(4.4) Internet Protocols

Preview:

DESCRIPTION

(4.4) Internet Protocols. Layered approach to Internet Software. Internet Protocols. In this section we investigate how messages are transferred over the Internet. . Figure 4.12 Package-shipping example. Internet Software Layers. Application: Constructs message with address - PowerPoint PPT Presentation

Citation preview

1

(4.4) Internet Protocols Layered approach to Internet Software

2

Internet ProtocolsIn this section we investigate

how messages are transferred over the Internet.

4-3

Figure 4.12 Package-shipping example

4-4

Internet Software Layers

• Application: Constructs message with address

• Transport: Chops message into packets• Network: Handles routing through the

Internet• Link: Handles actual transmission of

packets

4-5

Figure 4.13 The Internet software layers

6

Application layer:The application layer consists of those

software units such as clients and servers that use Internet Communication to carry out there tasks.

The application layer uses transport layer to sends and receives messages over the Internet .

The responsibility of application layer is to provide an address that is compatible with the transport layer.

7

Application layer:Application layer use the services

of the name servers within the Internet to translate mnemonic addresses used by humans into Internet-compatible.

8

Transport layer:The major task of transport layer is

to accept messages from the application layer and to ensure that the messages are properly formatted for transmission over the Internet.

Transport layer divides long messages into small segments, which are transmitted over the Internet as individual units.

9

Transport layer:This division is necessary because a single

long message can obstruct the flow of other messages at the points on the Internet where numerous messages must cross paths.

Small segments are interweave at these points, whereas a long message forces others to wait while it passes.

Transport layer adds sequence numbers to the small segments it produces so that, the segments can be reassembled at the message’s destination.

10

Transport layer:Then it attaches the destination

address to each segment and hands these address segments, known as packets, to the network layer.

11

Network layer:Has the task for forwarding the

packets it receives from one network within the Internet to another until they reach their final destinations.

Thus, network layer that must deal with the Internet topology.

12

Network layer:The decision is made a follows: If the final destination of the packet

is within the current network, the network layer will send the packet there.

Otherwise, the network layer will send the packet to a router in the current network through which the packet can be transferred into an adjacent network.

13

Network layer:The network layer appends this

address to the packet as an intermediate address and hands the packet to the link layer.

14

Link layer:The link layer has a responsibility of transferring

the packet to the intermediate address that was determined by the network layer.

Thus the link layer must deal with the communication details particular to the individual network in which the computer resides.

If that network is a token ring, the link layer must be wait for possession of the token before transmitting.

if the network uses CSMA/CD, the link layer must listen for a silent bus before transmitting.

15

Note :Only the link layer and network

layer are involved at intermediate stops.

16

In the opposite side :When the packet transmitted, it is

received by the link layer at the computer designated by the local address attached to the message.

Then hand it to its network layer where the packet final destination is compared to the current location.

Then it hands to its transport layer.

17

In the opposite side :As transport layer receives packets

from the network layer, it extracts the underlying message segments and reconstructs the original message according to the sequence numbers that were provided by the transport layer at the message’s origin.

Ones the message is assembled, transport layer hands it to the appropriate unit within the application layer.

18

Port number:The units within the application

layer should receive an incoming message is an important task of the transport layer.

This is handle by assigning unique port numbers to the various units and requiring that the appropriate port number be appended to a message’s address before starting the transmission.

19

Port number:For example:If web browser asked to retrieve the

document whose URL is http://www.zoo.org/animals/frog.html

The browser assume that it should contact the HTTP server at www.zoo.org via port number 80.

But FTP client should communicate with the FTP server through port number 20 and 21

4-20

Figure 4.14 Following a message through the Internet

4-21

TCP/IP Protocol Suite• Is a collection of protocols used by

the Internet to implement the four level communication hierarchy implemented in the Internet.

• TCP/IP is for Transmission Control Protocol/ Internet Protocol

4-22

Where TCP/IP and UDP• Transport Layer– TCP– UDP (User Datagram Protocol)

• Network Layer IP:– (IPv4) use 32 bits– (IPv6) use 128 bits

4-23

The differences between TCP and UDP

• The first one: before sending the message as

requested by the application layer, a transport layer based on TCP sends its own message to the transport layer at the destination telling it that a message is about to be sent.

It then be waits for this message to be acknowledged before starting to sent the application layer’s message.

4-24

The differences between TCP and UDP

• For this manner,• TCP transport layer is said to establish a

connection before sending a message.• But a transport layer based on UDB does

not establish such a connection prior to sending a message. Just send a message to the address and forget about it.

• UDB is called a connectionless protocol.

4-25

The differences between TCP and UDP

• The second:• TCP transport layers at the origin and

destination work together by means of acknowledgments and packet retransmissions to confirm that all segments of a message are successfully transferred to the destination.

• TCP called a reliable protocol.• But UDP is unreliable protocol. Because it

does not offer such retransmission services.

4-26

Figure 4.15 Choosing between TCP and UDP

4-27

Security• Attacks–Malware (viruses, worms, Trojan

horses, spyware, phishing software)– Denial of service– Spam

• Protection– Firewalls– Spam filters– Proxy Servers– Antivirus software

4-28

Encryption• FTPS, HTTPS, SSL• Public-key Encryption– Public key: Used to encrypt

messages– Private key: Used to decrypt

messages• Certificates and Digital

Signatures

4-29

Figure 4.16 Public-key encryption