chapter 1: introducing tcp/ip2profs.net/steve/cisntwk413/ppts/ch01.pdf · • understand tcp/ip’s...
TRANSCRIPT
Guide to TCP/IP, Third Edition
Chapter 1:pIntroducing TCP/IP
1
CISNTWK-11PermissionsObjectives
• Understand TCP/IP’s origins and histor• Understand TCP/IP’s origins and history
• Explain the process by which TCP/IP standards and other d ll d R f C (RFC )documents, called Requests for Comments (RFCs), are created, debated, and formalized (where appropriate)
• Understand the Open Systems Interconnection network reference model, often used to characterize network protocols and services, and how it relates to TCP/IP’s own internal networking modelinternal networking model
2Introducing TCP/IP 2
CISNTWK-11PermissionsObjectives
• Define the terms involved and explain how TCP/IP protocols sockets and ports are identifiedprotocols, sockets, and ports are identified
• Understand data encapsulation and how it relates to theUnderstand data encapsulation and how it relates to the four layers of the TCP/IP protocol stack
• Understand and apply the basic practices and principles that underlie network protocol analysis
3Introducing TCP/IP 3
CISNTWK-11PermissionsWhat is TCP/IP?
• Large collection of networking protocols and servicesT k l• Two key protocols– Transmission Control Protocol (TCP)
• Reliable delivery of messages– Internet Protocol (IP)
• Manages the routing of network transmissions
4Introducing TCP/IP 4
CISNTWK-11PermissionsThe Origins and History of TCP/IP
• 1969– Advanced Research Projects Agency (ARPA) funded research for– Advanced Research Projects Agency (ARPA) funded research for
packet-switched networking– ARPANET
• Network built as a result of this project• Network built as a result of this project
• In a packet-switched network– Sender and receiver are identified by unique network addresses
5Introducing TCP/IP 5
CISNTWK-11PermissionsTCP/IP’s Design Goals
• To withstand a potential nuclear strikeT i diff i• To permit different computer systems to communicate easily
• To interconnect systems across long distancesTo interconnect systems across long distances
6Introducing TCP/IP 6
CISNTWK-11PermissionsA TCP/IP Chronology
• 1978– Internet Protocol version 4 (IPv4)– Internet Protocol version 4 (IPv4)
• 1983– Defense Communications Agency took over operation of
ARPANETARPANET• 1986
– NSF launches high-speed network (NSFNET)• 1987
– Number of hosts on the Internet breaks 10,000
7Introducing TCP/IP 7
CISNTWK-11PermissionsA TCP/IP Chronology (continued)
• 1989– Number of hosts on the Internet breaks 100 000– Number of hosts on the Internet breaks 100,000
• 1990– Worldwide Web is born at Centre European Researche Nucleaire
(CERN)(CERN)• 1991
– Commercial Internet Exchange (CIX) is formed• 1992
– Internet Society (ISOC) is chartered
8Introducing TCP/IP 8
CISNTWK-11PermissionsA TCP/IP Chronology (continued)A TCP/IP Chronology (continued)
• 1993I t NIC i h t d– InterNIC is chartered
• 1994– Online junk mail begins to proliferatej g p
• 1995– Netscape launches Netscape Navigator
• 1996– Microsoft launches Internet Explorer Web browser
• 19971997– 31 million registered domain names
9Introducing TCP/IP 9
CISNTWK-11PermissionsA TCP/IP Chronology (continued)
• 2000L L tt i f t illi PC– Love Letter worm infects over one million PCs
• 2001– Number of hosts on the Internet breaks 150 million– Sircam virus and Code Red worm infect thousands
• 2002204 illi I t t h t– 204 million Internet hosts
• 2003– Public Interest Registry becomes .org registry operatorg y g g y p
10Introducing TCP/IP 10
CISNTWK-11PermissionsWho “Owns” TCP/IP?
• TCP/IP F ll l i t th bli d i– Falls squarely into the public domain
– Funded with public monies since its inception– Owned by everybody and nobody
11Introducing TCP/IP 11
CISNTWK-11PermissionsMeet the Standards Groups that Manage TCP/IPMeet the Standards Groups that Manage TCP/IP
i ( )• Internet Society (ISOC)• Internet Architecture Board (IAB)• Internet Engineering Task Force (IETF)• Internet Engineering Task Force (IETF)• Internet Research Task Force (IRTF)• Internet Societal Discussion Forum (ISDF)Internet Societal Discussion Forum (ISDF)• Internet Corporation for Assigned Names and Numbers
(ICANN)
12Introducing TCP/IP 12
CISNTWK-11PermissionsTCP/IP Standards and RFCs
• Request For Comments (RFCs)– Provide documentation to understand implement and use TCP/IP– Provide documentation to understand, implement and use TCP/IP
protocols• Index for all RFCs available at
www faqs org/rfcs/– www.faqs.org/rfcs/ • RFC 2026
– Describes how a RFC is created
13Introducing TCP/IP 13
CISNTWK-11PermissionsOSI Reference Model Overview
• OSI reference modelA t k f d l– A network reference model
– Formally known as ISO/OSI – Designed to replace TCP/IP– Standard way to explain how networks operate– TCP/IP is the open standard protocol suite of choice
14Introducing TCP/IP 14
CISNTWK-11Permissions
Models Break Networking into LayersLayers
• Divide and conquer approachS t t ki h d f th l t d t– Separates networking hardware concerns from those related to networking software
• Key points about networking– Easier to solve problems when broken into series of smaller
problems– Layers operate independently of one anothery p p y– Changes to one layer need not affect other layers
15Introducing TCP/IP 15
CISNTWK-11Permissions
Models Break Networking into Layers (continued)Layers (continued)
• Key points about networkingI di id l l k t th i f t– Individual layers work together on pairs of computers
– Different expertise is needed at each layer– Network protocols usually map into one or more layers– TCP/IP is designed around a layered model
16Introducing TCP/IP 16
CISNTWK-11Permissions
17Introducing TCP/IP 17
CISNTWK-11PermissionsHow Protocol Layers Behave
• Layers– Exist to encapsulate or isolate specific types of functionality– Exist to encapsulate or isolate specific types of functionality– Provide services to the layer above– Deliver data to or accept data from the layer below
P t l D t U it (PDU )• Protocol Data Units (PDUs) – Include “envelope information” in the form of specific headers and
trailers
18Introducing TCP/IP 18
CISNTWK-11PermissionsPhysical Layer
• Includes the physical transmission medium • Job is to activate maintain and deactivate network• Job is to activate, maintain, and deactivate network
connections • Manages communications with the network medium going
d h l kdown the protocol stack • Handles conversion of outgoing data
19Introducing TCP/IP 19
CISNTWK-11PermissionsData Link Layer
• Situated between the Physical layer and the Network layer in the reference modelin the reference model
• Job is to – Enable reliable transmission of data through the Physical layer at g y y
the sending end – Check reliability at the receiving end
• Manages point-to-point transmission across the networking• Manages point-to-point transmission across the networking medium
20Introducing TCP/IP 20
CISNTWK-11PermissionsNetwork Layer
• Handles logical addresses associated with individual machines on a networkmachines on a network
• Uses addressing information to – Determine how to send a PDU
• Embodies notion of multiple simultaneous connections between different IP addresses
l ibl h• Flexible enough to – Recognize and use multiple routes between a sender and a receiver
21Introducing TCP/IP 21
CISNTWK-11PermissionsTransport Layer
• Ensures reliable end-to-end transmission of PDUs• Includes end to end error detection and error recovery• Includes end-to-end error-detection and error-recovery• Segmentation
– Involves cutting up a big message into a numbered sequence of g p g g qchunks, called segments
• PDUs used at the Transport layer are called segments, or data segmentsdata segments
22Introducing TCP/IP 22
CISNTWK-11PermissionsSession Layer
• Defines mechanisms to P it d d i t t th t ti t t– Permit senders and receivers to request that a conversation start or stop
– Keep a conversation going even when traffic may not otherwise fl b t th ti i l dflow between the parties involved
• Checkpoints– Define the last point up to which successful communications are p p
known to have occurred
23Introducing TCP/IP 23
CISNTWK-11PermissionsPresentation Layer
• Handles transforming data from G i t k i t d f f i t ifi– Generic, network-oriented forms of expression to more specific, platform-oriented forms of expression
• A redirector or network shell– Special computer facility that resides here
• Can supply special data-handling functions for applications
24Introducing TCP/IP 24
CISNTWK-11PermissionsApplication Layer
• Defines an interface that applications can use to request network servicesnetwork services
• Defines a set of access controls over the network• PDUsPDUs
– Generically called Application PDUs
25Introducing TCP/IP 25
CISNTWK-11PermissionsThe TCP/IP Networking Model
• Design model that describes TCP/IP differs somewhat from OSI reference modelfrom OSI reference model
• Transport layers for both models map together quite well as does the– Network layer from the OSI reference model and the Internet layer
from the TCP/IP model
26Introducing TCP/IP 26
CISNTWK-11Permissions
27Introducing TCP/IP 27
CISNTWK-11PermissionsTCP/IP Network Access Layer
• Includes Ethernet, token ring, and wireless media devicesI l d WAN d i l• Includes WAN and connection-management protocols
• The IEEE standards for networking apply– Including the IEEE 802 family of standardsIncluding the IEEE 802 family of standards
28Introducing TCP/IP 28
CISNTWK-11Permissions
TCP/IP Network Access Layer ProtocolsProtocols
• PPP– Most important TCP/IP Network Access layer protocol
PPP E (“PPP E h ” )• PPPoE (“PPP over Ethernet” )– Widely used on Ethernet networks or those with Ethernet-like
characteristics
• SLIP– Older, simpler serial line protocol that only supports TCP/IP-based
communicationscommunications
29Introducing TCP/IP 29
CISNTWK-11PermissionsTCP/IP Internet Layer Functions
• Handle routing between machines across multiple networksnetworks
• Three primary tasks– MTU fragmentationg– Addressing– Routing
30Introducing TCP/IP 30
CISNTWK-11PermissionsTCP/IP Internet Layer Protocols
• Internet Protocol (IP)I C l M P l (ICMP)• Internet Control Message Protocol (ICMP)
• Packet Internetwork Groper (PING)• Address Resolution Protocol (ARP)• Address Resolution Protocol (ARP)• Reverse ARP (RARP)• Bootstrap Protocol (BOOTP)p ( )• Routing Information Protocol (RIP)
31Introducing TCP/IP 31
CISNTWK-11PermissionsTCP/IP Transport Layer Functions
• FunctionsR li bl d li f d t f d t i– Reliable delivery of data from sender to receiver
– Fragmentation of outgoing messages and their reassembly prior to delivery to the Application layer
• Hosts– Devices that operate on the Internet
32Introducing TCP/IP 32
CISNTWK-11PermissionsTCP/IP Transport Layer Protocols
• Two TCP/IP Transport layer protocols Th t i i C t l P t l (TCP)– The transmission Control Protocol (TCP)
• Connection-oriented– The User Datagram Protocol (UDP)
• Connectionless
• UDP– Transmits data in a “best-effort delivery”Transmits data in a best effort delivery – Does no follow-up checking on its receipt
33Introducing TCP/IP 33
CISNTWK-11PermissionsTCP/IP Application Layer
• Also known as the Process layerTCP/IP i d d• TCP/IP services depend on:– Special “listener process,” called a daemon
• Operates on a server to handle incoming user requests for specific services
– Each TCP/IP service has an associated port address
34Introducing TCP/IP 34
CISNTWK-11Permissions
TCP/IP Protocols, Services, Sockets, And Ports
l i l i• Multiplexing– Combining various sources of outgoing data into a single output data
stream
• Demultiplexing– Breaking up an incoming data stream so separate portions may be
delivered to the correct applicationsdelivered to the correct applications
• Well-known protocols– Assign a series of numbers to represent a sizable collection of
/ b d k iTCP/IP-based network services
35Introducing TCP/IP 35
CISNTWK-11Permissions
36Introducing TCP/IP 36
CISNTWK-11PermissionsTCP/IP Port Numbers
• TCP/IP application processes S ti ll d t k i– Sometimes called network services
– Identified by port numbers
• Source port numberp– Identifies the process that sent the data
• Destination port number Id tifi th t i th t d t– Identifies the process to receive that data
37Introducing TCP/IP 37
CISNTWK-11PermissionsTCP/IP Sockets
• Well-known or registered portsR t i d t b– Represent pre-assigned port numbers
• Socket address (or socket)– The combination of a particular IP address and a dynamically p y y
assigned port address
38Introducing TCP/IP 38
CISNTWK-11PermissionsData Encapsulation In TCP/IP
• At each layer in the TCP/IP protocol stackO t i d t i k d d id tifi d f d li t th l– Outgoing data is packaged and identified for delivery to the layer underneath
• Header– PDU’s own particular opening component – Identifies the protocol in use, the sender and intended recipient
• Trailer (or packet trailer)• Trailer (or packet trailer)– Provides data integrity checks for the payload
39Introducing TCP/IP 39
CISNTWK-11PermissionsAbout Protocol Analysis
• Protocol analysis is the process of– Tapping into the network communications system– Tapping into the network communications system– Capturing packets– Gathering network statistics
Decoding packets– Decoding packets• Popular Windows-based protocol analyzers
– Ethereal for Windows (Gerald Combs)– Sniffer Network Analyzer (Network Associates)
40Introducing TCP/IP 40
CISNTWK-11PermissionsUseful Roles for Protocol Analysis
• Used to troubleshoot network communications• Used to test networks• Used to test networks
– Passive– Active
• Gather trends on network performance• Analyzers available for variety of platforms
41Introducing TCP/IP 41
CISNTWK-11PermissionsProtocol Analyzer Elements
• Promiscuous mode card and driverP k fil• Packet filters
• Trace buffer• Decodes• Decodes• Alarms• Statistics
42Introducing TCP/IP 42
CISNTWK-11Permissions
43Introducing TCP/IP 43
CISNTWK-11Permissions
44Introducing TCP/IP 44
CISNTWK-11Permissions
45Introducing TCP/IP 45
CISNTWK-11Permissions
Placing a Protocol Analyzer on a NetworkNetwork
• Protocol analyzerC t k t th t it th t k– Captures packets that it can see on the network
• On network connected with hubs– You can place analyzer anywhere on the networkp y y
• Options for analyzing switched networks– Hubbing out
P t di ti– Port redirection– Remote Monitoring (RMON)
46Introducing TCP/IP 46
CISNTWK-11Permissions
47Introducing TCP/IP 47
CISNTWK-11PermissionsSummary
• TCP/IP design goals– To support multiple packet-switched pathways through the– To support multiple, packet-switched pathways through the
network – To permit dissimilar computer systems to easily exchange data– To offer robust reliable delivery services for both short- and long-To offer robust, reliable delivery services for both short and long
haul communications– To provide comprehensive network access with global scope
48Introducing TCP/IP 48
CISNTWK-11PermissionsSummary (continued)
• Initial implementations of TCP/IP F d d b Ad d R h P j t A– Funded by Advanced Research Projects Agency
• TCP/IP remains in the public domain• As Standard RFCs go through approval process they beginAs Standard RFCs go through approval process they begin
as Proposed Standard documents• Best Current Practice (BCP)
– An informational (non-standard) RFC
49Introducing TCP/IP 49
CISNTWK-11PermissionsSummary (continued)
• ISO/OSI network reference modelB k t ki i t di ti t l– Breaks networking into seven distinct layers
• TCP/IP uses a variety of encapsulation techniques at its various layers to y– Label the type of data contained in the contents, or payloads, of its
PDUs
• Protocol analysis• Protocol analysis – Network interface inspects all traffic moving across a segment of
network medium
50Introducing TCP/IP 50