Abdullah Alfarrarjeh
Business Da Business Data ta Commu Communica nications tions and and Netw Networ
- rking
king
Most of the slides in this lecture are either from or adapted from the slides provided by Dr. Hussein Alzoubi
Commu Communica nications tions and and Netw Networ orking - - PowerPoint PPT Presentation
Business Da Business Data ta Commu Communica nications tions and and Netw Networ orking king Abdullah Alfarrarjeh Most of the slides in this lecture are either from or adapted from the slides provided by Dr. Hussein Alzoubi Be aware
Most of the slides in this lecture are either from or adapted from the slides provided by Dr. Hussein Alzoubi
5/22/2020 Business Data Communications and Networks (13711) 2
5/22/2020 Business Data Communications and Networks (13711) 3
5/22/2020 Business Data Communications and Networks (13711) 4
5/22/2020 Business Data Communications and Networks (13711) 5
▪ that is, whether the options field is included.
5/22/2020 Business Data Communications and Networks (13711) 6
5/22/2020 Business Data Communications and Networks (13711) 7
5/22/2020 Business Data Communications and Networks (13711) 8
▪ source port, destination port, length, and aCRC 16.
5/22/2020 Business Data Communications and Networks (13711) 9
▪ Similar to the TCP header, the options field is rarely used, and therefore, the header is usually 20 bytes long.
5/22/2020 Business Data Communications and Networks (13711) 10
5/22/2020 Business Data Communications and Networks (13711) 11
5/22/2020 Business Data Communications and Networks (13711) 12
▪ which means that all network devices must be changed to understand both IPv4 and IPv6.
▪ but the change was not completed on time.
▪ TCP/IP is commonly combined with Ethernet.
▪ Ethernet has a maximum packet size of 1,492 bytes,
▪ so the maximum size of a TCP message field if IPv4 is used is 1,492 − 24 (the size of the TCP header) − 24 (the size of the IPv4 header) = 1,444.
5/22/2020 Business Data Communications and Networks (13711) 13
5/22/2020 Business Data Communications and Networks (13711) 14
5/22/2020 Business Data Communications and Networks (13711) 15
5/22/2020 Business Data Communications and Networks (13711) 16
5/22/2020 Business Data Communications and Networks (13711) 17
(1027, 1028, and 1029) are called temporary port numbers
5/22/2020 Business Data Communications and Networks (13711) 18
5/22/2020 Business Data Communications and Networks (13711) 19
▪ This negotiation is done by establishing a TCP connection between the sender and receiver.
5/22/2020 Business Data Communications and Networks (13711) 20
5/22/2020 Business Data Communications and Networks (13711) 21
Two strategies
5/22/2020 Business Data Communications and Networks (13711) 22
▪ Step 1: In the first step, the client establishes a connection with a server. It sends a segment with SYN and informs the server about the client should start communication, and with what should be its sequence number. ▪ Step 2: In this step server responds to the client request with SYN-ACK signal set. ACK helps you to signify the response of segment that is received and SYN signifies what sequence number it should able to start with the segments. ▪ Step 3: In this final step, the client acknowledges the response of the Server, and they both create a stable connection will begin the actual data transfer process.
5/22/2020 Business Data Communications and Networks (13711) 23
stops and waits for a response from the receiver after each data packet.
sends either an acknowledgment (ACK), if the packet was received without error, or a negative acknowledgment (NAK), if the message contained an error.
previous message.
half-duplex transmission technique
5/22/2020 Business Data Communications and Networks (13711) 24
▪ With continuous ARQ, the sender does not wait for an acknowledgment after sending a message; it immediately sends the next one. ▪ Although the messages are being transmitted, the sender examines the stream of returning acknowledgments. If it receives an NAK, the sender retransmits the needed messages. ▪ The packets that are retransmitted may be
a)
Access Protocol for Modems [LAP-M]), or b) the first packet with an error and all those that followed it (called Go-Back-N ARQ).
▪ LAP-M is better because it is more efficient. ▪ Continuous ARQ is by definition a full-duplex transmission technique
5/22/2020 Business Data Communications and Networks (13711) 25
5/22/2020 Business Data Communications and Networks (13711) 26
Continuous ARQ is sometimes called sliding window
▪ Continuous ARQ is also important in providing flow control, which means ensuring that the computer sending the message is not transmitting too quickly for the receiver. ▪ By using ACKs and NAKs, ▪ the receiver can control the rate at which it receives information. ▪ With stop-and-wait ARQ, ▪ the receiver does not send an ACK until it is ready to receive more packets. ▪ In continuous ARQ, ▪ the sender and receiver usually agree on the size of the sliding window. ▪ Once the sender has transmitted the maximum number of packets permitted in the sliding window,
▪ it cannot send any more packets until the receiver sends an ACK.
5/22/2020 Business Data Communications and Networks (13711) 27
5/22/2020 Business Data Communications and Networks (13711) 28
5/22/2020 Business Data Communications and Networks (13711) 29
▪ The Internet Protocol Suite can operate either as connection-
▪ When connection-oriented messaging is desired, TCP is used. ▪ When connectionless messaging is desired, the TCP segment is replaced with a UDP packet.
▪ The UDP header is much smaller than the TCP header (only 8 bytes).
▪ Connectionless is most commonly used when the application data
▪ HTTP requests are often very short, they might use UDP connectionless rather than TCP connection-oriented messaging. However, All of the application layer software we have discussed so far uses TCP (HTTP, SMTP, FTP, Telnet)
▪ UDP is most commonly used for control messages:
▪ Addressing, DHCP [Dynamic Host Configuration Protocol] ▪ Routing control messages, RIP [Routing Information Protocol] ▪ Network management, SNMP [Simple Network Management Protocol]
5/22/2020 Business Data Communications and Networks (13711) 30
5/22/2020 Business Data Communications and Networks (13711) 31
5/22/2020 Business Data Communications and Networks (13711) 32
RSVP and RTSP are example of transport layer protocols
▪ For example, many WANs are built with point-to-point circuits that use Point-to-Point Protocol (PPP) as the data link layer protocol.
▪ These networks do not have data link layer addresses.
5/22/2020 Business Data Communications and Networks (13711) 35
5/22/2020 Business Data Communications and Networks (13711) 36
5/22/2020 Business Data Communications and Networks (13711) 37
▪ network layer addresses (i.e., IP addresses) ▪ and application layer addresses (e.g., www.indiana.edu).
▪ (e.g., .com, .org, .ca, .uk) are created and IP address numbers are assigned to users.
▪ Once authorized, a registrar can approve requests for application layer addresses and assign IP numbers for those requests.
5/22/2020 Business Data Communications and Networks (13711) 38
5/22/2020 Business Data Communications and Networks (13711) 39
▪ Some companies use the Class E addresses for multicasting internal content in addition to the Class D addresses.
5/22/2020 Business Data Communications and Networks (13711) 40
▪ For this reason, private addresses are often used to increase security.
5/22/2020 Business Data Communications and Networks (13711) 41
5/22/2020 Business Data Communications and Networks (13711) 42
5/22/2020 Business Data Communications and Networks (13711) 43
5/22/2020 Business Data Communications and Networks (13711) 44
128.192.56.0: the network address 128.192.56.255: the broadcast address 128.192.55.0: the network address 128.192.55.255: the broadcast address
5/22/2020 Business Data Communications and Networks (13711) 45
5/22/2020 Business Data Communications and Networks (13711) 46
▪ This message asks the server to assign the requesting computer a unique network layer address.
5/22/2020 Business Data Communications and Networks (13711) 47
▪ or for a specified time limit (e.g., 2 hours).
5/22/2020 Business Data Communications and Networks (13711) 48
5/22/2020 Business Data Communications and Networks (13711) 49
▪ Name servers have address databases that store thousands of Internet addresses and their corresponding IP addresses.
▪ but smaller organizations that have only one or two servers
▪ When it registers its name, it must also provide the IP address of the DNS server that it will use to provide the IP addresses for all the computers within this domain name range
5/22/2020 Business Data Communications and Networks (13711) 50
5/22/2020 Business Data Communications and Networks (13711) 51
This is why it sometimes takes longer to access certain sites.
5/22/2020 Business Data Communications and Networks (13711) 52
▪ a computer must know the correct data link layer address. ▪ In this case, the TCP/IP software sends a broadcast message to all computers in its subnet.
▪ that says, “Whoever is IP address xxx.xxx.xxx.xxx, please send me your data link layer address.” ▪ The software in the computer with that IP address then sends an ARP response with its data link layer address.
▪ The sender transmits its message using that data link layer address.
▪ The receiving computer also stores the data link layer address in its address table for future use.
5/22/2020 Business Data Communications and Networks (13711) 53
5/22/2020 Business Data Communications and Networks (13711) 54
R has four interfaces, R2 also has four interfaces,
5/22/2020 Business Data Communications and Networks (13711) 55
5/22/2020 Business Data Communications and Networks (13711) 56
5/22/2020 Business Data Communications and Networks (13711) 57
5/22/2020 Business Data Communications and Networks (13711) 58
▪ Computing resources are devoted to adjusting routing tables rather than to sending messages,
▪ which can slow down the network.
▪ Some dynamic routing protocols transmit status information very frequently,
▪ which can significantly reduce performance.
5/22/2020 Business Data Communications and Networks (13711) 59
5/22/2020 Business Data Communications and Networks (13711) 60
5/22/2020 Business Data Communications and Networks (13711) 61
5/22/2020 Business Data Communications and Networks (13711) 62
5/22/2020 Business Data Communications and Networks (13711) 63
5/22/2020 Business Data Communications and Networks (13711) 64
5/22/2020 Business Data Communications and Networks (13711) 65
5/22/2020 Business Data Communications and Networks (13711) 66
5/22/2020 Business Data Communications and Networks (13711) 67
▪ The config file can contain
▪ the type of routing protocol to be used, ▪ the interfaces that are active/enabled and those that are down, ▪ and what type of encryption is used. ▪ The config file is central to a router’s operation, and the IOS refers to it hundreds of times per second to tell the router how to do its job.
▪ which plays an important role in network security. ▪ The ACL defines what types of packets should be routed and what types of packets should be discarded. ▪ The ACL is discussed in more detail in Chapter 10 on security.
5/22/2020 Business Data Communications and Networks (13711) 68
5/22/2020 Business Data Communications and Networks (13711) 69
5/22/2020 Business Data Communications and Networks (13711) 70
5/22/2020 Business Data Communications and Networks (13711) 71
▪ the network layer software on the client stores this address in its data link layer address table (called ARP cache).
5/22/2020 Business Data Communications and Networks (13711) 72
▪ Before the first packet is sent, the transport layer first sends a SYN segment to establish a session (also known as the three-way handshake). ▪ Once the session is established, then the data packets begin to flow. ▪ Once the data are finished, the session is closed with a FIN segment (also known as the four-way handshake).
▪ Web browsers open one session when they first issue an HTTP request ▪ and leave that session open for all subsequent HTTP requests to the same server.
5/22/2020 Business Data Communications and Networks (13711) 73
5/22/2020 Business Data Communications and Networks (13711) 74
5/22/2020 Business Data Communications and Networks (13711) 75