Sie sind auf Seite 1von 27

1

06/02/2006 1
Dr. L. Christofi 1
Local Local Local Local & && & Metropolitan Metropolitan Metropolitan Metropolitan
Area Networks Area Networks Area Networks Area Networks
ACOE322
Lecture 5
TCP/IP Protocol suite
and
IP addressing
Dr. L. Christofi
2
0. INTRODUCTION INTRODUCTION INTRODUCTION INTRODUCTION
We shall cover in this topic:
1. The relation of TCP/IP with internet and OSI
model
2. Internet layer
3. Transport layer and UDP
4. Application layer
Dr. L. Christofi
3
1. History and Future of TCP/IP
The U.S. Department of
Defense (DoD) created the
TCP/IP reference model
because it wanted a
network that could survive
any conditions.
Some of the layers in the
TCP/IP model have the
same name as layers in
the OSI model.
2
06/02/2006 2
Dr. L. Christofi
4
Application Layer
Handles high-level protocols, issues of
representation, encoding, and dialog control.
The TCP/IP protocol suite combines all application
related issues into one layer and ensures this data
is properly packaged before passing it on to the
next layer.
Dr. L. Christofi
5
Transport Layer
Five basic services:
Segmenting upper-layer application data
Establishing end-to-end operations
Sending segments from one end host to
another end host
Ensuring data reliability
Providing flow control
Dr. L. Christofi
6
Layer 4 Protocols
3
06/02/2006 3
Dr. L. Christofi
7
Internet Layer
The purpose of the Internet layer is to send packets from a
network node and have them arrive at the destination node
independent of the path taken.
Internet layer protocols:
Internet Protocol (IP)
Internet Control Message Protocol (ICMP)
Address Resolution Protocol (ARP)
Reverse Address Resolution Protocol (RARP)
Dr. L. Christofi
8
Network Access Layer
The network access layer
is concerned with all of
the issues that an IP
packet requires to
actually make a physical
link to the network
media.
It includes the LAN and
WAN technology details,
and all the details
contained in the OSI
physical and data link
layers.
Dr. L. Christofi
9
Comparing the OSI Model and
TCP/IP Model
4
06/02/2006 4
Dr. L. Christofi
10
Similarities of the OSI and TCP/IP
models
Both have layers.
Both have application layers, though they include
very different services.
Both have comparable transport and network
layers.
Packet-switched, not circuit-switched, technology
is assumed.
Networking professionals need to know both
models.
Dr. L. Christofi
11
Differences of the OSI and TCP/IP
models
TCP/IP combines the presentation and session
layer into its application layer.
TCP/IP combines the OSI data link and physical
layers into one layer.
TCP/IP appears simpler because it has fewer
layers.
TCP/IP transport layer using UDP does not always
guarantee reliable delivery of packets as the
transport layer in the OSI model does.
Dr. L. Christofi
12
Internet Architecture
Two computers, anywhere in the world, following
certain hardware, software, protocol
specifications, can communicate, reliably even
when not directly connected.
LANs are no longer scalable beyond a certain
number of stations or geographic separation.
5
06/02/2006 5
Dr. L. Christofi
13
2. TCP/IP Internet layer
Internet Addresses
Dr. L. Christofi
14
IP Address as a
32-Bit Binary Number
Dr. L. Christofi
15
Binary and Decimal Conversion
6
06/02/2006 6
Dr. L. Christofi
16
IP Address Classes
Dr. L. Christofi
17
IP Address Classes
Dr. L. Christofi
18
IP Addresses as Decimal
Numbers
7
06/02/2006 7
Dr. L. Christofi
19
Hosts for Classes of
IP Addresses
Class A (24 bits for hosts) 2
24
- 2
*
= 16,777,214 maximum
hosts
Class B (16 bits for hosts) 2
16
- 2
*
= 65,534 maximum hosts
Class C (8 bits for hosts) 2
8
- 2
*
= 254 maximum hosts
*
Subtracting the network and broadcast reserved address
Dr. L. Christofi
20
IP Addresses as Decimal
Numbers
Class D: Multicast
Class E: Research
Dr. L. Christofi
21
An IP address such as 176.10.255.255 that has all binary 1s
in the host bit positions is reserved for the broadcast
address.
An IP address such as 176.10.0.0 that has all binary 0s in
the host bit positions is reserved for the network address.
Network IDs and Broadcast
Addresses
8
06/02/2006 8
Dr. L. Christofi
22
Private Addresses
These addresses are NEVER used on the Internet and
should never appear on the Internet.
They are used only for private networks.
Dr. L. Christofi
23
Reserved Address Space
Network ID
Broadcast address
Hosts for classes of IP addresses
Dr. L. Christofi
24
Basics of Subnetting
Classical IP addressing
Subnetworks
Subnet mask
Boolean operations: AND, OR, and NOT
Performing the AND function
9
06/02/2006 9
Dr. L. Christofi
25
Subnetworks
To create a subnet address, a network
administrator borrows bits from the original host
portion and designates them as the subnet field.
Dr. L. Christofi
26
Subnetworks
Dr. L. Christofi
27
Subnet Mask
Determines which part of an IP address is the
network field and which part is the host field
Follow these steps to determine the subnet mask:
1. Express the subnetwork IP address in binary form.
2. Replace the network and subnet portion of the address
with all 1s.
3. Replace the host portion of the address with all 0s.
4. Convert the binary expression back to dotted-decimal
notation.
10
06/02/2006 10
Dr. L. Christofi
28
Subnet mask in decimal = 255.255.240.0
Subnet Mask
Dr. L. Christofi
29
Recall
AND is like multiplication
OR is like addition
NOT changes 1 to 0, and 0 to 1.
Boolean Operations:
AND, OR, and NOT
Dr. L. Christofi
30
Performing the AND Function
11
06/02/2006 11
Dr. L. Christofi
31
Range of Bits Needed to Create
Subnets
Dr. L. Christofi
32
Subnet Addresses
Dr. L. Christofi
33
Decimal Equivalents of 8-Bit
Patterns
12
06/02/2006 12
Dr. L. Christofi
34
Creating a Subnet
Determining subnet mask size
Computing subnet mask and IP address
Computing hosts per subnetwork
Boolean AND operation
IP configuration on a network diagram
Host and subnet schemes
Private addresses
Dr. L. Christofi
35
Class B address with 8 bits borrowed for the subnet
130.5.2.144 (8 bits borrowed for subnetting) routes to
subnet 130.5.2.0 rather than just to network 130.5.0.0.
Determining Subnet Mask Size
Dr. L. Christofi
36
The address 197.15.22.131 would be on the
subnet 197.15.22.128.
Host Field SN Network Field
00011 100 00010110 00001111 11000101
Class C address 197.15.22.131 with a subnet
mask of 255.255.255.224 (3 bits borrowed)
Determining Subnet Mask Size
13
06/02/2006 13
Dr. L. Christofi
37
Subnetting Example
with AND Operation
Dr. L. Christofi
38
The router connects subnetworks and networks.
IP Configuration on a Network
Diagram
Dr. L. Christofi
39
The number of lost IP addresses with a Class C network
depends on the number of bits borrowed for subnetting.
Host Subnet Schemes
14
06/02/2006 14
Dr. L. Christofi
40
Broadcast addresses exercise
Address Subnet Mask Class Subnet Broadcast
201.222.10.60 255.255.255.248
15.16.193.6 255.255.248.0
128.16.32.13 255.255.255.252
153.50.6.27 255.255.255.128
64.10.19.152 255.255.240.0
Fill-in the class, subnet and broadcast IP addresses in the
following table
Dr. L. Christofi
41
Broadcast addresses exercise
answer
Address Subnet Mask Class Subnet Broadcast
201.222.10.60 255.255.255.248 C 201.222.10.56 201.222.10.63
15.16.193.6 255.255.248.0 A 15.16.192.0 15.16.199.255
128.16.32.13 255.255.255.252 B 128.16.32.12 128.16.32.15
153.50.6.27 255.255.255.128 B 153.50.6.0 153.50.6.127
64.10.19.152 255.255.240.0 A 64.10.16.0 64.10.31.255
Fill-in the class, subnet and broadcast IP addresses in the
following table
Dr. L. Christofi
42
Exercise 1
Given the IP address 192.168.100.86 find
The default mask
The subnet mask, assuming 5 bits of subnetting
The subnet IP address
The broadcast address
The first and last valid host IP addresses
15
06/02/2006 15
Dr. L. Christofi
43
Exercise 1 answer
Given the IP address 192.168.100.86 find
The default mask:
It is a class C address, therefore Default mask is
255.255.255.0
The subnet mask, assuming 5 bits of subnetting
5 bits for subnet, 3 remaining bit for host addresses, so
subnet mask is 255.255.255.248
The subnet IP address: 192.168.100.80
The broadcast address: 192.168.100.87
The first and last valid host IP addresses
1
st
valid host address: 192.168.100.81
Last valid host address: 192.168.100.86
Dr. L. Christofi
44
Exercise 2
Given the IP address 172.16.164.32/19 find
The default mask
The subnet mask
The subnet IP address
The broadcast address
The first and last valid host IP addresses
Dr. L. Christofi
45
Exercise 2 answer
Given the IP address 172.16.164.32/19 find
The default mask
It is a class B address, so Default mask is 255.255.0.0
The subnet mask: 255.255.224.0
The subnet IP address: 172.16.160.0
The broadcast address: 172.16.191.255
The first and last valid host IP addresses
1
st
valid host address: 172.16.160.1
Last valid host address: 172.16.191.254
16
06/02/2006 16
Dr. L. Christofi
46
IPv4 versus IPv6
IP version 6 (IPv6) has been defined and developed.
IPv6 uses 128 bits rather than the 32 bits currently used in
IPv4.
IPv6 uses hexadecimal numbers to represent the 128 bits.
IPv4
Dr. L. Christofi
47
Obtaining an IP Address
Static addressing
Each individual device must be configured with an IP
address.
Dynamic addressing
Reverse Address Resolution Protocol (RARP)
Bootstrap Protocol (BOOTP)
Dynamic Host Configuration Protocol (DHCP)
DHCP initialization sequence
Function of the Address Resolution Protocol
ARP operation within a subnet
Dr. L. Christofi
48
A default gateway is the IP
address of the interface on the
router that connects to the
network segment on which the
source host is located.
Default Gateway
17
06/02/2006 17
Dr. L. Christofi
49
3. TCP/IP Transport Layer
Five basic services:
Segmenting upper-layer application data
Establishing end-to-end operations
Sending segments from one end host to another
end host
Ensuring data reliability
Providing flow control
Dr. L. Christofi
50
Flow Control
Avoids the problem of a host at one side of the
connection overflowing the buffers in the host at
the other side
Ensures the integrity of the data
Dr. L. Christofi
51
Session Establishment
18
06/02/2006 18
Dr. L. Christofi
52
Three-Way Handshake
Dr. L. Christofi
53
Windowing
A method of controlling the amount of information
transferred end to end
Information can be measured in terms of the
number of packets or the number of bytes
Dr. L. Christofi
54
Window Size
Larger window
sizes increase
communication
efficiency.
19
06/02/2006 19
Dr. L. Christofi
55
Acknowledgment
Positive acknowledgment requires a recipient to
communicate with the source, sending back an
acknowledgment message when it receives data.
Sender keeps a record of each data packet that it
sends and expects an acknowledgment.
Dr. L. Christofi
56
Layer 4 Protocols
Dr. L. Christofi
57
TCP
Connection oriented
Reliable
Divides outgoing messages into segments
Reassembles messages at the destination station
Resends anything not received
Reassembles messages from incoming segments
20
06/02/2006 20
Dr. L. Christofi
58
UDP
Connectionless
Unreliable
Transmits messages (called user datagrams)
Provides no software checking for message
delivery (unreliable)
Does not reassemble incoming messages
Uses no acknowledgments
Provides no flow control
Dr. L. Christofi
59
TCP/IP Protocol Graph
Dr. L. Christofi
60
TCP Segment Format
21
06/02/2006 21
Dr. L. Christofi
61
UDP Segment Format
Dr. L. Christofi
62
Port Numbers
Dr. L. Christofi
63
4. TCP/IP Application Layer
22
06/02/2006 22
Dr. L. Christofi
64
Responsibilities
Identifying and establishing the availability of
intended communication partners
Synchronizing cooperating applications
Establishing agreement on procedures for error
recovery
Controlling data integrity
Dr. L. Christofi
65
Application Layer Examples
Domain Name System (DNS)
File Transfer Protocol (FTP)
Hypertext Transfer Protocol (HTTP) and World
Wide Web (WWW)
Simple Mail Transport Protocol (SNTP)
Simple Network Management Protocol (SNMP)
Telnet
Dr. L. Christofi
66
Domain Name System (DNS)
To identify an entity the Internet uses the IP address, which
uniquely identifies the connection of a host to the Internet
However, people prefer to use names instead of numeric
addresses
Therefore we need a system that can map a name to an address
or an address to a name
When the Internet was small, mapping was done using a host file
Today is impossible to have a single host file to relate every
address to a name and vice versa. The host file would be too large
to store in every host
One solution is to store the entire host file in a single computer
and allow access to this centralized info to every PC that needs a
mapping but this would create a huge amount of traffic
Another solution is to divide this huge amount of info into smaller
parts and store each part on a different computer. In this method,
the host that needs mapping can contact the closest computer
holding the needed info.
This method is used by the DNS system.
23
06/02/2006 23
Dr. L. Christofi
67
Domain Name System
Dr. L. Christofi
68
FTP (1)
File transfer protocol (FTP) is a TCP/IP client-server application for
copying files from one host to another.
FTP requires two connections for data transfer: a control
connection and a data connection.
FTP employs ASCII for communication between dissimilar systems.
Prior to the actual transfer of files, the file type, data structure,
and transmission mode are defined by the client through the
control connection.
Responses are sent from the server to the client during connection
establishment.
Dr. L. Christofi
69
FTP (2)
There are three types of file transfer:
A file is copied from the server to the client.
A file is copied from the client to the server.
A list of directories or file names is sent from the server to the
client.
Most operating systems provide a user-friendly interface
between FTP and the user.
Anonymous FTP provides a method of the general public to
access files on remote sites.
24
06/02/2006 24
Dr. L. Christofi
70
SMTP
One of the most important network services is
electronic mail (email)
Electronic mail is used for sending a single
message that includes text, voice, video or
graphics to one or more recipients
Simple Mail Transfer Protocol (SMTP) is the
standard mechanism for electronic mail in the
Internet
Dr. L. Christofi
71
SMTP
E-mail servers communicate with each other using the
Simple Mail Transport Protocol (SMTP) to send and receive
mail.
Dr. L. Christofi
72
SMTP
25
06/02/2006 25
Dr. L. Christofi
73
HTTP
The Hypertext Transfer Protocol (HTTP) is used mainly to access
data on the World Wide Web.
Hypertext Markup Language (HTML) is a language used to create
static Web pages.
The protocol transfers data in the form of plain text, hypertext,
audio, video and so on.
It is called HTTP because it is used in an environment where there
are rapid jumps from one document to another
HTTP functions like a combination of FTP and SMTP
- It is similar to FTP because it transfers files and uses the services of
TCP (via port 80). There is no separate control connection only
data are transferred between the client and the server
- HTTP is also similar to SMTP because the data transferred between
the client and the server are similar to SMTP messages
Dr. L. Christofi
74
WWW (1)
The HTTP is the main protocol used to access data on the World
Wide Web (WWW).
The World Wide Web is a repository of information spread all over
the world and linked together.
Hypertext and hypermedia are documents linked to one another
through the con-cept of pointers.
Browsers interpret and display a Web document.
A browser consists of a controller, client programs, and
interpreters.
A Web document can be classified as static, dynamic, or active.
A static document is one in which the contents are fixed and
stored in a server. The client can make no changes in the server
document.
Any browser can read formatting instructions (tags) embedded in
an HTML document.
Dr. L. Christofi
75
WWW (2)
A dynamic Web document is created by a server only at a browser
request.
The Common Gateway Interface (CGI) is a standard for creating
and handling dynamic Web documents. A CGI program with its
embedded CGI interface tags can be written in a language such as
C, C++, shell script, or Perl.
The server sends the output of the CGI program to the browser.
The output of a CGI program can be text, graphics, binary data,
status codes, instructions, or an address of a file.
An active document is a copy of a program retrieved by the client
and run at the client site.
Java is a combination of a high-level programming language, a
run-time environment, and a class library that allows a
programmer to write an active document and a browser to run it.
Java is used to created applets (small application programs).
Java is an object-oriented typed language with a rich library of
classes.
26
06/02/2006 26
Dr. L. Christofi
76
SNMP
The Simple Network
Management Protocol
(SNMP) is an application
layer protocol that facilitates
the exchange of
management information
between network devices.
An SNMP managed network
consists of the following:
Network management
system (NMS)
Managed device
Agents
Dr. L. Christofi
77
Telnet
Telnet client software provides the ability to log in to a
remote Internet host that is running a Telnet server
application and then to execute commands from the
command line.
Dr. L. Christofi
78
Design a private LAN, with the following topology, that would allow
the exchange of data:
Your subnet is 192.168.200.64. You should use appropriate subnet
mask and assign appropriate IP addresses to all network elements
(routers & hosts) having in mind possible future expansion of your
network for 5 additional hosts. You have been told not to waste
unnecessary IP addresses.
Exercise 3
27
06/02/2006 27
Dr. L. Christofi
79
Subnet is 192.168.200.64.
Present number of hosts is 5, Number of routers is 2 and for future
expansion 5 additional hosts, makes a total of 12 addresses.
Hence use 255.255.255.240 Subnet Mask.
Broadcast IP address for this network is reserved to 192.168.200.79
therefore available IP addresses are from 192.168.200.65 to
192.168.200.78
Exercise 3 (answer)
Dr. L. Christofi
80
References
W. Stalling, Local and Metropolitan Area Networks,
6
th
edition, Prentice Hall, 2000
F. Halsall, Data Communications, Computer
Networks and Open Systems, 4
th
edition, Addison
Wesley, 1995
B.A. Forouzan, Data Communications and
Networking, 3rd edition, McGraw-Hill, 2004
W. Stallings, Data and Computer Communications,
7
th
edition, Prentice Hall, 2004

Das könnte Ihnen auch gefallen