SlideShare a Scribd company logo
Chapter 8 TCP/IP Overview Copyright © 1998, Cisco Systems, Inc. ICRC_revision_11.3
Upon completion of this chapter you will be able to perform the following tasks: Describe how the TCP/IP implementation relates to the OSI reference model Identify the functions of the TCP/IP transport-layer protocols Identify the functions of the TCP/IP network-layer protocols Identify the functions performed by ICMP Objectives
TCP/IP Overview  Copyright © 1998, Cisco Systems, Inc. ICRC_revision_11.3
Early protocol suite Introduction to TCP/IP UNIX Host Internet TCP/IP UNIX Host
Early protocol suite Universal Introduction to TCP/IP UNIX Host Internet TCP/IP UNIX Host
TCP/IP Protocol Stack Application Presentation Session Transport Network Data Link Physical 7 6 5 4 3 2 1 Application Transport Internet Network Interface OSI Reference Model 6 5 4 3 Ethernet, 802.3, 802.5, FDDI, and so on. TCP/IP Conceptual Layers
Application Layer Overview *Used by the router File Transfer - TFTP * - FTP - NFS E-Mail - SMTP Remote Login - Telnet * - rlogin Network Management - SNMP * Name Management - DNS* Application Transport Internet Network Interface Hardware
Transport Layer  Copyright © 1998, Cisco Systems, Inc. ICRC_revision_11.3
Transport Layer Overview Transmission Control Protocol (TCP) User Datagram  Protocol (UDP) Application Transport Internet Network Interface Hardware
TCP Segment Format # Bits 6 16 32 4 16 6 32 Source Port Dest. Port Sequence Number Acknowledgement Number HLEN Reserved Code Bits 16 Window 16 Check- sum 16 Urgent 0 or 32 Option Data...
Port Numbers TCP Port  Numbers F T P Transport Layer T E L N E T D N S S N M P T F T P S M T P UDP Application Layer 21 23 25 53 69 161
TCP Port Numbers Source Port Dest. Port … Host A Dest. port = 23. Send packet to my  Telnet  application. 1028 23 … SP DP Host Z Telnet Z
TCP Handshake/Open Connection Send SYN  (seq=100 ctl=SYN) SYN received Host A Host B 1
TCP Handshake/Open Connection Send SYN  (seq=100 ctl=SYN) SYN received Send SYN  (seq=300 ack=101 ctl=syn,ack) Host A Host B SYN received 1 2
TCP Handshake/Open Connection Send SYN  (seq=100 ctl=SYN) SYN received Send SYN  (seq=300 ack=101 ctl=syn,ack) Established (seq=101 ack=301 ctl=ack) Host A Host B SYN received 1 2 3
TCP Handshake/Open Connection Send SYN  (seq=100 ctl=SYN) SYN received Send SYN  (seq=300 ack=101 ctl=syn,ack) Established (seq=101 ack=301 ctl=ack) Host A Host B Established (seq=101 ack=301 ctl=ack Data) SYN received 1 2 3 4
Window size = 1 TCP Simple Acknowledgment Sender  Receiver
Window size = 1 TCP Simple Acknowledgment Sender  Receiver Send 1 Receive 1
Window size = 1 TCP Simple Acknowledgment Sender  Receiver Send 1 Receive 1 Receive ACK 2  Send ACK 2
Window size = 1 TCP Simple Acknowledgment Sender  Receiver Send 1 Receive 1 Receive ACK 2  Send ACK 2 Send 2 Receive 2
Window size = 1 TCP Simple Acknowledgment Sender  Receiver Send 1 Receive 1 Receive ACK 2  Send ACK 2 Send 2 Receive 2 Receive ACK 3 Send ACK 3
Window size = 1 TCP Simple Acknowledgment Sender  Receiver Send 1 Receive 1 Receive ACK 2  Send ACK 2 Send 2 Receive 2 Receive ACK 3 Send ACK 3 Send 3 Receive 3
Window size = 1 TCP Simple Acknowledgment Sender  Receiver Send 1 Receive 1 Receive ACK 2  Send ACK 2 Send 2 Receive 2 Receive ACK 3 Send ACK 3 Send 3 Receive 3 Receive ACK 4 Send ACK 4
TCP Windowing Sender Receiver
TCP Windowing Window size = 3 Send 2 Sender Receiver Window size = 3 Send 1 Window size = 3 Send 3
TCP Windowing Window size = 3 Send 2 Sender Receiver Window size = 3 Send 1 Window size = 3 Send 3 ACK 1 Window size = 2 ACK 2 Window size = 2 ACK 3 Window size = 2
TCP Windowing Window size = 3 Send 5 Window size = 3 Send 2 Sender Receiver Window size = 3 Send 1 Window size = 3 Send 4 Window size = 3 Send 3 ACK 1 Window size = 2 ACK 2 Window size = 2 ACK 3 Window size = 2
TCP Windowing Window size = 3 Send 5 Window size = 3 Send 2 Sender Receiver Window size = 3 Send 1 Window size = 3 Send 4 Window size = 3 Send 3 ACK 1 Window size = 2 ACK 2 Window size = 2 ACK 3 Window size = 2 ACK 4 Window size = 2 ACK 5 Window size = 2
TCP Sequence and  Acknowledgment Numbers I just sent #10. Source Port Dest. Port … Sequence # Acknowledgement # 1028 23 Source Dest. 10 Seq. 0 Ack. …
TCP Sequence and  Acknowledgment Numbers I just sent #10. I just got #10, now I need #11. Source Port Dest. Port … Sequence # Acknowledgement # 1028 23 Source Dest. 10 Seq. 1 Ack. … 1028 23 Source Dest. 11 Seq. 1 Ack. …
TCP Sequence and  Acknowledgment Numbers I just sent #10. I just got #10, now I need #11. Source Port Dest. Port … Sequence # Acknowledgement # 1028 23 Source Dest. 10 Seq. 1 Ack. … 1028 23 Source Dest. 11 Seq. 2 Ack. … 1028 23 Source Dest. 11 Seq. 1 Ack. …
No sequence or acknowledgment fields UDP Segment Format 16 Source Port 16 Destination Port 16 Length 16 Checksum Data… # Bits
Internet Layer Copyright © 1998, Cisco Systems, Inc. ICRC_revision_11.3
Network Layer Overview OSI network layer corresponds to the  TCP/IP internet layer Internet Protocol (IP) Internet Control Message Protocol (ICMP) Address Resolution Protocol (ARP) Reverse Address Resolution Protocol (RARP) Application Transport Internet Network Interface Hardware
IP Datagram # Bits 6 16 32 4 16 6 32 VERS HLEN Type of Service Total Length Identi- fication Flags Frag Offset TTL 4 # Bits 16 32 4 16 32 Protocol Header Checksum Source IP Address Destination IP Address IP Options Data… 4
Determines destination upper-layer protocol  Protocol Field Transport Layer Internet Layer TCP UDP Protocol Numbers IP 17 6
Internet Control Message  Protocol Application Transport Internet Network Interface Hardware ICMP Destination  Unreachable Echo (Ping) Other
ICMP Testing Destination unreachable Host or port unreachable Network unreachable Host A I do not know how to get to Z. Send ICMP. To Z Destination Unreachable Send data to Z. Data Network
ICMP Testing (cont.) Generated by the  ping  command A Yes, I am here. Is B reachable? B
ICMP Testing (cont.) Generated by the  ping  command A Yes, I am here. Is B reachable? B ICMP Echo Request
ICMP Testing (cont.) Generated by the  ping  command A Yes, I am here. ICMP Echo Reply Is B reachable? B ICMP Echo Request
Address Resolution Protocol 172.16.3.1 172.16.3.2 IP: 172.16.3.2 = ??? I need the Ethernet address of 176.16.3.2.
Address Resolution Protocol 172.16.3.1 172.16.3.2 IP: 172.16.3.2 = ??? I need the Ethernet address of 176.16.3.2. I heard that broadcast. The message is for me. Here is my Ethernet address.
Address Resolution Protocol 172.16.3.1 IP: 172.16.3.2  Ethernet: 0800.0020.1111 172.16.3.2 IP: 172.16.3.2 = ??? I need the Ethernet address of 176.16.3.2. I heard that broadcast. The message is for me. Here is my Ethernet address.
Address Resolution Protocol Map IP   Ethernet Local ARP 172.16.3.1 IP: 172.16.3.2  Ethernet: 0800.0020.1111 172.16.3.2 IP: 172.16.3.2 = ??? I need the Ethernet address of 176.16.3.2. I heard that broadcast. The message is for me. Here is my Ethernet address.
Reverse ARP Ethernet: 0800.0020.1111 IP = ??? What is my IP address?
Reverse ARP Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25.
Reverse ARP Ethernet: 0800.0020.1111 IP: 172.16.3.25 Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25.
Reverse ARP Map Ethernet    IP ARP and RARP are implemented directly on top of the data link layer Ethernet: 0800.0020.1111 IP: 172.16.3.25 Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25.
The TCP/IP protocol stack has the  following components: Protocols to support file transfer, e-mail,  remote login, and other applications Acknowledged and unacknowledged transports Connectionless datagram delivery at the network layer ICMP provides control and message  functions at the network layer Summary
Exercises Copyright © 1998, Cisco Systems, Inc. ICRC_revision_11.3
Exercise  Answers Copyright © 1998, Cisco Systems, Inc. ICRC_revision_11.3

More Related Content

PPTX
Elementary TCP Sockets
PPTX
Socket programming in c
PPT
Socket programming in C
PDF
Socket programming
PDF
Socket programming using C
PPTX
Socket programming
PDF
CCNA 1 Chapter 7 v5.0 2014
PPT
Socket programming
Elementary TCP Sockets
Socket programming in c
Socket programming in C
Socket programming
Socket programming using C
Socket programming
CCNA 1 Chapter 7 v5.0 2014
Socket programming

What's hot (19)

PPT
Application Layer and Socket Programming
PPTX
Socket Programming
PPTX
Socket programming
PDF
Dcn (transmission control protocol) ppt
PPT
Socket Programming Tutorial
PDF
Www ccnav5 net_ccna_1_chapter_7_v5_0_exam_answers_2014
PPT
Eshcol tech solutions pvt ltd
PPT
Basic socket programming
PDF
Sockets
PPTX
Socket programming
PPT
Ppt of socket
PDF
Programming TCP/IP with Sockets
PPT
Socket System Calls
DOC
socket programming
PDF
PPTX
Socket网络编程
PDF
Network Sockets
PDF
Socket Programming
PPT
Tcp sockets
Application Layer and Socket Programming
Socket Programming
Socket programming
Dcn (transmission control protocol) ppt
Socket Programming Tutorial
Www ccnav5 net_ccna_1_chapter_7_v5_0_exam_answers_2014
Eshcol tech solutions pvt ltd
Basic socket programming
Sockets
Socket programming
Ppt of socket
Programming TCP/IP with Sockets
Socket System Calls
socket programming
Socket网络编程
Network Sockets
Socket Programming
Tcp sockets
Ad

Viewers also liked (20)

PPTX
SportsMate
DOCX
Unidad 4
PPTX
Business administration at switzerland university
DOCX
The Effect of Imagery on 1RM Scores of College Students
PPTX
Redes de computadoras
PDF
CCNP routing
PPT
Semana 12 ip avanzado
PPTX
Glm Institute - Mumbai
PDF
Self Assessment Test - Results
PDF
Reactive Java Robotics and IoT 2016
PDF
Innovción en la_infraestructura_escolar__perfil_de_proyecto__
PPTX
Aparato excretor
PDF
Deadlock in Distributed Systems
PPT
Cpu scheduling(suresh)
PPTX
PPT
mach3
 
PPTX
Building Efficient Networks
PPTX
Gillette Marketing stratgy
PPT
Arp and rarp
PDF
OTCQX: The Clear Advantage -- Research Study
SportsMate
Unidad 4
Business administration at switzerland university
The Effect of Imagery on 1RM Scores of College Students
Redes de computadoras
CCNP routing
Semana 12 ip avanzado
Glm Institute - Mumbai
Self Assessment Test - Results
Reactive Java Robotics and IoT 2016
Innovción en la_infraestructura_escolar__perfil_de_proyecto__
Aparato excretor
Deadlock in Distributed Systems
Cpu scheduling(suresh)
mach3
 
Building Efficient Networks
Gillette Marketing stratgy
Arp and rarp
OTCQX: The Clear Advantage -- Research Study
Ad

Similar to 08 module interconnecting cisco router (20)

PPT
Chapter 01 - Overview
PPT
Tcp Ip Overview
PPT
Mạng máy tính nâng cao_Chapter01 overview
PPTX
08 - COMS 525 Internet Protocols and TCPIP - TCP 1.pptx
ODP
Your app lives on the network - networking for web developers
PPTX
Unit V computer network notes for study.
PDF
Chapter 3 - Transport Layer
PPTX
13_TCP_Attack.pptx
PPT
W14-15L28-29 Process to Process Communication.ppt
DOCX
Type of DDoS attacks with hping3 example
PPT
Transmission Control Protocol (TCP) connection oriented
PPTX
Transport Layer in Computer Networks (TCP / UDP / SCTP)
PDF
Osi model
PPT
PPT
Olumide pidan b
PPT
12 tcp-dns
PPTX
IPAddressing .pptx
PDF
TCP - Transmission Control Protocol
PPT
TCP Part I How does it work - module13-tcp1.ppt
Chapter 01 - Overview
Tcp Ip Overview
Mạng máy tính nâng cao_Chapter01 overview
08 - COMS 525 Internet Protocols and TCPIP - TCP 1.pptx
Your app lives on the network - networking for web developers
Unit V computer network notes for study.
Chapter 3 - Transport Layer
13_TCP_Attack.pptx
W14-15L28-29 Process to Process Communication.ppt
Type of DDoS attacks with hping3 example
Transmission Control Protocol (TCP) connection oriented
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Osi model
Olumide pidan b
12 tcp-dns
IPAddressing .pptx
TCP - Transmission Control Protocol
TCP Part I How does it work - module13-tcp1.ppt

More from Asif (16)

PPT
Module 1
PPT
14 module
PPT
13 module isdn bri call
PPT
12 module
PPT
11 module configuring novell ipx
PPT
10 module
PPT
09 module determinig ip routes
PPT
07 module extending switched netwroks with virtual la ns
PPT
06 module catalyst 1900 switch operations
PPT
05 module managing your network enviornment
PPT
04 module operating & configuring ios
PPT
02 module internet concept overview
PPT
Lecture 20 presentation
PPT
Ip addresses
PPT
Configuraton of standard access list and extented access lis
PPT
02 module internet concept overview
Module 1
14 module
13 module isdn bri call
12 module
11 module configuring novell ipx
10 module
09 module determinig ip routes
07 module extending switched netwroks with virtual la ns
06 module catalyst 1900 switch operations
05 module managing your network enviornment
04 module operating & configuring ios
02 module internet concept overview
Lecture 20 presentation
Ip addresses
Configuraton of standard access list and extented access lis
02 module internet concept overview

Recently uploaded (20)

PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Institutional Correction lecture only . . .
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
01-Introduction-to-Information-Management.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Cell Structure & Organelles in detailed.
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Complications of Minimal Access Surgery at WLH
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Supply Chain Operations Speaking Notes -ICLT Program
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Institutional Correction lecture only . . .
O7-L3 Supply Chain Operations - ICLT Program
01-Introduction-to-Information-Management.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Cell Structure & Organelles in detailed.
Final Presentation General Medicine 03-08-2024.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Cell Types and Its function , kingdom of life
VCE English Exam - Section C Student Revision Booklet
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Complications of Minimal Access Surgery at WLH

08 module interconnecting cisco router

  • 1. Chapter 8 TCP/IP Overview Copyright © 1998, Cisco Systems, Inc. ICRC_revision_11.3
  • 2. Upon completion of this chapter you will be able to perform the following tasks: Describe how the TCP/IP implementation relates to the OSI reference model Identify the functions of the TCP/IP transport-layer protocols Identify the functions of the TCP/IP network-layer protocols Identify the functions performed by ICMP Objectives
  • 3. TCP/IP Overview Copyright © 1998, Cisco Systems, Inc. ICRC_revision_11.3
  • 4. Early protocol suite Introduction to TCP/IP UNIX Host Internet TCP/IP UNIX Host
  • 5. Early protocol suite Universal Introduction to TCP/IP UNIX Host Internet TCP/IP UNIX Host
  • 6. TCP/IP Protocol Stack Application Presentation Session Transport Network Data Link Physical 7 6 5 4 3 2 1 Application Transport Internet Network Interface OSI Reference Model 6 5 4 3 Ethernet, 802.3, 802.5, FDDI, and so on. TCP/IP Conceptual Layers
  • 7. Application Layer Overview *Used by the router File Transfer - TFTP * - FTP - NFS E-Mail - SMTP Remote Login - Telnet * - rlogin Network Management - SNMP * Name Management - DNS* Application Transport Internet Network Interface Hardware
  • 8. Transport Layer Copyright © 1998, Cisco Systems, Inc. ICRC_revision_11.3
  • 9. Transport Layer Overview Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Application Transport Internet Network Interface Hardware
  • 10. TCP Segment Format # Bits 6 16 32 4 16 6 32 Source Port Dest. Port Sequence Number Acknowledgement Number HLEN Reserved Code Bits 16 Window 16 Check- sum 16 Urgent 0 or 32 Option Data...
  • 11. Port Numbers TCP Port Numbers F T P Transport Layer T E L N E T D N S S N M P T F T P S M T P UDP Application Layer 21 23 25 53 69 161
  • 12. TCP Port Numbers Source Port Dest. Port … Host A Dest. port = 23. Send packet to my Telnet application. 1028 23 … SP DP Host Z Telnet Z
  • 13. TCP Handshake/Open Connection Send SYN (seq=100 ctl=SYN) SYN received Host A Host B 1
  • 14. TCP Handshake/Open Connection Send SYN (seq=100 ctl=SYN) SYN received Send SYN (seq=300 ack=101 ctl=syn,ack) Host A Host B SYN received 1 2
  • 15. TCP Handshake/Open Connection Send SYN (seq=100 ctl=SYN) SYN received Send SYN (seq=300 ack=101 ctl=syn,ack) Established (seq=101 ack=301 ctl=ack) Host A Host B SYN received 1 2 3
  • 16. TCP Handshake/Open Connection Send SYN (seq=100 ctl=SYN) SYN received Send SYN (seq=300 ack=101 ctl=syn,ack) Established (seq=101 ack=301 ctl=ack) Host A Host B Established (seq=101 ack=301 ctl=ack Data) SYN received 1 2 3 4
  • 17. Window size = 1 TCP Simple Acknowledgment Sender Receiver
  • 18. Window size = 1 TCP Simple Acknowledgment Sender Receiver Send 1 Receive 1
  • 19. Window size = 1 TCP Simple Acknowledgment Sender Receiver Send 1 Receive 1 Receive ACK 2 Send ACK 2
  • 20. Window size = 1 TCP Simple Acknowledgment Sender Receiver Send 1 Receive 1 Receive ACK 2 Send ACK 2 Send 2 Receive 2
  • 21. Window size = 1 TCP Simple Acknowledgment Sender Receiver Send 1 Receive 1 Receive ACK 2 Send ACK 2 Send 2 Receive 2 Receive ACK 3 Send ACK 3
  • 22. Window size = 1 TCP Simple Acknowledgment Sender Receiver Send 1 Receive 1 Receive ACK 2 Send ACK 2 Send 2 Receive 2 Receive ACK 3 Send ACK 3 Send 3 Receive 3
  • 23. Window size = 1 TCP Simple Acknowledgment Sender Receiver Send 1 Receive 1 Receive ACK 2 Send ACK 2 Send 2 Receive 2 Receive ACK 3 Send ACK 3 Send 3 Receive 3 Receive ACK 4 Send ACK 4
  • 25. TCP Windowing Window size = 3 Send 2 Sender Receiver Window size = 3 Send 1 Window size = 3 Send 3
  • 26. TCP Windowing Window size = 3 Send 2 Sender Receiver Window size = 3 Send 1 Window size = 3 Send 3 ACK 1 Window size = 2 ACK 2 Window size = 2 ACK 3 Window size = 2
  • 27. TCP Windowing Window size = 3 Send 5 Window size = 3 Send 2 Sender Receiver Window size = 3 Send 1 Window size = 3 Send 4 Window size = 3 Send 3 ACK 1 Window size = 2 ACK 2 Window size = 2 ACK 3 Window size = 2
  • 28. TCP Windowing Window size = 3 Send 5 Window size = 3 Send 2 Sender Receiver Window size = 3 Send 1 Window size = 3 Send 4 Window size = 3 Send 3 ACK 1 Window size = 2 ACK 2 Window size = 2 ACK 3 Window size = 2 ACK 4 Window size = 2 ACK 5 Window size = 2
  • 29. TCP Sequence and Acknowledgment Numbers I just sent #10. Source Port Dest. Port … Sequence # Acknowledgement # 1028 23 Source Dest. 10 Seq. 0 Ack. …
  • 30. TCP Sequence and Acknowledgment Numbers I just sent #10. I just got #10, now I need #11. Source Port Dest. Port … Sequence # Acknowledgement # 1028 23 Source Dest. 10 Seq. 1 Ack. … 1028 23 Source Dest. 11 Seq. 1 Ack. …
  • 31. TCP Sequence and Acknowledgment Numbers I just sent #10. I just got #10, now I need #11. Source Port Dest. Port … Sequence # Acknowledgement # 1028 23 Source Dest. 10 Seq. 1 Ack. … 1028 23 Source Dest. 11 Seq. 2 Ack. … 1028 23 Source Dest. 11 Seq. 1 Ack. …
  • 32. No sequence or acknowledgment fields UDP Segment Format 16 Source Port 16 Destination Port 16 Length 16 Checksum Data… # Bits
  • 33. Internet Layer Copyright © 1998, Cisco Systems, Inc. ICRC_revision_11.3
  • 34. Network Layer Overview OSI network layer corresponds to the TCP/IP internet layer Internet Protocol (IP) Internet Control Message Protocol (ICMP) Address Resolution Protocol (ARP) Reverse Address Resolution Protocol (RARP) Application Transport Internet Network Interface Hardware
  • 35. IP Datagram # Bits 6 16 32 4 16 6 32 VERS HLEN Type of Service Total Length Identi- fication Flags Frag Offset TTL 4 # Bits 16 32 4 16 32 Protocol Header Checksum Source IP Address Destination IP Address IP Options Data… 4
  • 36. Determines destination upper-layer protocol Protocol Field Transport Layer Internet Layer TCP UDP Protocol Numbers IP 17 6
  • 37. Internet Control Message Protocol Application Transport Internet Network Interface Hardware ICMP Destination Unreachable Echo (Ping) Other
  • 38. ICMP Testing Destination unreachable Host or port unreachable Network unreachable Host A I do not know how to get to Z. Send ICMP. To Z Destination Unreachable Send data to Z. Data Network
  • 39. ICMP Testing (cont.) Generated by the ping command A Yes, I am here. Is B reachable? B
  • 40. ICMP Testing (cont.) Generated by the ping command A Yes, I am here. Is B reachable? B ICMP Echo Request
  • 41. ICMP Testing (cont.) Generated by the ping command A Yes, I am here. ICMP Echo Reply Is B reachable? B ICMP Echo Request
  • 42. Address Resolution Protocol 172.16.3.1 172.16.3.2 IP: 172.16.3.2 = ??? I need the Ethernet address of 176.16.3.2.
  • 43. Address Resolution Protocol 172.16.3.1 172.16.3.2 IP: 172.16.3.2 = ??? I need the Ethernet address of 176.16.3.2. I heard that broadcast. The message is for me. Here is my Ethernet address.
  • 44. Address Resolution Protocol 172.16.3.1 IP: 172.16.3.2 Ethernet: 0800.0020.1111 172.16.3.2 IP: 172.16.3.2 = ??? I need the Ethernet address of 176.16.3.2. I heard that broadcast. The message is for me. Here is my Ethernet address.
  • 45. Address Resolution Protocol Map IP Ethernet Local ARP 172.16.3.1 IP: 172.16.3.2 Ethernet: 0800.0020.1111 172.16.3.2 IP: 172.16.3.2 = ??? I need the Ethernet address of 176.16.3.2. I heard that broadcast. The message is for me. Here is my Ethernet address.
  • 46. Reverse ARP Ethernet: 0800.0020.1111 IP = ??? What is my IP address?
  • 47. Reverse ARP Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25.
  • 48. Reverse ARP Ethernet: 0800.0020.1111 IP: 172.16.3.25 Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25.
  • 49. Reverse ARP Map Ethernet IP ARP and RARP are implemented directly on top of the data link layer Ethernet: 0800.0020.1111 IP: 172.16.3.25 Ethernet: 0800.0020.1111 IP = ??? What is my IP address? I heard that broadcast. Your IP address is 172.16.3.25.
  • 50. The TCP/IP protocol stack has the following components: Protocols to support file transfer, e-mail, remote login, and other applications Acknowledged and unacknowledged transports Connectionless datagram delivery at the network layer ICMP provides control and message functions at the network layer Summary
  • 51. Exercises Copyright © 1998, Cisco Systems, Inc. ICRC_revision_11.3
  • 52. Exercise Answers Copyright © 1998, Cisco Systems, Inc. ICRC_revision_11.3

Editor's Notes

  • #5: The TCP/IP suite of protocols was developed as part of the research done by the Defense Advanced Research Projects Agency (DARPA). Later TCP/IP was included with the Berkeley Software Distribution (BSD) of UNIX. The Internet protocols can be used to communicate across any set of interconnected networks. They are equally well-suited for both LAN and WAN communications. The Internet protocol suite includes not only layer three and four specifications (such as IP and TCP), but also specifications for such common applications as mail, terminal emulation, and file transfer.
  • #6: The TCP/IP suite of protocols was developed as part of the research done by the Defense Advanced Research Projects Agency (DARPA). Later TCP/IP was included with the Berkeley Software Distribution (BSD) of UNIX. The Internet protocols can be used to communicate across any set of interconnected networks. They are equally well-suited for both LAN and WAN communications. The Internet protocol suite includes not only layer three and four specifications (such as IP and TCP), but also specifications for such common applications as mail, terminal emulation, and file transfer.
  • #7: The TCP/IP protocol stack maps closely to the OSI reference model in the lower layers. All standard physical and data-link protocols are supported.
  • #8: Application protocols exist for file transfer, e-mail, and remote login. Network management is also supported at the application layer.
  • #10: Two protocols are provided at the transport layer: TCP and UDP Transmission Control Protocol (TCP) is a connection-oriented, reliable protocol. Virtual circuit service is provided between end-user applications. User Datagram Protocol (UDP) is connectionless and "unreliable." No software checking for datagram delivery is provided at this layer; hence, the description "unreliable."
  • #11: Field definitions in the TCP segment: Source Port—number of the calling port Destination Port—number of the called port Sequence number—number used to ensure correct sequencing of the arriving data Acknowledgment number—next expected TCP octet HLEN—number of 32-bit words in the header Reserved—set to zero Code Bits—control functions (such as setup and termination of a session) Window—number of octets that the sender is willing to accept Checksum—calculated checksum of the header Urgent Pointer—points to the end of the urgent data Options—one currently defined: maximum TCP segment size
  • #12: Both TCP and UDP use port (or socket) numbers to pass information to the upper layers. “ Well-known” port numbers are defined in RFC 1340, thus simplifying application developement. Some ports are reserved in both TCP and UDP, but applications may not be written to support them.
  • #13: End systems use port numbers to select the proper application. Originating source port numbers are assigned by the transmitting host, usually some number greater than 1023.
  • #14: Both ends of the connection are synchronized with this sequence. By exchanging beginning sequence numbers, any lost data may be recovered.
  • #15: Both ends of the connection are synchronized with this sequence. By exchanging beginning sequence numbers, any lost data may be recovered.
  • #16: Both ends of the connection are synchronized with this sequence. By exchanging beginning sequence numbers, any lost data may be recovered.
  • #17: Both ends of the connection are synchronized with this sequence. By exchanging beginning sequence numbers, any lost data may be recovered.
  • #18: With a window size of one, each segment must be acknowledged before another segment is transmitted. This results in inefficient use of bandwidth by the hosts.
  • #19: With a window size of one, each segment must be acknowledged before another segment is transmitted. This results in inefficient use of bandwidth by the hosts.
  • #20: With a window size of one, each segment must be acknowledged before another segment is transmitted. This results in inefficient use of bandwidth by the hosts.
  • #21: With a window size of one, each segment must be acknowledged before another segment is transmitted. This results in inefficient use of bandwidth by the hosts.
  • #22: With a window size of one, each segment must be acknowledged before another segment is transmitted. This results in inefficient use of bandwidth by the hosts.
  • #23: With a window size of one, each segment must be acknowledged before another segment is transmitted. This results in inefficient use of bandwidth by the hosts.
  • #24: With a window size of one, each segment must be acknowledged before another segment is transmitted. This results in inefficient use of bandwidth by the hosts.
  • #25: A larger window size allows more data to be transmitted pending acknowledgment. No further transmission will occur until at least one acknowledgment is received. A sliding window results in more efficient utilization of bandwidth by the hosts.
  • #26: A larger window size allows more data to be transmitted pending acknowledgment. No further transmission will occur until at least one acknowledgment is received. A sliding window results in more efficient utilization of bandwidth by the hosts.
  • #27: A larger window size allows more data to be transmitted pending acknowledgment. No further transmission will occur until at least one acknowledgment is received. A sliding window results in more efficient utilization of bandwidth by the hosts.
  • #28: A larger window size allows more data to be transmitted pending acknowledgment. No further transmission will occur until at least one acknowledgment is received. A sliding window results in more efficient utilization of bandwidth by the hosts.
  • #29: A larger window size allows more data to be transmitted pending acknowledgment. No further transmission will occur until at least one acknowledgment is received. A sliding window results in more efficient utilization of bandwidth by the hosts.
  • #30: TCP provides sequencing of segments with a forward reference acknowledgement. Segments that are not acknowledged within a given time period result in retransmission.
  • #31: TCP provides sequencing of segments with a forward reference acknowledgement. Segments that are not acknowledged within a given time period result in retransmission.
  • #32: TCP provides sequencing of segments with a forward reference acknowledgement. Segments that are not acknowledged within a given time period result in retransmission.
  • #33: User Datagram Protocol (UDP) uses no windowing or acknowledgments. Application layer protocols may provide for reliability. Protocols that utilize UDP include TFTP, SNMP, Network File System (NFS), and Domain Name Service (DNS).
  • #35: Several protocols operate at the Internet layer: IP provides connectionless, best-effort delivery routing of datagrams. ARP determines data link layer address for known IP addresses. RARP determines network addresses when datalink addresses are known. ICMP provides control and messaging capabilities.
  • #36: VERS—version number HLEN—header length in 32-bit words Type of Service—specifies how the datagram should be handled Total Length—total length (header + data) Identification, Flags, Frag Offset—work together to allow fragmentation of datagrams due to differing MTUs in the Internet TTL—time to live Protocol—upper-layer protocol (layer four) Header Checksum—integrity check on the header Source and Destination IP addresses—the 32-bit IP addresses IP Options—provide network testing, debugging, security and others
  • #37: The protocol field determines the layer four protocol being carried within an IP datagram.
  • #38: The Internet Control Message Protocol is implemented by all TCP/IP hosts. ICMP messages are carried in IP datagrams and are used to send error and control messages.