Download Linux+ Guide to Linux Certification

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Point-to-Point Protocol over Ethernet wikipedia , lookup

Remote Desktop Services wikipedia , lookup

Net bias wikipedia , lookup

Dynamic Host Configuration Protocol wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Server Message Block wikipedia , lookup

Wireless security wikipedia , lookup

Network tap wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Distributed firewall wikipedia , lookup

Deep packet inspection wikipedia , lookup

Computer network wikipedia , lookup

TCP congestion control wikipedia , lookup

Wake-on-LAN wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Airborne Networking wikipedia , lookup

AppleTalk wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Internet protocol suite wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
Hands-on Networking
Fundamentals
Chapter 3
Using Network Communication Protocols
An Overview of Network Protocols
• Protocols enable effortless interchange
• Analogize protocols to dialects
– Computer communication requires common protocol
– Human communication requires common dialect
• LANs may transport multiple protocols
– Network device (such as router) makes distinctions
– Example: Ethernet hosts TCP/IP for Windows server,
AppleTalk for Macintosh computer
• Pros and cons of hosting multiple protocols
– Pro: networks perform many different functions on LAN
– Con: volume of network traffic increases
Hands-on Networking Fundamentals
2
Hands-on Networking Fundamentals
3
Properties of a LAN Protocol
• Capabilities included in properties of LAN protocol
–
–
–
–
Enable reliable network links
Communicate at relatively high speeds
Handle source and destination node addressing
Follow standards, particularly the IEEE 802 standards
• Protocols have different strengths and drawbacks
– Example 1: some (not all) protocols are routable
– Example 2: some protocols have poor error checking
• Protocols typically used on LANs
– IPX/SPX, NetBEUI, AppleTalk, and TCP/IP
– TCP is most widely used due to relation to Internet
Hands-on Networking Fundamentals
4
Understanding IPX/SPX
• Internetwork Packet Exchange (IPX)
– Developed by Novell for NetWare operating system
• NetWare used with Ethernet bus, token ring, ARCnet
– Modeled after Xerox Network System (XNS) protocol
• Sequenced Packet Exchange (SPX)
– Companion protocol to IPX
– Developed for use with applications, such as databases
• IPX/SPX used on NetWare servers through version 4
• TCP/IP is preferred protocol for NetWare 6 and above
• New NetWare versions can still implement IPX/SPX
Hands-on Networking Fundamentals
5
Hands-on Networking Fundamentals
6
Activity 3-1: Configuring NWLink in
Windows XP
• Time Required: Approximately 5 minutes
• Objective: Configure a Windows XP client to
access NetWare using NWLink (similar for
Windows Server 2003).
• Description: Configure Windows XP to use Client
Service for NetWare and NWLink for accessing an
older NetWare server. Log on to Windows XP using
an account that has Administrator privileges.
Hands-on Networking Fundamentals
7
The History and Role of TCP/IP
• Advanced Research Projects Agency (ARPA)
– Networking goal: enable university, research, and
Defense Department to communicate
• ARPANET WAN: prototype for modern networks
• An early protocol: Network Control Protocol (NCP)
– Enabled DEC, IBM, and other hosts to communicate
– Did not provide wholly reliable communication
• TCP/IP combination: an improvement over NCP
– TCP (Transmission Control Protocol)
– IP (Internet Protocol)
• TCP/IP has become most widely used protocol suite
Hands-on Networking Fundamentals
8
The History and Role of TCP/IP
(continued)
• Five advantages of TCP/IP
–
–
–
–
Used worldwide on most networks and the Internet
Influences design of wide range of network devices
Main protocol of most computer operating systems
Subject to many troubleshooting and network
analysis tools
– Understood by large body of network professionals
• TCP/IP associated with a suite of protocols and
applications
• Associations enable TCP/IP to underlie vast range
of communications capabilities
Hands-on Networking Fundamentals
9
Hands-on Networking Fundamentals
10
Understanding TCP/IP
• TCP specified in RFC 793
– Designed for point-to-point communications
• IP specified in RFC 791
– Developed to link nodes in different networks or WANs
• TCP and IP first combined for use with UNIX
• TCP/IP layers may be roughly mapped to OSI layers
• Core components of TCP/IP protocol suite
– Transmission Control Protocol (TCP)
– User Datagram Protocol (UDP)
– Internet Protocol (IP)
Hands-on Networking Fundamentals
11
How Transmission Control Protocol
Works
• TCP is a transport protocol (Layer 4 in OSI model)
– Establishes sessions between network nodes
– Sequences and acknowledges frames
• Provides for reliable end-to-end delivery
• Sequence number placed in TCP frame header
– Shows frame sequence in stream of frames
– Indicates amount of data in frames
• Sequence number checked for frame correctness
• Sliding window: number of data bytes in frame
– May be dynamically adjusted if two nodes agree
Hands-on Networking Fundamentals
12
How Transmission Control Protocol
Works (continued)
• Main TCP functions (similar in OSI Transport layer)
–
–
–
–
Monitor for session requests
Establish sessions with other TCP nodes
Transmit and receive data
Close transmission sessions
• TCP ports: used to form virtual circuit between nodes
– Enable multiple processes to communicate in session
• TCP segment: header and data payload in TCP frame
• TCP header contains 11 fields
– Minimum length is 20 bytes
Hands-on Networking Fundamentals
13
Hands-on Networking Fundamentals
14
Hands-on Networking Fundamentals
15
How the User Datagram Protocol
(UDP) Works
• User Datagram Protocol (UDP)
– Connectionless protocol
– Operates at OSI Layer 4 (like TCP)
– Alternative to TCP when high reliability not required
• Frame has four-field header and data
• Relies only on checksum to ensure reliability
• Connectionless protocol
– No flow control, sequencing, or acknowledgment
• Advantages: adds little overhead onto IP
– Used with transaction processing applications
– Carries important network status messages
Hands-on Networking Fundamentals
16
Hands-on Networking Fundamentals
17
How the Internet Protocol (IP) Works
• A LAN may be composed of series of subnetworks
• A WAN may comprise series of autonomous networks
– Examples: DSL, SONET, X.25, and ISDN
• Communications enabled by Internet Protocol (IP)
– Between different subnetworks on a LAN
– Between different networks on a WAN
• Network transport options should be compatible with
TCP/IP
• Transport options include: Ethernet, token ring, X.25,
FDDI, ISDN, DSL, frame relay, ATM
Hands-on Networking Fundamentals
18
How the Internet Protocol (IP) Works
(continued)
• Basic IP Functions: data transfer, packet addressing,
packet routing, fragmentation, detection of errors
• Addressing essential for data transfer and routing
– 32-bit network node address used with 48-bit MAC
address
• Connectionless protocol
– Provides network-to-network addressing and routing
information
– Changes packet size when size varies with network
• Datagram: TCP segment formatted with IP header
• IP packet header consists of thirteen fields
Hands-on Networking Fundamentals
19
Hands-on Networking Fundamentals
20
How IP Addressing Works
• IP addressing used to identify two entities
– Specific node
– Network on which node resides
• Unique IP address enables accurate packet delivery
• Two nodes with same IP address create error
• IP addressing concepts fundamental in networking
Hands-on Networking Fundamentals
21
Basic IP Addressing
• Dotted decimal notation: IP address format
– Four fields totaling 32 bits
• Fields are decimal values representing 8-bit binary octets
– Part of address is network ID, part is host ID
– Example in decimal format: 129.5.10.100
• Five IP address classes, Class A through Class E
– Address reflects network size and transmission type
• Three types of transmission
– Unicast: packet sent to each requesting client
– Multicast: packet sent to group of requesting clients
– Broadcast: communication sent to all network nodes
Hands-on Networking Fundamentals
22
Hands-on Networking Fundamentals
23
The Role of the Subnet Mask
• TCP/IP requires configured subnet mask
• Subnet mask used for two purposes
– Show class of addressing used
– Divide networks into subnetworks to control traffic
• Example of a subnet mask:
–
–
–
–
11111111.00000000.00000000.00000000 (255.0.0.0)
Indicates Class A network
Ones represent network/subnet identification bits
Zeroes represent host identification bits
Hands-on Networking Fundamentals
24
Creating Subnetworks
• Subnet mask contains subnet ID
– Subnet ID contained within network and host IDs
– Subnet ID determined by network administrator
– Ex: 11111111.11111111.11111111.00000000
(255.255.255.0)
•
Third octet in Class B address indicates subnet ID
• Subnet mask overrides four-octet length limitation
• Classless Interdomain Routing (CIDR) addressing
– Puts a slash ( / ) after the dotted decimal notation
• Number after slash represents bits in network ID
– Example (decimal): 165.100.18.44/18
• 18 bits needed for network ID, 14 for host ID (32 -18)
Hands-on Networking Fundamentals
25
IP Address Rules
• Network number 127.0.0.0 cannot be assigned
– Address used for diagnostic purposes
• Certain IP network numbers reserved as private
• No one can use private addresses on Internet
– Designed for use behind NAT device; e.g., firewall
– May be used on private network with NAT device
• Network number cannot be assigned
• Highest number on a network cannot be assigned
– Address interpreted as broadcast message for subnet
– Example: cannot assign 198.92.4.255
Hands-on Networking Fundamentals
26
Activity 3-5: View the IP Address and
Subnet Mask Configuration in Windows
XP and Windows Server 2003
• Time Required: Approximately 5 minutes
• Objective: View and learn where to configure IP
addressing information in Windows XP and
Windows Server 2003
• Description: This activity enables you to view
where to set up the IP address and subnet mask in
Windows XP Professional or Windows Server
2003.
Hands-on Networking Fundamentals
27
The Promise of IPv6
•
•
•
•
IPv6 developed through IETF initiative
IPv6 overcomes limitations of IPv4
Networks are beginning to transition to IPv6
Five prominent features of IPv6
–
–
–
–
–
128-bit address capability
Single address associated with multiple interfaces
Address autoconfiguration and CIDR addressing
40-byte header instead of IPv4’s 20-byte header
New IP extension headers for special needs
• Includes more routing and security options
Hands-on Networking Fundamentals
28
The Promise of IPv6 (continued)
• Three IPv6 packet types: unicast, anycast, multicast
• DES (Data Encryption Standard)
– Network symmetric-key encryption standard
• IPv6 supports DES compatible encryption techniques
• Benefits of IPv6 encryption capability
– Security over Internet
– Security over other types of LANs and WANs
• Disadvantage of IPv6 encryption capability
– Increases latency of network communications
• Latency: travel time from sending node to receiving node
Hands-on Networking Fundamentals
29
TCP/IP Application Protocols
• Useful protocols and applications in TCP/IP suite
– Telnet
– Secure Shell (SSH)
– FileTransfer Protocol (FTP), Trivial FileTransfer
Protocol (TFTP), and Network File System (NFS)
– Simple Mail Transfer Protocol (SMTP)
– Domain Name System (DNS)
– Dynamic Host Configuration Protocol (DHCP)
– Address Resolution Protocol (ARP)
– Simple Network Management Protocol (SNMP)
– Hypertext Transfer Protocol (HTTP), Secure Hypertext
Transfer Protocol (S-HTTP), HTTP Secure (HTTPS)
Hands-on Networking Fundamentals
30
Telnet
• Telnet: application protocol for terminal emulation
• Terminal: device with a monitor and keyboard
– Examples: IBM 3270 or DEC VT220
• Terminal emulation: Computer behaving like terminal
– User access resources in a remote host
– Example: Telnet with 3270 emulator connects to IBM
mainframe like terminal
• Important Telnet features
– Comes with nearly all implementations of TCP/IP
– Open standard
– A number of communications options
Hands-on Networking Fundamentals
31
SSH
• Secure Shell (SSH)
– Provides authentication security for TCP/IP
applications
– Used on many UNIX/Linux systems and in MAC OS X
• Circumstances for using SSH (if available)
– Remotely accessing a computer
– Uploading and downloading files
• How to start SSH application
– Enter ssh at the UNIX/Linux command line
• Learning about system dependent implementation
– Use the man ssh command in Linux and Mac OS X
Hands-on Networking Fundamentals
32
File Transfer Protocol (FTP), Trivial File
Transfer Protocol (TFTP), and Network
File System (NFS)
• FTP: allows transfer of data between remote devices
– Transmissions may be binary or ASCII formatted files
– Transmissions ensured by connection-oriented service
• Limitation of FTP: cannot transfer portion of file
• TFTP: intended for transfer of small files
– Use for non-critical and non-secure transmissions
– Connectionless protocol running UDP instead of TCP
• NFS: Sun Microsystem's alternative to FTP
– Uses connection-oriented protocol running in TCP
Hands-on Networking Fundamentals
33
Simple Mail Transfer Protocol (SMTP)
• Designed for exchange of electronic mail
• Two implementations
– For e-mail exchange between networked systems
– In local e-mail systems for Internet transport
• Provides alternative to FTP for file transfer
– Limited to sending text files
– Requires e-mail address on receiving end
– Does not require logon ID and password
• Two part message: address header and message text
• Supported in TCP by connection-oriented service
Hands-on Networking Fundamentals
34
Domain Name System (DNS)
• Domain: logical grouping of network resources
• Domains given unique names; e.g., Microsoft.com
• DNS resolves domain names
– Resolution: converts domain name to IP address
• Internet host domain names have two to three parts
–
–
–
–
Top-level domain name (TLD): organization or country
Optional subdomain name: university/business name
Host name: name of computer
Example: [email protected]
• ICANN coordinates and registers root domain names
Hands-on Networking Fundamentals
35
Hands-on Networking Fundamentals
36
Domain Name System (DNS)
(continued)
• Namespace: logical area with list of named objects
• Zones: partitions in DNS server with resource records
– Forward lookup zone links computer name to IP address
– Reverse lookup zone links IP address to computer name
• Three servers related to DNS
– Primary DNS server: authoritative server for zone
– Secondary DNS server: backup servers
– Root servers: find TLDs on the Internet
• Two DNS standards
– Service resource record (SRV RR)
– DNS dynamic update protocol
Hands-on Networking Fundamentals
37
Dynamic Host Configuration Protocol
(DHCP)
• Enables automatic assignment of IP address
• Process of assigning address by DHCP server
–
–
–
–
Newly configured computer contacts DHCP server
DHCP server leases an IP address to new computer
Lease length set on DHCP server by network admin
Server or host may be given lease that does not
expire
• IP address will never change with permanent lease
Hands-on Networking Fundamentals
38
Address Resolution Protocol (ARP)
• Enables sender to retrieve MAC address
• Process of obtaining MAC address
– Sending node sends ARP broadcast frame
• Frame has MAC address, IP address of recipient
– Receiving node sends back its MAC address
• Reverse Address Resolution Protocol (RARP)
– Used by network node to determine its IP address
– Used by applications to determine IP address of
workstation or server
Hands-on Networking Fundamentals
39
Simple Network Management Protocol
(SNMP)
• Enables steady monitoring of network activity
• Advantages
– Operates independently on the network
– Management functions carried out on special node
– Has low memory overhead
• Node types: network management station (NMS)
and network agents
• SNMPv2 offers better security, error handling,
multiprotocol support, transmissions
• SNMP and SNMPv2 monitor LANs and WANS
Hands-on Networking Fundamentals
40
Activity 3-8: Configuring an SNMP
Agent
• Time Required : Approximately 15 minutes
• Objective: Learn to make Windows XP an SNMP
agent.
• Description: Windows XP can be configured to act
as an SNMP agent for a network management
station. In this project, you learn how to install
SNMP in Windows XP.
Hands-on Networking Fundamentals
41
HTTP, S-HTTP, and HTTPS
• Hypertext Transfer Protocol (HTTP)
– Enables establishment of a Web connection
– Provides for exchange of resources
• Example: displaying Web page in browser
• Secure Hypertext Transfer Protocol (S-HTTP)
– Used primarily in native HTTP communications
– Does not encrypt data in IP-level communications
• Hypertext Transfer Protocol Secure (HTTPS)
– Uses Secure Sockets Layer to implement security
– More common than S-HTTP
Hands-on Networking Fundamentals
42
TCP and the OSI Reference Model
Compared
• Portions of TCP moving closer to OSI model
– Physical layer: TCP supports coaxial, twisted-pair,
fiber-optic, wireless communication
– Data Link layer: TCP compatible with IEEE 802.2 LLC
and MAC addressing
– Network layer: TCP/IP equivalent is IP
– Transport layer: both TCP and UDP operate here
– Upper layers of OSI correspond to TCP/IP
applications
Hands-on Networking Fundamentals
43
Hands-on Networking Fundamentals
44
Transporting LAN Protocols Over
WANs
• WAN protocols enable transport from LANs to WANs
• Serial Line Internet Protocol (SLIP)
– Encapsulates TCP/IP during connection session
– TCP/IP removed from SLIP after data payload received
• Compressed Serial Line Internet Protocol (CSLIP)
– Newly developed extension of SLIP
– Compresses header in each packet sent across link
• SLIP and CSLIP do not support
– Network connection authentication
– Setup of connections at multiple layers
– Synchronous connections
Hands-on Networking Fundamentals
45
Transporting LAN Protocols Over
WANs (continued)
• Point-to-Point Protocol (PPP)
– Supports more network protocols than SLIP
– Automatically sets up connections with several layers
– Supports connection authentication and encryption
• Point-to-Point Tunneling Protocol (PPTP)
– Supplements PPP
– Enables remote communications via the Internet
• PPTP and PPP support synchronous communication
• PPTP and PPP support Password Authentication
Protocol (PAP)
Hands-on Networking Fundamentals
46
Transporting LAN Protocols Over
WANs (continued)
• Layer Two Tunneling Protocol (L2TP)
–
–
–
–
Similar to PPTP, and like PPTP used on VPNs
Like PPTP, L2TP encapsulates PPP
Creates special tunnels over public network (Internet)
Uses Layer Two Forwarding (based on MAC addresses)
• Signaling System 7 (SS7)
– For fast communications between different type WANS
– Supports call roaming, voicemail, redirection of 800 calls
– Adapted for T-carrier and other WAN communications
Hands-on Networking Fundamentals
47
Designing A Network To Use TCP/IP
And Application Protocols
• Scenario: network personnel in medical office
• Seven major components in network design
– Workstations and servers configured for TCP/IP
• Automatic (DHCP-based) IP addressing used
– DHCP used to lease IP addresses to workstations
• All servers given permanent IP addresses
–
–
–
–
–
SNMP used in certain stations for network monitoring
Network browsers set up to use PPP for Internet links
Workstations set up to use FTP/HTTP through firewalls
E-mail system configured to employ SMTP
Primary DNS server and secondary DNS server set up
Hands-on Networking Fundamentals
48