Internet Protocols - PowerPoint PPT Presentation

1 / 88
About This Presentation
Title:

Internet Protocols

Description:

upload. THE INTERNET. IP = Internet Protocol. Store and Forward Switch = Router ... Router in network core receives incoming packets and stores them in 'buffer' ... – PowerPoint PPT presentation

Number of Views:70
Avg rating:3.0/5.0
Slides: 89
Provided by: Harry112
Category:

less

Transcript and Presenter's Notes

Title: Internet Protocols


1
Internet Protocols
2
ARPAnet, 1971
3
Clients and Servers
download
upload
Client Computers
4
IP Internet Protocol Store and Forward Switch
Router
  • Router in network core receives incoming packets
    and stores them in buffer (temporary storage)
  • Routes packets on outgoing links
  • May throw packets away if buffer is full

Routing Table
5
End to EndIntelligence at Edge of Network
  • Routers are relatively dumb and rely on
    intelligence at the edge to compensate

BEST EFFORT
6
Packets
  • Packet size (1.5 KB max) a compromise
  • Small enough that they can be handled quickly
    and with relatively low odds of being damaged
  • Large enough that packaging does not outweigh the
    contents or payload

7
IP Addresses
  • IPv4 32 bits written as 4 decimal numerals less
    than 256, e.g. 141.211.125.22 (UMich)
  • 4 billion not enough
  • IPv6 128 bits written as 8 blocks of 4 hex
    digits each, e.g. AF4323BCCAA10045A5B290ACFF
    EE8080
  • At edge, translate URLs --gt IP addresses, e.g.
    umich.edu --gt 141.211.125.22
  • Authoritative sites for address translation
    Domain Name Server (DNS)
  • In the network core, IP addresses are used to
    route packets using routing tables

8
(No Transcript)
9
But who controls the names and numbers?
  • ICANN Internet Corporation for Assigned Names
    and Numbers
  • A US nonprofit but its a long story.

10
(No Transcript)
11
The Internet is IP
  • Routers do not know what the bits in the packets
    represent
  • Do not know if they are email, streaming video,
    html web pages
  • Do not know if they are encrypted or unencrypted
  • You can invent your own new service adhering to
    IP standards
  • Gain Internets best-effort service
  • and possibility of undelivered packets

12
Packets
  • Packet size (1.5 KB max) a compromise
  • Small enough that they can be handled quickly
    and with relatively low odds of being damaged
  • Large enough that packaging does not outweigh the
    contents or payload

13
Striping
  • Smallish packets also make better use of the
    network since later packets can leave before
    earlier packets arrive

1
2
3
4
14
Striping
  • Smallish packets also make better use of the
    network since later packets can leave before
    earlier packets arrive

2
3
4
1
15
Striping
  • Smallish packets also make better use of the
    network since later packets can leave before
    earlier packets arrive

3
4
1
2
16
Striping
  • Smallish packets also make better use of the
    network since later packets can leave before
    earlier packets arrive

4
1
2
3
17
Striping
  • Smallish packets also make better use of the
    network since later packets can leave before
    earlier packets arrive

1
2
3
4
18
Striping
  • Smallish packets also make better use of the
    network since later packets can leave before
    earlier packets arrive

1
2
3
4
19
Striping
  • Smallish packets also make better use of the
    network since later packets can leave before
    earlier packets arrive

1
2
3
4
20
Striping
  • Smallish packets also make better use of the
    network since later packets can leave before
    earlier packets arrive

2
3
4
1
21
Striping
  • Smallish packets also make better use of the
    network since later packets can leave before
    earlier packets arrive

3
4
1
2
22
Striping
  • Smallish packets also make better use of the
    network since later packets can leave before
    earlier packets arrive

4
1
2
3
23
Striping
  • Smallish packets also make better use of the
    network since later packets can leave before
    earlier packets arrive

1
2
3
4
24
Striping Utilizes the Network
  • Store and Forward delays would add up if entire
    message had to be buffered at every router

1
2
3
4
25
Striping Utilizes the Network
  • Store and Forward delays would add up if entire
    message had to be buffered at every router

1
2
3
4
26
Striping Utilizes the Network
  • Store and Forward delays would add up if entire
    message had to be buffered at every router

1
2
3
4
27
Striping Utilizes the Network
  • Store and Forward delays would add up if entire
    message had to be buffered at every router

1
2
3
4
28
Striping Utilizes the Network
  • Store and Forward delays would add up if entire
    message had to be buffered at every router

1
2
3
4
29
Striping Utilizes the Network
  • Store and Forward delays would add up if entire
    message had to be buffered at every router

1
2
3
4
30
TCPTransport Control Protocol
  • Creates logical connection between two machines
    on the edge of the network
  • Connected machines seem to have a circuit
    connecting them even though they do not tie up
    the network
  • Provide reliable, perfect transport of messages,
    even though IP may drop packets
  • Regulates the rate at which packets are inserted
    into the network

31
TCP, Basic Idea
32
TCP, Basic Idea
1 2
33
TCP, Basic Idea

1 2
3-Way Handshaking
34
TCP, Basic Idea

1 2
3-Way Handshaking
35
TCP, Basic Idea

1 2
3-Way Handshaking
36
TCP, Basic Idea

1 2
3-Way Handshaking
37
TCP, Basic Idea

1 2
3-Way Handshaking
38
TCP, Basic Idea

1 2
3-Way Handshaking
39
TCP, Basic Idea
1 2

3-Way Handshaking
40
TCP, Basic Idea
1 2

3-Way Handshaking
41
TCP, Basic Idea
1 2

3-Way Handshaking
42
TCP, Basic Idea
1 2

3-Way Handshaking
43
TCP, Basic Idea
1 2

3-Way Handshaking
44
TCP, Basic Idea
1 2

3-Way Handshaking
45
TCP, Basic Idea

1 2
3-Way Handshaking
46
TCP, Basic Idea

1 2
3-Way Handshaking
47
TCP, Basic Idea

1 2
3-Way Handshaking
48
TCP, Basic Idea

1 2
3-Way Handshaking
49
TCP, Basic Idea

1 2
3-Way Handshaking
50
TCP, Basic Idea

1 2
3-Way Handshaking
51
TCP, Basic Idea
1 2
Virtual Circuit now established between two
hosts though the routers in between are not aware
of it and the same path need not be followed by
all packets
52
TCP, Basic Idea
1
1 2
53
TCP, Basic Idea
1
1 2
54
TCP, Basic Idea
1 2
1
2
55
TCP, Basic Idea
1
1 2
2
56
TCP, Basic Idea
1 2
1
2
57
TCP, Basic Idea
1
1 2
2
58
TCP, Basic Idea
1 2
2
1
ACK1
59
TCP, Basic Idea
1 2
2
1
ACK1
60
TCP, Basic Idea
1 2
1
2
ACK1
ACK2
61
TCP, Basic Idea
1 2
1
ACK1
ACK2
62
TCP, Basic Idea
1 2
1
2
ACK1
ACK2
63
TCP, Basic Idea
2
1
2
ACK2
64
TCP, Basic Idea
2
2
1
ACK2
65
TCP, Basic Idea
2
2
1
ACK2
66
TCP, Basic Idea
1
2
67
TCP, Basic Idea
1
2
68
Dropped Packets and Retransmission
1
1 2
69
Dropped Packets and Retransmission
1
1 2
70
Dropped Packets and Retransmission
1
1 2
2
71
Dropped Packets and Retransmission
1 2
2
72
Dropped Packets and Retransmission
1 2
2
73
Dropped Packets and Retransmission
1 2
2
74
Dropped Packets and Retransmission
1 2
2
75
Dropped Packets and Retransmission
1 2
2
76
Dropped Packets and Retransmission
TIMEOUT
1 2
1
2
77
UDP User Datagram Protocol
  • Used for real-time applications (e.g. streaming
    audio and video) where timing is essential but
    perfect delivery is not

78
UDP Best Effort Delivery
2 3
1
79
UDP Best Effort Delivery
3
2
1
80
UDP Best Effort Delivery
3
1
2
81
UDP Best Effort Delivery
3
1
2
82
UDP Best Effort Delivery
3
1
83
UDP Best Effort Delivery
3
1
84
UDP Best Effort Delivery
3
1
85
UDP Best Effort Delivery
3
1
86
UDP Best Effort Delivery
3
1
87
Layered Protocols
  • Both TCP (guaranteed delivery) and UDP (fast
    delivery, no guarantees) use the lower-level
    Internet Protocol in the link layer
  • But TCP and UDP know nothing about links,
    routing, etc. All that knowledge is embedded in IP

88
An analogyPostal Mail Protocols
Higher Level Protocols
Lower Level Protocols
Write a Comment
User Comments (0)
About PowerShow.com