CCN: Lecture Notes—Module 4 Computer Comm. & Networking 1 TCP/IP and the Internet Computer networking today is becoming more and more entwined with the internet. By far the most popular protocol set in use is TCP/IP (Transmission Control Protocol/Internet Protocol). It is worth looking at this in more detail. As TCP/IP existed prior to the OSI, it doesn’t fit exactly into the defined layers. It does however have a layered structure and fits pretty much into layer 3 and 4.
30
Embed
TCP/IP and the Internet - Griffith University · PDF fileCCN: Lecture Notes—Module 4 Computer Comm. & Networking 1 TCP/IP and the Internet ... Post: to send information to server
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
TCP/IP and the InternetComputer networking today is becoming more and more entwined with the internet. By far the most popular protocol setin use is TCP/IP (Transmission Control Protocol/Internet Protocol). It is worth looking at this in more detail.
As TCP/IP existed prior to the OSI, it doesn’t fit exactly into the defined layers. It does however have a layered structure and fits pretty much into layer 3 and 4.
Why do we need all this stuff?Consider sending a message (say email) from your computer to another computer on the other side of the world. All you know isthe address of the destination.
• Firstly, you use a mailer program which allows you to type a mail message and specify the address. How do we know the user at the other end has the same mailer program? We don’t and it doesn’t matter. The TCP part of the suite has a mailer that can send and received mail in a standard format that every internet user can read. Your mailer program is just an editor that supplies the message to this mailer.
• When TCP has formatted the mail message, we must make this message into a packet that can be sent across the internet and find its way to the destination. The IP part does this by adding a header with the IP address. This is the unique address that every internet user is addressed by. Routers can route your message with this address.
Why do we need all this stuff? (Cont’d)• This IP packet now has to be sent over the media at your
site. To do this we need a link layer to look after the transmission, ie. correct the error etc. This is performed by your local LLC. IT is dependant on the type of network at your end.
• The next step depends on what type of media you have at your end, ie. Ethernet, Token Ring etc. The MAC will take care of this and will attach a header, preamble etc to your packet that will allow it to be sent on the local LAN.
Why do we need all this stuff? (Cont’d)• Somewhere on your LAN exists a router. This device will received
your network packet and disassemble it up to IP level, so it mayread the IP address. It will then pack it up again into a form suitable for the next transmission step. This may be simply another hop on a LAN or it may travel on a WAN of public network. In either case, it will be packeted into a form suitable for transmission.
• Eventually, the packet arrives at the LAN of the destination computer. The router accepts the packet and broadcasts it onto the LAN with the network address of the destination. The destinationcomputer will receive the packet and proceed to unwrap it. Firstly the MAC strips off the network headers, CRC’s etc. The LLC checks it over.
• The IP now unpacks the IP packet and passes the TCP packet to the TCP. After unpacking, the TCP recognizes it is an email. It treats the packet as email and passes it to the appropriate application. In this case your email program.
Each layer encapsulates the output from the layer above. We have already examined what a network packet contains. Let use look at the rest of the TCP/IP suite.
Everything feeds into the IP part of the suite. ICMP and OSPF are to deal with network operation. The TCP handles the actual data transmission and is a connection oriented protocol. UDP is a connectionless unreliable service. Its main use is in network management.
The TCP helpers sit above TCP and provide services that we are familiar with. Remember these are usually accessed by higher layers up toapplication.
The document served will vary depending on the request given
They are usually created using a Common Gateway Interface (CGI) script. This script is urn at the server site so the browser needs no knowledge of its syntax.
Active pages
Often we need to execute a program at the client site. This might be to display animated graphics, calculators etc.
Java is often used as a language to do this. The code binary is downloaded to the client where it is executed.
Java consists of a programming language, runtime environment and class library. It is object oriented and C++ like.
Sequence number: Sequence number of the firs data octet in this segment. When a SYN flag is set, this is the initial sequence number (ISN). TCP is stream oriented, ie. A sequence number applies to the first octet of data in the segment. If a segment had 500 octets and its sequence number was 2000 thenthe next segment would have sequence number 25000.
Acknowledgement number: Contains the sequence number of the next segment to be received.
Data offset: Number of 32 bit words in the header.
Flag: URG Urgent pointer field significantACK Acknowledge field significantPSH Push functionRST Reset the connectionSYN Synchronise the sequence numbersFIN No more data
Window: Flow control. Contains the number of data octets that sender is willingto accept.
Checksum: The one’s complement of the sum modulo 216-1 of all the 16 bit words in the segment plus a pseudo header.
Time to live: How many router hops this datagram will live for.
Protocol: Shows what higher level protocol is to receive this datgram at he receiving end.
Header checksum: The 16 bit ones complement addition of all 16 bit words in the header. It is recalculated at each router as some header fields may change.
Source address: Internet address or IP address of sender.
Destination address: IP address of destination.
Options+padding: Contains user options plus padding to ensure header is a multiple of 32 bits.
Network addressesIf networks are to be connected together then unique addresses of all nodes must be employed. The Internet Protocol addresses perform this function.
• Each address is a 32 bit number (IP address)
• The break-up of this number is dependent on the class of LAN.
Non-internet addressingIn addition there are some addresses which have been assigned for nodes that live on a network that is not directly connected to the Internet. You may use these addresses freely as long as theyare not transmitted onto the Internet.
IPv6The current version of IP is version 4 (IPv4). There are some limitations becoming apparent with this version. An upgrade (IPv6) is presently being slowly implemented.
The biggest and most needed change is the size of the IP address field is now much bigger. This can allow many more nodes to have unique addresses on the Internet. IPv4 has a 32 bit address giving 232 possible addresses.
IPv6 has a 128 bit address giving 2128 possible addresses. This is unique address.
IPv6There are many other improvements in IPv6. It will be slowly implemented in areas where translation can take place. This is clearly a very difficult task to roll it out.
Domain names and DNSIP addresses are administered internationally by the Network Information Centre (InterNIC). The subnet addressing is then administered locally.
The IP address is used to locate a node on the larger network and is encapsulated into an IP packet. Routers unpack the address to route the packet. At the last router however the packet is passed onto the LAN. Here a physical address is used. This is the address of the LAN physical layer hardware in each node. (Commonly called the ethernetaddress)
Every card produced has a unique 48 bit address
The router builds a table that relates IP addresses to physical addresses for nodes connected in its LAN.