Chapter04 -- network protocols

  • 1,146 views
Uploaded on

Basic Networking Guide

Basic Networking Guide

More in: Technology , Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,146
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
56
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Chapter 4: Network Protocols Network+ Guide to Networks
  • 2. Objectives
    • Identify the characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk
    • Understand how key network protocols correlate to layers of the OSI Model
    • Identify the core protocols of the TCP/IP suite and describe their functions
  • 3. Objectives (continued)
    • Understand the most popular protocol addressing schemes
    • Describe the purpose and implementation of the domain name system
    • Install protocols on Windows XP clients
  • 4. Introduction To Protocols
    • Protocol is a rule that governs how networks communicate
      • Define the standards for communication between network devices
      • Vary according to their speed, transmission efficiency, utilization of resources, ease of setup, compatibility, and ability to travel between different LANs
  • 5. Introduction To Protocols
      • Networks running more than one protocol are called multiprotocol networks
  • 6. Transmission Control Protocol /Internet Protocol (TCP/IP)
      • TCP/IP is not simply one protocol, but rather a suite of specialized protocols—including TCP, IP, UDP, ARP, and many others—called sub protocols
      • Extremely popular because of low cost
  • 7. TCP/IP (continued)
      • Has ability to communicate between a multitude of dissimilar platforms
      • The core protocols are free and their code is available for anyone to read or modify
      • Its routable, because they carry Network layer addressing information that can be interpreted by a router
  • 8.
      • Has flexibility because it can run on virtually any combination of network operating systems or network media
    • TCP/IP Compared to the OSI Model
      • The TCP/IP suite of protocols can be divided into four layers that roughly correspond to the seven layers of the OSI Model
    TCP/IP (continued)
  • 9.
    • TCP/IP Compared to the OSI Model (continued)
      • Application layer
        • Applications gain access to the network through this layer, via protocols
      • Transport layer
        • Holds the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), which provide flow control, error checking, and sequencing
    TCP/IP (continued)
  • 10.
    • TCP/IP Compared to the OSI Model (continued)
      • Internet layer
        • Holds the Internet Protocol (IP), Internet Control Message Protocol (ICMP), and Address Resolution Protocol (ARP).These protocols handle message routing, error reporting, delivery confirmation, and logical addressing
      • Network Interface Layer
        • This layer handles the formatting of data and transmission to the network wire
    TCP/IP (continued)
  • 11.
    • The TCP/IP Core Protocols
      • Certain sub protocols of the TCP/IP suite
      • Operate in the Transport or Network layers of the OSI Model
    TCP/IP (continued)
  • 12.
    • Transmission Control Protocol (TCP)
      • Operates in the Transport layer of both the OSI and the TCP/IP Models and provides reliable data delivery services
      • TCP is a connection-oriented sub protocol
    TCP/IP (continued)
  • 13.
    • Fields belonging to a TCP segment are described in the following list:
      • Source port
      • Destination port
      • Sequence number
    TCP/IP (continued)
  • 14.
      • Acknowledgment number (ACK)
      • TCP header length
      • Reserved
      • Flags
      • Sliding-window size (or window)
    TCP/IP (continued)
  • 15.
      • Checksum - Allows the receiving node to determine whether the TCP segment became corrupted during transmission
      • Urgent pointer - Indicate a location in the data field
      • Options - Used to specify special options
    TCP/IP (continued)
  • 16.
      • Padding - Contains filler information to ensure that the size of the TCP header is a multiple of 32 bits
      • Data - Contains data originally sent by the source node and the size of the Data field depends on how much data needs to be transmitted
    TCP/IP (continued)
  • 17.
    • User Datagram Protocol (UDP)
      • A connectionless transport service
      • UDP offers no assurance that packets will be received in the correct sequence
    TCP/IP (continued)
  • 18.
    • User Datagram Protocol (UDP)
      • Provides no error checking or sequencing
      • More efficient for carrying messages that fit within one data packet
    TCP/IP (continued)
  • 19.
    • Internet Protocol (IP)
      • Provides information about how and where data should be delivered, including the data’s source and destination addresses
      • IP is the sub protocol that enables TCP/IP to internetwork
    TCP/IP (continued)
  • 20.
    • Internet Protocol (IP)
      • IP datagram acts as an envelope for data and contains information necessary for routers to transfer data between different LAN segments
      • IP is an unreliable, connectionless protocol, which means that it does not guarantee delivery of data
    TCP/IP (continued)
  • 21.
    • Internet Control Message Protocol (ICMP)
      • An Internet layer protocol that reports on the success or failure of data delivery
      • ICMP announcements provide critical information for troubleshooting network problems
    TCP/IP (continued)
  • 22.
    • Address Resolution Protocol (ARP)
      • An Internet layer protocol that obtains the MAC (physical) address of a host, or node, then creates a database that maps the MAC address to the host’s IP (logical) address
    TCP/IP (continued)
  • 23.
    • Address Resolution Protocol (ARP) table
      • Dynamic ARP table entries are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table
      • Static ARP table entries are those that someone has entered manually using the ARP utility
      • ARP can be a valuable troubleshooting tool
    TCP/IP (continued)
  • 24.
    • Reverse Address Resolution Protocol (RARP)
      • Allow the client to send a broadcast message with its MAC address and receive an IP address in reply
      • RARP was originally developed as a means for diskless workstations
    TCP/IP (continued)
  • 25.
    • Addressing in TCP/IP
      • Two kinds of addresses: Logical or physical
    TCP/IP (continued)
  • 26.
      • Logical (or Network layer) can be manually or automatically assigned and must follow rules set by the protocol standards
      • Physical (or MAC, or hardware) addresses are assigned to a device’s network interface card at the factory by its manufacturer
      • Addresses on TCP/IP-based networks are often called IP addresses
    TCP/IP (continued)
  • 27.
      • IP addresses are assigned and used according to very specific parameters
        • Each IP address is a unique 32-bit number, divided into four octets, or sets of 8-bits, that are separated by periods
        • An IP address contains two types of information: network and host
        • From the first octet you can determine the network class
        • Three types of network classes are used on modern LANs: Class A, Class B, and Class C
    TCP/IP (continued)
  • 28.
      • IP Addresses specific parameters continued
        • Class D and Class E addresses do exist, but are rarely used
        • Class D addresses are reserved for a special type of transmission called multicasting
          • Multicasting allows one device to send data to a specific group of devices
    TCP/IP (continued)
  • 29.
      • IP Addresses specific parameters continued
        • Some IP addresses are reserved for special functions, like broadcasts, and cannot be assigned to machines or devices
        • 127 is not a valid first octet for any IP address
        • The range of addresses beginning with 127 is reserved for a device communicating with itself, or performing loopback communication
    TCP/IP (continued)
  • 30.
    • The command used to view IP information on a Windows XP workstation is ipconfig
    TCP/IP (continued)
  • 31.
    • Binary and Dotted Decimal Notation
      • A decimal number between 0 and 255 represents each binary octet (for a total of 256 possibilities)
      • The binary system is the way that computers interpret IP addresses
      • In this system every piece of information is represented by 1s and 0s and each 1 or 0 constitutes a bit
    TCP/IP (continued)
  • 32.
    • Subnet Mask
      • A special 32-bit number that, when combined with a device’s IP address, informs the rest of the network about the segment or network to which the device is attached
      • A more common term for subnet mask is net mask, and sometimes simply mask
      • Subnetting is a process of subdividing a single class of network into multiple, smaller logical networks, or segments
    TCP/IP (continued)
  • 33.
    • Assigning IP Addresses
      • Every node on a network must have a unique IP address
      • If you add a node to a network and its IP address is already in use by another node on the same subnet, an error message will be generated on the new client
    TCP/IP (continued)
  • 34.
      • A manually assigned IP address is called a static IP address
      • Most network administrators rely on a network service to automatically assign them
    TCP/IP (continued)
  • 35.
    • Two methods of automatic IP addressing: BOOTP and DHCP
      • Bootstrap Protocol (BOOTP), an Application layer protocol, uses a central list of IP addresses and their associated devices’ MAC addresses to assign IP addresses to clients dynamically
    TCP/IP (continued)
  • 36.
        • An IP address that is assigned to a device upon request and is changeable is known as a dynamic IP address
        • BOOTP has the potential to issue additional information, such as the client’s subnet mask and requires administrators to enter every IP and MAC address manually into the BOOTP table
    TCP/IP (continued)
  • 37.
      • Dynamic Host Configuration Protocol (DHCP)
        • An automated means of assigning a unique IP address to every device on a network
        • DHCP does not require a table of IP and MAC addresses on the server
        • DHCP does require configuration of DHCP service on a DHCP server
    TCP/IP (continued)
  • 38.
    • Terminating a DHCP Lease
      • A DHCP lease may expire based on the period established for it in the server configuration or it may be manually terminated
    • Sockets and Ports
      • Every process on a machine is assigned a port number and the process’s port number plus its host machine’s IP address equals the process’s socket
      • The use of port numbers simplifies TCP/IP communications and ensures that data are transmitted to the correct application
    TCP/IP (continued)
  • 39.
      • Port numbers range from 0 to 65,539 and are divided by IANA into three types: Well Known Ports, Registered Ports, and Dynamic and/or Private Ports
      • Well Known Ports are in the range of 0 to 1023 and are assigned to processes that only the operating system or an Administrator of the system can access
    TCP/IP (continued)
  • 40.
      • Registered Ports are in the range of 1024 to 49151. These ports are accessible to network users and processes that do not have special administrative privileges
      • Dynamic and/or Private Ports are those from 49152 through 65535 and are open for use without restriction
    TCP/IP (continued)
  • 41.
    • Addressing in IPv6
      • Known as IP next generation, or Ipng is slated to replace the current IP protocol, IPv4
      • IPv6 offers several advantages over IPv4, including a more efficient header, better security, better prioritization allowances, and automatic IP address configuration
      • The most valuable advantage IPv6 offers is its promise of billions and billions of additional IP addresses through its new addressing scheme
    TCP/IP (continued)
  • 42.
    • Addressing in IPv6 (continued)
      • The most notable difference between IP addresses in IPv4 and IPv6 is their size
        • IPv4 addresses are composed of 32 bits, IPv6 are eight 16-bit fields and total 128 bits
        • IPv4 address contains binary numbers separated by a period, each field in an IPv6 address contains hexadecimal numbers separated by a colon
    TCP/IP (continued)
  • 43.
    • Host Names and Domain Name System (DNS) every device on the Internet is technically known as a host and every host can take a host name
    TCP/IP (continued)
  • 44.
    • Domain Names every host is a member of a domain, or a group of computers that belong to the same organization and have part of their IP addresses in common
      • A domain name is associated with a company or other type of organization
      • Local host name plus its domain name is a fully qualified host name
    TCP/IP (continued)
  • 45.
      • A domain name is represented by a series of character strings, called labels, separated by dots
        • Each label represents a level in the domain naming hierarchy
          • In the domain name, www.novell.com, “com” is the top-level domain (TLD), “novell” is the second-level domain, and “www” is the third-level domain
        • Domain names must be registered with an Internet naming authority that works on behalf of ICANN
    TCP/IP (continued)
  • 46.
    • Domain Name System (DNS)
      • A hierarchical way of associating domain names with IP addresses
      • “ DNS” refers to both the Application-layer service and the organized system of computers and databases
    TCP/IP (continued)
  • 47.
      • The DNS service does not rely on one file or even one server, but rather on many computers across the globe
        • These computers are related in a hierarchical manner, with thirteen computers, known as root servers, acting as the ultimate authorities
    TCP/IP (continued)
  • 48.
      • DNS service is divided into three components: resolvers, name servers, and name space
      • Resolvers are any hosts on the Internet that need to look up domain name information
    TCP/IP (continued)
  • 49.
      • Name servers (or DNS servers) are servers that contain databases of associated names and IP addresses and provide this information to resolvers on request
      • The term name space refers to the database of Internet IP addresses and their associated names
    TCP/IP (continued)
  • 50.
      • Resource record is a single record that describes one piece of information in the DNS database
        • An address resource record is a type of resource record that maps the IP address of an Internet-connected device to its domain name
        • Approximately 20 types of resource records are currently used
    TCP/IP (continued)
  • 51.
    • Some TCP/IP Application Layer Protocols
      • Telnet
        • A terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite
        • Using Telnet, a TCP connection is established and keystrokes on the user’s machine act like keystrokes on the remotely connected machine
        • Telnet is notoriously insecure
    TCP/IP (continued)
  • 52.
    • Some TCP/IP Application Layer Protocols (continued)
      • File Transfer Protocol (FTP)
        • Used to send and receive files via TCP/IP
        • FTP commands will work from your operating system’s command prompt
        • Many FTP hosts accept anonymous logins
    TCP/IP (continued)
  • 53.
      • Trivial File Transfer Protocol (TFTP)
        • Enables file transfers between computers, but it is simpler (or more trivial) than FTP
        • TFTP relies on UDP at the Transport layer
        • TFTP is useful when you need to load data or programs on a diskless workstation
        • TFTP does not require a user to log on to a host
    TCP/IP (continued)
  • 54.
      • Network Time Protocol (NTP)
        • Used to synchronize the clocks of computers on a network
        • NTP depends on UDP for Transport layer services
        • NTP is a protocol that benefits from UDP’s quick, connectionless nature at the Transport layer
        • NTP is time-sensitive and cannot wait for the error checking that TCP would require
    TCP/IP (continued)
  • 55.
      • Packet Internet Groper (PING)
        • A utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network
        • PING uses ICMP services to send echo request and echo reply messages that determine the validity of an IP address
        • By pinging the loopback address, 127.0.0.1, you can determine whether your workstation’s TCP/IP services are running
    TCP/IP (continued)
  • 56.
      • Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is a protocol originally developed by Xerox
      • Modified and adopted by Novell in the1980s for its NetWare network operating system
      • Microsoft’s implementation of IPX/SPX is called NWLink
    IPX/SPX
  • 57.
    • The IPX and SPX Protocols
      • Internetwork Packet Exchange (IPX) operates at the Network layer of the OSI Model and provides logical addressing and internetworking services, similar to IP in the TCP/IP suite
        • IPX is a connectionless service because it does not require a session to be established before it transmits, and it does not guarantee that data will be delivered in sequence or without errors
    IPX/SPX (continued)
  • 58.
      • Sequenced Packet Exchange (SPX) belongs to the Transport layer of the OSI Model
        • A connection-oriented protocol and therefore must verify that a session has been established with the destination node before it will transmit data
    IPX/SPX (continued)
  • 59.
    • Addressing in IPX/SPX
      • IPX/SPX-based networks require that each node on a network be assigned a unique address to avoid communication conflicts
      • IPX is the component of the protocol that handles addressing, addresses on an IPX/SPX network are called IPX addresses
      • IPX addresses contain two parts: the network address and the node address
    IPX/SPX (continued)
  • 60. NetBIOS and NetBEUI
      • NetBIOS (Network Basic Input Output System) is a protocol originally designed for IBM to provide Transport and Session layer services for applications running on small, homogenous networks
      • NetBEUI can support only 254 connections, however, and does not allow for good security
        • Because NetBEUI frames include only Data Link layer (or MAC) addresses and not Network layer addresses, it is not routable
  • 61.
    • Windows Internet Naming Service (WINS) - Provides a means of resolving NetBIOS names to IP addresses
      • A computer’s NetBIOS name and its TCP/IP host name are different entities, though you can have the same name for both
    NetBIOS and NetBEUI (continued)
  • 62.
      • WINS has the same relationship to NetBIOS as DNS has to TCP/IP
      • WINS does not assign names or IP addresses, but merely keeps track of which NetBIOS names are linked to which IP addresses
    NetBIOS and NetBEUI (continued)
  • 63.
      • The protocol suite originally designed to interconnect Macintosh computers
      • An AppleTalk network is separated into logical groups of computers called AppleTalk zones
    Appletalk
  • 64.
      • An AppleTalk node ID is a unique 8-bit or 16-bit number that identifies a computer on an AppleTalk network
      • An AppleTalk network number is a unique 16-bit number that identifies the network to which a node is connected
    Appletalk (continued)
  • 65.
      • Binding is the process of assigning one network component to work with another
      • You can manually bind protocols that are not already associated with a network interface
    Binding Protocols on a Windows XP Workstation
  • 66. Summary
    • Characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk
    • Network protocols correlate to layers of the OSI Model
    • Core protocols of the TCP/IP suite and their functions
  • 67. Summary (continued)
    • The most popular protocol addressing schemes
    • Purpose and implementation of the domain name system
    • Install protocols on Windows XP clients