Network Protocols

advertisement
Network Protocols
Why Protocols?
 Rules
and procedures to govern
communication


Some for transferring data
Some for route discovery
TCP/IP
 Suite
of Protocols to define communication
 Application – client functionality
 Transport - moving data
 Network – tasks for moving data
Steps –Sending
 Protocol
responsible for breaking data into
smaller parts called packets
 Network address is attached to packet
 Data prepared for transmission and sent
through NIC
Steps - Receiving
 Data
received, taken off network through
NIC
 Address information stripped
 Data packets are resembles
 Packets are then sent to application for
use.
Common Protocols










TCP
FTP
UDP
TCP/IP
DHCP
TFTP
DNS
HTTP
ARP
SIP


RTP
SSH
 POP3
 NTP
 IMAP4
 TELNET
 SMTP
 SNMP
 ICMP
 IGMP
 TLS
TCP
 Transmission
Control Protocol
 Connection oriented – establishes a
manually acknowledged session between
two hosts.
 Provides reliability to IP
 Flow control, sequencing, and error
detection and correction.
 Transport layer
TCP Connection
 Sends
SYN to target host
 Target opens connection and sends ACK
 Originated host sends ACK ready to
transfer data
 Called three-way handshake
UDP
 User
Datagram Protocol
 No guarantee delivery
 “fire and forget”
 Uses IP
 Transport layer
 Lower overhead – low bandwidth
FTP
 File
Transfer Protocol
 Uploading and downloading of files
 Uses TCP as a transport protocol
 Used to transfer files over the LAN

Popular to distribute files over the internet
 Application
layer
Common FTP commands
 know
SSH
 Secure
Shell
 Alternative to telnet
 Provides security and encryption
 Allows sessions to be opened on a remote
host
SFTP
 Secure
File Transfer Protocol
 Authentication between sender and
receiver
 Encryption – if packets copied remain
hidden
 Implemented though client and server
software
 Allows for securely uploading and
downloading files to and from remote host
TFTP
 Trivial
File Transfer Protocol
 File transfer
 Not the same file security and functionality
as FTP
 Simple downloads – firmware
 No directory navigation
 Uses UDP
 Application layer
SMTP
 Simple
Mail Transfer Protocol
 How mail is sent/transported through the
network
 TCP
 Can be used to send and receive mail
 authentication
HTTP
 Hypertext
Transfer Protocol
 Uses TCP
 Allows text, graphics, multimedia and
other material to be downloaded
 Requests sent in clear text
HTTPS
 Hypertext
Transfer Protocol Secure
 SSL – encrypts
 Both the client and server must support
POP3/IMAP4
 Post
Office Protocol 3/ Internet Message
Access Protocol
 Can download email but not send
 Passwords transferred in clear text
Telnet
 Virtual
terminal protocol
 Allows session to be opened and
commands executed
 Used to access routers and other network
devices
 Not secure
ICMP
 Internet
Control Message Protocol
 Works with the IP layer to provide error
checking and reporting
 Tools to provide best-delivery
 PING
 Used for error reporting, flow control, and
route testing
ARP
 Address
Resolution Protocol
 Resolving IP addresses to MAC
addresses
RARP
 Reverse ARP
 Resolves
MAC to IP addresses
 Reveres lookups in DNS
Network Time Protocol NTP
 Facilitates
the communication of time
between systems
 Important for email and directory services
Network News Transfer Protocol
NNTP
 Posting
and retrieval of messages
 Application layer
Secure Copy Protocol SCP
 Secure
means of copying files
 Encrypts data
 More secure then RCP
Lightweight Directory Access
Protocol LDAP
 Access
and query directory services
 NDS and ADS
Internet Group Management
Protocol IGMP
 Manages
multicast
 Used to register and discover devices
 Routers and videoconferencing clients
Domain Name Service DNS
 Resolves
host names to IP addresses
 Used to use txt file hosts
WINS
 On
windows allows NetBIOS names to be
resolved to IP addresses.
 If no WINS server use LMHOSTS file
Simple Network Management
Protocol SNMP
 Network
management of devices
Dynamic Host Configuration
Protocol DHCP
 Automatically
assigns IP addresses
 Allows a range of IP addresses to be
defined
 Clients ask the server for and address
 Lease - scope
Transport Layer Security TLS
 Ensure
privacy between client/server apps
Session Initiation Protocol SIP
 VOIP
 Establish
and maintain multimedia
sessions

Internet telephone calls
 Uses
TCP or UDP
 Application layer
Real Time Transport Protocol
RTP
 Transport
of real-time data
 Does not guarantee delivery
 Transport Layer
Ports
 Each
protocol needs a port to access and
leave the system
Ports
 TCP/IP
has 65,535 ports
 Well known – 0-1023
 Registered ports – 1024-49151

Used by apps or services
 Dynamic

or private – 49152 – 65353
Can be used for any service or app
– 20 – TCP
 FTP – 21 TCP
 SSH – 22 TCP
 Telnet – 23 – TCP
 SMTP – 25 – TCP
 DNS – 53 – UDP/TCP
 TFTP – 69 – UDP
 HTTP – 80 – TCP/UDP
 POP3 – 110 – TCP
 FTP
– 119 – TCP
 NTP – 123 – TCP
 IMAP4 – 143 – TCP
 SNMP – 161- UDP
 HTTPS – 443 – TCP
 DHCP – 67 - UDP
 NNTP
IP Address
 Consists
of a series of 32 binary bits
 Grouped into four 8-bit bytes


Called and octet
Presented in decimal value
 Composed


of two parts
First part – network
Second part - host
Example
 192.168.18.57

First three octets are network
• 192.168.18

Last octet identifies the host
• 57
Address Ranges

Class
Address Range

A
10.0.0.0-10.255.255.255
255.0.0.0

B
172.16.0.0-172.31.255.255
255.255.0.0

C
192.168.0.0-192.168.255.255 255.255.255.0
Default Subnet
Mask
Need to Know
 169.254.0.0-
no DHCP server to give
address
 127 loopback
Class
 IP





addresses are divided into 5 classes
Class A – large networks
Class B – medium sized networks –
universities
Class C – small networks – ISP’s for
customers
Class D – multicasting
Class E - testing
Subnet Mask
 Network
portion of the address
 Hosts on a LAN use the same subnet
mask
Subnet Mask cont
 Class A –
255.0.0.0
 Class B – 255.255.0.0
 Class C – 255.255.255.0
Download