TCP/IP Protocol Due to the number of hardware possibilities for a network, there must be a set of rules for how data should be transmitted across the connection media. A protocol defines how the network devices and computers talk to one another. What protocol does Phoenix Elementary School District # 1 use? TCP/IP - Transmission Control Protocol / Internet Protocol Each time a network device manipulates data, it obeys TCP/IP rules. When data packets are sent, they may not arrive at their destination in order. Example: E-mail messages are split into packets. If the data gets spread over several packets, TCP/IP puts it back together so that the message makes sense. IP – Internet Protocol, is responsible for basic network connectivity. IP provides a place to send and receive data - a network address. Network addresses, unlike physical addresses, are not burned into any hardware. Network addresses are assigned by network administrators and are logically configured into network devices. Every computer or device on a TCP/IP network must have a numeric address. The IP on any computer understands how and where to send messages to these addresses. TCP – Transmission Control Protocol uses IP to deliver packets to the upper-layer applications and provides a reliable stream of data among computers on the network. Error checking and sequence numbering are two of TCP’s more important functions. Once a packet arrives at the correct IP address, TCP examines the data. On both the sending and receiving computers, it establishes a dialog to communicate about the data that is being transmitted. TCP is connection oriented because it tells the network to resend lost data. TCP/IP works on 3 types of services: 1) Connection services: Determine how data gets from one computer onto the network cable (or other connection medium) and how that data moves from the network cable to the next computer. The connection services do not guarantee that the data will arrive at the destination in the right order or that it will arrive at all. 2) Transport services: Provide completely reliable communication between computers. The packets are numbered to make sure the data can be placed in the right order even when the packets arrive out of sequence. The computers then perform error checking to make sure that no packets are lost or damaged. 6 TCP/IP Protocol TCP/IP works on 3 types of services (cont.): 3) Application services: Let an application on one computer talk to a similar application on another computer in order to perform tasks such as copying files. These services depend on connection services and transport services for reliable and efficient communication. TCP/IP refers to each local network as a subnet. IP uses addresses to identify (subnets which are network numbers) and (devices, such as computers, which are called hosts.) The IP addresses are 32 bit numbers that contain both a subnet address and a host address. IP addresses are divided into four octets (8-bit sections) called dotted-decimal notation. Each device must have a unique IP address. Example of Dotted Decimal Notation and the corresponding Binary Notation: 170 .203 .93 10101010 11001011 1011101 .5 00000101 TCP/IP protocols are divided into three categories: Class A - a small number of networks that have a large number of hosts. The first octet has a value of 0 through 127. There are 126 Class A addresses, each of which can support 16,777,216 hosts. Class B - networks with an intermediate number of hosts. The first octet has a value of 128 through 191. There are 16,384 Class B addresses, each of which can support 65,536 hosts. Class C - a large number of networks that have a small number of hosts. The first octet has a value of 192 through 223. There are 2,097,152 Class C addresses, each of which can support 254 hosts. 7 TCP/IP Protocol Each IP address consists of two fields: A netid field that is the logical network address of the subnet to which the computer is attached. A hostid field, which is the logical device address that uniquely identifies each host on a subnet. Together, the netid and the hostid provide each host on an internetwork with a unique IP address. Class A Class B Class C NNNNNNNN NNNNNNNN NNNNNNNN HHHHHHHH NNNNNNNN NNNNNNNN N = Netid HHHHHHHH HHHHHHHH NNNNNNNN HHHHHHHH HHHHHHHH HHHHHHHH H = Hostid Obtaining Internet Addresses If a network is isolated and not connected to the Internet, any addresses can be used; however, on the Internet, the addresses must be assigned by the Internet Network Information Center (InterNIC). Internet addresses are getting scarce, and the ability to obtain enough addresses to assign becomes more difficult as the Internet grows. Two alternatives are used to limit the number of IP address ranges required by users of the Internet. They are: Alternative 1: Subnets Subnets divide one network into multiple smaller networks. The separate networks are normally interconnected by network devices called routers. Not every environment requires subnets. If an organization’s class C network has 254 or fewer hosts and the network is entirely in one building, there’s no reason to subnet it. However, if the organization’s network expands into multiple locations, the network administrator can split the existing network into pieces, one piece for each location. Every host on a network must be configured with the same subnet ID. Like IP addresses, subnet ID’s can be represented in dotted decimal notation. Subnet ID’s or masks make it easier and faster for IP to identify the netid portion of the IP address. Also, they make it possible to suballocate network addresses. Both the IP address and the subnet mask are examined in their binary format when subneting is evaluated. Boolean arithmetic called ANDing is used during this process. An explanation of that is beyond the scope of this document. 8 TCP/IP Protocol The default subnet mask for the three classes of networks are displayed below: Class A: 11111111 255.0.0.0 00000000 00000000 00000000 Class B: 11111111 255.255.0.0 11111111 00000000 00000000 Class C: 11111111 255.255.255.0 11111111 11111111 00000000 A Zero [ 0 ] in a subnet mask indicates that the corresponding bit in the IP address is part of the host ID. Routing Packets to Remote Subnets When hosts are connected to an internetwork, each host is configured with the IP address of a default gateway or router. If IP determines that the source and destination subnet addresses don’t match, IP addresses the packet to the default router. IP determines where to route packets by consulting routing tables contained within the routers. Alternative 2: Private IP Addresses Packets of information whose source or destination is in a private address space are dropped by routers, and information about private address spaces is not passed between routers. IP addresses specified in RFC 1918, Address Allocation for Private Internets, define the IP address ranges that can be used and are listed below. Class A Type: Class B Type: Class C Type: 10.0.0.0 172.16.0.0 192.168.0.0 to to 172.31.0.0 192.168.255.0 If a network that uses private addresses needs to be connected to the Internet, it may do one of two things: renumber all of its computers to use IP numbers assigned by InterNIC, or use a multihomed device as a connection to the Internet. 9 TCP/IP Protocol A multihomed device has multiple IP addresses. At least one address needs to be on the private network, and one (or more) of its addresses needs to be on the public network. An application – typically a firewall or proxy server - must be set up on the multihomed device to process requests from the private network, and act as a broker between the private network and external resources – the Internet. DHCP – Dynamic Host Configuration Protocol Provides automatic configuration of IP addresses. All addresses may be allocated from a range of IP addresses available for lease. This range of addresses is called a scope. This takes place when a computer demands TCP/IP access to the network. DHCP addresses are leased for a specific duration. When the lease approaches expiration, an active client negotiates to renew the lease. If the current address cannot be reassigned, a new address is assigned to the client. Addresses that are not renewed are returned to the address pool. Phoenix Elementary School District # 1’s server FS_DO1 is a DHCP server. Each site / location’s file server acts as a DHCP server for that site. The number assigned by the site server is then authenticated by the main DHCP server at the district office. DNS – Domain Name Service As previously stated, any computer that needs to be visible on the Internet must have a unique IP address. It also has a name that conforms with its network’s naming convention. DNS was designed to map Internet addresses, such as 12.7.70.178, to names, such as host.subnet.company.com. The name parts proceed from most specific to least specific, as you move from the first to last parts of the name. The first name is often the name of the computer. The next part is generally the subnet the computer is on. The second-to-last name part is often the company’s name, and the last name part describes the kind of company it is. Without DNS you would be required to access information from remote systems using the IP address instead of a valid computer name. Names are much easier to remember than IP addresses; consequently, DNS is used to resolve a computer name into the appropriate TCP/IP address - www.phxelem.k12.az.gov is much easier to remember that 207.105.154.194. DNS is a distributed database. On the Internet, the root of this database is written as a single dot ( . ). This root database is maintained by InterNIC. The root of DNS is then sub-divided into toplevel entries such as [ .com ] for commercial organizations, [ .gov ] for government institutions, [ .net ] for Internet Service Providers, and [ .edu ] for educational institutions. There are others that are used for other purposes, such as those used to specify other countries. A server that can tell you an IP address if you give it a domain name is called a domain name server. DNS clients ask these servers to return IP addresses for specified domain names. In completing its tasks, one DNS may ask another DNS for help, an so on, until an answer is found and a reply is sent to the DNS client. 10