Your SlideShare is downloading. ×
Chapter04  -- network protocols
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Chapter04 -- network protocols


Published on

Basic Networking Guide

Basic Networking Guide

Published in: Technology, Education

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Chapter 4: Network Protocols Network+ Guide to Networks
  • 2. Objectives
    • Identify the characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk
    • Understand how key network protocols correlate to layers of the OSI Model
    • Identify the core protocols of the TCP/IP suite and describe their functions
  • 3. Objectives (continued)
    • Understand the most popular protocol addressing schemes
    • Describe the purpose and implementation of the domain name system
    • Install protocols on Windows XP clients
  • 4. Introduction To Protocols
    • Protocol is a rule that governs how networks communicate
      • Define the standards for communication between network devices
      • Vary according to their speed, transmission efficiency, utilization of resources, ease of setup, compatibility, and ability to travel between different LANs
  • 5. Introduction To Protocols
      • Networks running more than one protocol are called multiprotocol networks
  • 6. Transmission Control Protocol /Internet Protocol (TCP/IP)
      • TCP/IP is not simply one protocol, but rather a suite of specialized protocols—including TCP, IP, UDP, ARP, and many others—called sub protocols
      • Extremely popular because of low cost
  • 7. TCP/IP (continued)
      • Has ability to communicate between a multitude of dissimilar platforms
      • The core protocols are free and their code is available for anyone to read or modify
      • Its routable, because they carry Network layer addressing information that can be interpreted by a router
  • 8.
      • Has flexibility because it can run on virtually any combination of network operating systems or network media
    • TCP/IP Compared to the OSI Model
      • The TCP/IP suite of protocols can be divided into four layers that roughly correspond to the seven layers of the OSI Model
    TCP/IP (continued)
  • 9.
    • TCP/IP Compared to the OSI Model (continued)
      • Application layer
        • Applications gain access to the network through this layer, via protocols
      • Transport layer
        • Holds the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), which provide flow control, error checking, and sequencing
    TCP/IP (continued)
  • 10.
    • TCP/IP Compared to the OSI Model (continued)
      • Internet layer
        • Holds the Internet Protocol (IP), Internet Control Message Protocol (ICMP), and Address Resolution Protocol (ARP).These protocols handle message routing, error reporting, delivery confirmation, and logical addressing
      • Network Interface Layer
        • This layer handles the formatting of data and transmission to the network wire
    TCP/IP (continued)
  • 11.
    • The TCP/IP Core Protocols
      • Certain sub protocols of the TCP/IP suite
      • Operate in the Transport or Network layers of the OSI Model
    TCP/IP (continued)
  • 12.
    • Transmission Control Protocol (TCP)
      • Operates in the Transport layer of both the OSI and the TCP/IP Models and provides reliable data delivery services
      • TCP is a connection-oriented sub protocol
    TCP/IP (continued)
  • 13.
    • Fields belonging to a TCP segment are described in the following list:
      • Source port
      • Destination port
      • Sequence number
    TCP/IP (continued)
  • 14.
      • Acknowledgment number (ACK)
      • TCP header length
      • Reserved
      • Flags
      • Sliding-window size (or window)
    TCP/IP (continued)
  • 15.
      • Checksum - Allows the receiving node to determine whether the TCP segment became corrupted during transmission
      • Urgent pointer - Indicate a location in the data field
      • Options - Used to specify special options
    TCP/IP (continued)
  • 16.
      • Padding - Contains filler information to ensure that the size of the TCP header is a multiple of 32 bits
      • Data - Contains data originally sent by the source node and the size of the Data field depends on how much data needs to be transmitted
    TCP/IP (continued)
  • 17.
    • User Datagram Protocol (UDP)
      • A connectionless transport service
      • UDP offers no assurance that packets will be received in the correct sequence
    TCP/IP (continued)
  • 18.
    • User Datagram Protocol (UDP)
      • Provides no error checking or sequencing
      • More efficient for carrying messages that fit within one data packet
    TCP/IP (continued)
  • 19.
    • Internet Protocol (IP)
      • Provides information about how and where data should be delivered, including the data’s source and destination addresses
      • IP is the sub protocol that enables TCP/IP to internetwork
    TCP/IP (continued)
  • 20.
    • Internet Protocol (IP)
      • IP datagram acts as an envelope for data and contains information necessary for routers to transfer data between different LAN segments
      • IP is an unreliable, connectionless protocol, which means that it does not guarantee delivery of data
    TCP/IP (continued)
  • 21.
    • Internet Control Message Protocol (ICMP)
      • An Internet layer protocol that reports on the success or failure of data delivery
      • ICMP announcements provide critical information for troubleshooting network problems
    TCP/IP (continued)
  • 22.
    • Address Resolution Protocol (ARP)
      • An Internet layer protocol that obtains the MAC (physical) address of a host, or node, then creates a database that maps the MAC address to the host’s IP (logical) address
    TCP/IP (continued)
  • 23.
    • Address Resolution Protocol (ARP) table
      • Dynamic ARP table entries are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table
      • Static ARP table entries are those that someone has entered manually using the ARP utility
      • ARP can be a valuable troubleshooting tool
    TCP/IP (continued)
  • 24.
    • Reverse Address Resolution Protocol (RARP)
      • Allow the client to send a broadcast message with its MAC address and receive an IP address in reply
      • RARP was originally developed as a means for diskless workstations
    TCP/IP (continued)
  • 25.
    • Addressing in TCP/IP
      • Two kinds of addresses: Logical or physical
    TCP/IP (continued)
  • 26.
      • Logical (or Network layer) can be manually or automatically assigned and must follow rules set by the protocol standards
      • Physical (or MAC, or hardware) addresses are assigned to a device’s network interface card at the factory by its manufacturer
      • Addresses on TCP/IP-based networks are often called IP addresses
    TCP/IP (continued)
  • 27.
      • IP addresses are assigned and used according to very specific parameters
        • Each IP address is a unique 32-bit number, divided into four octets, or sets of 8-bits, that are separated by periods
        • An IP address contains two types of information: network and host
        • From the first octet you can determine the network class
        • Three types of network classes are used on modern LANs: Class A, Class B, and Class C
    TCP/IP (continued)
  • 28.
      • IP Addresses specific parameters continued
        • Class D and Class E addresses do exist, but are rarely used
        • Class D addresses are reserved for a special type of transmission called multicasting
          • Multicasting allows one device to send data to a specific group of devices
    TCP/IP (continued)
  • 29.
      • IP Addresses specific parameters continued
        • Some IP addresses are reserved for special functions, like broadcasts, and cannot be assigned to machines or devices
        • 127 is not a valid first octet for any IP address
        • The range of addresses beginning with 127 is reserved for a device communicating with itself, or performing loopback communication
    TCP/IP (continued)
  • 30.
    • The command used to view IP information on a Windows XP workstation is ipconfig
    TCP/IP (continued)
  • 31.
    • Binary and Dotted Decimal Notation
      • A decimal number between 0 and 255 represents each binary octet (for a total of 256 possibilities)
      • The binary system is the way that computers interpret IP addresses
      • In this system every piece of information is represented by 1s and 0s and each 1 or 0 constitutes a bit
    TCP/IP (continued)
  • 32.
    • Subnet Mask
      • A special 32-bit number that, when combined with a device’s IP address, informs the rest of the network about the segment or network to which the device is attached
      • A more common term for subnet mask is net mask, and sometimes simply mask
      • Subnetting is a process of subdividing a single class of network into multiple, smaller logical networks, or segments
    TCP/IP (continued)
  • 33.
    • Assigning IP Addresses
      • Every node on a network must have a unique IP address
      • If you add a node to a network and its IP address is already in use by another node on the same subnet, an error message will be generated on the new client
    TCP/IP (continued)
  • 34.
      • A manually assigned IP address is called a static IP address
      • Most network administrators rely on a network service to automatically assign them
    TCP/IP (continued)
  • 35.
    • Two methods of automatic IP addressing: BOOTP and DHCP
      • Bootstrap Protocol (BOOTP), an Application layer protocol, uses a central list of IP addresses and their associated devices’ MAC addresses to assign IP addresses to clients dynamically
    TCP/IP (continued)
  • 36.
        • An IP address that is assigned to a device upon request and is changeable is known as a dynamic IP address
        • BOOTP has the potential to issue additional information, such as the client’s subnet mask and requires administrators to enter every IP and MAC address manually into the BOOTP table
    TCP/IP (continued)
  • 37.
      • Dynamic Host Configuration Protocol (DHCP)
        • An automated means of assigning a unique IP address to every device on a network
        • DHCP does not require a table of IP and MAC addresses on the server
        • DHCP does require configuration of DHCP service on a DHCP server
    TCP/IP (continued)
  • 38.
    • Terminating a DHCP Lease
      • A DHCP lease may expire based on the period established for it in the server configuration or it may be manually terminated
    • Sockets and Ports
      • Every process on a machine is assigned a port number and the process’s port number plus its host machine’s IP address equals the process’s socket
      • The use of port numbers simplifies TCP/IP communications and ensures that data are transmitted to the correct application
    TCP/IP (continued)
  • 39.
      • Port numbers range from 0 to 65,539 and are divided by IANA into three types: Well Known Ports, Registered Ports, and Dynamic and/or Private Ports
      • Well Known Ports are in the range of 0 to 1023 and are assigned to processes that only the operating system or an Administrator of the system can access
    TCP/IP (continued)
  • 40.
      • Registered Ports are in the range of 1024 to 49151. These ports are accessible to network users and processes that do not have special administrative privileges
      • Dynamic and/or Private Ports are those from 49152 through 65535 and are open for use without restriction
    TCP/IP (continued)
  • 41.
    • Addressing in IPv6
      • Known as IP next generation, or Ipng is slated to replace the current IP protocol, IPv4
      • IPv6 offers several advantages over IPv4, including a more efficient header, better security, better prioritization allowances, and automatic IP address configuration
      • The most valuable advantage IPv6 offers is its promise of billions and billions of additional IP addresses through its new addressing scheme
    TCP/IP (continued)
  • 42.
    • Addressing in IPv6 (continued)
      • The most notable difference between IP addresses in IPv4 and IPv6 is their size
        • IPv4 addresses are composed of 32 bits, IPv6 are eight 16-bit fields and total 128 bits
        • IPv4 address contains binary numbers separated by a period, each field in an IPv6 address contains hexadecimal numbers separated by a colon
    TCP/IP (continued)
  • 43.
    • Host Names and Domain Name System (DNS) every device on the Internet is technically known as a host and every host can take a host name
    TCP/IP (continued)
  • 44.
    • Domain Names every host is a member of a domain, or a group of computers that belong to the same organization and have part of their IP addresses in common
      • A domain name is associated with a company or other type of organization
      • Local host name plus its domain name is a fully qualified host name
    TCP/IP (continued)
  • 45.
      • A domain name is represented by a series of character strings, called labels, separated by dots
        • Each label represents a level in the domain naming hierarchy
          • In the domain name,, “com” is the top-level domain (TLD), “novell” is the second-level domain, and “www” is the third-level domain
        • Domain names must be registered with an Internet naming authority that works on behalf of ICANN
    TCP/IP (continued)
  • 46.
    • Domain Name System (DNS)
      • A hierarchical way of associating domain names with IP addresses
      • “ DNS” refers to both the Application-layer service and the organized system of computers and databases
    TCP/IP (continued)
  • 47.
      • The DNS service does not rely on one file or even one server, but rather on many computers across the globe
        • These computers are related in a hierarchical manner, with thirteen computers, known as root servers, acting as the ultimate authorities
    TCP/IP (continued)
  • 48.
      • DNS service is divided into three components: resolvers, name servers, and name space
      • Resolvers are any hosts on the Internet that need to look up domain name information
    TCP/IP (continued)
  • 49.
      • Name servers (or DNS servers) are servers that contain databases of associated names and IP addresses and provide this information to resolvers on request
      • The term name space refers to the database of Internet IP addresses and their associated names
    TCP/IP (continued)
  • 50.
      • Resource record is a single record that describes one piece of information in the DNS database
        • An address resource record is a type of resource record that maps the IP address of an Internet-connected device to its domain name
        • Approximately 20 types of resource records are currently used
    TCP/IP (continued)
  • 51.
    • Some TCP/IP Application Layer Protocols
      • Telnet
        • A terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite
        • Using Telnet, a TCP connection is established and keystrokes on the user’s machine act like keystrokes on the remotely connected machine
        • Telnet is notoriously insecure
    TCP/IP (continued)
  • 52.
    • Some TCP/IP Application Layer Protocols (continued)
      • File Transfer Protocol (FTP)
        • Used to send and receive files via TCP/IP
        • FTP commands will work from your operating system’s command prompt
        • Many FTP hosts accept anonymous logins
    TCP/IP (continued)
  • 53.
      • Trivial File Transfer Protocol (TFTP)
        • Enables file transfers between computers, but it is simpler (or more trivial) than FTP
        • TFTP relies on UDP at the Transport layer
        • TFTP is useful when you need to load data or programs on a diskless workstation
        • TFTP does not require a user to log on to a host
    TCP/IP (continued)
  • 54.
      • Network Time Protocol (NTP)
        • Used to synchronize the clocks of computers on a network
        • NTP depends on UDP for Transport layer services
        • NTP is a protocol that benefits from UDP’s quick, connectionless nature at the Transport layer
        • NTP is time-sensitive and cannot wait for the error checking that TCP would require
    TCP/IP (continued)
  • 55.
      • Packet Internet Groper (PING)
        • A utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network
        • PING uses ICMP services to send echo request and echo reply messages that determine the validity of an IP address
        • By pinging the loopback address,, you can determine whether your workstation’s TCP/IP services are running
    TCP/IP (continued)
  • 56.
      • Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is a protocol originally developed by Xerox
      • Modified and adopted by Novell in the1980s for its NetWare network operating system
      • Microsoft’s implementation of IPX/SPX is called NWLink
  • 57.
    • The IPX and SPX Protocols
      • Internetwork Packet Exchange (IPX) operates at the Network layer of the OSI Model and provides logical addressing and internetworking services, similar to IP in the TCP/IP suite
        • IPX is a connectionless service because it does not require a session to be established before it transmits, and it does not guarantee that data will be delivered in sequence or without errors
    IPX/SPX (continued)
  • 58.
      • Sequenced Packet Exchange (SPX) belongs to the Transport layer of the OSI Model
        • A connection-oriented protocol and therefore must verify that a session has been established with the destination node before it will transmit data
    IPX/SPX (continued)
  • 59.
    • Addressing in IPX/SPX
      • IPX/SPX-based networks require that each node on a network be assigned a unique address to avoid communication conflicts
      • IPX is the component of the protocol that handles addressing, addresses on an IPX/SPX network are called IPX addresses
      • IPX addresses contain two parts: the network address and the node address
    IPX/SPX (continued)
  • 60. NetBIOS and NetBEUI
      • NetBIOS (Network Basic Input Output System) is a protocol originally designed for IBM to provide Transport and Session layer services for applications running on small, homogenous networks
      • NetBEUI can support only 254 connections, however, and does not allow for good security
        • Because NetBEUI frames include only Data Link layer (or MAC) addresses and not Network layer addresses, it is not routable
  • 61.
    • Windows Internet Naming Service (WINS) - Provides a means of resolving NetBIOS names to IP addresses
      • A computer’s NetBIOS name and its TCP/IP host name are different entities, though you can have the same name for both
    NetBIOS and NetBEUI (continued)
  • 62.
      • WINS has the same relationship to NetBIOS as DNS has to TCP/IP
      • WINS does not assign names or IP addresses, but merely keeps track of which NetBIOS names are linked to which IP addresses
    NetBIOS and NetBEUI (continued)
  • 63.
      • The protocol suite originally designed to interconnect Macintosh computers
      • An AppleTalk network is separated into logical groups of computers called AppleTalk zones
  • 64.
      • An AppleTalk node ID is a unique 8-bit or 16-bit number that identifies a computer on an AppleTalk network
      • An AppleTalk network number is a unique 16-bit number that identifies the network to which a node is connected
    Appletalk (continued)
  • 65.
      • Binding is the process of assigning one network component to work with another
      • You can manually bind protocols that are not already associated with a network interface
    Binding Protocols on a Windows XP Workstation
  • 66. Summary
    • Characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk
    • Network protocols correlate to layers of the OSI Model
    • Core protocols of the TCP/IP suite and their functions
  • 67. Summary (continued)
    • The most popular protocol addressing schemes
    • Purpose and implementation of the domain name system
    • Install protocols on Windows XP clients