SlideShare a Scribd company logo
1 of 46
www.huawei.com
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Basic Network Concepts
Page 2
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
 To understand security technologies, you first need to learn about basic
network concepts, such as basic communication principles, network
components, and common network protocols. With knowledge of these
basic concepts, you can better understand network security threats and
deploy security defense policies.
Page 3
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
 Upon completion of this course, you will be able to:
 Describe the working principles of TCP/IP protocols.
 Describe the working principles of common protocols.
 Describe possible security threats to common protocols.
Page 4
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. TCP/IP Architecture
2. Common Network Protocols
Page 5
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Architecture of a Typical Campus Network
Core layer
Aggregation
layer
Access layer
Egress zone
…
Page 6
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
OSI Model
 Objectives
 Design principles
 Advantages
Page 7
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
7 Layers of the OSI Model
Provides communications
between applications.
Processes data formats and
encrypts data.
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data Link layer
Physical layer 1
2
3
4
5
6
7
Establishes, maintains, and
manages sessions.
Establishes E2E connections for
hosts.
Performs addressing and
routing.
Provides media access and
link management.
Transmits bit streams.
APDU
PPDU
SPDU
Segment
Packet
Frame
Bit
Top
three
layers
Bottom
four
layers
Page 8
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Peer Layer Communications
 Each layer uses the services provided by the lower layer to communicate with the
peer layer.
Host A Host B
APDU
PPDU
SPDU
Segment
Packet
Frame
Bit
Application
layer
Presentation
layer
Session layer
Transport
layer
Network layer
Data Link
layer
Physical layer
Application
layer
Presentation
layer
Session layer
Transport
layer
Network layer
Data Link
layer
Physical layer
Page 10
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Mapping Between TCP/IP and OSI
 The TCP/IP protocol stack has a simple hierarchical design and a clear mapping relationship
with the OSI model.
OSI TCP/IP
Physical layer
Data Link layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer
Network access layer
Internet layer
Transport layer
Application layer
Page 11
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Functions of Each Layer of the TCP/IP
Provides network interfaces for
applications.
Establishes E2E connections for
hosts.
Performs addressing and
routing.
Performs physical media
access.
HTTP, Telnet, FTP, TFTP, and DNS
Network
access layer
Internet layer
Transport layer
Application
layer
Ethernet, 802.3, PPP, HDLC, and FR
TCP/UDP
IP
ICMP & IGMP
ARP & RARP
Page 13
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Encapsulation and Decapsulation Processes of
the TCP/IP
User data
App
TCP
IP
Eth
1010101101010100101010001110
Encapsulation Decapsulation
Sender Recipient
IP
User data
User data
User data
App
App
App
TCP
TCP
Network access
layer
Internet layer
Transport
layer
Application
layer
Network access
layer
Internet
layer
Transport
layer
Application
layer
Page 15
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Quintuple
SNMP
FTP
HTTP Telnet SMTP DNS TFTP
TCP UDP
IP packet
Quintuple
80
20/21 23 25 53 69 161
 Source IP address + destination IP address + protocol +
source port + destination port
Page 16
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. TCP/IP Architecture
2. Common Network Protocols
 Network Layer Protocols
 Transport Layer Protocols
 Application Layer Protocols
Page 17
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Common Network Protocols
ICMP
OSPF/RIP
NMS NetStream
ARP
SNMP
PC 1 PC 2
Page 18
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Overview of ARP
 Before sending a data packet to Host C, Host A needs to obtain the MAC
address of Host C.
10.0.0.1/24
00-01-02-03-04-AA
10.0.0.3/24
00-01-02-03-04-CC
192.168.1.2/24
00-01-02-03-04-BB
Host A Host C
Page 19
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ARP Request
Host A
192.168.1.2/24
00-01-02-03-04-BB
Host C
Host B
10.0.0.3/24
00-01-02-03-04-CC
10.0.0.1/24
00-01-02-03-04-AA
Source MAC address:
00-01-02-03-04-AA
Destination MAC address:
FF-FF-FF-FF-FF-FF
ARP
Destination IP address: 10.0.0.3
Source IP address: 10.0.0.1
Destination MAC address: 00-00-00-00-00-00
Source MAC address: 00-01-02-03-04-AA
Operation type: Request
ETH_II FCS
Page 20
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ARP Reply (1)
Host A
192.168.1.2/24
00-01-02-03-04-BB
Host C
Host B
10.0.0.3/24
00-01-02-03-04-CC
10.0.0.1/24
00-01-02-03-04-AA
Host C>arp -a
Internet address Physical address Type
10.0.0.1 00-01-02-03-04-AA Dynamic
Page 21
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ARP Reply (2)
Host B
Destination IP address: 10.0.0.1
Source IP address: 10.0.0.3
Source MAC address: 00-01-02-03-04-AA
Source MAC address: 00-01-02-03-04-CC
Operation type: Reply
Host A
192.168.1.2/24
00-01-02-03-04-BB
Host C
10.0.0.3/24
00-01-02-03-04-CC
10.0.0.1/24
00-01-02-03-04-AA
Source MAC address:
00-01-02-03-04-CC
Destination MAC address:
00-01-02-03-04-AA
ARP
ETH_II FCS
Page 22
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Gratuitous ARP
 Gratuitous ARP can be used to detect whether IP addresses conflict.
Host A
10.0.0.1/24
00-01-02-03-04-AA
Destination IP address: 10.0.0.1
Source IP address: 10.0.0.1
Destination MAC address: 00-00-00-00-00-00
Source MAC address: 00-01-02-03-04-AA
Source MAC address:
00-01-02-03-04-AA
Destination MAC address:
FF-FF-FF-FF-FF-FF
ARP
ETH_II FCS
Page 23
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to ICMP
 ICMP is used to transmit error, control, and query messages.
Message
Return Message
Host A
Page 24
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ICMP Application: Ping (1)
Router A Router B
192.168.1.1/24 192.168.1.2/24
<Router A>ping ?
STRING<1-255> IP address or hostname of a remote system
-a Select source IP address, the default is the IP address of the
output interface
-c Specify the number of echo requests to be sent, the default is
5
-d Specify the SO_DEBUG option on the socket being used
-f Set Don't Fragment flag in packet (IPv4-only)
-h Specify TTL value for echo requests to be sent, the default is
255
-i Select the interface sending packets
…
Page 25
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ICMP Application: Ping (2)
[Router A]ping 192.168.1.2
PING 192.168.1.2 : 56 data bytes, press CTRL_C to break
Reply from 192.168.1.2 : bytes=56 Sequence=1 ttl=255 time=340 ms
Reply from 192.168.1.2 : bytes=56 Sequence=2 ttl=255 time=10 ms
Reply from 192.168.1.2 : bytes=56 Sequence=3 ttl=255 time=30 ms
Reply from 192.168.1.2 : bytes=56 Sequence=4 ttl=255 time=30 ms
Reply from 192.168.1.2 : bytes=56 Sequence=5 ttl=255 time=30 ms
--- 192.168.1.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 10/88/340 ms
Page 26
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ICMP Application: Tracert (1)
Host A Host B
Router A Router C
Router B
10.0.0.2/24
20.0.0.2/24
30.0.0.2/24
<Router A>tracert ?
STRING<1-255> IP address or hostname of a remote system
-a Set source IP address, the default is the IP address of the
output interface
-f First time to live, the default is 1
-m Max time to live, the default is 30
-name Display the host name of the router on each hop
-p Destination UDP port number, the default is 33434
-q Number of probe packets, the default is 3
-s Specify the length of the packets to be sent. The default
length is 12 bytes
…
Page 27
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
ICMP Application: Tracert (2)
 The Tracert command displays each hop that packets pass through during
network transmission.
<Router A>tracert 30.0.0.2
Tracert to 30.0.0.2(30.0.0.2), max hops:30, packet length:40, press CTRL_C to
break
1 10.0.0.2 130 ms 50 ms 40 ms
2 20.0.0.2 80 ms 60 ms 80 ms
3 30.0.0.2 80 ms 60 ms 70 ms
Host A Host B
Router A Router C
Router B
10.0.0.2/24
20.0.0.2/24
30.0.0.2/24
Page 28
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Routing Protocol Overview
 Routing is the most basic element in a data communications network. It is
the process of selecting paths on a network through which packets are
sent from a source to a destination.
Routing protocols
PC 1 PC 2
Page 30
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to OSPF
 No loop
 Fast convergence
 Good scalability
 Supporting authentication
Site B
Site A
Site C
OSPF
RTB
RTA
RTC
OSPF
OSPF
Page 31
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to SNMP
 SNMP is used to transmit management information between the network management
system (NMS) and managed devices.
NMS
SNMP
Page 32
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
SNMP Architecture
 SNMP includes the NMS, agent, and MIB.
 An agent is a process performed on the managed devices.
 A MIB is a database that contains variables maintained by managed devices.
Agent
MIB
SNMP
Execute
Notify
Managed device
NMS
Page 33
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise Network O&M
 Understand the traffic trend of all branches
and identify the devices and branches that
need expansion.
 Analyze the distribution of branch traffic
identify the value points for capacity
expansion.
 Rank changes in branch traffic and allocate
existing network resources accordingly.
HQ
Branch 1
Branch 2
IT engineer: Branch 1 has exhausted its
bandwidth on the XYZ port. We need to
purchase a new device to expand the
network capacity.
Supervisor: Are you sure we need to
expand the capacity? Is the network fully
optimized or is the service application
developing rapidly?
IT engineer: I have detailed network
application development reports for
each branch ...
Page 34
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
NTA Concept and Functions
 Basic concept
 The eSight Network Traffic Analyzer (NTA) is a software-only solution. No hardware probe is
required, and no additional investment is needed. The NetFlow, NetStream, and sFlow protocols are
used to collect and analyze common IP packets, provide a customer analysis report, and monitor
network-wide traffic in real time. This is a powerful tool for enterprise O&M management.
 Functions
 The eSight NTA provides a convenient way to monitor and analyze networks. By using the IP
network traffic information provided by network devices that support NetFlow, NetStream, and
sFlow, the eSight NTA analyzes network-wide traffic, provides traffic analysis reports, and displays
traffic analysis results in various charts. This helps users learn about network-wide traffic, including
the traffic distribution, and detect abnormal network traffic.
Page 35
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
NetStream Overview
 NetStream is a Huawei-patented technology used to collect and distribute statistics about network
traffic. The NDE sends the obtained statistics to the NSC for further processing, and sends the statistics
to the NDA for analysis. The results of the analysis provide a basis for network accounting and planning.
NDE
NDE
NSC
NSC
NDA
NetStream stream
Page 36
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. TCP/IP Architecture
2. Common Network Protocols
 Network Layer Protocols
 Transport Layer Protocols
 Application Layer Protocols
Page 37
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Establishing TCP Connections
 Three-way handshake
Client Server
Page 38
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Disconnecting TCP Connections
 4-way handshake
Client Server
Page 39
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. TCP/IP Architecture
2. Common Network Protocols
 Network Layer Protocols
 Transport Layer Protocols
 Application Layer Protocols
Page 40
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Common Application Layer Protocols
FTP server
Mail server
Web server
DNS server
PC
Page 41
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
How DNS Works
 Domain name resolution is performed by a dedicated domain name system (DNS). The DNS involves the following
types of servers:
 Root server
 Top-level domain name server
 Recursive server
 Cache server
Client Cache server
I'd like to visit www.huawei.com.
The IP address of www.huawei.com. is
Z.Z.Z.Z.
I don't know
about this. I
have to ask the
experts.
Root server
Top-level domain
name server
Recursive server

What is the IP address corresponding to
www.huawei.com?
The IP address of the .huawei.com DNS
server is Y.Y.Y.Y.


IP:X.X.X.X
IP:Y.Y.Y.Y
Client Cache server
I'd like to visit www.huawei.com again.
The IP address of www.huawei.com. is
Z.Z.Z.Z.
I remember it
this time.
First access
Second access
Page 43
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
How FTP Works
 FTP provides an effective way to upload and download files between a server and a client.
 When used to transmit data, FTP establishes a control connection and a data connection between the
server and the client..
User User interface
Process control
Data transmission
process
File system
Process control
Data transmission
process
File system
Client Server
Control connection
Data connection
Page 44
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
FTP Transmission Mode (1)
 FTP supports two modes: active mode and passive mode. In active mode, which is used by
default, the client sets up the control connection and the server sets up the data connection.
In passive mode, the client sets up both connections. Users can switch the mode through
commands.
 FTP connection setup in active mode:
Temporary port
Temporary port
Port 21
Port 20
Control connection
Data connection
FTP Client FTP Server
Page 45
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
FTP Transmission Mode (2)
 FTP connection setup in passive mode:
Temporary port
Temporary port
Port 21
Temporary port
Control connection
Data connection
FTP Client FTP Server
Page 46
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
HTTP/HTTPS: Basic Components of a Web
Application
 The web is built on a client-server architecture and relies on three essential technologies:
 Using Hypertext Markup Language (HTML), used to describe a file
 Using Uniform Resource Locator (URL), used to specify the file location
 Using Hypertext Transfer Protocol (HTTP), used for client-server communication
Server
Client
Access URL:
www.huawei.com
HTTP/HTTPS
HTML file
The URL specifies the server file.
Displays on the client.
Page 47
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
How HTTP Works
 HTTP is a stateless protocol that uses a request-response method for communication.
 HTTP has two types of packets:
 Request packet: sent from the client to the server.
 Response packet: returned from the server to the client.
①
②
③
④
⑤
⑥
Hi.
What can I do for you?
I need the XXX file.
GET /http://class/xxxx HTTP/1.1
Do you have a key?
Yes, &……%@ (#
OK. This is the file you want.
HTTP/1.1 200 OK
Page 48
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
SMTP, POP3, IMAP: How Mail Is Sent and
Received
 SMTP defines how PCs send mail to an SMTP server and how mail is transferred between SMTP servers.
 Post Office Protocol 3 (POP3) and Internet Mail Access Protocol (IMAP) specify how PCs manage and download mail
on the mail server through client software.
 SMTP and POP3 (or IMAP) are deployed on the mail server by an administrator, and mail client software (such as
Microsoft Outlook or Foxmail) is installed on a user's PC.
Page 49
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. Which of the following is not in the TCP/IP model?
A. Data link layer
B. Transport layer
C. Session layer
D. Application layer
2. Which of the following packets is the first packet of the TCP three-way
handshake?
A. SYN+ACK
B. SYN
C. ACK
D. FIN
Page 50
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Summary
 TCP/IP Architecture
 Common Network Protocols
Page 51
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com

More Related Content

What's hot

Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationasadkhan1327
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)rahuldaredia21
 
3G presentation.
3G presentation.3G presentation.
3G presentation.Bhima Rai
 
02 umts network architecturenew
02 umts network architecturenew02 umts network architecturenew
02 umts network architecturenewsivakumar D
 
Evolution Of Telecommunication
Evolution Of TelecommunicationEvolution Of Telecommunication
Evolution Of TelecommunicationRohan Attravanam
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lanMohd Arif
 
Fiberhome Smart ODN Solution
Fiberhome Smart ODN SolutionFiberhome Smart ODN Solution
Fiberhome Smart ODN SolutionJethrow Hwayerera
 
Fiber optic communications
Fiber optic communicationsFiber optic communications
Fiber optic communicationsDr.YNM
 
Introduction for internet connectivity (IoT)
 Introduction for internet connectivity (IoT) Introduction for internet connectivity (IoT)
Introduction for internet connectivity (IoT)FabMinds
 
optical space division multiplexing
optical space division multiplexingoptical space division multiplexing
optical space division multiplexingmohammedalimahdi
 
9 antenna system connection guide (for indonesia's sinar mas) r1.0 ch
9 antenna system connection guide (for indonesia's sinar mas) r1.0 ch9 antenna system connection guide (for indonesia's sinar mas) r1.0 ch
9 antenna system connection guide (for indonesia's sinar mas) r1.0 chArifiyanto Arifiyanto
 

What's hot (20)

Spread spectrum technologies
Spread spectrum technologiesSpread spectrum technologies
Spread spectrum technologies
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communication
 
ieee protocols 802.11
ieee protocols 802.11ieee protocols 802.11
ieee protocols 802.11
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)
 
3G presentation.
3G presentation.3G presentation.
3G presentation.
 
02 umts network architecturenew
02 umts network architecturenew02 umts network architecturenew
02 umts network architecturenew
 
4G technology
4G technology4G technology
4G technology
 
Mobile network structure
Mobile network structure Mobile network structure
Mobile network structure
 
Evolution Of Telecommunication
Evolution Of TelecommunicationEvolution Of Telecommunication
Evolution Of Telecommunication
 
802.11ac
802.11ac802.11ac
802.11ac
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
Fiberhome Smart ODN Solution
Fiberhome Smart ODN SolutionFiberhome Smart ODN Solution
Fiberhome Smart ODN Solution
 
Beamforming
BeamformingBeamforming
Beamforming
 
3G System
3G System3G System
3G System
 
Fiber optic communications
Fiber optic communicationsFiber optic communications
Fiber optic communications
 
long term evolution Lte 4g
 long term evolution Lte 4g  long term evolution Lte 4g
long term evolution Lte 4g
 
Introduction for internet connectivity (IoT)
 Introduction for internet connectivity (IoT) Introduction for internet connectivity (IoT)
Introduction for internet connectivity (IoT)
 
optical space division multiplexing
optical space division multiplexingoptical space division multiplexing
optical space division multiplexing
 
9 antenna system connection guide (for indonesia's sinar mas) r1.0 ch
9 antenna system connection guide (for indonesia's sinar mas) r1.0 ch9 antenna system connection guide (for indonesia's sinar mas) r1.0 ch
9 antenna system connection guide (for indonesia's sinar mas) r1.0 ch
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
 

Similar to 103 Basic network concepts

CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6Irsandi Hasan
 
104 Common network devices
104 Common network devices104 Common network devices
104 Common network devicesSsendiSamuel
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraEmbarcados
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET Journal
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Hamza Malik
 
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...IRJET Journal
 
Chapter 07 - Transport Layer
Chapter 07 - Transport LayerChapter 07 - Transport Layer
Chapter 07 - Transport LayerYaser Rahmati
 
Chapter 7 : Transport layer
Chapter 7 : Transport layerChapter 7 : Transport layer
Chapter 7 : Transport layerteknetir
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerVuz Dở Hơi
 
محمد مشاري
محمد مشاريمحمد مشاري
محمد مشاريmaherrrrz
 
Sinnreich Henry Johnston Alan Pt 2
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2Carl Ford
 
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts ReviewCh02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Reviewphanleson
 
Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Hamza Malik
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.igede tirtanata
 
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SPKrzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SPPROIDEA
 

Similar to 103 Basic network concepts (20)

CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6
 
104 Common network devices
104 Common network devices104 Common network devices
104 Common network devices
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP segura
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
Hacking3e ppt ch02
Hacking3e ppt ch02Hacking3e ppt ch02
Hacking3e ppt ch02
 
Itn instructor ppt_chapter6_network_layer
Itn instructor ppt_chapter6_network_layerItn instructor ppt_chapter6_network_layer
Itn instructor ppt_chapter6_network_layer
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6
 
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
IRJET - Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP...
 
Chapter 07 - Transport Layer
Chapter 07 - Transport LayerChapter 07 - Transport Layer
Chapter 07 - Transport Layer
 
Chapter 7 : Transport layer
Chapter 7 : Transport layerChapter 7 : Transport layer
Chapter 7 : Transport layer
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport Layer
 
محمد مشاري
محمد مشاريمحمد مشاري
محمد مشاري
 
Sinnreich Henry Johnston Alan Pt 2
Sinnreich Henry Johnston Alan   Pt 2Sinnreich Henry Johnston Alan   Pt 2
Sinnreich Henry Johnston Alan Pt 2
 
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts ReviewCh02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Review
 
TCP/IP basics
TCP/IP basicsTCP/IP basics
TCP/IP basics
 
Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.
 
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SPKrzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
 

More from SsendiSamuel

106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trendsSsendiSamuel
 
105 Common information security threats
105 Common information security threats105 Common information security threats
105 Common information security threatsSsendiSamuel
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specificationsSsendiSamuel
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information securitySsendiSamuel
 
Chapter 06: cloud computing trends
Chapter 06: cloud computing trendsChapter 06: cloud computing trends
Chapter 06: cloud computing trendsSsendiSamuel
 
Chapter 05: introduction to virtualization features
Chapter 05: introduction to virtualization featuresChapter 05: introduction to virtualization features
Chapter 05: introduction to virtualization featuresSsendiSamuel
 
Chapter 04: Storage virtualization basics
Chapter 04: Storage virtualization basicsChapter 04: Storage virtualization basics
Chapter 04: Storage virtualization basicsSsendiSamuel
 
Chapter 03: Network basics for cloud computing
Chapter 03: Network basics for cloud computingChapter 03: Network basics for cloud computing
Chapter 03: Network basics for cloud computingSsendiSamuel
 
Chapter 01: A brief introduction to cloud computing
Chapter 01: A brief introduction to cloud computingChapter 01: A brief introduction to cloud computing
Chapter 01: A brief introduction to cloud computingSsendiSamuel
 
Chapter 02: Introduction to compute virtualization
Chapter 02: Introduction to compute virtualizationChapter 02: Introduction to compute virtualization
Chapter 02: Introduction to compute virtualizationSsendiSamuel
 

More from SsendiSamuel (10)

106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
105 Common information security threats
105 Common information security threats105 Common information security threats
105 Common information security threats
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
 
Chapter 06: cloud computing trends
Chapter 06: cloud computing trendsChapter 06: cloud computing trends
Chapter 06: cloud computing trends
 
Chapter 05: introduction to virtualization features
Chapter 05: introduction to virtualization featuresChapter 05: introduction to virtualization features
Chapter 05: introduction to virtualization features
 
Chapter 04: Storage virtualization basics
Chapter 04: Storage virtualization basicsChapter 04: Storage virtualization basics
Chapter 04: Storage virtualization basics
 
Chapter 03: Network basics for cloud computing
Chapter 03: Network basics for cloud computingChapter 03: Network basics for cloud computing
Chapter 03: Network basics for cloud computing
 
Chapter 01: A brief introduction to cloud computing
Chapter 01: A brief introduction to cloud computingChapter 01: A brief introduction to cloud computing
Chapter 01: A brief introduction to cloud computing
 
Chapter 02: Introduction to compute virtualization
Chapter 02: Introduction to compute virtualizationChapter 02: Introduction to compute virtualization
Chapter 02: Introduction to compute virtualization
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

103 Basic network concepts

  • 1. www.huawei.com Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Basic Network Concepts
  • 2. Page 2 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Foreword  To understand security technologies, you first need to learn about basic network concepts, such as basic communication principles, network components, and common network protocols. With knowledge of these basic concepts, you can better understand network security threats and deploy security defense policies.
  • 3. Page 3 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Objectives  Upon completion of this course, you will be able to:  Describe the working principles of TCP/IP protocols.  Describe the working principles of common protocols.  Describe possible security threats to common protocols.
  • 4. Page 4 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. TCP/IP Architecture 2. Common Network Protocols
  • 5. Page 5 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Architecture of a Typical Campus Network Core layer Aggregation layer Access layer Egress zone …
  • 6. Page 6 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. OSI Model  Objectives  Design principles  Advantages
  • 7. Page 7 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. 7 Layers of the OSI Model Provides communications between applications. Processes data formats and encrypts data. Application layer Presentation layer Session layer Transport layer Network layer Data Link layer Physical layer 1 2 3 4 5 6 7 Establishes, maintains, and manages sessions. Establishes E2E connections for hosts. Performs addressing and routing. Provides media access and link management. Transmits bit streams. APDU PPDU SPDU Segment Packet Frame Bit Top three layers Bottom four layers
  • 8. Page 8 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Peer Layer Communications  Each layer uses the services provided by the lower layer to communicate with the peer layer. Host A Host B APDU PPDU SPDU Segment Packet Frame Bit Application layer Presentation layer Session layer Transport layer Network layer Data Link layer Physical layer Application layer Presentation layer Session layer Transport layer Network layer Data Link layer Physical layer
  • 9. Page 10 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Mapping Between TCP/IP and OSI  The TCP/IP protocol stack has a simple hierarchical design and a clear mapping relationship with the OSI model. OSI TCP/IP Physical layer Data Link layer Network layer Transport layer Session layer Presentation layer Application layer Network access layer Internet layer Transport layer Application layer
  • 10. Page 11 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Functions of Each Layer of the TCP/IP Provides network interfaces for applications. Establishes E2E connections for hosts. Performs addressing and routing. Performs physical media access. HTTP, Telnet, FTP, TFTP, and DNS Network access layer Internet layer Transport layer Application layer Ethernet, 802.3, PPP, HDLC, and FR TCP/UDP IP ICMP & IGMP ARP & RARP
  • 11. Page 13 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Encapsulation and Decapsulation Processes of the TCP/IP User data App TCP IP Eth 1010101101010100101010001110 Encapsulation Decapsulation Sender Recipient IP User data User data User data App App App TCP TCP Network access layer Internet layer Transport layer Application layer Network access layer Internet layer Transport layer Application layer
  • 12. Page 15 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Quintuple SNMP FTP HTTP Telnet SMTP DNS TFTP TCP UDP IP packet Quintuple 80 20/21 23 25 53 69 161  Source IP address + destination IP address + protocol + source port + destination port
  • 13. Page 16 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. TCP/IP Architecture 2. Common Network Protocols  Network Layer Protocols  Transport Layer Protocols  Application Layer Protocols
  • 14. Page 17 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Common Network Protocols ICMP OSPF/RIP NMS NetStream ARP SNMP PC 1 PC 2
  • 15. Page 18 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Overview of ARP  Before sending a data packet to Host C, Host A needs to obtain the MAC address of Host C. 10.0.0.1/24 00-01-02-03-04-AA 10.0.0.3/24 00-01-02-03-04-CC 192.168.1.2/24 00-01-02-03-04-BB Host A Host C
  • 16. Page 19 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ARP Request Host A 192.168.1.2/24 00-01-02-03-04-BB Host C Host B 10.0.0.3/24 00-01-02-03-04-CC 10.0.0.1/24 00-01-02-03-04-AA Source MAC address: 00-01-02-03-04-AA Destination MAC address: FF-FF-FF-FF-FF-FF ARP Destination IP address: 10.0.0.3 Source IP address: 10.0.0.1 Destination MAC address: 00-00-00-00-00-00 Source MAC address: 00-01-02-03-04-AA Operation type: Request ETH_II FCS
  • 17. Page 20 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ARP Reply (1) Host A 192.168.1.2/24 00-01-02-03-04-BB Host C Host B 10.0.0.3/24 00-01-02-03-04-CC 10.0.0.1/24 00-01-02-03-04-AA Host C>arp -a Internet address Physical address Type 10.0.0.1 00-01-02-03-04-AA Dynamic
  • 18. Page 21 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ARP Reply (2) Host B Destination IP address: 10.0.0.1 Source IP address: 10.0.0.3 Source MAC address: 00-01-02-03-04-AA Source MAC address: 00-01-02-03-04-CC Operation type: Reply Host A 192.168.1.2/24 00-01-02-03-04-BB Host C 10.0.0.3/24 00-01-02-03-04-CC 10.0.0.1/24 00-01-02-03-04-AA Source MAC address: 00-01-02-03-04-CC Destination MAC address: 00-01-02-03-04-AA ARP ETH_II FCS
  • 19. Page 22 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Gratuitous ARP  Gratuitous ARP can be used to detect whether IP addresses conflict. Host A 10.0.0.1/24 00-01-02-03-04-AA Destination IP address: 10.0.0.1 Source IP address: 10.0.0.1 Destination MAC address: 00-00-00-00-00-00 Source MAC address: 00-01-02-03-04-AA Source MAC address: 00-01-02-03-04-AA Destination MAC address: FF-FF-FF-FF-FF-FF ARP ETH_II FCS
  • 20. Page 23 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Introduction to ICMP  ICMP is used to transmit error, control, and query messages. Message Return Message Host A
  • 21. Page 24 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ICMP Application: Ping (1) Router A Router B 192.168.1.1/24 192.168.1.2/24 <Router A>ping ? STRING<1-255> IP address or hostname of a remote system -a Select source IP address, the default is the IP address of the output interface -c Specify the number of echo requests to be sent, the default is 5 -d Specify the SO_DEBUG option on the socket being used -f Set Don't Fragment flag in packet (IPv4-only) -h Specify TTL value for echo requests to be sent, the default is 255 -i Select the interface sending packets …
  • 22. Page 25 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ICMP Application: Ping (2) [Router A]ping 192.168.1.2 PING 192.168.1.2 : 56 data bytes, press CTRL_C to break Reply from 192.168.1.2 : bytes=56 Sequence=1 ttl=255 time=340 ms Reply from 192.168.1.2 : bytes=56 Sequence=2 ttl=255 time=10 ms Reply from 192.168.1.2 : bytes=56 Sequence=3 ttl=255 time=30 ms Reply from 192.168.1.2 : bytes=56 Sequence=4 ttl=255 time=30 ms Reply from 192.168.1.2 : bytes=56 Sequence=5 ttl=255 time=30 ms --- 192.168.1.2 ping statistics --- 5 packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 10/88/340 ms
  • 23. Page 26 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ICMP Application: Tracert (1) Host A Host B Router A Router C Router B 10.0.0.2/24 20.0.0.2/24 30.0.0.2/24 <Router A>tracert ? STRING<1-255> IP address or hostname of a remote system -a Set source IP address, the default is the IP address of the output interface -f First time to live, the default is 1 -m Max time to live, the default is 30 -name Display the host name of the router on each hop -p Destination UDP port number, the default is 33434 -q Number of probe packets, the default is 3 -s Specify the length of the packets to be sent. The default length is 12 bytes …
  • 24. Page 27 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. ICMP Application: Tracert (2)  The Tracert command displays each hop that packets pass through during network transmission. <Router A>tracert 30.0.0.2 Tracert to 30.0.0.2(30.0.0.2), max hops:30, packet length:40, press CTRL_C to break 1 10.0.0.2 130 ms 50 ms 40 ms 2 20.0.0.2 80 ms 60 ms 80 ms 3 30.0.0.2 80 ms 60 ms 70 ms Host A Host B Router A Router C Router B 10.0.0.2/24 20.0.0.2/24 30.0.0.2/24
  • 25. Page 28 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Routing Protocol Overview  Routing is the most basic element in a data communications network. It is the process of selecting paths on a network through which packets are sent from a source to a destination. Routing protocols PC 1 PC 2
  • 26. Page 30 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Introduction to OSPF  No loop  Fast convergence  Good scalability  Supporting authentication Site B Site A Site C OSPF RTB RTA RTC OSPF OSPF
  • 27. Page 31 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Introduction to SNMP  SNMP is used to transmit management information between the network management system (NMS) and managed devices. NMS SNMP
  • 28. Page 32 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. SNMP Architecture  SNMP includes the NMS, agent, and MIB.  An agent is a process performed on the managed devices.  A MIB is a database that contains variables maintained by managed devices. Agent MIB SNMP Execute Notify Managed device NMS
  • 29. Page 33 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Enterprise Network O&M  Understand the traffic trend of all branches and identify the devices and branches that need expansion.  Analyze the distribution of branch traffic identify the value points for capacity expansion.  Rank changes in branch traffic and allocate existing network resources accordingly. HQ Branch 1 Branch 2 IT engineer: Branch 1 has exhausted its bandwidth on the XYZ port. We need to purchase a new device to expand the network capacity. Supervisor: Are you sure we need to expand the capacity? Is the network fully optimized or is the service application developing rapidly? IT engineer: I have detailed network application development reports for each branch ...
  • 30. Page 34 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. NTA Concept and Functions  Basic concept  The eSight Network Traffic Analyzer (NTA) is a software-only solution. No hardware probe is required, and no additional investment is needed. The NetFlow, NetStream, and sFlow protocols are used to collect and analyze common IP packets, provide a customer analysis report, and monitor network-wide traffic in real time. This is a powerful tool for enterprise O&M management.  Functions  The eSight NTA provides a convenient way to monitor and analyze networks. By using the IP network traffic information provided by network devices that support NetFlow, NetStream, and sFlow, the eSight NTA analyzes network-wide traffic, provides traffic analysis reports, and displays traffic analysis results in various charts. This helps users learn about network-wide traffic, including the traffic distribution, and detect abnormal network traffic.
  • 31. Page 35 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. NetStream Overview  NetStream is a Huawei-patented technology used to collect and distribute statistics about network traffic. The NDE sends the obtained statistics to the NSC for further processing, and sends the statistics to the NDA for analysis. The results of the analysis provide a basis for network accounting and planning. NDE NDE NSC NSC NDA NetStream stream
  • 32. Page 36 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. TCP/IP Architecture 2. Common Network Protocols  Network Layer Protocols  Transport Layer Protocols  Application Layer Protocols
  • 33. Page 37 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Establishing TCP Connections  Three-way handshake Client Server
  • 34. Page 38 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Disconnecting TCP Connections  4-way handshake Client Server
  • 35. Page 39 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Contents 1. TCP/IP Architecture 2. Common Network Protocols  Network Layer Protocols  Transport Layer Protocols  Application Layer Protocols
  • 36. Page 40 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Common Application Layer Protocols FTP server Mail server Web server DNS server PC
  • 37. Page 41 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. How DNS Works  Domain name resolution is performed by a dedicated domain name system (DNS). The DNS involves the following types of servers:  Root server  Top-level domain name server  Recursive server  Cache server Client Cache server I'd like to visit www.huawei.com. The IP address of www.huawei.com. is Z.Z.Z.Z. I don't know about this. I have to ask the experts. Root server Top-level domain name server Recursive server  What is the IP address corresponding to www.huawei.com? The IP address of the .huawei.com DNS server is Y.Y.Y.Y.   IP:X.X.X.X IP:Y.Y.Y.Y Client Cache server I'd like to visit www.huawei.com again. The IP address of www.huawei.com. is Z.Z.Z.Z. I remember it this time. First access Second access
  • 38. Page 43 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. How FTP Works  FTP provides an effective way to upload and download files between a server and a client.  When used to transmit data, FTP establishes a control connection and a data connection between the server and the client.. User User interface Process control Data transmission process File system Process control Data transmission process File system Client Server Control connection Data connection
  • 39. Page 44 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. FTP Transmission Mode (1)  FTP supports two modes: active mode and passive mode. In active mode, which is used by default, the client sets up the control connection and the server sets up the data connection. In passive mode, the client sets up both connections. Users can switch the mode through commands.  FTP connection setup in active mode: Temporary port Temporary port Port 21 Port 20 Control connection Data connection FTP Client FTP Server
  • 40. Page 45 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. FTP Transmission Mode (2)  FTP connection setup in passive mode: Temporary port Temporary port Port 21 Temporary port Control connection Data connection FTP Client FTP Server
  • 41. Page 46 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. HTTP/HTTPS: Basic Components of a Web Application  The web is built on a client-server architecture and relies on three essential technologies:  Using Hypertext Markup Language (HTML), used to describe a file  Using Uniform Resource Locator (URL), used to specify the file location  Using Hypertext Transfer Protocol (HTTP), used for client-server communication Server Client Access URL: www.huawei.com HTTP/HTTPS HTML file The URL specifies the server file. Displays on the client.
  • 42. Page 47 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. How HTTP Works  HTTP is a stateless protocol that uses a request-response method for communication.  HTTP has two types of packets:  Request packet: sent from the client to the server.  Response packet: returned from the server to the client. ① ② ③ ④ ⑤ ⑥ Hi. What can I do for you? I need the XXX file. GET /http://class/xxxx HTTP/1.1 Do you have a key? Yes, &……%@ (# OK. This is the file you want. HTTP/1.1 200 OK
  • 43. Page 48 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. SMTP, POP3, IMAP: How Mail Is Sent and Received  SMTP defines how PCs send mail to an SMTP server and how mail is transferred between SMTP servers.  Post Office Protocol 3 (POP3) and Internet Mail Access Protocol (IMAP) specify how PCs manage and download mail on the mail server through client software.  SMTP and POP3 (or IMAP) are deployed on the mail server by an administrator, and mail client software (such as Microsoft Outlook or Foxmail) is installed on a user's PC.
  • 44. Page 49 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Quiz 1. Which of the following is not in the TCP/IP model? A. Data link layer B. Transport layer C. Session layer D. Application layer 2. Which of the following packets is the first packet of the TCP three-way handshake? A. SYN+ACK B. SYN C. ACK D. FIN
  • 45. Page 50 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Summary  TCP/IP Architecture  Common Network Protocols
  • 46. Page 51 Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved. Thank You www.huawei.com