TCP/IP (continued) - Personal.kent.edu

advertisement
Network+ Guide to Networks
Third Edition
Chapter 4:
Network Protocols
Objectives
Identify the characteristics of TCP/IP,
IPX/SPX, NetBIOS, and AppleTalk
Understand how key network protocols
correlate to layers of the OSI Model
Identify the core protocols of the TCP/IP suite
and describe their functions
Network +
2
Objectives (continued)
Understand the most popular protocol
addressing schemes
Describe the purpose and implementation of
the domain name system
Install protocols on Windows XP clients
Network +
3
Introduction To Protocols
• Protocol is a rule that governs how
networks communicate
• Define the standards for communication between
network devices
• Vary according to their speed, transmission
efficiency, utilization of resources, ease of setup,
compatibility, and ability to travel between different
LANs
Network +
4
Introduction To Protocols
• Networks running more than one protocol are called
multiprotocol networks
Network +
5
Transmission Control Protocol
/Internet Protocol (TCP/IP)
• TCP/IP is not simply one protocol, but rather a
suite of specialized protocols—including TCP, IP,
UDP, ARP, and many others—called sub protocols
• Extremely popular because of low cost
Network +
6
TCP/IP (continued)
• Has ability to communicate between a multitude of
dissimilar platforms
• The core protocols are free and their code is
available for anyone to read or modify
• Its routable, because they carry Network layer
addressing information that can be interpreted by
a router
Network +
7
TCP/IP (continued)
• Has flexibility because it can run on virtually any
combination of network operating systems or
network media
• TCP/IP Compared to the OSI Model
• The TCP/IP suite of protocols can be divided into
four layers that roughly correspond to the seven
layers of the OSI Model
Network +
8
TCP/IP (continued)
• TCP/IP Compared to the OSI Model
(continued)
• Application layer
• Applications gain access to the network through this
layer, via protocols
• Transport layer
• Holds the Transmission Control Protocol (TCP) and
User Datagram Protocol (UDP), which provide flow
control, error checking, and sequencing
Network +
9
TCP/IP (continued)
• TCP/IP Compared to the OSI Model
(continued)
• Internet layer
• Holds the Internet Protocol (IP), Internet Control
Message Protocol (ICMP), and Address Resolution
Protocol (ARP).These protocols handle message
routing, error reporting, delivery confirmation, and
logical addressing
• Network Interface Layer
• This layer handles the formatting of data and
transmission to the network wire
Network +
10
TCP/IP (continued)
• The TCP/IP Core Protocols
• Certain sub protocols of the TCP/IP suite
• Operate in the Transport or Network layers of the
OSI Model
Network +
11
TCP/IP (continued)
• Transmission Control Protocol (TCP)
• Operates in the Transport layer of both the OSI
and the TCP/IP Models and provides reliable data
delivery services
• TCP is a connection-oriented sub protocol
Network +
12
TCP/IP (continued)
• Fields belonging to a TCP segment are
described in the following list:
• Source port
• Destination port
• Sequence number
Network +
13
TCP/IP (continued)
• Acknowledgment number (ACK)
• TCP header length
• Reserved
• Flags
• Sliding-window size (or window)
Network +
14
TCP/IP (continued)
• Checksum - Allows the receiving node to
determine whether the TCP segment became
corrupted during transmission
• Urgent pointer - Indicate a location in the data field
• Options - Used to specify special options
Network +
15
TCP/IP (continued)
• Padding - Contains filler information to ensure that
the size of the TCP header is a multiple of 32 bits
• Data - Contains data originally sent by the source
node and the size of the Data field depends on
how much data needs to be transmitted
Network +
16
TCP/IP (continued)
• User Datagram Protocol (UDP)
• A connectionless transport service
• UDP offers no assurance that packets will be
received in the correct sequence
Network +
17
TCP/IP (continued)
• User Datagram Protocol (UDP)
• Provides no error checking or sequencing
• More efficient for carrying messages that fit within
one data packet
Network +
18
TCP/IP (continued)
• Internet Protocol (IP)
• Provides information about how and where data
should be delivered, including the data’s source
and destination addresses
• IP is the sub protocol that enables TCP/IP to
internetwork
Network +
19
TCP/IP (continued)
• Internet Protocol (IP)
• IP datagram acts as an envelope for data and
contains information necessary for routers to
transfer data between different LAN segments
• IP is an unreliable, connectionless protocol, which
means that it does not guarantee delivery of data
Network +
20
TCP/IP (continued)
• Internet Control Message Protocol (ICMP)
• An Internet layer protocol that reports on the
success or failure of data delivery
• ICMP announcements provide critical information
for troubleshooting network problems
Network +
21
TCP/IP (continued)
• Address Resolution Protocol (ARP)
• An Internet layer protocol that obtains the MAC
(physical) address of a host, or node, then creates
a database that maps the MAC address to the
host’s IP (logical) address
Network +
22
TCP/IP (continued)
• Address Resolution Protocol (ARP) table
• Dynamic ARP table entries are created when a
client makes an ARP request that cannot be
satisfied by data already in the ARP table
• Static ARP table entries are those that someone
has entered manually using the ARP utility
• ARP can be a valuable troubleshooting tool
Network +
23
TCP/IP (continued)
• Reverse Address Resolution Protocol
(RARP)
• Allow the client to send a broadcast message with
its MAC address and receive an IP address in
reply
• RARP was originally developed as a means for
diskless workstations
Network +
24
TCP/IP (continued)
• Addressing in TCP/IP
• Two kinds of addresses: Logical or physical
Network +
25
TCP/IP (continued)
• Logical (or Network layer) can be manually or
automatically assigned and must follow rules set
by the protocol standards
• Physical (or MAC, or hardware) addresses are
assigned to a device’s network interface card at
the factory by its manufacturer
• Addresses on TCP/IP-based networks are often
called IP addresses
Network +
26
TCP/IP (continued)
• IP addresses are assigned and used according to
very specific parameters
• Each IP address is a unique 32-bit number, divided
into four octets, or sets of 8-bits, that are separated
by periods
• An IP address contains two types of information:
network and host
• From the first octet you can determine the network
class
• Three types of network classes are used on modern
LANs: Class A, Class B, and Class C
Network +
27
TCP/IP (continued)
• IP Addresses specific parameters continued
• Class D and Class E addresses do exist, but are
rarely used
• Class D addresses are reserved for a special type
of transmission called multicasting
• Multicasting allows one device to send data to a
specific group of devices
Network +
28
TCP/IP (continued)
• IP Addresses specific parameters continued
• Some IP addresses are reserved for special
functions, like broadcasts, and cannot be
assigned to machines or devices
• 127 is not a valid first octet for any IP address
• The range of addresses beginning with 127 is
reserved for a device communicating with itself,
or performing loopback communication
Network +
29
TCP/IP (continued)
• The command used to view IP information
on a Windows XP workstation is ipconfig
Network +
30
TCP/IP (continued)
• Binary and Dotted Decimal Notation
• A decimal number between 1 and 255 represents
each binary octet (for a total of 256 possibilities)
• The binary system is the way that computers
interpret IP addresses
• In this system every piece of information is
represented by 1s and 0s and each 1 or 0
constitutes a bit
Network +
31
TCP/IP (continued)
• Subnet Mask
• A special 32-bit number that, when combined with
a device’s IP address, informs the rest of the
network about the segment or network to which
the device is attached
• A more common term for subnet mask is net
mask, and sometimes simply mask
• Subnetting is a process of subdividing a single
class of network into multiple, smaller logical
networks, or segments
Network +
32
TCP/IP (continued)
• Assigning IP Addresses
• Every node on a network must have a unique IP
address
• If you add a node to a network and its IP address
is already in use by another node on the same
subnet, an error message will be generated on the
new client
Network +
33
TCP/IP (continued)
• A manually assigned IP address is called a static
IP address
• Most network administrators rely on a network
service to automatically assign them
Network +
34
TCP/IP (continued)
• Two methods of automatic IP addressing:
BOOTP and DHCP
• Bootstrap Protocol (BOOTP), an Application layer
protocol, uses a central list of IP addresses and
their associated devices’ MAC addresses to
assign IP addresses to clients dynamically
Network +
35
TCP/IP (continued)
• An IP address that is assigned to a device upon
request and is changeable is known as a dynamic
IP address
• BOOTP has the potential to issue additional
information, such as the client’s subnet mask and
requires administrators to enter every IP and MAC
address manually into the BOOTP table
Network +
36
TCP/IP (continued)
• Dynamic Host Configuration Protocol (DHCP)
• An automated means of assigning a unique IP
address to every device on a network
• DHCP does not require a table of IP and MAC
addresses on the server
• DHCP does require configuration of DHCP service
on a DHCP server
Network +
37
TCP/IP (continued)
• Terminating a DHCP Lease
• A DHCP lease may expire based on the period
established for it in the server configuration or it
may be manually terminated
• Sockets and Ports
• Every process on a machine is assigned a port
number and the process’s port number plus its
host machine’s IP address equals the process’s
socket
Network +
38
TCP/IP (continued)
• Port numbers range from 0 to 65,539 and are
divided by IANA into three types: Well Known
Ports, Registered Ports, and Dynamic and/or
Private Ports
• Well Known Ports are in the range of 0 to 1023
and are assigned to processes that only the
operating system or an Administrator of the
system can access
Network +
39
TCP/IP (continued)
• Registered Ports are in the range of 1024 to
49151. These ports are accessible to network
users and processes that do not have special
administrative privileges
• Dynamic and/or Private Ports are those from
49152 through 65535 and are open for use
without restriction
Network +
40
TCP/IP (continued)
• Addressing in IPv6
• Known as IP next generation, or Ipng is slated to
replace the current IP protocol, IPv4
• IPv6 offers several advantages over IPv4,
including a more efficient header, better security,
better prioritization allowances, and automatic IP
address configuration
• The most valuable advantage IPv6 offers is its
promise of billions and billions of additional IP
addresses through its new addressing scheme
Network +
41
TCP/IP (continued)
• Addressing in IPv6 (continued)
• The most notable difference between IP
addresses in IPv4 and IPv6 is their size
• IPv4 addresses are composed of 32 bits, IPv6 are
eight 16-bit fields and total 128 bits
• IPv4 address contains binary numbers separated
by a period, each field in an IPv6 address contains
hexadecimal numbers separated by a colon
Network +
42
TCP/IP (continued)
• Host Names and Domain Name System
(DNS) every device on the Internet is
technically known as a host and every
host can take a host name
Network +
43
TCP/IP (continued)
• Domain Names every host is a member of
a domain, or a group of computers that
belong to the same organization and have
part of their IP addresses in common
• A domain name is associated with a company or
other type of organization
• Local host name plus its domain name is a fully
qualified host name
Network +
44
TCP/IP (continued)
• A domain name is represented by a series of
character strings, called labels, separated by dots
• Each label represents a level in the domain naming
hierarchy
• In the domain name, www.novell.com, “com” is
the top-level domain (TLD), “novell” is the
second-level domain, and “www” is the thirdlevel domain
• Domain names must be registered with an Internet
naming authority that works on behalf of ICANN
Network +
45
TCP/IP (continued)
• Domain Name System (DNS)
• A hierarchical way of associating domain names
with IP addresses
• “DNS” refers to both the Application-layer service
and the organized system of computers and
databases
Network +
46
TCP/IP (continued)
• The DNS service does not rely on one file or even
one server, but rather on many computers across
the globe
• These computers are related in a hierarchical
manner, with thirteen computers, known as root
servers, acting as the ultimate authorities
Network +
47
TCP/IP (continued)
• DNS service is divided into three components:
resolvers, name servers, and name space
• Resolvers are any hosts on the Internet that need
to look up domain name information
Network +
48
TCP/IP (continued)
• Name servers (or DNS servers) are servers that
contain databases of associated names and IP
addresses and provide this information to
resolvers on request
• The term name space refers to the database of
Internet IP addresses and their associated names
Network +
49
TCP/IP (continued)
• Resource record is a single record that describes
one piece of information in the DNS database
• An address resource record is a type of resource
record that maps the IP address of an Internetconnected device to its domain name
• Approximately 20 types of resource records are
currently used
Network +
50
TCP/IP (continued)
• Some TCP/IP Application Layer Protocols
• Telnet
• A terminal emulation protocol used to log on to
remote hosts using the TCP/IP protocol suite
• Using Telnet, a TCP connection is established and
keystrokes on the user’s machine act like
keystrokes on the remotely connected machine
• Telnet is notoriously insecure
Network +
51
TCP/IP (continued)
• Some TCP/IP Application Layer Protocols
(continued)
• File Transfer Protocol (FTP)
• Used to send and receive files via TCP/IP
• FTP commands will work from your operating
system’s command prompt
• Many FTP hosts accept anonymous logins
Network +
52
TCP/IP (continued)
• Trivial File Transfer Protocol (TFTP)
• Enables file transfers between computers, but it is
simpler (or more trivial) than FTP
• TFTP relies on UDP at the Transport layer
• TFTP is useful when you need to load data or
programs on a diskless workstation
• TFTP does not require a user to log on to a host
Network +
53
TCP/IP (continued)
• Network Time Protocol (NTP)
• Used to synchronize the clocks of computers on a
network
• NTP depends on UDP for Transport layer services
• NTP is a protocol that benefits from UDP’s quick,
connectionless nature at the Transport layer
• NTP is time-sensitive and cannot wait for the error
checking that TCP would require
Network +
54
TCP/IP (continued)
• Packet Internet Groper (PING)
• A utility that can verify that TCP/IP is installed,
bound to the NIC, configured correctly, and
communicating with the network
• PING uses ICMP services to send echo request
and echo reply messages that determine the
validity of an IP address
• By pinging the loopback address, 127.0.0.1, you
can determine whether your workstation’s TCP/IP
services are running
Network +
55
IPX/SPX
• Internetwork Packet Exchange/Sequenced Packet
Exchange (IPX/SPX) is a protocol originally
developed by Xerox
• Modified and adopted by Novell in the1980s for its
NetWare network operating system
• Microsoft’s implementation of IPX/SPX is called
NWLink
Network +
56
IPX/SPX (continued)
• The IPX and SPX Protocols
• Internetwork Packet Exchange (IPX) operates at
the Network layer of the OSI Model and provides
logical addressing and internetworking services,
similar to IP in the TCP/IP suite
• IPX is a connectionless service because it does not
require a session to be established before it
transmits, and it does not guarantee that data will
be delivered in sequence or without errors
Network +
57
IPX/SPX (continued)
• Sequenced Packet Exchange (SPX) belongs to
the Transport layer of the OSI Model
• A connection-oriented protocol and therefore must
verify that a session has been established with the
destination node before it will transmit data
Network +
58
IPX/SPX (continued)
• Addressing in IPX/SPX
• IPX/SPX-based networks require that each node
on a network be assigned a unique address to
avoid communication conflicts
• IPX is the component of the protocol that handles
addressing, addresses on an IPX/SPX network
are called IPX addresses
• IPX addresses contain two parts: the network
address and the node address
Network +
59
NetBIOS and NetBEUI
• NetBIOS (Network Basic Input Output System) is
a protocol originally designed for IBM to provide
Transport and Session layer services for
applications running on small, homogenous
networks
• NetBEUI can support only 254 connections,
however, and does not allow for good security
• Because NetBEUI frames include only Data Link
layer (or MAC) addresses and not Network layer
addresses, it is not routable
Network +
60
NetBIOS and NetBEUI (continued)
• Windows Internet Naming Service (WINS) Provides a means of resolving NetBIOS
names to IP addresses
• A computer’s NetBIOS name and its TCP/IP host
name are different entities, though you can have
the same name for both
Network +
61
NetBIOS and NetBEUI (continued)
• WINS has the same relationship to NetBIOS as
DNS has to TCP/IP
• WINS does not assign names or IP addresses, but
merely keeps track of which NetBIOS names are
linked to which IP addresses
Network +
62
Appletalk
• The protocol suite originally designed to
interconnect Macintosh computers
• An AppleTalk network is separated into logical
groups of computers called AppleTalk zones
Network +
63
Appletalk (continued)
• An AppleTalk node ID is a unique 8-bit or 16-bit
number that identifies a computer on an AppleTalk
network
• An AppleTalk network number is a unique 16-bit
number that identifies the network to which a node
is connected
Network +
64
Binding Protocols on a
Windows XP Workstation
• Binding is the process of assigning one network
component to work with another
• You can manually bind protocols that are not
already associated with a network interface
Network +
65
Summary
• Characteristics of TCP/IP, IPX/SPX,
NetBIOS, and AppleTalk
• Network protocols correlate to layers of
the OSI Model
• Core protocols of the TCP/IP suite and
their functions
Network +
66
Summary (continued)
• The most popular protocol addressing
schemes
• Purpose and implementation of the
domain name system
• Install protocols on Windows XP clients
Network +
67
Download