Week 3 - Lecture Notes
Week 3 - Lecture Notes
Computer
Networks
Module Code: COM5014M
Level: 5
Credits: 20
Week 3
Message
Pattern
TCP/IP
ICMP FTP
Protocols
HTTP SMTP
Application
POP3 SSL
IPAM
Network IP
Internet Protocol (IP)
• At the network layer the TCP/IP model supports IP.
• IP is a transmission mechanism that uses IP addresses to deliver packets to network
devices through best effort service.
• The best effort service means, IP does its best to deliver a packet to destination, but
no error checking or tracking (no guarantee).
• IP is unreliable protocol, has no guarantee for delivery, meaning that a packet might
be lost, corrupted, delivered late or out of order.
• IP transports data in individual packers called datagrams, each of which is
transported separately.
• Core Functionalities: Routing, address assignment, multicasting
Routed Protocols
• A routed protocol is used to deliver application traffic.
• It provides appropriate addressing information in Network Layer to allow a packet to
be forwarded from one network to another.
• Examples of routed protocols are the IP and Internetwork Packet Exchange (IPX).
• In a network all devices should know where a packet should be sent.
• All devices need to know what IP addresses are on directly attached networks
o If the destination is on a local network, send it directly there
o If the destination address isn’t local, there should be a router device to send it
to the corresponding network, according to IP address.
IP Address
• An IP address is a unique logical address
that identifies a device on a network,
either in a local network or the Internet.
• An IP address is a string of numbers
separated by periods.
• IP address for a device in a network is
like a postal code in a mailing address.
• IP addresses are how computers on the
internet recognise one another.
• It is basically developed to supports
networks consisting of multiple
networks or sub-networks.
IPv4
• Internet Protocol version 4 is the original
and most common deployed internet
protocol used to connect devices to the
internet.
• IPv4 uses 32-bit address scheme, divided
into four 8-bit fields, called octets,
separated by a period or dot.
11000000.10101000.00000001.00001010 192.168.1.10
IPv4
• Each of the 4 Octets has 8 Bits.
• Each Bit can only be a One or a Zero.
128+64+32+16+8+4+2+1=255
• In addressing each octet is converted
to a decimal number, ranging from 0 to
255 and separated by a by a period.
• Example of IPv4 address:
163.1.125.98
• IPv4 with this format allows only
around 4 billion IP addresses, that is
not enough for supporting addressing
of all devices in the future.
IPv4 Addressing
• IP addresses are made up of
two main components.
5 Classes of IP Addresses: • Net ID (Network ID)
o A: 1 byte for NetID, 3 for HostID • Host ID
o B: 2 byte for NetID, 2 for HostID
o C: 3 byte for NetID, 1 for HostID
o D: Multicast addresses
o E: Reserved for future use
IPv4
Addressing
Octet Octet Octet Octet
Assigned Solicited-Node
• The main downsides of TCP is that it is the latency, as the connection need to
be established before sending the packet out.
User Datagram Protocol (UDP)
• UDP is a connectionless protocol.
• UDP is simple but fast protocol, as it doesn’t need to establish a connection before
sending data, and there is no mechanism for congestion control.
• UDP is unreliable protocol and there is no guarantee that the packet arrives to its
destination.
• This protocol is suitable for low-latency are loss-tolerating applications.
• Time-sensitive and real-time applications like online games often use UDP.
TCP v.s. UDP
TCP UDP
SMTP POP3
HTTP IPAM
FTP SSL
Hypertext Transfer Protocol (HTTP)
• HTTP is the core protocol for the World Wide Web (WWW) and the foundation of any
data exchange on the Web.
• HTTP is a protocol for fetching resources such as HTML documents. It was designed
for communication between web browsers and web servers.
• It is based on client-server architecture model, which define:
o the data that a client should send to a Web server to request services,
o the meaning of received data,
o the data that a Web server should send to the client, such that it can understand.
• The client uses Uniform Resource Identifier (URL).
File Transfer Protocol (FTP)
• FTP is a standard protocol on TCP/IP, used to transfer files over the Internet.
• It is the most common, simplest and most secure protocol for file exchange over the
Internet.
• FTP is a client-server architecture, uses TCP between client and server.
• FTP Client: Software that connects a computer to FTP server to access files.
• FTP Server: Stores all the files and databases for FTP clients.
• FTP Clients software: FileZilla, Fire FTP,
Winscp
Simple Mail Transfer Protocol (SMTP)
• SMTP is the standard e-mail protocol on the Internet and part of the TCP/IP protocol
suite.
• It defines the message format which stores and forward the mail.
• It is a relatively simple, text-based protocol, where one or more recipients of a
message are specified and then the message text is transferred.
• SMTP does not require authentication. This allows anyone on the Internet to send
email to anyone else.
• The primary purpose of SMTP is to transfer email between mail servers. In order to
send email, the client sends the message to an outgoing mail server, which in turn
contact the destination mail server for delivery. To be able to do this, it is necessary to
specify an SMTP server when configuring an email client.
Post Office Protocol (POP3)
• POP3 is a protocol used by clients to retrieve emails from an email server over a
TCP/IP connection. It is 3rd version of POP.
• Email servers, hosted by Internet service providers, also use POP3 to receive and to
receives and holds email for each individual client until they pick it up.
• Clients use an email application to download their mailbox from email server.
• Once a client downloaded its own emails, they will be usually deleted from the server.
However, some clients allow email server to keep a copy of them.
• Microsoft Outlook is one of the popular email application who work with POP3.
• Advantages: 1- As emails are downloaded to the client’s computer, all messages can
be read when user is offline. 2- Easy to configure and use.
• Disadvantages: Email are stored on client’s computer, in case of crush, all emails may
be lost.
Secure Sockets Layer (SSL)
• SSL is a method for providing security for web-based applications and between a
client and a server.
• Example: a web browser and a web server (website), a client and a mail server.
• Integration of HTTP and SSL provides security for websites. The SSL-secured websites
begin with HTTPS (with S at HTTP).
• SSL use encryption and authentication mechanisms to ensures reliable
(confidentiality & integrity,) link between a client and a web server.
• SSL authenticate both sides of communication using SSL certificate.
• A browsers and a Web Server both needs the SSL Certificate to establish the
connection.
• SSL Certificate has a pair cryptographic key, called Public Key, which use for encrypted
connection establishment.
Internet Protocol Address Management
• IP Address Management (IPAM) is a network service for planning, tracking, and
managing the IP addresses in a network.
• Managing IP addresses means: Assigning IP addresses to devices, changing IP
addresses, deleting IP addresses when devices leave the network, dealing with
conflict IP addresses, setting up subnets and designating addresses for use by certain
applications or clouds.
• Why IPAM is needed?
o In a large network with hundreds or thousands of devices, keeping track of each
of IP address becomes very difficult.
• IPAM can be used to determine: the device and host name associated with each IP
address, allocated and free IP addresses, allocated and free subnets, and who uses
the subnets and how large they are.
Thank You
Hamidreza Bagheri
[email protected]
References
1. Forouzan, B. A., & Fegan, S. C. (2007). Data communications and networking (4th. ed.). New York:
McGraw-Hill.
2. Burgess, M. (2003) Principles of Network and System Administration. 2nd Ed. John Wiley and Sons Ltd.
3. Limoncelli, T. and Hogan, C. (2001) The Practice of System and Network Administration. Addison-
Wesley.
4. Olifer, N. and Olifer, V. (2005) Computer Networks: Principles, Technologies and Protocols for Network
Design. John Wiley and Sons Ltd.
5. Stallings, W. (2003) Data and Computer Communications. 7th Ed. Prentice Hall
6. Tanenbaum, A. (2002) Computer Networks. Prentice Hall PTR.