Download Data_Ntwk_v3_0_PowerPoint

Document related concepts

Asynchronous Transfer Mode wikipedia , lookup

Peering wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Net bias wikipedia , lookup

Distributed firewall wikipedia , lookup

Wireless security wikipedia , lookup

AppleTalk wikipedia , lookup

Network tap wikipedia , lookup

IEEE 1355 wikipedia , lookup

Deep packet inspection wikipedia , lookup

Airborne Networking wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Computer network wikipedia , lookup

Wake-on-LAN wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Internet protocol suite wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
Data Networking
Copyright © 2006 Prosoft Learning, a VCampus Company - All rights reserved.
Lesson 1:
Introduction to Data Networking
Copyright © 2006 Prosoft Learning, a VCampus Company - All rights reserved.
Objectives
•
•
•
•
•
•
Define networking and the concept of convergence
Describe Bluetooth and RFID
Identify networking models
Describe next-generation technologies
Identify network topologies
Define the purpose and function of network
operating systems
• Describe various operating systems
• View operating system error logs
• Describe embedded operating systems
Networks
• A network is two or more connected computers
that share data
• Most data networks utilize the PSTN
• Modems are still widely used
• Voice over IP (VoIP) delivers voice information in
digital form as packets of data
Cell phones
• Modern cell phones are used for much more than
phone calls
– 1G wireless phones were for voice only
– 2G wireless phones were digital
– 3G phones can be used for Web browsing,
multimedia and video conferencing
– Smartphones combine the functionalities of cell
phones and PDAs
SMS
• Short Message Service (SMS) permits the sending
and receiving of short text messages from:
– Mobile to mobile
– Mobile to computer
– Computer to mobile
• Allows you to send messages without incurring
airtime charges
• Some Web sites offer free SMS services, allowing
you to get driving directions, find out when a movie
is playing, or perform currency conversions on
your cell phone
Bluetooth
• Specifies how various electronic devices can be
connected and synchronized using short-range radio
signals
• Creates Personal Area Networks (PANs) between
suitably equipped devices
• The connection and formation of a PAN is automatic
• Bluetooth devices use low-power transmissions in the
2.45 GHz band
• Does not require line of sight; signals can pass through
walls
• Functionality is divided into separate types of
connections known as profiles
• Most implementations are non-secure by default
Radio Frequency Identification (RFID)
• Currently used for tracking cargo shipments and
deliveries, and for automated road toll collection
• Uses tags (microchip and antenna coil) and
readers
• Tags can be passive (no power supply) or active
(includes a battery)
• Advantages: no contact is required between tag
and reader, nor is line of sight; operates well in
poor-visibility conditions
• Disadvantages: raises privacy concerns, and the
technology is expensive
Networking Models and Evolution
• Mainframe: centralized, slow, expensive; all
processing is performed by the mainframe
• Client/server: distributed, reduces congestion by
dividing processing and storage tasks between the
client and the server
• Web-based: three-tier or n-tier networking;
distributed networking that offers speed and
flexibility
• Peer-to-peer: distributed networking that supports
many thousands of simultaneous users to connect
with each other and directly share files on their
hard drives
• Cellular: star-topology in which users within a
given cell must access a base station for
connectivity
Network Topologies
Bus
Star
Ring
Hybrid (star bus)
Centralized Hub
Bus Trunk
Server
Client
Mesh
Server
Client
Network Operating System
•
•
•
•
•
Manages multiple users on a network
Provides access to file and print servers
Provides services such as Web, FTP and e-mail
Implements network security
Part of the NOS must run from the client and part
of it must run from the server
Many major network operating systems can
operate with one another; this feature is called
interoperability
Microsoft Windows Servers
•
•
•
•
•
Windows NT 3.1
Windows NT 3.5
Windows NT 4.0
Windows 2000
Windows Server 2003
Windows XP Professional, Windows 2000
Professional and NT 4.0 workstations are
recommended as clients in secure environments
The Windows superuser account is named
Administrator or Admin
UNIX
• Many versions of UNIX have evolved from the
original kernel
• Superuser account is named root
• UNIX operating systems consist of at least one
kernel, a file system and a shell
• GUIs such as X Window were developed to simplify
UNIX operations
• Flavors of UNIX are based on one of the following
basic platform strategies: System V, Berkeley
Software Distribution (BSD), Open Software
Foundation (OSF)
• Flavors of UNIX include: Linux, Sun Solaris, BSD
Linux
•
•
•
•
Developed by Linus Torvalds
Can operate as a client or as a server
Superuser account is named root
Supports all of the most common Internet
protocols, including TCP/IP, SMTP, POP, NNTP,
Telnet, HTTP, FTP, IRC, DNS and more
• Various flavors of Linux exist, such as SuSE
Mac OS X Server
• Based on Berkeley Software Distribution (BSD) 4.4
• Client version, Mac OS X, is based on FreeBSD 3.2
• Supports numerous networking and security
standards
• Integrates services for file sharing, Web serving,
networking, client management and e-mail
• Includes Apache Web server
• Provides UNIX-like performance with a Macintosh
look and feel
Novell NetWare
• Before NetWare 5, Netware was a proprietary NOS
that used Internetwork Packet Exchange (IPX),
Sequenced Packet Exchange (SPX) and NetWare
Core Protocol (NCP)
• NetWare 5 supports TCP/IP as its native protocol
• NetWare 5 supports Java as its application
language
• Novell specializes in directory services
• Superuser account on a NetWare system is named
Admin
Operating System Error Logs
• You can use event logs to gather information about hardware,
software and system problems
• Windows XP records events in three kinds of logs:
– Application log
– Security log
– System log
• In Windows you can use Event Viewer to view the logs
created by the Event log service. Event Viewer displays five
types of events:
– Error
– Warning
– Information
– Success audit
– Failure audit
Error logs in
Linux/Mac OS X/BSD systems
• Linux operating systems log errors in
/var/log/messages file
• Mac OS X and BSD systems log errors in
/var/system.log file
Additional files exist off the /var/log/ directory
Embedded Operating Systems
• Designed to be compact and efficient
• Offer limited functionality
• Designed specifically for use on an embedded
system
• Include only components that are absolutely
necessary to allow the system to perform correctly
• Examples include: Embedded Linux, NetBSD, QNX,
SymbianOS, Windows CE and Windows XP
Embedded
Summary
 Define networking and the concept of
convergence
 Describe Bluetooth and RFID
 Identify networking models
 Describe next-generation technologies
 Identify network topologies
 Define the purpose and function of network
operating systems
 Describe various operating systems
 View operating system error logs
 Describe embedded operating systems
Lesson 2:
Networking Protocols
Copyright © 2006 Prosoft Learning, a VCampus Company - All rights reserved.
Objectives
• Discuss the OSI/RM, its layers and functions
• Explain packets and describe packet creation
• Differentiate between protocols at the network,
transport and application layers of the OSI/RM
• Identify key internetworking protocols
• Define the purpose and essentials of TCP/IP
• Compare and contrast the functions of network
protocols
• Bind protocols to a network interface card (NIC)
OSI Reference Model
Layer
Application
Presentation
Session
Transport
Network
Data link
Physical
Layer Number
7
6
5
4
3
2
1
OSI layers and communication
Protocol Data Unit (PDU)
PDU Name
Layer
Application PDU (APDU)
Application (7)
Presentation PDU (PPDU)
Presentation (6)
Session PDU (SPDU)
Session (5)
Transport PDU (TPDU)
Transport (4)
Network PDU (NPDU)
Network (3)
Data Link PDU (LPDU)
Data link (2)
Physical PDU (PhPDU)
Physical (1)
Protocol Data Unit (PDU)
• Data  Segment  Packet  Frame
Packets
• Packet structure
– Header
– Data
– Trailer
CRC
• Cyclical redundancy check (CRC) verifies whether
a packet is valid
• Imagine a packet as a package being shipped to
you: The CRC would be considered a packing slip
or a bill of lading
Packet creation
• Packet creation process begins with Layer 7 and
continues through Layer 1. Each layer adds its own
information (header)
OSI/RM
Protocol Examples
Application-layer
protocols
SMTP, POP3, HTTP,
DNS, FTP, Telnet, LDAP,
H.323, SIP, MGCP
Presentation-layer
protocols
ASN.1
Session-layer protocols
NetBIOS, ASP
Transport-layer protocols
TCP, UDP, SPX,
NWLink, ATP
Network-layer protocols
IP, IPX, NWLink, DDP
Data link-layer standards
Token Ring (802.5),
Ethernet (802.3)
Physical layer
Network hardware and
transmission media
Major
Networking Protocols
• TCP/IP
• IPX/SPX
• NetBIOS/NetBEUI
Connection-oriented  stateful
Connectionless  stateless
• Routable protocols can cross Internet routers
• Nonroutable protocols are used within a LAN
TCP/IP
• Default protocol for:
– Windows NT 4.0
– Windows 2000/XP/2003
– UNIX
– NetWare 5
• Open standard
TCP/IP
• Protocol suite that includes:
– Transmission Control Protocol (TCP)
• Connection-oriented protocol that ensures
reliable communication and uses logical
ports to deliver packets
– User Datagram Protocol (UDP)
• Connectionless protocol that allows
information to be sent without using a
handshake process
– Internet Protocol (IP)
• Connectionless protocol that is responsible
for providing addresses of each computer
and performing routing
IP
• An IP address contains a network portion and host
portion: network portion, host portion
– Network portion determines whether the given
address is on a local network segment or a
remote one
– Host portion identifies a specific computer on
the network
• IPv4 address:
208.157.24.111
• IPv6 address:
A342:0000:0000:0000:123F:0000:0034:EA3D
IPX/SPX
• Internet Packet Exchange (IPX) – Connectionless
protocol that is responsible for network addressing
and forwarding packets to their destination
• Sequenced Packet Exchange – Connectionoriented protocol that provides reliability and
ensures that packets arrive intact at their
destination
• Vendor-specific protocol (Novell)
NetBIOS/NetBEUI
• NetBIOS enables systems to communicate with
one another without using DNS
• NetBIOS is fast and runs with low overhead
• NetBIOS requires a network protocol such as IP or
NetBEUI to carry its sessions across a network,
and can be implemented over a number of different
protocols
• NetBEUI was specifically designed for use with
NetBIOS
• NetBEUI is nonroutable, but performs well within a
single LAN
Protocols and the NIC
• Protocols communicate with a NIC’s interface
(NDIS or ODI) rather than with the NIC itself
• Network Device Interface Specification (NDIS) and
Open Data-Link Interface (ODI) make the following
possible:
– They allow a NIC to be chosen independently
from the protocols, network operating system or
applications that will be used
– They enable multiple protocols to be bound to a
single NIC, and enable the use of multiple NICs
in the same computer
Choosing and
Combining Protocols
• Combining protocols
– NICs can support multiple protocols, but it is
best to use the fewest number of protocols
necessary
– Multiple protocols can increase the time
required to maintain and troubleshoot a
network, and they increase system overhead
• Binding protocols
– Protocols must be bound to your NIC
– Some operating systems allow you to specify a
binding order, while others do not
Summary
 Discuss the OSI/RM, its layers and functions
 Explain packets and describe packet creation
 Differentiate between protocols at the network,
transport and application layers of the OSI/RM
 Identify key internetworking protocols
 Define the purpose and essentials of TCP/IP
 Compare and contrast the functions of network
protocols
 Bind protocols to a network interface card (NIC)
Lesson 3:
LANs and WANs
Copyright © 2006 Prosoft Learning, a VCampus Company - All rights reserved.
Objectives
• Describe the basics of a LAN and a WAN
• Explain how networking components work
together
• Describe the difference between DCE and DTE
• Identify the differences among common
transmission media used in networking
• Describe transmission types
• Identify LAN and WAN standards
• Describe T-carrier, E-carrier and SONET
• Implement wireless networks
• Identify wireless standards
• Describe wireless vulnerabilities and security
Local Area Networks (LANs)
• A group of computers connected within a confined
geographic area
– Virtual local area networks (VLANs) are
subgroups of LANs
Novell
Server
IPX/SPX
Legacy
Host
SNA
Router
Hub
Node
NT
Server
TCP/IP
Wide Area Networks (WANs)
• A group of computers connected over an
expansive geographic area, such as a state or
country, allowing users to share files and services
Common
Network Components
• Network interface card
(NIC)
• Repeater
• Hub
• Bridge
• Router
• Brouter
•
•
•
•
•
•
Switch
Gateway
CSU/DSU
Modem
Patch panel
Firewall
Network Interface Card (NIC)
• Makes the physical connection between the
computer and the network cabling
• Operates at the data link layer (Layer 2) of the
OSI/RM
• Requires a device driver
• Every NIC has a MAC address
• Can be attached to a computer by:
– PCI card
– PCMCIA card
– USB
– FireWire
– Wireless
Repeaters
• Amplify the electronic signal traveling on a cable
segment
• Operate at the Physical Layer (Layer 1)
Hubs
• Connect multiple devices into the same collision
domain
• Operate at the physical layer (Layer 1)
Bridges
• Filter frames to determine whether a specific frame
belongs on a local segment or another LAN
segment
• Connect networks with the same or different data
link protocols
• Operate at the data link layer (Layer 2)
• Use MAC addresses to forward frames
• Spanning-tree protocol helps prevent bridging
loops and broadcast storms
Routers
• Connect separate LANs to form a WAN
• Operate at the network layer (Layer 3)
• Instead of using MAC addresses, routers use IP or
IPX addresses to forward or route data from one
network to another
Brouters
• Short for bridge-router
• Can forward packets based on data link layer
information (MAC address – bridging function), and
they can route other packets based on network
layer information (IP address – routing function)
• Operate at Layers 2 and 3 of the OSI/RM
Switches
• Direct the flow of information from one node to
another
• By definition, switches operate at Layer 2
• Types of switches:
– Layer 1 – connects individual systems
– Layer 2 – forwards traffic based on MAC
addresses
– Layer 3 – connects networks
Gateways
• Protocol converters
• Can operate at any layer of the OSI/RM
• Gateways typically must convert from one protocol
stack to another
• Can be used to connect networks with dissimilar
protocols or architectures
• Not to be confused with default gateways
CSU/DSU
• Terminates physical connections
• Required when using dedicated circuits such as
T1 lines
• Operates at the physical layer (Layer 1)
Telecom
Network
CSU/DSU
Router
Network
Modems
• Adapt a computer to a phone line or cable TV
network, whether it is digital or analog
• Analog modems translate digital data into analog
signals and then back into digital form
• DSL and ISDN modems are all-digital
• A modem is DCE (data communications
equipment)
• DTE (data terminating equipment) is the source or
destination of a data transmission; a computer or
console port of a router can be considered DTE
Patch Panels
• A group of sockets mounted on a rack
• A central point where cables from different rooms
or departments can be connected to one another,
thus forming a LAN
• Usually located in a central location, such as a
closet or server room
• One side of a patch panel contains rows of pin
locations
• You use a punch tool to punch down the wires to
make a connection
Firewall
• A secure computer system placed between a
trusted network and an untrusted one, such as the
Internet
• Acts as a barrier against potential malicious
activity
• Allows a “door” for people to communicate
between their own secured station on the inside
and a station on the outside
• Network firewall is most commonly placed between
a corporate LAN and the Internet
Common
Peripheral Ports
•
•
•
•
•
•
Serial port
Universal Serial Bus (USB)
FireWire (IEEE 1394)
Parallel port
PS/2 connector
Small computer system interface (SCSI)
Serial ports
• Serial ports are computer sockets that connect
serial devices to a computer
• Use two types of connectors:
– DB-9 (9-pin) – usually COM1
– DB-25 (25-pin) – usually COM2 and used for
modem
USB
• USB interface may replace serial and parallel ports
• Two USB standards:
– USB 1.0 offers transfer rate of 12 Mbps for fast
devices (and 1.5 Mbps for slow devices)
– USB 2.0 offers transfer rate of up to 480 Mbps
FireWire (IEEE 1394)
• A serial bus especially popular for attaching video
devices to computers
• Allows up to 63 devices to be daisy-chained
• Supports hot swapping
• Guarantees bandwidth for multimedia
Parallel ports
• Connect a printer or any other parallel device, such
as a removable disk or tape backup device, to a
computer
• Enhanced using the IEEE 1284 standard, which
provides bidirectional transfer and increased
speeds
• Parallel cables can be 32 feet long
PS/2 connectors
• Used to connect a keyboard or a mouse to a
computer
• 6-pin connector
• Used on all laptops and PCs
SCSI
• Small computer system interface (SCSI) is a
parallel interface that allows two devices to
communicate at the same time
• Allows devices to be daisy-chained
• Last device in a daisy chain must have a SCSI
terminator
• Three types of SCSI connectors:
– 25-pin (SCSI-1)
– 50-pin (SCSI-2)
– 68-pin (SCSI-3)
Transmission Media
•
•
•
•
Twisted pair cable
Coaxial cable
Fiber optic cable
Wireless media
Twisted pair cable
• Maximum segment length of 100 meters
• Available in two basic types:
– Shielded (STP) – twisted copper wrapped in a
metal sheath; more difficult to install and
maintain than UTP
– Unshielded (UTP) – most common; less
expensive than STP
• STP and UTP are available in two varieties:
– Stranded – most common
– Solid – can span longer distances, but less
flexible and will break if bent multiple times
• Uses RJ-45 connectors
Twisted pair categories
Category
Description
1
Used for voice only, not data
2
4 Mbps
3
10 Mbps; standard Ethernet
4
16 Mbps; token ring networks
5
100 Mbps; Ethernet and Fast Ethernet
5e
155 Mbps; Fast Ethernet and Gigabit
Ethernet; largely replaces Cat 5
6
600 Mbps; more fragile than Cat 5 or 5e
7
Theoretical; up to 1 Gbps
Coaxial cable
• Used for video and communication networks
• Provides higher bandwidth than twisted pair
• Supports data transfer rates from 1 Mbps to
100 Mbps
• Transfer rate of 10 Mbps common for LAN
• Types: RG-6, RG-8, RG-11, RG-58, RG-59
• Varying segment lengths depending on type of
cable
• Uses the following connectors:
– F-Type
– BNC (thinnet)
– Vampire tap (thicknet)
Coaxial cable
Type
Segment Length
Use
RG-6
N/A
TV and video; similar to RG-59
but for longer distances
RG-8
500 m
Thicknet (10Base5)
RG-11
500 m
Broadband LAN connections
RG-58
185 m
Thinnet (10Base2)
RG-59
305 m
Cable TV, video; often for short
distances (6 feet)
Fiber optic cable
• Sends data as pulses of light over threads of glass
• Transfer rates in the gigabits-per-second range
• Transmissions can travel for miles without
attenuation
• Immune to electromagnetic interference
• To major types:
– Single-mode – offers extremely high bandwidth
and long distances (up to 70 km)
– Multimode – allows for use of inexpensive light
sources and used for short distances (less than
200 m); typically specified for LANs
Fiber optic connectors
• ST (Straight Tip) connector – connects one optical
fiber using a one-piece bayonet mounting system;
widely implemented in commercial wiring
• SC (Subscriber or Standard) connector – connects
fiber optic cable using a plug and socket with a
push-pull latch
• Fiber LC (Local) connector – half the size of a
standard ST or SC connector; designed to save
space on patch panels
• MT-RJ (Mechanical Transfer Registered Jack) –
about the same shape and size as an RJ-45 and
can be used with single-mode or multimode fiber
Transmission Types
• Synchronous transmission
– Access device and network device share a clock
• Asynchronous transmission
– No clock in the transmission media
• Data transmission flow
– Simplex – data travels in one direction only
– Half duplex – data travels in two directions, but only one
direction at a time
– Full duplex – data travels in two directions simultaneously
• Baseband and broadband transmissions
– Baseband uses entire media bandwidth for a single
channel
– Broadband divides the media bandwidth into separate
channels, and each channel carries a separate signal
IEEE LAN Standards
• IEEE 802.2
– Logical Link Control (LLC) Function
• Ethernet/IEEE 802.3
– MAC address
• IEEE 802.3u – Fast Ethernet
• IEEE 802.3z and 802.3ab – Gigabit Ethernet
• IEEE 802.3ae (supplement) – 10-Gigabit Ethernet
• IEEE 802.5 – Token Ring
WAN Standards
• X.25
• Fast packet switching
– Frame relay
– Data Link Connection Identifier (DLCI)
T-Carrier System
T-Carrier
Data Transfer Rate
T1
1.544 Mbps
T2
6.312 Mbps
T3
44.736 Mbps
T4
274.176 Mbps
E-Carrier System
E-Carrier
Data Transfer Rate
E1
2.048 Mbps
E2
8.448 Mbps
E3
34.368 Mbps
E4
139.264 Mbps
E5
565.148 Mbps
SONET/SDH
SONET/SDH Service
Data Transfer Rate
OC-1
51.84 Mbps
OC-3
155.52 Mbps
OC-12
622.08 Mbps
OC-48
2488.32 Mbps
OC-192
9953.28 Mbps
OC-768
39813.12 Mbps
Wireless Network Technologies
• Wireless networks use the following types of
spread spectrum transmissions:
– Frequency Hopping Spread Spectrum (FHSS) –
changes the frequency of a transmission at
regular intervals
– Direct Sequence Spread Spectrum (DSSS) –
signal is spread over the entire band at once
– Orthogonal Frequency Division Multiplexing
(OFDM) – splits a signal into smaller sub-signals
that are transmitted simultaneously on different
frequencies
Wireless Networking Models
• Ad-hoc – systems use only their NICs to connect
with each other
• Infrastructure – systems connect via a centralized
access point (WAP)
Wireless Ethernet Equipment
• Essential wireless Ethernet elements include:
– Wireless NIC
– Wireless access point (WAP)
– Configuration software
– Antenna
– Beacon
– Service Set Identifier (SSID)
Wireless Standards
• 802.11 (Wi-Fi) – original specification providing
for data rates of 1 Mbps or 2 Mbps in the
2.4 GHz band using either FHSS or DSSS
• 802.11a – operates at 54 Mbps in the 5 GHz
band; uses OFDM
• 802.11b (802.11 High Rate) – operates at 11
Mbps in the 2.4 GHz band; uses DSSS
• 802.11g – operates at up to 54 Mbps in the 2.4
GHz band; uses OFDM or DSSS
• 802.11i – specifies wireless security
enhancements
Wireless Security
• Common security problems with wireless networks
include:
– Cleartext transmissions
– Access control
– Unauthorized WAPs and wireless systems in the
workplace
– Weak or flawed encryption
– Encryption and network traffic
– War driving
Wireless Security Tools
• Wired Equivalent Privacy (WEP)
– Encrypts all data packets sent between wireless
clients and the WAP
• MAC address filtering
– You can limit access to your network by
configuring the WAP to allow only certain
system MAC addresses to communicate with
the rest of the network
Securing a Wireless Network
• Enable encryption solutions such as WEP
• Enable MAC address filtering
• Conduct regular site surveys to ensure that only
authorized networks are in use
• Use the latest stable encryption and authentication
mechanisms
Attaching a WAP to a Wired Network
• A WAP has an RJ-45 plug that you can use to
attach it to a standard, wired Ethernet network
Troubleshooting Wireless
Connections
• Power
– Make sure that the WAP has power
– If the WAP is attached to a standard Ethernet hub or
switch, make sure all the equipment is plugged in
and powered on
• Encryption
– Make sure all clients are using the same level of
encryption as the WAP
• SSID
– Make sure all clients are using the correct SSID
• MAC address filtering
– Check to see if the WAP is filtering MAC addresses,
and if necessary add any required addresses for
your wireless clients
Summary
 Describe the basics of a LAN and a WAN
 Explain how networking components work
together
 Describe the difference between DCE and DTE
 Identify the differences among common
transmission media used in networking
 Describe transmission types
 Identify LAN and WAN standards
 Describe T-carrier, E-carrier and SONET
 Implement wireless networks
 Identify wireless standards
 Describe wireless vulnerabilities and security
Lesson 4:
TCP/IP Suite
and Internet Addressing
Copyright © 2006 Prosoft Learning, a VCampus Company - All rights reserved.
Objectives
• Define and describe the Internet architecture model
and various Internet protocols
• Describe the purpose of RFCs
• Explain the routing process
• Compare and contrast RIP with OSPF
• Describe port numbers and their functions
• Explain IP addressing, address classes and the
concept of uniqueness
• Explain the use of private addresses
Objectives
(cont'd)
• Identify default subnet masks and explain their
function
• Calculate custom subnet masks and CIDR notation
using supernetting techniques
• Describe the function of proxy servers and NAT
• Define the TCP/IP properties needed to configure a
typical workstation
• Compare and contrast IPv4 with IPv6
Internet
Architecture
Application Layer
Transport Layer
Internet Layer
Network Access Layer
OSI Reference Model and Internet
Architecture Layer Equivalents
OSI/RM Layer
Application
Presentation
Session
Transport
Network
Data link
Physical
Internet Architecture
Equivalent
Application
Transport
Internet
Network access
Requests for Comments (RFCs)
• Protocol states
– Maturity level
• Experimental
• Proposed
• Draft
• Standard
– Additional
• Historic
• Informational
Internet Protocols
• Network access layer
– LANs
– WANs
• Internet layer (IP, ICMP, IGMP, ARP, RARP)
• Transport layer (TCP, UDP)
• Application layer (HTTP, FTP, TFTP, Telnet, SSH,
SMTP, IMAP, POP3, SNMP, DNS, BOOTP, DHCP, SIP,
H.323, MGCP/H.248)
Demultiplexing
• The method a
destination
computer
uses to
process the
incoming
packet
Telnet
FTP
TFTP
TCP
SNMP
UDP
IGMP
ICMP
IP
RARP
ARP
ETHERNET
Introduction
to Routing
• Direct routing
• Indirect routing
– The tracert command
• Routing process
• Routing information tables
• Static versus dynamic routing
Routing Protocols
• Interior versus exterior protocols
– Interior – used within an organization’s network
• RIP
• OSPF
– Exterior – used outside an organization’s
network
• EGP
• BGP
Routing Protocols
• Distance-vector routing protocols
• Advantages
– Allow a router to inform neighboring routers
about the contents of its routing table
– Easy to configure and install
– Does not require much router processing power
• Disadvantages
– Exchanging tables can consume bandwidth
Routing Protocols
• Distance-vector routing protocol examples
– Interior Gateway Routing Protocol (IGRP)
– Routing Information Protocol (RIP)
– Routing Information Protocol 2 (RIPv2)
Routing Protocols
• Link-state routing protocols
– More advanced and flexible alternatives to
distance-vector routing protocols
– Gather network statistics to create a network
map
– Broadcast a link state advertisement (LSA)
throughout the network
– Routers with link-state protocols read the LSAs
and update their tables accordingly
– Require more router processing power than
distance-vector protocols
Routing Protocols
• Link-state routing protocol examples
– Open Shortest Path First (OSPF)
• Triggered routing table updates
• Service routing
• Load balancing
• Network areas
• Authenticated exchanges
• Defined route support
– Intermediate-System-to-Intermediate-System
(IS-IS) protocol
Port Numbers
• Well-known port numbers – 1 to 1023
• Registered port numbers – 1024 to 49151
• Dynamic port numbers – 49152 to 65535
Internet
Addressing
• Internet addresses are specified by four fields,
separated by periods:
field1.field2.field3.field4
• Each field represents one byte of data, and has a
value ranging from 0 to 255
• Most Internet addresses contain a network portion
and a host portion
Internet Addressing
• Decimal vs. binary format
• To determine the value of an Internet address, you
must convert from decimal to binary
Bit
Value
128
64
32
16
8
4
2
1
• If the binary value of an IP address is 01111001, you
can determine the decimal value by adding the
corresponding bit values that equal 1
0111001 = 0 + 64 + 32 +16 +8 +0 +0 +1 =121
Internet Address Classes
Class A: Range 0.0.0.0 to 127.255.255.255
Starting
Binary
Value
0 Network (1 byte)
Host (3 bytes)
126 Networks
16,777,214 Hosts
Class B: Range 128.0.0.0 to 191.255.255.255
Starting
Binary
Value
1 0
Network (2 bytes)
16,384 Networks
Host (2 bytes)
65,534 Hosts
Class C: Range 192.0.0.0 to 223.255.255.255
Starting
Binary
Value
1 1 0
Network (3 bytes)
Host (1 byte)
2,097,152 Networks
254 Hosts
Class D: Range 224.0.0.0 to 239.255.255.255
Starting
Binary
Value
1 1 1 0
Multicasting—network (4 bytes)
Class E: Range 240.0.0.0 to 247.255.255.255
Starting
Binary
Value
1 1 1 1 0
Experimental/reserved for future use
Internet
Address Classes
•
•
•
•
•
Class A – Range 0.0.0.0 to 127.255.255.255
Class B – Range 128.0.0.0 to 191.255.255.255
Class C – Range 192.0.0.0 to 223.255.255.255
Class D – Range 224 to 239 (network address only)
Class E – Range 240 to 247 (reserved for future
use)
IP Addressing Rules
• Loopback address
– 127 address range
• Broadcast address
– 255
• Network address
– If the host portion of an IP address is all zeros,
then that address is a network address
• Special-case source address
– 0.0.0.0 – used for requesting an IP address from
a DHCP or BOOTP server
Private IP Addressing
• Private network addresses are not Internetaddressable
Class
Private IP Address
Range
Subnet Mask
Class A
10.0.0.0 to
10.255.25.255
255.0.0.0
Class B
172.16.0.0 to
172.31.255.255
255.240.0.0
Class C
192.168.0.0 to
192.168.25.255
255.255.0.0
Subnetworks
• Subnetworks offer a way to organize hosts within a
network into logical groups
• Subnet masks
– Distinguish the network and host portions of an
IP address
– Specify whether a destination address is local or
remote
• ANDing is a function that a computer uses with its
local IP address and local subnet mask in order to
determine if a destination address is local or
remote
Custom Subnet Masks
• Step 1: Determine the number of subnets needed
• Step 2: Determine the number of bits to borrow
from the host portion
• Step 3: Determine the subnet mask
• Step 4: Determine the maximum number of hosts
per subnetwork
• Step 5: Determine the subnetwork addresses for
each subnet
• Step 6: Determine the address ranges for each
subnetwork
IP Address Conservation
• Proxy servers
• Network Address Translation (NAT)
• Classless Interdomain Routing (CIDR)
IP Address Conservation
• Network Address Translation (NAT)
– Types of NAT
• Port address translation (PAT) – multiple IP
addresses are translated into one valid IP
address
• Static address translation – multiple IP
addresses are mapped to valid IP addresses
in a one-to-one relationship
• Dynamic address translation – multiple IP
addresses are mapped to valid IP addresses
randomly
IP Address Conservation
• Network Address Translation (NAT)
– Implementations of NAT
• Full cone
• Restricted cone
• Port-restricted cone
• Symmetric
– NAT and convergence
IP Address Conservation
• Classless Interdomain Routing (CIDR)
– A method to minimize the number of routing
table entries
– Also called supernetting
– Allocates multiple IP addresses so they can be
summarized into a smaller number of routing
table entries
Normal TCP/IP
Desktop Configurations
• Basic configurations
– IP address
– Subnet mask
– Default gateway
– DHCP client
– DNS server
Normal TCP/IP
Desktop Configurations
• Name resolution configurations
– Host name
– Domain name
– DNS server
– NetBIOS name
– WINS server
Normal TCP/IP
Desktop Configurations
• Domain Name System (DNS)
– DNS translates IP addresses into easily
recognizable names
– Domain name syntax
Normal TCP/IP
Desktop Configurations
• Dynamic Host Configuration Protocol (DHCP)
– A protocol that assigns IP addresses
automatically on a TCP/IP network
– Along with an IP address, DHCP can specify:
• Subnet mask
• Default gateway
• DNS server
• WINS server
– IP addresses can be reserved by mapping an IP
address in the DHCP pool to a client’s MAC
address
Internet Protocol Version 6 (IPv6)
Addressing Essentials
• IPv4 versus IPv6 addresses
– Different length
• IPv4 – 32 bits divided into four 8-bit integers
• IPv6 – 128 bits divided into eight 16-bit
integers
– Different notation
• IPv4 – dotted decimal
• IPv6 – colon notation
– Different number system
• IPv4 – decimal
• IPv6 – hexadecimal
Summary
 Define and describe the Internet architecture model
and various Internet protocols
 Describe the purpose of RFCs
 Explain the routing process
 Compare and contrast RIP with OSPF
 Describe port numbers and their functions
 Explain IP addressing, address classes and the
concept of uniqueness
 Explain the use of private addresses
Summary
(cont'd)
 Identify default subnet masks and explain their
function
 Calculate custom subnet masks and CIDR notation
using supernetting techniques
 Describe the function of proxy servers and NAT
 Define the TCP/IP properties needed to configure a
typical workstation
 Compare and contrast IPv4 with IPv6
Lesson 5:
TCP/IP Troubleshooting
Copyright © 2006 Prosoft Learning, a VCampus Company - All rights reserved.
Objectives
• Describe the protocol and services files
• Describe ICMP concepts and message types
• Describe various diagnostic tools for
troubleshooting TCP/IP networks
• Identify the functions of commands that can assist
with both general and name and address
troubleshooting
• Describe network analyzers and the services they
provide to the network
• Describe items to take into consideration when
troubleshooting connectivity on a LAN or to the
Internet
Useful Network Files
• The services file
– Contains port numbers for well-known services
• The protocol file
– Identifies the Internet protocols used on a
network
• Located in windows\system32\drivers\etc
Internet Control
Message Protocol (ICMP)
• ICMP is known as the troubleshooting protocol of
TCP/IP
• A required part of the TCP/IP stack
• Specified in RFCs 844, 1256 and 1788
• Allows Internet hosts and gateways to report errors
– Source-quench error messages – generated
when packets arrive too quickly for a host or
gateway to process
– Echo-request and echo-reply messages – used
by the ping command to test for reachability
General
Network Commands
•
•
•
•
•
ping
tracert
netstat
ftp
telnet
ping
• Tests connectivity between source and destination
systems
• Syntax: ping ip_address
• Includes several options
ping output
tracert/traceroute
•
•
•
Used to determine the path between the source
and destination systems
Provides information on round-trip propagation
time between each router and the source system
Output:
1
<10 ms <10 ms <10 ms gateway
[192.168.3.1]
2
<10 ms <10 ms <10 ms student12
[192.168.4.12]
Trace complete
•
You can use tracert to locate failures far from your
local network
tracert output
netstat
• Displays information about packets processed by your
system on the network
• Shows the state of sockets
• If executed without specifying options, the netstat command
displays established active connections:
Active Connections
Proto
Local Address Foreign Address
TCP student13:1037
192.168.3.13:1040
ESTABLISHED
TCP student13:1041
192.168.3.13:1050
ESTABLISHED
TCP student13:1046
192.168.3.13:1040
ESTABLISHED
TCP student13:1050
192.168.3.13:1050
ESTABLISHED
TCP student13:1599
207.199.11.24:ftp
ESTABLISHED
State
netstat output
ftp and telnet
• The ftp command accesses FTP servers
– Primarily used to transfer files
– Also used to test network connectivity
• The telnet command allows users to log on to a
remote computer, provided that permission has
been granted
– Ideal for troubleshooting because you can log
on to a system from wherever you are and work
as if you were sitting in front of it
Maximum Transmission Unit (MTU)
• Functions
– Describes an IP packet’s maximum size
– Affects a system’s ability to communicate
locally
• Changing the MTU in a workstation
– In Windows, you must edit a registry key
– In Linux, you use the ifconfig command
• Discovering a path’s MTU
– Send ICMP packets of different sizes to the
router
– Specify the Do Not Fragment option
Name and
Address Commands
•
•
•
•
•
•
ipconfig
winipcfg
arp
nslookup
hostname
nbtstat
ipconfig
• The ipconfig command is used to display IP
configurations in Windows
• Syntax: ipconfig options
• Options include:
– /all – shows all IP-related configuration
information
– /release – releases an IP address obtained from
a DHCP server
– /renew – releases an IP address from a DHCP
server
• ifconfig is used to display IP configuration settings
in UNIX-based systems, including Linux; has much
of the same functionality as the Windows ipconfig
command
ipconfig output
winipcfg
• Used by Windows 95/98/Me
• Presents an IP Configuration dialog box in which
you can view and edit settings
arp
• The arp command displays Address Resolution
Protocol (ARP) information
• ARP resolves software (IP) addresses into
hardware (MAC) addresses
Interface: 192.168.3.13 on Interface 0x1000003
Internet Address Physical Address
Type
192.168.3.11
00-60-83-7c-24-a2
dynamic
192.168.3.15
00-60-97-24-db-df
dynamic
192.168.3.1
00-aa-00-38-e7-c3
dynamic
nslookup
• An interactive program used to query Internet
domain name servers
• Frequently used to test communication with and
operation of DNS servers
hostname
• Displays the current host’s name
nbtstat
• NetBIOS over TCP/IP statistics (nbtstat) is helpful
for determining NetBIOS names when only an IP
address is available
• Also displays protocol statistics and TCP/IP
connections
Network
Analyzers
• Used for:
– Monitoring network traffic to identify network
trends
– Identifying network problems and sending alert
messages
– Identifying specific problems
– Testing network connections, devices and
cables
• Also known as protocol analyzers
LAN Troubleshooting Considerations
• DNS name resolution
– Is the address for the DNS server correct?
• Hosts file configuration
– Is the lmhosts file accurate?
• Static vs. dynamic IP addressing
– Are two nodes attempting to use the same IP
address?
• Default gateway and subnet mask
– Is the default gateway specified correctly?
– Is the proper subnet mask specified?
Summary
 Describe the protocol and services files
 Describe ICMP concepts and message types
 Describe various diagnostic tools for
troubleshooting TCP/IP networks
 Identify the functions of commands that can assist
with both general and name and address
troubleshooting
 Describe network analyzers and the services they
provide to the network
 Describe items to take into consideration when
troubleshooting connectivity on a LAN or to the
Internet
Data Networking





Introduction to Data Networking
Networking Protocols
LANs and WANs
TCP/IP Suite and Internet Addressing
TCP/IP Troubleshooting