Lec-3-tcpip

Lec-3-tcpip - Networking The Network is the Computer...

Info iconThis preview shows pages 1–18. Sign up to view the full content.

View Full Document Right Arrow Icon
Networking
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Network is the Computer Client-Server computing Peer-to-Peer The Web Today’s networking is wonderful, but How is it done?
Background image of page 2
Ethernet Frame Format Addresses: Unique, 48-bit unicast address assigned to each adaptor Example: 8:0:2b:e4:b1:2 Broadcast: all 1 Multicast: first bit is 1
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Layering Use abstractions to hide complexity Abstraction naturally leads to layering Application Programs Process-to-process Host-to-Host Connectivity Hardware Protocol Stack
Background image of page 4
Host1 High Level Object Protocol Protocols Building blocks of a network architecture Each protocol object has two different interfaces service interface : defines operations on this protocol peer-to-peer interface : defines messages exchanged with peer Host2 High Level Object Protocol Service Interface Peer to peer
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Protocol Graph collection of protocols and their dependencies most peer-to-peer communication is indirect peer-to-peer is direct only at hardware level FTP Telnet Video RRP MSP HHP FTP Telnet Video RRP MSP HHP
Background image of page 6
Communication Encapsulation (header/body) Application RRP HHP data RRP data HHP RRP data Application RRP HHP data RRP data
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Standard Architectures Open Systems Interconnect (OSI) Architecture International Standards Organization (ISO) International Telecommunications Union (ITU); formerly CCITT “X dot” series: X.25, X.400, X.500 Reference Model
Background image of page 8
Seven Layer Model Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical Email, FTP, www cinteger size, big endian synchronization, name space reliability, congestion control Routing address framing errors electrical signals
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Internetworking
Background image of page 10
A Simple Internetwork H1 H2 H3 Hn = Host Rn = Router Network 2 (Ethernet) H4 Network 3 (Token Ring) H5 H6 R1 R2 Network 4 (point-to-point) H7 H8 Network 1 (Ethernet) R3
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Internet
Background image of page 12
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Internet Engineering Task Force (IETF) Application Protocol (FTP, HTTP) – Not applications TCP – Transmission Control Protocol - Reliable Transport IP – Internet Protocol – Connect Local Area Networks Internet Architecture NET n NET 2 NET 1 TCP UDP IP . . . . TFTP NV FTP HTTP TCP UDP IP Network Application
Background image of page 14
Internet Protocol (IP)
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
IP Service Model Global Addressing Scheme IP Addresses Packet Delivery Model Connectionless (datagram-based) Best-effort delivery (unreliable service) packets are often lost packets are often delivered out of order duplicate copies of a packet are often delivered packets can be delayed for a long time
Background image of page 16
Datagram format Version (4): currently 4 Hlen (4): number of 32-bit words in header TOS (8): type of service (not widely used QoS) Length (16): number of bytes in this datagram Ident (16): different for each datagram Flags/Offset (16): used by fragmentation TTL (8): Time to live
Background image of page 17

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 18
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/02/2012 for the course C S 360 taught by Professor Clement,m during the Winter '08 term at BYU.

Page1 / 51

Lec-3-tcpip - Networking The Network is the Computer...

This preview shows document pages 1 - 18. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online