Network+ Guide to Networks, Fourth Edition Chapter 11 In-Depth TCP/IP Networking Objectives • Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, NAT and ICS • Explain the differences between public and private networks • Describe protocols used between mail clients and mail servers, including SMTP, POP3, and IMAP4 • Employ multiple TCP/IP utilities for network discovery and troubleshooting Designing TCP/IP-Based Networks • Review of some TCP/IP fundamentals: – IP is a routable protocol – On a network using TCP/IP, each interface associated with unique IP address – Some nodes may use multiple IP addresses – IP addresses consist of four 8-bit octets – Many networks assign IP addresses and host names dynamically, using DHCP – Every IP address can be associated with a network class Subnetting • Separates network into multiple, logically defined segments (subnets) • Each subnet’s traffic separated from every other subnet’s traffic – Enhances security • Subnetworks must be connected via routers or other Layer 3 devices – Improves performance • Data is selectively retransmitted – Simplifies troubleshooting Classful Addressing • Adheres to network class distinctions – Only Class A, B, and C addresses are recognized – Network ID limited to first 8 bits in Class A, first 16 bits in Class B, and first 24 bits in Class C • Fixed network ID size ultimately limits number of hosts a network can include Classful Addressing (continued) Figure 11-1: Example IP addresses with classful addressing Subnet Masks • Subnetting depends on subnet masks to identify how a network is subdivided – Indicates where network information is located in an IP address – “1” bits indicate corresponding bits in IP address contain network information – “0” bits indicate corresponding bits in IP address contain host information • To calculate host’s network ID given IP address and subnet mask, perform ANDing Subnet Masks (continued) Table 11-1: Default subnet masks Subnet Masks (continued) Table 11-2: ANDing Figure 11-2: Example of calculating a host’s network ID Reserved Addresses • Certain types of IP addresses reserved for special functions – In network IDs, bits for host information set to 0 – In broadcast addresses, octet(s) representing host information set to all 1s (255 in decimal notation) Subnetting Techniques • Subnetting breaks rules of classful addressing – Some bits that in classful addressing would represent host information changed to represent network information – Reduce number of usable host addresses per subnet Subnetting Techniques (continued) Table 11-3: Class B subnet masks Subnetting Techniques (continued) Table 11-4: Class C subnet masks Calculating Subnets • Formula for determining how to modify a default subnet mask: 2n-2=Y – n = number of bits in subnet mask that must be switched from 0 to 1 – Y = number of subnets that result • Extended network prefix: Additional bits used for subnet information plus existing network ID • Class A, B, and C networks can all be subnetted • External routers pay attention to only the network portion of devices’ IP addresses Calculating Subnets (continued) Figure 11-3: A router connecting several subnets Calculating Subnets (continued) Figure 11-3 (continued): A router connecting several subnets CIDR (Classless Interdomain Routing) • Classless routing or supernetting • Provides additional ways of arranging network and host information in an IP address • Supernet: Subnet created by moving subnet boundary to the left – Generates more usable IP addresses • CIDR notation (slash notation): network ID followed by forward slash (/), followed by number of bits used for extended network prefix – CIDR Block CIDR (continued) Figure 11-4: Subnet mask and supernet mask Figure 11-5: Calculating a host’s network ID on a supernetted network Internet Gateways • Combination of software and hardware enabling two different network segments to exchange data • Every device on a TCP/IP-based network has a default gateway – – – – First interprets outbound requests to other subnets Interprets inbound requests from other subnets Each node on network has one default gateway May be network interface on a router • Must maintain routing tables as well • Core gateways make up the Internet backbone Internet Gateways (continued) Figure 11-6: The use of default gateways NAT (Network Address Translation) • Default gateways can be used to “hide” IP numbers assigned within an organization – Clients behind gateway may use any IP addressing scheme • Even non-legitimate schemes – Must have legitimate IP address to exchange data with Internet • NAT: when client’s transmission reaches default gateway, it assigns client’s transmission a valid IP address NAT (continued) Figure 11-7: NAT through an Internet gateway ICS (Internet Connection Sharing) • Computer with Internet access (ICS host) configured to translate requests to and from Internet on behalf of other computers on network – Acts as DHCP server, DNS resolver, and NAT gateway for clients on its LAN • Network adapter on ICS host assigned IP address of 192.168.0.1 – Clients must be set up to obtain IP addresses automatically – ICS host assigns clients IP addresses in range of 192.168.0.2 through 192.168.0.255 Intranets and Extranets • Intranet: network or part of network that uses browser-based services to exchange information within an enterprise – Used for supplying HTTP-accessible documents, e-mail, file sharing, document management, and collaboration – Defined by its security policies • Extranet: network that uses Internet-like services and protocols to exchange information within an organization and with certain, authorized users outside of that organization TCP/IP Mail Services • E-mail is most frequently used Internet service that network administrators manage • Mail servers communicate with other mail servers to deliver messages across Internet • Hundreds of software packages for mail servers exist – Sendmail, Microsoft Exchange Server, Lotus Notes, Novell Groupwise • Mail clients send/retrieve messages to/from mail servers • Servers and clients communicate through TCP/IP Application layer protocols SMTP (Simple Mail Transfer Protocol) • Protocol responsible for moving messages between mail servers over TCP/IP-based networks – – – – – Belongs to Application layer of TCP/IP Model Relies on TCP at Transport layer Operates from port 25 Relies on higher-level programs for instructions Can only transport or hold mail • When configuring clients to use Internet e-mail, must identify user’s SMTP server MIME (Multipurpose Internet Mail Extensions) • Standard SMTP message format allows for lines that contain 1000 ASCII characters max – Cannot handle pictures or formatted text • MIME: standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within e-mail messages – Identifies each element of a message according to content type – Works in conjunction with SMTP POP (Post Office Protocol) • Application layer protocol used to retrieve messages from mail servers • POP3 is most current and commonly used version – Mail delivered and stored on mail server until user connects (via e-mail client) to retrieve messages – Mail deleted from server after retrieval • Minimizes use of server resources • Best suited to users who retrieve mail from same workstation all the time IMAP (Internet Message Access Protocol) • Developed as sophisticated alternative to POP3 – IMAP4 is most current version – Users can store messages on mail server • IMAP4 provides the following features: – Retrieve all or only a portion of any mail message – Review messages and delete them while the messages remain on the server – Create sophisticated methods of organizing messages on the server – Share mailboxes in a central location Additional TCP/IP Utilities • TCP/IP comes with complete set of utilities that can help to track down most TCP/IP-related problems – e.g., Ping, Telnet, ARP • Nearly all TCP/IP utilities can be accessed from command prompt on any type of server or client running TCP/IP – Syntax may differ depending on OS – Options may differ according to OS Netstat • Displays TCP/IP statistics and details about TCP/IP components and connections on a host – Port on which a particular TCP/IP service is running – Network connections currently established – Number of packets handled by network interface since activation – Number of data errors Netstat (continued) • Common Netstat switches: – -a lists all available TCP and UDP connections – -e displays details about all packets that have been sent – -n lists currently connected hosts according to their ports and IP addresses (in numerical form) – -p allows you to specify what type of protocol statistics to list – -r provides list of routing table information – -s provides statistics about each packet transmitted by a host, separated according to protocol type Nbtstat • Given NetBIOS name, get IP address • Common nbtstat switches: – -a displays a machine’s name table given its NetBIOS name – -A displays a machine’s name table given its IP address – -r lists statistics about names that have been resolved to IP addresses by broadcast and by WINS – -s displays a list of all the current NetBIOS sessions for a machine Nslookup • Query DNS database from any network computer and find host name of a device by specifying its IP address, or vice versa – Provides host’s IP address, primary DNS server name, and address holding record for this name – Many options (switches) Dig • Domain information groper (dig): similar to nslookup – Provides more detailed information than nslookup • e.g., specifics about resource records associated with host name – Many switches – Must be explicitly installed on Windows systems Dig (continued) Figure 11-11: Output of a simple dig command Whois • Query DNS registration database and obtain information about a domain – – – – Who is domain registered to? Technical person responsible for domain? Hosting entity? DNS Server addresses? • Must install software to use on Windows systems • Web-based alternatives exist – e.g., www.arin.net Traceroute (Tracert) • Uses ICMP to trace path from one node to another – Identifies all intermediate hops – Useful for determining router or subnet connectivity problems – Transmits series of UDP datagrams to specified destination • Increases TTL as path is discovered • Traceroute may stop before completing – Device problem on path – Device does not accept ICMP transmissions • Often indicates firewall Traceroute (continued) • Common switches: – -d instructs traceroute not to resolve IP addresses to host names – -h specifies maximum number of hops packets should take when attempting to reach a host • Default is 30 – -w identifies timeout period for responses Ipconfig • TCP/IP administration utility for use with Windows NT, 2000, XP, and Server 2003 OSs – Provides information about network adapter’s IP address, subnet mask, and default gateway • Commonly used switches: – /? displays list of available switches – /all displays complete TCP/IP configuration information for each network interface on device – /release releases DHCP-assigned addresses for all network interfaces – /renew renews DHCP-assigned addresses for all network interfaces Winipcfg • Same as ipconfig utility, but applies to Windows 9x and Me OSs – Graphical interface Ifconfig • TCP/IP configuration and management utility used on UNIX-type of systems – Similar to ipconfig on Windows systems • Commonly used switches: – -a applies command to all interfaces on a device – down marks interface as unavailable to network – up reinitializes interface after it has been taken “down” • Complete list of switches found in man pages VoIP (Voice over IP) • Use of packet-switched networks and TCP/IP to transmit voice conversations – IP telephony • Objectives for implementing VoIP: – Lower costs for voice calls – Supply new or enhanced features and applications – Centralize voice and data network management VoIP (continued) • VoIP callers can use: – Traditional telephone – IP telephones: telephones designed for TCP/IP transmission – Softphones: computers equipped with microphone, speaker, and VoIP client software • IP telephones must have unique IP addresses • More difficult to transmit voice signals over a packet-switched network than data signals • Internet telephony: VoIP carried via Internet – May also be carried over private lines VoIP (continued) Figure 11-16: Accessing a VoIP network from traditional telephones VoIP (continued) Figure 11-17: Accessing a VoIP network from IP phones Summary • Subnetting separates one network or segment into multiple, logically defined segments, or subnets • Bits in a subnet mask that equal 1 indicate that corresponding bits in an IP address contain network information • Bits in a subnet mask that equal 0 indicate that corresponding bits in an IP address contain host information • CIDR allows the creation of supernets, or subnets established by using bits that normally would be reserved for network class information Summary (continued) • Gateways facilitate communication between different subnets • Every device on a TCP/IP-based network has a default gateway • NAT allows a network administrator to “hide” IP addresses assigned to nodes on a private network • ICS is a service that allows a network of computers to share a single Internet connection through an ICS host computer Summary (continued) • SMTP is responsible for moving messages from one e-mail server to another over TCP/IP-based networks • POP is a mail retrieval protocol • IMAP4 allows users to store messages on the mail server, rather than always having to download them to the local machine • The netstat utility displays TCP/IP statistics and the state of current TCP/IP components and connections Summary (continued) • The nslookup utility allows you to look up the DNS host name of a network node by specifying the node’s IP address, or vice versa • The traceroute utility useful for determining router or subnet connectivity problems • VoIP is the use of packet-switched TCP/IP-based networks to carry voice signals