in bytes)
Fragment offset
¾F¾DS- Differentiated Service /eType-of-Service (TOS)
¾Explicit Congestion Notification to TCP (ECN-2bits) • identification options (0 to 40 bytes)
•don’t fragment
• more flag payload
•and fragment offset 4fields
IP Datagram Format
time-to-live (TTL) protocol header checksum
•Time To Live (TTL) (1 b pecifying the higher-layer protocol. •Specifies longest paths before datagram is dropped
•Role of TTL field: Ensure that packet is eventually dropped when a routing loop occurs
•Used as follows:
•Sender sets the value (e.g., 64)
•Each router decrements the value by 1
•When the value reaches 0, the datagram is dropped
IP Datagram Format
bit # 0 7 8 15 16
version header DS ECN
Identification 0 D M
time-to-live (TTL) protocol
23 24 31
total length (in bytes)
Fragment offset
header checksum
•In some cases option with source route also used for
routing. Several options can be added to IP header: version length • So DS e route total length (in bytes)
Identification ord route 0 F F Fragment offset time-to-live (TTL) • Ti protocol p header checksum
source IP address
• Header checksum field: idetects error occurring
options (0 to 40 bytes)
payload
4 bytes
Internal Using in ptithcm
source IP address
destination IP address
•Routing datagram by destination address and source address fields.
•In some cases option with source route also used for routing. 4 bytes
...
- tailieumienphi.vn
nguon tai.lieu . vn