Computer communications The exchange of information between computers for the purpose of cooperative...

Post on 23-Dec-2015

220 views 0 download

Tags:

Transcript of Computer communications The exchange of information between computers for the purpose of cooperative...

Chapter 8TCP/IP

The Need for a Protocol Architecture

Protocol

A set of rules governing the exchange of data between two entitiesKey elements:

SyntaxIncludes such things as data format and signal levels

SemanticsIncludes control information for coordination and error handling

Timing Includes speed matching and sequencing

Protocol Architecture

Three-Layer Model

Distributed data communications involves three primary components:

NetworksComputersApplications

Three corresponding layersNetwork access layerTransport layerApplication layer

Network Access Layer

Transport Layer

Application Layer

Protocol Architectures

Protocols in a

Simplified Architecture

Standardized Protocol Architectures

TCP/IP Architecture

Result of protocol research and development conducted on the experimental packet-switched network, ARPANET

Protocol suite consists of a large collection of protocols that have been issued as Internet standards by the Internet Activities Board (IAB)

No official TCP/IP model

Organized into five relatively independent layers:

Application layerHost-to-host, or transport layerInternet layerNetwork access layerPhysical layer

TCP/IP Layers

TCP/IP Concepts

PDUs in the TCP/IP Architecture

TCP and UDP

TCP and UDP

Headers

IP Headers

TCP/IP ApplicationsSMTP (Simple Mail Transfer Protocol)

Supports a basic electronic mail facility by providing a mechanism for transferring messages among separate hostsFeatures include mailing lists, return receipts, and forwarding

FTP (File Transfer Protocol)Sends files from one system to another on user commandBoth text and binary files are accommodated

SSH (Secure Shell)Provides a secure remote login capability which enables a user at a terminal or personal computer to logon to a remote computer and function as if directly connected to that computer

TCP/IP Applications

HTTP (HyperText Transfer Protocol)Connects client systems to Web servers on the InternetIts primary function is to establish a connection with the server and send HTML pages back to the user’s browser

SNMP (Simple Network Management Protocol)A widely used network monitoring and control protocol

Protocols in the TCP/IP Protocol Suite

Table 8.1

InternetworkingTerms

(This table is located on page 222 in the text)

Routers

Equipment used to interconnect independent networksEssential functions:

Provide a link between networksProvide for the routing and delivery of data between end systems attached to different networksProvide these functions without requiring modifications of the networking architecture of any of the attached networks

Router IssuesThe router must accommodate a number of differences among networks:

Addressing schemesNetworks may use different schemes for assigning addresses to devices

Maximum packet sizePackets from one network may have to be broken into smaller pieces to be transmitted on another network (fragmentation)

InterfacesThe hardware and software interfaces to various networks differ

ReliabilityOperations should not depend on an assumption of network reliability

Internetworking Example

Operation of TCP/IP:

Action at Sender

(Figure is on page 225 in text)

Operation of

TCP/IP:

Action at Router

(Figure is on page 226 in text)

Operation of

TCP/IP:

Action at

Receiver

(Figure is on page 227 in text)

Virtual Private Network (VPN)

IP Security (IPsec)Provides the capability to secure communications across a LAN, across private and public WANs, and across the InternetExamples of its use include:

Secure branch office connectivity over the InternetSecure remote access over the InternetEstablishing extranet and intranet connectivity with partnersEnhancing electronic commerce security

Principal feature is that it can encrypt and/or authenticate all traffic at the IP level

Thus, all distributed applications, including remote logon, client/server, e-mail, file transfer, and Web access can be secured

An IP

Security Scenario

Benefits of IPsec

IPsec Functions

IPsec provides three main facilities:An authentication-only function referred to as Authentication Header (AH)A combined authentication/encryption function called Encapsulating Security Payload (ESP)A key exchange function

Summary A simple protocol architecture

The need for a protocol architecture

Three-layer model

Standardized protocol architectures

Virtual private networks and IP security

IPsec

Applications of IPsec

Benefits of IPsec

IPsec functions

Chapter 8: TCP/IP

Internetworking Routers

The TCP/IP architecture TCP/IP layers Operation of TCP/IP TCP and UDP IP and IPv6 TCP/IP applications Protocol interfaces