* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Chapter One
IEEE 802.1aq wikipedia , lookup
Distributed firewall wikipedia , lookup
Network tap wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Airborne Networking wikipedia , lookup
Computer network wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Deep packet inspection wikipedia , lookup
TCP congestion control wikipedia , lookup
Communication protocol wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Chapter Three Network Protocols Introduction to Protocols Protocol Rules network uses to transfer data Protocols that can span more than one LAN segment are routable SNA & DLC becoming outdated due to nonroutability Multiprotocol network Network using more than one protocol TCP/IP OSI Model TCP/IP Transmission Control Protocol/Internet Protocol (TCP/IP) Suite of small, specialized protocols called subprotocols Figure 3-1: TCP/IP compared to the OSI Model The TCP/IP Core Protocols Certain subprotocols of TCP/IP suite Operate in Transport or Network layers of OSI Model Provide basic services to protocols in other layers of TCP/IP TCP and IP are most significant core protocols in TCP/IP suite Internet Protocol (IP) Provides information about how and where data should be delivered Subprotocol that enables TCP/IP to internetwork To internetwork is to traverse more than one LAN segment and more than one type of network through a router In an internetwork, the individual networks that are joined together are called subnetworks (or subnets) Internet Protocol (IP) IP datagram IP portion of TCP/IP frame that acts as an envelope for data Contains information necessary for routers to transfer data between subnets Figure 3-2: Components of an IP datagram Internet Protocol (IP) Version IPv4 – current version used for 20 years IPv6 – in process Time to live (TTL) – max time, in seconds, that a datagram can remain on the network before it is discarded Also corresponds to # of router hops Internet Protocol (IP) IP is an unreliable, connectionless protocol, which means it does not guarantee delivery of data Connectionless Allows protocol to service a request without requesting verified session and without guaranteeing delivery of data Transport Control Protocol (TCP) TCP Provides reliable data delivery services Connection-oriented subprotocol Requires establishment of connection between communicating nodes before protocol will transmit data TCP segment Holds TCP data fields Becomes encapsulated by IP datagram Transport Control Protocol (TCP) Port Address on host where application makes itself available to incoming data Figure 3-3: A TCP segment Additional Core Protocols of the TCP/IP Suite User Datagram Protocol (UDP) Connectionless transport service Lack of sophistication makes it more efficient than TCP Live audio/video transmissions over the Internet Internet Control Message Protocol (ICMP) Notifies sender of an error in transmission process and that packets were not delivered Sits between IP & TCP in Internet layer of TCP/IP model Used by PING diagnostic tool Address Resolution Protocol (ARP) Obtains MAC address of host or node Creates local database mapping MAC address to host’s IP address TCP/IP Application Layer Protocols These protocols work over TCP (or UDP) and IP: Telnet Used to log on to remote hosts using TCP/IP protocol suite File Transfer Protocol (FTP) Used to send and receive files via TCP/IP Simple Mail Transfer Protocol (SMTP) Responsible for moving messages from one e-mail server to another, using the Internet and other TCP/IP-based networks Simple Network Management Protocol (SNMP) Manages devices on a TCP/IP network Addressing in TCP/IP IP Address Logical address used in TCP/IP networking Unique 32-bit number Divided into four groups of octets (8-bit bytes) that are separated by periods IP addresses are assigned and used according to very specific parameters Example: 144.92.43.178 Addressing in TCP/IP Table 3-1: Commonly used TCP/IP classes Though 8 bits have 256 possible combinations, only the numbers 1 through 254 are used to identify networks and hosts Numbers 0 and 255 are reserved for broadcasts Broadcast are transmissions to all stations on a network Addressing in TCP/IP Group A Only 126 available – used/reserved for large corporations or governments Share the first octet (1-126) i.e. 23.78.110.109, 23.164.32.97 Group B Share the first two octets (128-191) i.e. 168.34.88.29, 168.34.55.41 Group C Share the first three octets (192-223) i.e 204.139.118.7, 204.139.118.14 Addressing in TCP/IP Loopback address IP address reserved for communicating from a node to itself Value of the loopback address is always 127.0.0.1 (try it) Internet Corporation for Assigned Names and Numbers (ICANN) – formerly InterNIC Non-profit organization currently designated by U.S. government to maintain and assign IP addresses Addressing in TCP/IP Firewall Specialized device (typically a router) Selectively filters or blocks traffic between networks May be strictly hardware-based or may involve a combination of hardware and software Host Computer connected to a network using the TCP/IP protocol Addressing in TCP/IP IP address data are sent across the network in binary form In IP address 131.127.3.22, to convert the first octet (131) to a binary number: On Windows 2000, click Start, point to Programs, point to Accessories, then click Calculator Click View, then click Scientific (make sure Dec option button is selected) Type 131, then click Bin option button The binary equivalent of number 131, 10000011, appears in the display window Addressing in TCP/IP Static IP address IP address manually assigned to a device Dynamic Host Configuration Protocol (DHCP) Application layer protocol Manages dynamic distribution of IP addresses on a network Viewing Current IP Information Figure 3-4: Example of an IP configuration window Viewing Current IP Information Figure 3-5: IP address information on a Windows 2000 workstation Addresses and Names In addition to using IP addresses, TCP/IP networks use names for networks and hosts Each host requires a host name Each network requires a network name, also called a domain name Together, host name and domain name constitute the fully qualified domain name (FQDN) IPX/SPX Internetwork Packet Exchange/Sequence d Packet Exchange (IPX/SPX) Protocol originally developed by Xerox Modified and adopted by Novell in the 1980s for the NetWare network operating system Figure 3-6: IPX/SPX compared to the OSI Model IPX/SPX Core Protocols Internetwork Packet Exchange (IPX) Operates at Network layer of OSI Model Provides routing and internetworking services Similar to IP in TCP/IP suite Socket – logical address assigned to a specific process Figure 3-7: Components of an IPX datagram IPX/SPX Core Protocols Sequenced Packet Exchange (SPX) Belongs to Transport layer of OSI Model Works in tandem with IPX to ensure data are received: Whole In sequence Error free Similar to TCP IPX/SPX Core Protocols Figure 3-8: SPX packet encapsulated by an IPX datagram IPX/SPX Core Protocols Service Advertising Protocol (SAP) Works in Application, Presentation, Session, and Transport layers of OSI Model Runs directly over IPX Used by NetWare servers and routers to advertise to entire network which services they can provide Can lead to unnecessary network traffic IPX/SPX Core Protocols NetWare Core Protocol (NCP) Works within Presentation and Sessions layers of OSI Model Works over IPX Handles requests for services between clients and servers Addressing in IPX/SPX IPX address Address assigned to a device on an IPX/SPX network Contains two parts: Network address (external network number) Established Network Admin when network is installed Node address NIC MAC address Example (8.12): 000008A2:0060973E97F3 NetBIOS and NetBEUI Network Basic Input Output System (NetBIOS) Originally designed by IBM to provide Transport and Session layer services Adopted by Microsoft as its foundation protocol Microsoft added Application layer component called NetBEUI NetBIOS and NetBEUI NetBIOS Enhanced User Interface Fast and efficient protocol Consumes few network resources Provides excellent error correction Requires little configuration Can handle only 254 connections Does not allow for good security By itself, it is not routable NetBIOS and NetBEUI Compared to the OSI Model Figure 3-9: NetBIOS/NetBEUI compared to the OSI Model NetBIOS Addressing Figure 3-10: Identification tab in Network properties AppleTalk Protocol suite used to interconnect Macintosh computers Originally designed to support peer-to-peer networking among Macintoshes Can now be routed between network segments and integrated with NetWare- and Microsoftbased networks AppleTalk networks are separated into logical groups of computers called AppleTalk zones Apple has begun supporting TCP/IP AppleTalk and OSI Model Figure 3-11: AppleTalk protocol compared to OSI Model Addressing in AppleTalk AppleTalk node ID Unique 8-bit or 16-bit number identifying a computer on an AppleTalk network AppleTalk network number Unique 16-bit number identifying the network to which a node is connected Installing Protocols After installing protocols, they must be binded to NICs and services they run on or with Binding Process of assigning one network component to work with another