1 / 38

TCP/IP Network and OSI Model

TCP/IP Network and OSI Model . What is a Protocol?. Allows entities (i.e. application programs) from different systems to communicate Shared conventions for communicating information are called protocols Includes syntax, semantics, and timing. Why Use Protocol Architecture?.

rue
Download Presentation

TCP/IP Network and OSI Model

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TCP/IP Network and OSI Model

  2. What is a Protocol? • Allows entities (i.e. application programs) from different systems to communicate • Shared conventions for communicating information are called protocols • Includes syntax, semantics, and timing

  3. Why Use Protocol Architecture? • Data communications requires complex procedures • Sender identifies data path/receiver • Systems negotiate preparedness • Applications negotiate preparedness • Translation of file formats • For all tasks to occur, high level of cooperation is required

  4. Three-Layer Model • Distributed data communications involves three primary components: • Networks • Computers • Applications • Three corresponding layers • Network access layer • Transport layer • Application layer

  5. Networks are complex! many “pieces”: hosts routers links of various media applications protocols hardware, software Question: Is there any hope of organizing structure of network? Or at least our discussion of networks?0 Protocol “Layers”

  6. ticket (complain) baggage (claim) gates (unload) runway landing airplane routing ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing airplane routing Organization of air travel • a series of steps

  7. ticket (complain) baggage (claim) gates (unload) runway landing airplane routing ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing airplane routing Organization of air travel: a different view Layers: each layer implements a service • via its own internal-layer actions • relying on services provided by layer below

  8. Layered air travel: services Counter-to-counter delivery of person+bags baggage-claim-to-baggage-claim delivery people transfer: loading gate to arrival gate runway-to-runway delivery of plane airplane routing from source to destination

  9. airplane routing airplane routing airplane routing Distributed implementation of layer functionality ticket (complain) baggage (claim) gates (unload) runway landing airplane routing ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing arriving airport Departing airport intermediate air traffic sites

  10. Why layering? Dealing with complex systems: • explicit structure allows identification, relationship of complex system’s pieces • layered reference model for discussion • modularization eases maintenance, updating of system • change of implementation of layer’s service transparent to rest of system • e.g., change in gate procedure doesn’t affect rest of system • layering considered harmful?

  11. application: supporting network applications ftp, smtp, http transport: host-host data transfer tcp, udp network: routing of datagrams from source to destination ip, routing protocols link: data transfer between neighboring network elements ppp, ethernet physical: bits “on the wire” application transport network link physical Internet protocol stack

  12. Transmission Control Protocol/Internet Protocol Developed by DARPA No official protocol standard Can identify five layers Application Host-to-Host (transport) Internet Network Access Physical TCP/IP

  13. Application process Application process W rite Read bytes bytes … … TCP TCP Send buffer Receive buffer … Segment Segment Segment T ransmit segments TCP Overview • Full duplex • Flow control: keep sender from overrunning receiver • Congestion control: keep sender from overrunning network • Connection-oriented • Byte-stream • app writes bytes • TCP sends segments • app reads bytes

  14. full duplex data: bi-directional data flow in same connection MSS: maximum segment size connection-oriented: handshaking (exchange of control msgs) init’s sender, receiver state before data exchange flow controlled: sender will not overwhelm receiver point-to-point: one sender, one receiver reliable, in-order byte steam: no “message boundaries” pipelined: TCP congestion and flow control set window size send & receive buffers TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581

  15. 32 bits source port # dest port # sequence number acknowledgement number head len not used rcvr window size U A P R S F checksum ptr urgent data Options (variable length) application data (variable length) TCP segment structure URG: urgent data (generally not used) counting by bytes of data (not segments!) ACK: ACK # valid PSH: push data now (generally not used) # bytes rcvr willing to accept RST, SYN, FIN: connection estab (setup, teardown commands) Internet checksum (as in UDP)

  16. Source port (16 bits) Destination port (16 bits) Sequence number (32 bits) Acknowledgment number (32 bits) Data Offset (4 bits) Reserved (6 bits) Flags (6 bits) : URG, ACK, PSH, RST, SYN, FIN Window (16 bits) Checksum (16 bits) Urgent Pointer (16 bits) Options (variable) TCP Segment (TCP PDU)

  17. TCP/IP Physical Layer • Physical interface between a DTE (e.g. computer or terminal) and a transmission medium • Specifies: • Characteristics of medium • Nature of signals • Data rate

  18. TCP/IP Network Access • Exchange of data between end system and network • Address of host and destination • Prioritization of transmission • Software at this layer depends on network (e.g. X.25 vs. Ethernet) • Segregation means that no other software needs to be concerned about net specifics

  19. Network Access Layer • Concerned with exchange of data between computer and network • Includes addressing, routing, prioritizing, etc • Different networks require different software at this layer • Example: X.25 standard for network access procedures on packet-switching networks

  20. TCP/IP Internet Layer • An Internet is an interconnection of two or more networks • Internet layer handles tasks similar to network access layer, but between networks rather than between nodes on a network • Uses IP for addressing and routing across networks • Implemented in workstations and routers

  21. TCP/IP Transport Layer • Also called host-to-host layer • Reliable exchange of data between applications • Uses TCP protocols for transmission

  22. Transport Layer • Concerned with reliable transfer of information between applications • Independent of the nature of the application • Includes aspects like flow control and error checking

  23. TCP/IP Application Layer • Logic needed to support variety of applications • Each type of application (file transfer, remote access) requires different software on this layer

  24. TCP/IP Applications • SMTP (Simple Mail Transfer Protocol) • Basic e-mail facility, transferring messages among hosts • FTP (File Transfer Protocol) • Sends files from one system to another on user command • Telnet • Remote login capability, allowing a user to emulate a terminal on the remote system

  25. TCP & UDP • Most TCP/IP applications use TCP for transport layer • TCP provides a connection (logical association) between two entities to regulate flow check errors • UDP (User Datagram Protocol) does not maintain a connection, and therefore does not guarantee delivery, preserve sequences, or protect against duplication

  26. “no frills,” “bare bones” Internet transport protocol “best effort” service, UDP segments may be: lost delivered out of order to app connectionless: no handshaking between UDP sender, receiver each UDP segment handled independently of others Why is there a UDP? no connection establishment (which can add delay) simple: no connection state at sender, receiver small segment header no congestion control: UDP can blast away as fast as desired UDP: User Datagram Protocol [RFC 768]

  27. often used for streaming multimedia apps loss tolerant rate sensitive other UDP uses (why?): DNS SNMP reliable transfer over UDP: add reliability at application layer application-specific error recover! UDP: more 32 bits source port # dest port # Length, in bytes of UDP segment, including header checksum length Application data (message) UDP segment format

  28. Addressing • Each computer on a network requires a unique address on that network • Each application requires a unique address within the computer to allow support for multiple applications (service access points, or SAP)

  29. Version (4 bits) Internet header length (4 bits) Type of Service (8 bits) Total Length (16 bits) Identification (16 bits) Flags (3 bits) Fragment Offset (13 bits) Time to Live (8 bits) Protocol (8 bits Header Checksum (16 bits) Source Address ( 32 bits) Destination Address (32 bits) Options (variable) Padding (variable) IPv4 Header

  30. IP and IPv6 • IP provides for 32-bit source and destination addresses • IPv6 (1996 standard) provides for 128-bit addresses • Migraqtion to IPv6 will be a very slow process

  31. Data Transmission • Application layer creates data block • Transport layer appends header to create PDU (protocol data unit) • Destination SAP, Sequence #, Error-Detection Code • Network layer appends another header • Destination computer, facilities (e.g. “priority”)

  32. Standardized Protocol Architectures • Vendors like standards because they make their products more marketable • Customers like standards because they enable products from different vendors to interoperate • Two protocol standards are well-known: • TCP/IP: widely implemented • OSI: well-known, less used, still useful for modeling/conceptualizing

  33. Routers • Equipment used to interconnect independent networks • Several essential functions • Provide a link between networks • Provide routing and delivery of data between processes on systems from different networks • Provide the above functions without requiring modification of the attached networks

  34. Router Issues • Addressing schemes • Maximum packet size • Interfaces • Reliability

  35. Internetworking • Interconnected networks, usually implies TCP/IP • Can appear to users as a single large network • The global Internet is the largest example, but intranets and extranets are also examples

  36. Network 1 (Ethernet) H7 R3 H8 H1 H8 H2 H1 H3 TCP TCP Network 4 R1 R2 R3 (point-to-point) Network 2 (Ethernet) R1 IP IP IP IP IP R2 FDDI PPP ETH ETH ETH FDDI PPP ETH H4 Network 3 (FDDI) H5 H6 IP Internet • Concatenation of Networks • Protocol Stack

  37. Internetworking Protocols

  38. Question ???

More Related