chapter three

37
Chapter Three Chapter Three Network Network Protocols Protocols

Upload: gage-pace

Post on 30-Dec-2015

36 views

Category:

Documents


3 download

DESCRIPTION

Chapter Three. Network Protocols. Introduction to Protocols. Protocol Rules network uses to transfer data Protocols that can span more than one LAN segment are routable SNA & DLC becoming outdated due to non-routability Multiprotocol network Network using more than one protocol. TCP/IP. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Chapter Three

Chapter ThreeChapter ThreeNetwork Network

ProtocolsProtocols

Page 2: Chapter Three

Introduction to ProtocolsIntroduction to Protocols

ProtocolProtocol Rules network uses to transfer dataRules network uses to transfer data Protocols that can span more than one LAN Protocols that can span more than one LAN

segment are segment are routableroutableSNA & DLC becoming outdated due to non-SNA & DLC becoming outdated due to non-routabilityroutability

Multiprotocol networkMultiprotocol network Network using more than one protocolNetwork using more than one protocol

Page 3: Chapter Three

TCP/IPTCP/IP

Transmission Transmission Control Control Protocol/Internet Protocol/Internet Protocol (TCP/IP)Protocol (TCP/IP)

Suite of small, Suite of small, specialized specialized protocols called protocols called subprotocolssubprotocols

OSI Model TCP/IP

Figure 3-1: TCP/IP compared to the OSI Model

Page 4: Chapter Three

The TCP/IP The TCP/IP CoreCore Protocols Protocols

Certain subprotocols of TCP/IP Certain subprotocols of TCP/IP suitesuite Operate in Transport or Network layers of OSI Operate in Transport or Network layers of OSI

ModelModel Provide basic services to protocols in other Provide basic services to protocols in other

layers of TCP/IPlayers of TCP/IP

TCP and IP are most significant core TCP and IP are most significant core protocols in TCP/IP suiteprotocols in TCP/IP suite

Page 5: Chapter Three

Internet Protocol (IP)Internet Protocol (IP)

Provides information about how and where Provides information about how and where data should be delivereddata should be delivered

Subprotocol that enables TCP/IP to Subprotocol that enables TCP/IP to internetworkinternetwork To To internetworkinternetwork is to traverse more than one is to traverse more than one

LAN segment and more than one type of LAN segment and more than one type of network through a routernetwork through a router

In an internetwork, the individual networks that In an internetwork, the individual networks that are joined together are called are joined together are called subnetworks subnetworks (or (or subnets)subnets)

Page 6: Chapter Three

Internet Protocol (IP)Internet Protocol (IP)

IP datagramIP datagram IP portion of IP portion of

TCP/IP TCP/IP frame that frame that acts as an acts as an envelope for envelope for datadata

Contains Contains information information necessary necessary for routers to for routers to transfer data transfer data between between subnetssubnets

Figure 3-2: Components of an IP datagram

Page 7: Chapter Three

Internet Protocol (IP)Internet Protocol (IP)

VersionVersion IPv4 – current version used for 20 yearsIPv4 – current version used for 20 years IPv6 – in processIPv6 – in process

Time to live (TTL) – max time, in seconds, Time to live (TTL) – max time, in seconds, that a datagram can remain on the that a datagram can remain on the network before it is discardednetwork before it is discarded Also corresponds to # of router hopsAlso corresponds to # of router hops

Page 8: Chapter Three

Internet Protocol (IP)Internet Protocol (IP)

IP is an unreliable, connectionless IP is an unreliable, connectionless protocol, which means it does not protocol, which means it does not guarantee delivery of dataguarantee delivery of data ConnectionlessConnectionless

Allows protocol to service a request without Allows protocol to service a request without requesting verified session and without requesting verified session and without guaranteeing delivery of dataguaranteeing delivery of data

Page 9: Chapter Three

Transport Control Protocol (TCP)Transport Control Protocol (TCP)

TCPTCP Provides reliable data delivery servicesProvides reliable data delivery services Connection-orientedConnection-oriented subprotocol subprotocol

Requires establishment of connection between Requires establishment of connection between communicating nodes before protocol will transmit communicating nodes before protocol will transmit datadata

TCP segmentTCP segment Holds TCP data fieldsHolds TCP data fields Becomes encapsulated by IP datagramBecomes encapsulated by IP datagram

Page 10: Chapter Three

Transport Control Protocol (TCP)Transport Control Protocol (TCP)

PortPort Address on host where application makes itself available to Address on host where application makes itself available to

incoming dataincoming data

Figure 3-3: A TCP

segment

Page 11: Chapter Three

Additional Core Protocols of the Additional Core Protocols of the TCP/IP SuiteTCP/IP Suite

User Datagram Protocol (UDP)User Datagram Protocol (UDP) Connectionless transport serviceConnectionless transport service Lack of sophistication makes it more efficient than TCPLack of sophistication makes it more efficient than TCP

Live audio/video transmissions over the InternetLive audio/video transmissions over the Internet

Internet Control Message Protocol (ICMP)Internet Control Message Protocol (ICMP) Notifies sender of an error in transmission process and that Notifies sender of an error in transmission process and that

packets were not deliveredpackets were not delivered Sits between IP & TCP in Internet layer of TCP/IP modelSits between IP & TCP in Internet layer of TCP/IP model

Used by PING diagnostic toolUsed by PING diagnostic tool

Address Resolution Protocol (ARP)Address Resolution Protocol (ARP) Obtains MAC address of host or nodeObtains MAC address of host or node Creates local database mapping MAC address to host’s IP Creates local database mapping MAC address to host’s IP

addressaddress

Page 12: Chapter Three

TCP/IP Application Layer TCP/IP Application Layer ProtocolsProtocols

These protocols work over TCP (or UDP) and IP:These protocols work over TCP (or UDP) and IP:Telnet Telnet Used to log on to remote hosts using TCP/IP protocol suite Used to log on to remote hosts using TCP/IP protocol suite

File Transfer Protocol (FTP)File Transfer Protocol (FTP) Used to send and receive files via TCP/IPUsed to send and receive files via TCP/IP

Simple Mail Transfer Protocol (SMTP)Simple Mail Transfer Protocol (SMTP) Responsible for moving messages from one e-mail server Responsible for moving messages from one e-mail server

to another, using the Internet and other TCP/IP-based to another, using the Internet and other TCP/IP-based networksnetworks

Simple Network Management Protocol (SNMP)Simple Network Management Protocol (SNMP) Manages devices on a TCP/IP networkManages devices on a TCP/IP network

Page 13: Chapter Three

Addressing in TCP/IPAddressing in TCP/IP

IP AddressIP Address Logical address used in TCP/IP networkingLogical address used in TCP/IP networking Unique 32-bit numberUnique 32-bit number

Divided into four groups of Divided into four groups of octetsoctets (8-bit bytes) (8-bit bytes) that are separated by periodsthat are separated by periods

IP addresses are assigned and used IP addresses are assigned and used according to very specific parametersaccording to very specific parameters

Example: 144.92.43.178Example: 144.92.43.178

Page 14: Chapter Three

Addressing in TCP/IPAddressing in TCP/IP

Though 8 bits have 256 possible combinations, only the Though 8 bits have 256 possible combinations, only the numbers 1 through 254 are used to identify networks numbers 1 through 254 are used to identify networks and hostsand hosts

Numbers 0 and 255 are reserved for Numbers 0 and 255 are reserved for broadcastsbroadcasts Broadcast are transmissions to all stations on a networkBroadcast are transmissions to all stations on a network

Table 3-1: Commonly used TCP/IP classes

Page 15: Chapter Three

Addressing in TCP/IPAddressing in TCP/IP

Group AGroup A Only 126 available – used/reserved for large Only 126 available – used/reserved for large

corporations or governmentscorporations or governments Share the first octet (1-126)Share the first octet (1-126) i.e. i.e. 2323.78.110.109, .78.110.109, 2323.164.32.97.164.32.97

Group BGroup B Share the first two octets (128-191)Share the first two octets (128-191) i.e. i.e. 168.34168.34.88.29, .88.29, 168.34168.34.55.41.55.41

Group CGroup C Share the first three octets (192-223)Share the first three octets (192-223) i.e i.e 204.139.118204.139.118.7, .7, 204.139.118204.139.118.14.14

Page 16: Chapter Three

Addressing in TCP/IPAddressing in TCP/IP

Loopback addressLoopback address IP address reserved for communicating from a IP address reserved for communicating from a

node to itselfnode to itself Value of the loopback address is always Value of the loopback address is always

127.0.0.1 127.0.0.1 (try it)(try it)

Internet Corporation for Assigned Names and Internet Corporation for Assigned Names and Numbers (ICANN) – formerly InterNICNumbers (ICANN) – formerly InterNIC Non-profit organization currently designated by Non-profit organization currently designated by

U.S. government to maintain and assign IP U.S. government to maintain and assign IP addressesaddresses

Page 17: Chapter Three

Addressing in TCP/IPAddressing in TCP/IP

FirewallFirewall Specialized device (typically a router)Specialized device (typically a router) Selectively filters or blocks traffic between Selectively filters or blocks traffic between

networksnetworks May be strictly hardware-based or may involve a May be strictly hardware-based or may involve a

combination of hardware and softwarecombination of hardware and software

HostHost Computer connected to a network using the Computer connected to a network using the

TCP/IP protocolTCP/IP protocol

Page 18: Chapter Three

Addressing in TCP/IPAddressing in TCP/IP

IP address data are sent across the network in IP address data are sent across the network in binary formbinary formIn IP address 131.127.3.22, to convert the first In IP address 131.127.3.22, to convert the first octet (131) to a binary number:octet (131) to a binary number: On Windows 2000, click On Windows 2000, click StartStart, point to , point to ProgramsPrograms, ,

point to point to AccessoriesAccessories, then click , then click CalculatorCalculator Click Click ViewView, then click , then click ScientificScientific (make sure (make sure Dec Dec

option buttonoption button is selected) is selected) Type Type 131131, then click , then click Bin option buttonBin option button

The binary equivalent of number 131, 10000011, appears The binary equivalent of number 131, 10000011, appears in the display windowin the display window

Page 19: Chapter Three

Addressing in TCP/IPAddressing in TCP/IP

Static IP addressStatic IP address IP address manually assigned to a deviceIP address manually assigned to a device

Dynamic Host Configuration Protocol Dynamic Host Configuration Protocol (DHCP)(DHCP) Application layer protocolApplication layer protocol Manages dynamic distribution of IP addresses Manages dynamic distribution of IP addresses

on a networkon a network

Page 20: Chapter Three

Viewing Current IP InformationViewing Current IP Information

Figure 3-4: Example of an IP

configuration window

Page 21: Chapter Three

Viewing Current IP InformationViewing Current IP Information

Figure 3-5: IP address

information on a

Windows 2000

workstation

Page 22: Chapter Three

Addresses and NamesAddresses and Names

In addition to using IP addresses, TCP/IP In addition to using IP addresses, TCP/IP networks use names for networks and networks use names for networks and hostshosts Each host requires a host nameEach host requires a host name Each network requires a network name, also Each network requires a network name, also

called a called a domain namedomain name Together, host name and domain name Together, host name and domain name

constitute the constitute the fully qualified domain name fully qualified domain name (FQDN)(FQDN)

Page 23: Chapter Three

IPX/SPXIPX/SPX

Internetwork Packet Internetwork Packet Exchange/SequenceExchange/Sequenced Packet Exchange d Packet Exchange (IPX/SPX)(IPX/SPX) Protocol originally Protocol originally

developed by Xeroxdeveloped by Xerox Modified and adopted Modified and adopted

by Novell in the by Novell in the 1980s for the 1980s for the NetWare network NetWare network operating systemoperating system

Figure 3-6: IPX/SPX compared to the OSI Model

Page 24: Chapter Three

IPX/SPX Core ProtocolsIPX/SPX Core ProtocolsInternetwork Packet Exchange (IPX)Internetwork Packet Exchange (IPX)

Operates at Network layer of OSI ModelOperates at Network layer of OSI Model Provides routing and internetworking servicesProvides routing and internetworking services Similar to IP in TCP/IP suiteSimilar to IP in TCP/IP suite Socket – logical address assigned to a specific processSocket – logical address assigned to a specific process

Figure 3-7: Components

of an IPX datagram

Page 25: Chapter Three

IPX/SPX Core ProtocolsIPX/SPX Core Protocols

Sequenced Packet Exchange (SPX)Sequenced Packet Exchange (SPX) Belongs to Transport layer of OSI ModelBelongs to Transport layer of OSI Model Works in tandem with IPX to ensure data are Works in tandem with IPX to ensure data are

received:received:WholeWhole

In sequenceIn sequence

Error freeError free

Similar to TCPSimilar to TCP

Page 26: Chapter Three

IPX/SPX Core ProtocolsIPX/SPX Core Protocols

Figure 3-8: SPX packet encapsulated by an IPX datagram

Page 27: Chapter Three

IPX/SPX Core ProtocolsIPX/SPX Core Protocols

Service Advertising Protocol (SAP)Service Advertising Protocol (SAP) Works in Application, Presentation, Session, Works in Application, Presentation, Session,

and Transport layers of OSI Modeland Transport layers of OSI Model Runs directly over IPXRuns directly over IPX Used by NetWare servers and routersUsed by NetWare servers and routers to to

advertiseadvertise to entire network which services to entire network which services they can providethey can provide

Can lead to unnecessary network trafficCan lead to unnecessary network traffic

Page 28: Chapter Three

IPX/SPX Core ProtocolsIPX/SPX Core Protocols

NetWare Core Protocol (NCP)NetWare Core Protocol (NCP) Works within Presentation and Sessions Works within Presentation and Sessions

layers of OSI Modellayers of OSI Model Works over IPXWorks over IPX Handles requests for services Handles requests for services between clients between clients

and serversand servers

Page 29: Chapter Three

Addressing in IPX/SPXAddressing in IPX/SPX

IPX addressIPX address Address assigned to a device on an IPX/SPX Address assigned to a device on an IPX/SPX

networknetwork Contains two parts:Contains two parts:

Network address (Network address (external network numberexternal network number)) Established Network Admin when network is installedEstablished Network Admin when network is installed

Node addressNode address NIC MAC addressNIC MAC address

Example (8.12):Example (8.12): 000008A2:0060973E97F3000008A2:0060973E97F3

Page 30: Chapter Three

NetBIOS and NetBEUINetBIOS and NetBEUI

Network Basic Input Output System Network Basic Input Output System (NetBIOS)(NetBIOS) Originally designed by IBM to provide Originally designed by IBM to provide

Transport and Session layer servicesTransport and Session layer services Adopted by Microsoft as its foundation Adopted by Microsoft as its foundation

protocolprotocol Microsoft added Application layer Microsoft added Application layer

component called component called NetBEUINetBEUI

Page 31: Chapter Three

NetBIOS and NetBEUINetBIOS and NetBEUI

NetBIOS Enhanced User InterfaceNetBIOS Enhanced User Interface FastFast and and efficientefficient protocol protocol Consumes few network resourcesConsumes few network resources Provides excellent error correctionProvides excellent error correction Requires little configurationRequires little configuration Can handle Can handle only 254only 254 connections connections Does not allow for good securityDoes not allow for good security By itself, it is By itself, it is not routablenot routable

Page 32: Chapter Three

NetBIOS and NetBEUI Compared NetBIOS and NetBEUI Compared to the OSI Modelto the OSI Model

Figure 3-9: NetBIOS/NetBEUI compared to the OSI Model

Page 33: Chapter Three

NetBIOS AddressingNetBIOS Addressing

Figure 3-10: Identification

tab in Network properties

Page 34: Chapter Three

AppleTalkAppleTalk

Protocol suite used to interconnect Protocol suite used to interconnect MacintoshMacintosh computerscomputersOriginally designed to support peer-to-peer Originally designed to support peer-to-peer networking among Macintoshesnetworking among MacintoshesCan now be routed between network segments Can now be routed between network segments and integrated with NetWare- and Microsoft-and integrated with NetWare- and Microsoft-based networksbased networksAppleTalk networks are separated into logical AppleTalk networks are separated into logical groups of computers called groups of computers called AppleTalk zonesAppleTalk zonesApple has begun supporting TCP/IPApple has begun supporting TCP/IP

Page 35: Chapter Three

AppleTalk and OSI ModelAppleTalk and OSI Model

Figure 3-11: AppleTalk protocol compared to OSI Model

Page 36: Chapter Three

Addressing in AppleTalkAddressing in AppleTalk

AppleTalk node IDAppleTalk node ID Unique 8-bit or 16-bit number identifying a Unique 8-bit or 16-bit number identifying a

computer on an AppleTalk networkcomputer on an AppleTalk network

AppleTalk network numberAppleTalk network number Unique 16-bit number identifying the network Unique 16-bit number identifying the network

to which a node is connectedto which a node is connected

Page 37: Chapter Three

Installing ProtocolsInstalling Protocols

After installing protocols, they must be After installing protocols, they must be binded to NICs and services they run on or binded to NICs and services they run on or withwith BindingBinding

Process of assigning one network component to Process of assigning one network component to work with anotherwork with another