1 / 67

Chapter 4: Network Protocols

Chapter 4: Network Protocols. Network+ Guide to Networks Third Edition. Objectives. Identify the characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand how key network protocols correlate to layers of the OSI Model

arabella
Télécharger la présentation

Chapter 4: Network Protocols

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 4: Network Protocols Network+ Guide to Networks Third Edition

  2. Objectives • Identify the characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk • Understand how key network protocols correlate to layers of the OSI Model • Identify the core protocols of the TCP/IP suite and describe their functions

  3. Objectives (continued) • Understand the most popular protocol addressing schemes • Describe the purpose and implementation of the domain name system • Install protocols on Windows XP clients

  4. Introduction To Protocols • Protocol is a rule that governs how networks communicate • Define the standards for communication between network devices • Vary according to their speed, transmission efficiency, utilization of resources, ease of setup, compatibility, and ability to travel between different LANs

  5. Introduction To Protocols • Networks running more than one protocol are called multiprotocol networks

  6. Transmission Control Protocol/Internet Protocol (TCP/IP) • TCP/IP is not simply one protocol, but rather a suite of specialized protocols—including TCP, IP, UDP, ARP, and many others—called sub protocols • Extremely popular because of low cost

  7. TCP/IP (continued) • Has ability to communicate between a multitude of dissimilar platforms • The core protocols are free and their code is available for anyone to read or modify • Its routable, because they carry Network layer addressing information that can be interpreted by a router

  8. TCP/IP (continued) • Has flexibility because it can run on virtually any combination of network operating systems or network media • TCP/IP Compared to the OSI Model • The TCP/IP suite of protocols can be divided into four layers that roughly correspond to the seven layers of the OSI Model

  9. TCP/IP (continued) • TCP/IP Compared to the OSI Model (continued) • Application layer • Applications gain access to the network through this layer, via protocols • Transport layer • Holds the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), which provide flow control, error checking, and sequencing

  10. TCP/IP (continued) • TCP/IP Compared to the OSI Model (continued) • Internet layer • Holds the Internet Protocol (IP), Internet Control Message Protocol (ICMP), and Address Resolution Protocol (ARP).These protocols handle message routing, error reporting, delivery confirmation, and logical addressing • Network Interface Layer • This layer handles the formatting of data and transmission to the network wire

  11. TCP/IP (continued) • The TCP/IP Core Protocols • Certain sub protocols of the TCP/IP suite • Operate in the Transport or Network layers of the OSI Model

  12. TCP/IP (continued) • Transmission Control Protocol (TCP) • Operates in the Transport layer of both the OSI and the TCP/IP Models and provides reliable data delivery services • TCP is a connection-oriented sub protocol

  13. TCP/IP (continued) • Fields belonging to a TCP segment are described in the following list: • Source port • Destination port • Sequence number

  14. TCP/IP (continued) • Acknowledgment number (ACK) • TCP header length • Reserved • Flags • Sliding-window size (or window)

  15. TCP/IP (continued) • Checksum - Allows the receiving node to determine whether the TCP segment became corrupted during transmission • Urgent pointer - Indicate a location in the data field • Options - Used to specify special options

  16. TCP/IP (continued) • Padding - Contains filler information to ensure that the size of the TCP header is a multiple of 32 bits • Data - Contains data originally sent by the source node and the size of the Data field depends on how much data needs to be transmitted

  17. TCP/IP (continued) • User Datagram Protocol (UDP) • A connectionless transport service • UDP offers no assurance that packets will be received in the correct sequence

  18. TCP/IP (continued) • User Datagram Protocol (UDP) • Provides no error checking or sequencing • More efficient for carrying messages that fit within one data packet

  19. TCP/IP (continued) • Internet Protocol (IP) • Provides information about how and where data should be delivered, including the data’s source and destination addresses • IP is the sub protocol that enables TCP/IP to internetwork

  20. TCP/IP (continued) • Internet Protocol (IP) • IP datagram acts as an envelope for data and contains information necessary for routers to transfer data between different LAN segments • IP is an unreliable, connectionless protocol, which means that it does not guarantee delivery of data

  21. TCP/IP (continued) • Internet Control Message Protocol (ICMP) • An Internet layer protocol that reports on the success or failure of data delivery • ICMP announcements provide critical information for troubleshooting network problems

  22. TCP/IP (continued) • Address Resolution Protocol (ARP) • An Internet layer protocol that obtains the MAC (physical) address of a host, or node, then creates a database that maps the MAC address to the host’s IP (logical) address

  23. TCP/IP (continued) • Address Resolution Protocol (ARP) table • Dynamic ARP table entries are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table • Static ARP table entries are those that someone has entered manually using the ARP utility • ARP can be a valuable troubleshooting tool

  24. TCP/IP (continued) • Reverse Address Resolution Protocol (RARP) • Allow the client to send a broadcast message with its MAC address and receive an IP address in reply • RARP was originally developed as a means for diskless workstations

  25. TCP/IP (continued) • Addressing in TCP/IP • Two kinds of addresses: Logical or physical

  26. TCP/IP (continued) • Logical (or Network layer) can be manually or automatically assigned and must follow rules set by the protocol standards • Physical (or MAC, or hardware) addresses are assigned to a device’s network interface card at the factory by its manufacturer • Addresses on TCP/IP-based networks are often called IP addresses

  27. TCP/IP (continued) • IP addresses are assigned and used according to very specific parameters • Each IP address is a unique 32-bit number, divided into four octets, or sets of 8-bits, that are separated by periods • An IP address contains two types of information: network and host • From the first octet you can determine the network class • Three types of network classes are used on modern LANs: Class A, Class B, and Class C

  28. TCP/IP (continued) • IP Addresses specific parameters continued • Class D and Class E addresses do exist, but are rarely used • Class D addresses are reserved for a special type of transmission called multicasting • Multicasting allows one device to send data to a specific group of devices

  29. TCP/IP (continued) • IP Addresses specific parameters continued • Some IP addresses are reserved for special functions, like broadcasts, and cannot be assigned to machines or devices • 127 is not a valid first octet for any IP address • The range of addresses beginning with 127 is reserved for a device communicating with itself, or performing loopback communication

  30. TCP/IP (continued) • The command used to view IP information on a Windows XP workstation is ipconfig

  31. TCP/IP (continued) • Binary and Dotted Decimal Notation • A decimal number between 1 and 255 represents each binary octet (for a total of 256 possibilities) • The binary system is the way that computers interpret IP addresses • In this system every piece of information is represented by 1s and 0s and each 1 or 0 constitutes a bit

  32. TCP/IP (continued) • Subnet Mask • A special 32-bit number that, when combined with a device’s IP address, informs the rest of the network about the segment or network to which the device is attached • A more common term for subnet mask is net mask, and sometimes simply mask • Subnetting is a process of subdividing a single class of network into multiple, smaller logical networks, or segments

  33. TCP/IP (continued) • Assigning IP Addresses • Every node on a network must have a unique IP address • If you add a node to a network and its IP address is already in use by another node on the same subnet, an error message will be generated on the new client

  34. TCP/IP (continued) • A manually assigned IP address is called a static IP address • Most network administrators rely on a network service to automatically assign them

  35. TCP/IP (continued) • Two methods of automatic IP addressing: BOOTP and DHCP • Bootstrap Protocol (BOOTP), an Application layer protocol, uses a central list of IP addresses and their associated devices’ MAC addresses to assign IP addresses to clients dynamically

  36. TCP/IP (continued) • An IP address that is assigned to a device upon request and is changeable is known as a dynamic IP address • BOOTP has the potential to issue additional information, such as the client’s subnet mask and requires administrators to enter every IP and MAC address manually into the BOOTP table

  37. TCP/IP (continued) • Dynamic Host Configuration Protocol (DHCP) • An automated means of assigning a unique IP address to every device on a network • DHCP does not require a table of IP and MAC addresses on the server • DHCP does require configuration of DHCP service on a DHCP server

  38. TCP/IP (continued) • Terminating a DHCP Lease • A DHCP lease may expire based on the period established for it in the server configuration or it may be manually terminated • Sockets and Ports • Every process on a machine is assigned a port number and the process’s port number plus its host machine’s IP address equals the process’s socket • The use of port numbers simplifies TCP/IP communications and ensures that data are transmitted to the correct application

  39. TCP/IP (continued) • Port numbers range from 0 to 65,539 and are divided by IANA into three types: Well Known Ports, Registered Ports, and Dynamic and/or Private Ports • Well Known Ports are in the range of 0 to 1023 and are assigned to processes that only the operating system or an Administrator of the system can access

  40. TCP/IP (continued) • Registered Ports are in the range of 1024 to 49151. These ports are accessible to network users and processes that do not have special administrative privileges • Dynamic and/or Private Ports are those from 49152 through 65535 and are open for use without restriction

  41. TCP/IP (continued) • Addressing in IPv6 • Known as IP next generation, or Ipng is slated to replace the current IP protocol, IPv4 • IPv6 offers several advantages over IPv4, including a more efficient header, better security, better prioritization allowances, and automatic IP address configuration • The most valuable advantage IPv6 offers is its promise of billions and billions of additional IP addresses through its new addressing scheme

  42. TCP/IP (continued) • Addressing in IPv6 (continued) • The most notable difference between IP addresses in IPv4 and IPv6 is their size • IPv4 addresses are composed of 32 bits, IPv6 are eight 16-bit fields and total 128 bits • IPv4 address contains binary numbers separated by a period, each field in an IPv6 address contains hexadecimal numbers separated by a colon

  43. TCP/IP (continued) • Host Names and Domain Name System (DNS) every device on the Internet is technically known as a host and every host can take a host name

  44. TCP/IP (continued) • Domain Names every host is a member of a domain, or a group of computers that belong to the same organization and have part of their IP addresses in common • A domain name is associated with a company or other type of organization • Local host name plus its domain name is a fully qualified host name

  45. TCP/IP (continued) • A domain name is represented by a series of character strings, called labels, separated by dots • Each label represents a level in the domain naming hierarchy • In the domain name, www.novell.com, “com” is the top-level domain (TLD), “novell” is the second-level domain, and “www” is the third-level domain • Domain names must be registered with an Internet naming authority that works on behalf of ICANN

  46. TCP/IP (continued) • Domain Name System (DNS) • A hierarchical way of associating domain names with IP addresses • “DNS” refers to both the Application-layer service and the organized system of computers and databases

  47. TCP/IP (continued) • The DNS service does not rely on one file or even one server, but rather on many computers across the globe • These computers are related in a hierarchical manner, with thirteen computers, known as root servers, acting as the ultimate authorities

  48. TCP/IP (continued) • DNS service is divided into three components: resolvers, name servers, and name space • Resolvers are any hosts on the Internet that need to look up domain name information

  49. TCP/IP (continued) • Name servers (or DNS servers) are servers that contain databases of associated names and IP addresses and provide this information to resolvers on request • The term name space refers to the database of Internet IP addresses and their associated names

  50. TCP/IP (continued) • Resource record is a single record that describes one piece of information in the DNS database • An address resource record is a type of resource record that maps the IP address of an Internet-connected device to its domain name • Approximately 20 types of resource records are currently used

More Related