1
NETWORKING BASICS
Chapter 1: NETWORKING BASICS
LANS, WANS, AND MANS
Three main networking technologies are used to connect computers and networks together:
Local area network (LAN) Wide area network (WAN)
Metropolitan area network (MAN)
Chapter 1: NETWORKING BASICS
LAN
Used to network computers located in a limited geographical area such as a room, floor, or building Has three main attributes
Topology: bus, star, and ring
Medium: copper, fiber, and wireless Protocols
Chapter 1: NETWORKING BASICS
EXAMPLE OF A LAN
Chapter 1: NETWORKING BASICS
WAN
Spans a large geographic area Defined as an internetwork (private or public) that connects many LANs Uses routers and usually point-to-point links Examples of WANs
The Internet Private global enterprise networks
NETWORKING BASICS
EXAMPLE OF A WAN
Storage-Area Networks (SANS)
Virtual Private Networks (VPNs)
Benefits of VPNs
Intranet and Extranet VPN
Importance of Bandwidth
Bandwidth Pipe Analogy
Bandwidth Highway Analogy
Chapter 1: NETWORKING BASICS
14
PROTOCOLS AND SERVICES
Facilitate communication between two networked devices Perform data encapsulation Provide a common language to communicating devices Provide either connectionless or connectionoriented services
CONNECTIONLESS VS. CONNECTIONORIENTED
Chapter 1: NETWORKING BASICS
15
Connectionless protocols
Do not require a connection Have very little overhead Are fast and unreliable Require a connection
Connection-oriented protocols
Require more overhead
Are slower and very reliable
Chapter 1: NETWORKING BASICS
16
PHYSICAL LAYER TRANSMISSION
Chapter 1: NETWORKING BASICS
17
NETWORK LAYER ADDRESSING
Chapter 1: NETWORKING BASICS
18
ROUTING
Chapter 1: NETWORKING BASICS
19
SUMMARY
LANs, WANs, and MANs allow groups of computers to share information. Signaling protocols are used to transmit data as 1s and 0s.
Protocols provide a common language for communication hosts.
20
Chapter 2
NETWORK CABLING
Chapter 2: NETWORK CABLING
21
TOPOLOGIES
There are three main local area network (LAN) topologies:
Bus Star
Ring
Mesh Wireless
Other network topologies include:
Chapter 2: NETWORK CABLING
22
BUS TOPOLOGY
The bus topology supports thick and thin coaxial segments.
Segments are connected by repeaters.
The bus topology uses the baseband signaling method. Signals are broadcast in both directions simultaneously.
Both ends of each segment require termination to avoid reflection.
End systems connect to the segment in a linear manner.
Chapter 2: NETWORK CABLING
23
THICK AND THIN COAXIAL BUS
Chapter 2: NETWORK CABLING
24
STAR TOPOLOGY
The star topology can use coaxial, twisted pair, or fiber optic cable. A central device (hub) connects hubs and nodes to the network.
Each node connects to its own dedicated port on the hub. Hubs broadcast transmitted signals to all connected devices. You can connect multiple hubs to form a hierarchical star topology.
The star topology uses the baseband signaling method.
Chapter 2: NETWORK CABLING
25
A SIMPLE STAR TOPOLOGY
Chapter 2: NETWORK CABLING
26
A HIERARCHICAL STAR TOPOLOGY
Chapter 2: NETWORK CABLING
27
RING TOPOLOGY
The ring topology can use twisted pair or fiber optic cabling.
A central device (hub) connects hubs and nodes to the network.
Each node connects to its own dedicated port on the hub.
You can connect multiple hubs to form a larger ring.
The ring topology uses the baseband signaling method. Frames are transmitted around the ring from node to hub to node. Media Access Control (MAC) is used for token passing.
Chapter 2: NETWORK CABLING
28
A RING NETWORK
Chapter 2: NETWORK CABLING
29
MESH TOPOLOGY
Typically uses fiber optic cabling for redundant wide area network (WAN) links Provides multiple paths to destinations for fault tolerance
Supports baseband and broadband signals
Requires an enormous amount of cable
Chapter 2: NETWORK CABLING
30
LAN MESH
Chapter 2: NETWORK CABLING
31
ENTERPRISE MESH
Chapter 2: NETWORK CABLING
32
WIRELESS TOPOLOGY
Cell-based technology that uses unbounded media Two wireless topologies:
Ad hoc Infrastructure
Chapter 2: NETWORK CABLING
33
AD HOC WLAN
Chapter 2: NETWORK CABLING
34
INFRASTRUCTURE WLAN
Chapter 2: NETWORK CABLING
35
LAN CABLE TYPES
Three cable types are used in LANs:
Coaxial Twisted pair Fiber optic
Chapter 2: NETWORK CABLING
36
COAXIAL CABLE
Chapter 2: NETWORK CABLING
37
AUI (ATTACHMENT UNIT INTERFACE) CABLE
Chapter 2: NETWORK CABLING
38
THIN ETHERNET HARDWARE
Chapter 2: NETWORK CABLING
39
UNSHIELDED TWISTED PAIR (UTP) CABLE
Chapter 2: NETWORK CABLING
40
UTP CONNECTORS
Chapter 2: NETWORK CABLING
41
UTP CABLE GRADES
Category
1 2
Frequency
Up to 0 MHz Up to 1 MHz
Primary Application
Voice networks Voice and low-speed data networks less than 4 Mbps
3
4 5
Up to 16 MHz
Up to 20 MHz Up to 100 MHz
Voice and data networks from 4 to 100 Mbps
16-Mbps Token Ring 100-Mbps Fast Ethernet
5e 6
Up to 100 MHz Up to 250 MHz
1000-Mbps Gigabit Ethernet 1000-Mbps Gigabit Ethernet
Chapter 2: NETWORK CABLING
42
FIBER OPTIC CABLE
Chapter 2: NETWORK CABLING
43
STRAIGHT TIP (ST) CONNECTOR
Chapter 2: NETWORK CABLING
44
STRAIGHT THROUGH AND CROSSOVER WIRING
Wiring within a twisted pair cable is configured as
either
Straight through, where each wire (or pin) is attached
to the same contact point at each end
Crossover, where transmit contacts on each end of
the cable are connected to the receive contact at the other end
Chapter 2: NETWORK CABLING
45
STRAIGHT THROUGH WIRING
Chapter 2: NETWORK CABLING
46
CROSSOVER WIRING
Chapter 2: NETWORK CABLING
47
SUMMARY
The three basic LAN topologies are bus, star, and ring. WLANs are becoming more popular. Mesh networks are not typically used in LANs. The primary cable types used in LANs are coaxial, twisted pair, and fiber optic.
48
Network Devices
Network Interface Card
NIC
Ethernet network interface card (NIC), which inserts into the system bus of a computer and makes the connection between running software processes on the computer and physical media.
Repeater
A repeater
is a device that amplifies a signal, to
counteract the effects of attenuation
HUB
HUB
is a device used to connect all of the computers on a
star network.
From the outside, a hub looks like nothing more than
a box with a series of cable connectors and LEDs in it
Two Types: Active and Passive
Active :amplifies the signals and immediately
transmits them through all of the other ports. ports .
Passive: transmits the signals through all of the other
Communicating Within the LAN
Communicating Within the LAN
Broadcast: message is a packet with a special
destination address that causes it to be read and processed by every computer that receives it computer on the network
Unicast: message is a packet addressed to a single Multicast: message is addressed to a subset of
computers on the network
LAN Segment Limitations
Signals degrade with transmission distance. Each Ethernet type has a maximum segment length.
Extending LAN Segments
Bandwidth is shared
Extends cable distances Repeats or amplifies signal
Collisions
Bridges
Operate at Layer 2 of the OSI model Forward, filter, or flood frames Few ports Slow
Layer 2 devices
A layer 2 device is a device that understand MAC, for example: NIC (Network Interface Card) Bridge : - address learning - forwarding decisions are based on software - bridge is used for LAN segmentation - max. 16 port. Switch: - a multi-port bridge up to 567 port - forwarding decisions are based on hardware ASIC (faster than bridge)
LANs Today
Users grouped by physical location
Many switches Switches connected by high-speed links
Multiple Collision Domains
MAC Address Components
MAC Addresses
Decimal, Binary, and Hexadecimal Number Systems
Binary and Hexadecimal Number Comparisons
Decimal-to-Binary-Conversion
Binary-to-Hexadecimal Conversion Example
Hexadecimal-to-Binary Conversion Example
Examples
Convert the following:
205
10
to binary
to binary
1100110 1 0000101
0 226 199 8C E0 134
11100010 to decimal
11000111 to decimal
10001100 to hexadecimal
224 to hexadecimal
0x86
to decimal
Router
functions of a router
- connect between networks - Select best path - Divide broadcast domain
- Packet forwarding
collision domain & broadcast domain
broadcast domain :is the group of computers that
receive a broadcast message transmitted by any one of the computers in the group.
A collision domain is a network (or part of a
network) that is constructed so that when two computers transmit packets at the same time, a collision occurs, causing both packets to be lost. All hosts that are affected by a collision belong to the same collision domain.
Device hub Switch router
Collision domain
one Equal number of ports Equal number of ports
Broadcast Domain
one one Equal number of ports
How many collision domains and broadcast domains ?
collision domains = 4 & Broadcast domains =1
Identifying Collision and Broadcast Domains
Collision domain =3 and Broadcast
UTP Implementation (Straight-Through)
Cable 10BASE-T/ 100BASE-TX Straight-Through Straight-Through Cable
Pin Label 1 2 3 4 5 6 7 8 TX+ TXRX+ NC NC RXNC NC 1 2 3 4 5 6 7 8
Pin Label TX+ TXRX+ NC NC RXNC NC
Wires on cable ends are in same order.
UTP Implementation (Crossover)
Cable 10BASE-T or 100BASE-TX Straight-Through Crossover Cable
Pin Label 1 2 3 4 5 6 7 8 TX+ TXRX+ NC NC RXNC NC 1 2 3 4 5 6 7 8
Pin Label TX+ TXRX+ NC NC RXNC NC
EIA/TIA T568A
EIA/TIA T568B
Some wires on cable ends are crossed.
UTP Implementation: StraightThrough vs. Crossover
Using Varieties of UTP
Crossover
Crossover
Straight-through
Straight-through
Straight-through
Multi-Layer Switch
High port density Large frame buffers
Mixture of port speeds
Fast internal switching
83
Chapter 4
DATA-LINK LAYER PROTOCOLS
Ethernet Token Ring FDDI Wireless Networking
Chapter 4: DATA-LINK LAYER PROTOCOLS
84
OSI MODEL AND IEEE 802.X STANDARDS
The Institute of Electrical and Electronics Engineers (IEEE)
divides the data-link and physical layers of the Open Systems Interconnection (OSI) model into four sublayers:
Two IEEE data-link sublayers:
The upper sublayer is the 802.2 or Logical Link Control (LLC)
Operates independently from the Media Access Control (MAC)
sublayer
Specifies the upper layer protocol carried within a frame
The lower sublayer is the MAC sublayer.
Defined by various 802.x standards such as IEEE 802.3, 802.5, and
802.11
OSI MODEL AND IEEE 802.X STANDARDS (CONT.)
Two IEEE physical sublayers:
Physical signaling
Media specifications
Chapter 4: DATA-LINK LAYER PROTOCOLS
85
Chapter 4: DATA-LINK LAYER PROTOCOLS
86
FOUR IEEE SUBLAYERS
Chapter 4: DATA-LINK LAYER PROTOCOLS
87
IEEE DATA-LINK AND PHYSICAL STANDARDS
Chapter 4: DATA-LINK LAYER PROTOCOLS
88
ETHERNET VERSION I AND II
Digital Equipment Corporation, Intel, and Xerox
Version I (also known as DIX Ethernet)
Uses bus topology with RG-8 (thick coaxial cable)
published the first two 10-Mbps Ethernet standards.
Uses Attachment Unit Interface (AUI) patch cables with
15-pin connectors, 50-ohm terminators, and external transceivers Maximum distance per segment: 500 meters
Maximum distance per network: 2500 meters
Uses the 5-4-3 rule
Adopted and renamed 10Base5 (page 157) by the IEEE
Chapter 4: DATA-LINK LAYER PROTOCOLS
89
ETHERNET VERSION I AND II (CONT.)
Version II
Uses bus topology with RG-58 (thin coaxial cable)
Uses T-connectors, 50-ohm terminators, and internal
transceivers
Maximum distance per segment: 185 meters
Maximum distance per network: 925 meters Uses the 5-4-3 rule
Adopted and renamed 10Base2 by the IEEE
Chapter 4: DATA-LINK LAYER PROTOCOLS
90
5-4-3 RULE
Chapter 4: DATA-LINK LAYER PROTOCOLS
91
IEEE ETHERNET STANDARDS (page 159)
The IEEE adopted and renamed the original
Ethernet standards and then expanded them.
802.3 working group.
All IEEE Ethernet standards are controlled by the
10-Mbps standards: 802.3a (10Base2), 802.3e
(10Base5), 802.3i (10Base-T), and 802.3j (10BaseFP, 10Base-FB, and 10Base-FL)
100-Mbps standards: 802.3u (100Base-X) 1000-Mbps standards: 802.3z and 802.3ab
(1000Base-X)
Chapter 4: DATA-LINK LAYER PROTOCOLS
92
IEEE 10BASE-X STANDARDS
The three primary IEEE standards for 10-Mbps
baseband networks are
10Base5
Physical and data-link layer standards and limitations
are identical to Ethernet version I.
10Base2
Physical and data-link layer standards and limitations
are identical to Ethernet version II.
Chapter 4: DATA-LINK LAYER PROTOCOLS
93
IEEE 10BASE-X STANDARDS (CONT.)
10Base-T
Star topology using unshielded twisted-pair (UTP)
cabling Two-pair UTP with RJ-45 connectors: One pair for transmit, the other one for receive
Supports half-duplex and full-duplex modes Maximum distance per segment: 100 meters
Maximum distance per network: 500 meters (which
includes connections from workstation to hub and also connections between hubs) Uses the 5-4-3 rule
Chapter 4: DATA-LINK LAYER PROTOCOLS
94
10BASE-T 5-4 Rule
Chapter 4: DATA-LINK LAYER PROTOCOLS
95
IEEE 100BASE-X STANDARDS
The three IEEE standards for 100-Mbps baseband
networks configured as a star topology are
100Base-TX
Uses the 4B5B encoding scheme over two pair
(Category 5), the same as 10Base-T
Supports half-duplex mode or full-duplex mode Maximum distance per segment (half or full): 100
meters
Maximum distance per half-duplex network: 205
meters Supports Class I and Class II repeaters
Chapter 4: DATA-LINK LAYER PROTOCOLS
96
IEEE 100BASE-X STANDARDS (CONT.)
100Base-T4
Uses the 8B/6B encoding scheme over four Category 3
(CAT3) twisted pairs
Supports only half-duplex mode
Maximum distance per segment: 100 meters
Maximum distance per network: 205 meters Supports Class I and Class II repeaters
Chapter 4: DATA-LINK LAYER PROTOCOLS
97
IEEE 100BASE-X STANDARDS (CONT.)
100Base-FX
Uses the 4B/5B encoding scheme over fiber optic
Supports half-duplex mode or full-duplex mode
Maximum length of a multimode half-duplex segment: 412
meters Maximum length of a multimode full-duplex segment: 2 kilometers Maximum length of a singlemode half-duplex segment: 2 kilometers Maximum length of a singlemode full-duplex segment: 10+ kilometers
Supports Class I and Class II repeaters
Chapter 4: DATA-LINK LAYER PROTOCOLS
98
CLASS I AND CLASS II REPEATERS
Chapter 4: DATA-LINK LAYER PROTOCOLS
99
IEEE 1000BASE-X STANDARDS
The IEEE 1000Base-X standard defines Gigabit
Ethernet specifications for twisted-pair cable and fiber optic cable.
Uses the 8B/10T encoding scheme
Supports full-duplex mode only
Maximum length of UTP segment: 100 meters Maximum length of multimode fiber segment: 220+
meters
Maximum length of singlemode fiber segment: 5000
meters
Chapter 4: DATA-LINK LAYER PROTOCOLS
100
FOUR ETHERNET FRAME TYPES
There are four different Ethernet frame types:
Version II Ethernet 802.3 IEEE 802.3 IEEE 802.3 SNAP
Chapter 4: DATA-LINK LAYER PROTOCOLS
101
VERSION II FRAME
Chapter 4: DATA-LINK LAYER PROTOCOLS
102
ETHERNET 802.3 FRAME
Chapter 4: DATA-LINK LAYER PROTOCOLS
103
IEEE 802.3 FRAME
Chapter 4: DATA-LINK LAYER PROTOCOLS
104
IEEE 802.3 SNAP FRAME
Chapter 4: DATA-LINK LAYER PROTOCOLS
105
MAC ADDRESSES (page 162)
Media Access Control: Is the mechanism that enables multiple computers to use the same network medium without conflicting
Chapter 4: DATA-LINK LAYER PROTOCOLS
106
CARRIER SENSE MULTIPLE ACCESS WITH COLLISION DETECTION (CSMA/CD)
Phase Carrier sense Description A computer listens to the network before transmitting. When the network is clear, the computer transmits the packet. The computer checks for signs of a collision. If one occurs, it retransmits the packet.
Multiple access
Collision detection
CARRIER SENSE MULTIPLE ACCESS WITH COLLISION DETECTION (CSMA/CD)
All half-duplex implementations of Ethernet use the
Chapter 4: DATA-LINK LAYER PROTOCOLS
107
CSMA/CD channel access method.
Carrier Sense
A device that wants to transmit must first listen to the
channel to see if it is in use.
If the channel is busy, the device must wait. If the channel is idle, the device can transmit a frame.
CARRIER SENSE MULTIPLE ACCESS WITH COLLISION DETECTION (CSMA/CD) (CONT.)
Multiple Access
Chapter 4: DATA-LINK LAYER PROTOCOLS
108
CSMA All devices on the network contend for access to the channel.
When two or more devices transmit at the same time,
Collision Detection
their signals collide.
Devices detect collisions when they receive a different
frequency on their receive pair.
Devices must immediately stop transmitting data and
send out a jamming signal and then back off for a random interval before trying again.
Chapter 4: DATA-LINK LAYER PROTOCOLS
109
COLLISIONS
Collision
Contention
Collisions are also called signal quality errors.
They are normal on Ethernet networks. The frequency of collisions increases as network
traffic increases.
Late collisions are a sign of a serious problem.
Do Exercise 4-2 (Page 194)
Chapter 4: DATA-LINK LAYER PROTOCOLS
110
TOKEN RING
Token Ring Network
Token Ring was originally developed by IBM, and then it was
adopted by the IEEE and renamed 802.5.
Star wired ring topology Operates at either 4 Mbps or 16 Mbps
Token-passing channel access method (Next Slide) Uses Multistation Access Units (MAUs) to connect nodes to the
network
You can connect MAUs together, using RI (Ring In) and RO (Out)
ports to form a larger ring.
Can use both shielded and unshielded twisted-pair cable
Chapter 4: DATA-LINK LAYER PROTOCOLS
111
TOKEN Passing
Token Passing
A token frame circulates continuously around the
network.
data.
Only the computer holding the token can transmit
The transmitting system is responsible for removing
the data from the ring.
Chapter 4: DATA-LINK LAYER PROTOCOLS
112
TOKEN RING FRAMES
Chapter 4: DATA-LINK LAYER PROTOCOLS
113
FDDI (Fiber Distributed Data Interface )
Developed by the American National Standards Institute
(ANSI)
Uses dual ring topology
The primary ring serves as a data path. The secondary ring provides fault tolerance.
Has a 100-Mbps transmission rate over fiber optic cabling Uses the token passing channel access method Supports early token release Uses single attachment station (SAS) or dual attachment
station (DAS) FDDI
Chapter 4: DATA-LINK LAYER PROTOCOLS
114
FDDI (Fiber Distributed Data Interface )
Supports both:
Singlemode cable (600 Km segments) Multimode cable (100 Km segments &
500 Workstations) This is the industry standard for fiber optic LANs.
Chapter 4: DATA-LINK LAYER PROTOCOLS
115
SAS AND DAS DEVICES
Chapter 4: DATA-LINK LAYER PROTOCOLS
117
RING WRAP (page 185)
Chapter 4: DATA-LINK LAYER PROTOCOLS
118
FDDI FRAMES
Chapter 4: DATA-LINK LAYER PROTOCOLS
119
WIRELESS LANS
Wireless LANs
IEEE standard 802.11 defines the specifications for wireless
LANs (WLANs).
Support various transmission rates, depending on the standard
802.11b supports up to 11 Mbps. 802.11a and 802.11g support up to 54 Mbps.
Support ad hoc or infrastructure topologies Use three different signaling methods: Direct Sequence Spread
Spectrum (DSSS), Frequency Hopping Spread Spectrum (FHSS), and infrared (CSMA/CA) channel access method
Use the Carrier Sense Multiple Access with Collision Avoidance
Chapter 4: DATA-LINK LAYER PROTOCOLS
120
AD HOC WLAN
Chapter 4: DATA-LINK LAYER PROTOCOLS
121
INFRASTRUCTURE WIRELESS
Chapter 4: DATA-LINK LAYER PROTOCOLS
122
SUMMARY
DIX and IEEE 802.3 define physical and data-link
layer standards and functions for Ethernet networks using CSMA/CD over coaxial, twisted-pair, or fiber optic cabling. layer standards and functions for a token passing ring topology.
standards for a token-passing, fiber optic ring topology.
IBM and IEEE 802.5 define physical and data-link FDDI defines the physical and data-link layer
WLANs can either be ad hoc or infrastructure.
123
Chapter 5
NETWORK LAYER PROTOCOLS
IP IPX NetBEUI AppleTalk
Chapter 5: NETWORK LAYER PROTOCOLS
124
EXAMPLES OF NETWORK LAYER PROTOCOLS
The Transmission Control Protocol/Internet Protocol
(TCP/IP) suite
Internet Protocol (IP)
Novells Internetwork Packet Exchange/Sequenced Packet
Exchange (IPX/SPX) suite
Internetwork Packet Exchange (IPX)
Apple Computers AppleTalk suite
Datagram Delivery Protocol (DDP)
Microsofts suite
NetBIOS Extended User Interface (NetBEUI)
Chapter 5: NETWORK LAYER PROTOCOLS
125
THE INTERNET PROTOCOL
IP, defined in Request for Comments (RFC) 791, is a
connectionless network layer protocol that provides
Datagram encapsulation Logical addressing
Fragmentation and reassembly of datagrams
Routing
Chapter 5: NETWORK LAYER PROTOCOLS
126
IP FUNCTIONS
Encapsulation IP forms a datagram by adding an IP header to information
passed down from the transport layer protocol.
Addressing Each datagram includes logical source and destination
addresses.
Fragmentation and reassembly
The source host or router divides packets into smaller
datagrams that can be transmitted over the network.
The destination host reassembles fragments when it receives
them.
Routing
The selection of the most efficient path.
Chapter 5: NETWORK LAYER PROTOCOLS
127
DATAGRAM ENCAPSULATION
Chapter 5: NETWORK LAYER PROTOCOLS
128
FRAGMENTATION AND REASSEMBLY
Routers connect networks that support different-sized
packets.
The largest packet size supported by a network is called its
maximum transmission unit (MTU).
When a packet is too large to be forwarded to a particular
network, the router splits it into fragments.
Chapter 5: NETWORK LAYER PROTOCOLS
129
FRAGMENTATION AND REASSEMBLY
Each fragment is encapsulated with a header and is
transmitted as a separate packet.
Fragments are not reassembled until they reach their final
destination.
Fragments can themselves be fragmented.
Fragmentation
Chapter 5: NETWORK LAYER PROTOCOLS
130
FRAGMENTATION AND REASSEMBLY
Chapter 5: NETWORK LAYER PROTOCOLS
132
IP HEADER AND FIELDS
Chapter 5: NETWORK LAYER PROTOCOLS
134
Protocol Field Values (The most commonly used values)
0
1 3 6 8 17
IP
ICMP Gateway-to-Gateway Protocol (GGP) TCP (most expected) Exterior Gateway Protocol (EGP) UDP (most expected)
Chapter 5: NETWORK LAYER PROTOCOLS
136
IP ADDRESSING
IP addresses are
Logical network layer addresses used to identify
networks, subnetworks, and hosts
4 bytes (or 32 bits) in length and represented in
dotted decimal notation
The values within each byte range from 0 to 255.
Public or private
Chapter 5: NETWORK LAYER PROTOCOLS
137
DECIMAL AND BINARY NUMBERING
The decimal numbering system uses 10 (base 10)
values to represent numbers.
Uses 09
The binary numbering system uses 2 (base 2)
values to represent numbers.
Uses 0 and 1
Chapter 5: NETWORK LAYER PROTOCOLS
138
EXAMPLE OF 8-BIT CONVERSION
Chapter 5: NETWORK LAYER PROTOCOLS
139
EXAMPLE OF 16-BIT CONVERSION
Chapter 5: NETWORK LAYER PROTOCOLS
140
THREE IP ADDRESS CLASSES
Chapter 5: NETWORK LAYER PROTOCOLS
141
THREE DEFAULT MASKS
Chapter 5: NETWORK LAYER PROTOCOLS
142
IP ADDRESS CLASSES AND PARAMETERS
Chapter 5: NETWORK LAYER PROTOCOLS
143
EXAMPLE OF A CLASS A ADDRESS
Chapter 5: NETWORK LAYER PROTOCOLS
144
EXAMPLE OF A CLASS B ADDRESS
Chapter 5: NETWORK LAYER PROTOCOLS
145
EXAMPLE OF A CLASS C ADDRESS
Chapter 5: NETWORK LAYER PROTOCOLS
146
IP SUBNETTING
Each address class can be divided further to create
subnets.
bits.
Subnet bits are borrowed from the available host
Class A: 24 host bits Class B: 16 host bits Class C: 8 host bits
Bits used to define subnets cannot be used to
identify hosts.
Borrowed bits are added to the mask.
Chapter 5: NETWORK LAYER PROTOCOLS
147
CLASS A, CLASS B, AND CLASS C SUBNETTING
Chapter 5: NETWORK LAYER PROTOCOLS
150
CLASS C SUBNETTING EXAMPLE (CONT.)
Chapter 5: NETWORK LAYER PROTOCOLS
151
PRIVATE IP ADDRESSES
Chapter 5: NETWORK LAYER PROTOCOLS
152
INTERNET PROTOCOL VERSION 6 (IPV6) ADDRESSING
Addresses the depletion of Internet Protocol version
4 (IPv4) addresses
bits
Increases the address space from 32 bits to 128
Chapter 5: NETWORK LAYER PROTOCOLS
153
INTERNET PROTOCOL VERSION 6 (IPV6) ADDRESSING (CONT.)
Uses six variable-length sections:
Format Prefix Registry ID Provider ID Subscriber ID Subnet ID
Interface ID
Chapter 5: NETWORK LAYER PROTOCOLS
154
EXAMPLE OF AN IPV6 ADDRESS
Chapter 5: NETWORK LAYER PROTOCOLS
156
THE IPX PROTOCOL
Novells IPX protocol is a connectionless network
layer protocol that provides
Datagram encapsulation Logical addressing
Fragmentation and reassembly of datagrams
Routing
Chapter 5: NETWORK LAYER PROTOCOLS
159
IPX ADDRESSING
IPX logical network layer addresses consist of three
parts:
Network
The network portion is four bytes long and is assigned
by an administrator or dynamically during installation.
Node
The node portion is the hardware address of the
interface attached to the network.
Socket
The socket is a two-byte value specifying the
application process.
Chapter 5: NETWORK LAYER PROTOCOLS
160
IPX ADDRESSING
Chapter 5: NETWORK LAYER PROTOCOLS
161
IPX ROUTING PROTOCOLS
There are two routing protocols in the Novell
IPX/SPX suite:
IPX Routing Information Protocol (RIP)
IPX RIP uses broadcasts to learn and advertise routes.
The entire route table is broadcast every 60 seconds.
The maximum number of network hops = 15 (16 is
destination unreachable).
IPX RIP uses two metrics for best path selection: hops
and ticks. (A tick is one-eighteenth of a second.)
Chapter 5: NETWORK LAYER PROTOCOLS
162
IPX ROUTING PROTOCOLS (CONT.)
NetWare Link Services Protocol (NLSP)
NLSP is a link state routing protocol. NLSP does not broadcast; it sends route information
only when there is a change in the network.
The maximum number of hops is 127.
The metric for the best path selection is based on link
parameters, not hops.
THE APPLETALK DATAGRAM DELIVERY PROTOCOL
The DDP protocol is a connectionless network layer
Chapter 5: NETWORK LAYER PROTOCOLS
164
protocol in the AppleTalk suite that provides
Datagram encapsulation Logical addressing
Fragmentation and reassembly of datagrams
Routing
Chapter 5: NETWORK LAYER PROTOCOLS
168
NETBEUI
The NetBEUI protocol was developed by IBM and
then adopted by Microsoft.
delivering NetBIOS data.
NetBEUI is a nonroutable protocol used for NetBEUI does not contain network layer addressing. The NetBEUI frame format includes two
components:
A data-link layer Logical Link Control (LLC) (802.2)
Type II header with control fields A transport layer NetBIOS programming interface
Chapter 5: NETWORK LAYER PROTOCOLS
171
SUMMARY
Network layer protocols like IP, IPX, and DDP
provide data encapsulation, logical addressing, fragmentation, and reassembly.
Class B, and Class C.
There are three classes of IP addresses: Class A, Subnet masks are used to further subdivide Class A,
B, and C networks into subnets.
The NetBEUI protocol is the only network layer
protocol that does not provide logical network layer addressing and is therefore not routable.
172
Chapter 6
TRANSPORT LAYER PROTOCOLS
TCP and UDP SPX and NCP
Chapter 6: TRANSPORT LAYER PROTOCOLS
173
TYPES OF TRANSPORT LAYER PROTOCOLS
There are two types of transport layer protocols:
Connection-oriented
Transmission Control Protocol (TCP) Sequenced Packet Exchange (SPX) NetWare Core Protocol (NCP)
Connectionless
User Datagram Protocol (UDP)
Chapter 6: TRANSPORT LAYER PROTOCOLS
174
TRANSPORT LAYER PROTOCOLS
There are two transport layer protocols in the
Transmission Control Protocol/Internet Protocol (TCP/IP) suite:
TCP
UDP
There are two transport layer protocols in the Novell
Internetwork Packet Exchange (IPX)/SPX suite:
SPX
NCP
Chapter 6: TRANSPORT LAYER PROTOCOLS
175
TRANSMISSION CONTROL PROTOCOL (TCP)
The TCP protocol (described in Request for Comments [RFC]
793) has the following characteristics:
Uses Internet Protocol (IP) ID 06
Is a reliable, connection-oriented protocol Provides guaranteed delivery of packets through sequencing
and acknowledgments
Provides sliding-window flow control Performs error detection and correction
Uses ports to identify the communicating process or application
Chapter 6: TRANSPORT LAYER PROTOCOLS
176
TCP HEADER AND FIELDS (PAGE 253)
Chapter 6: TRANSPORT LAYER PROTOCOLS
178
EXAMPLE OF A TCP HEADER
ESTABLISHING A TCP CONNECTION THREE-WAY HANDSHAKE
Verify that both computers are operating and
Chapter 6: TRANSPORT LAYER PROTOCOLS
179
ready to receive data
Exchange initial sequence numbers (ISNs) Exchange maximum segment sizes (MSSs) Exchange port numbers
Chapter 6: TRANSPORT LAYER PROTOCOLS
180
ESTABLISHING A TCP CONNECTION THREE-WAY HANDSHAKE
TCP Connection
Chapter 6: TRANSPORT LAYER PROTOCOLS
182
TCP CONNECTION TERMINATION
Chapter 6: TRANSPORT LAYER PROTOCOLS
187
USER DATAGRAM PROTOCOL (UDP)
UDP (described in RFC 768) has the following
characteristics:
Uses IP ID 17
Provides fast, connectionless delivery of data
Has less overhead than connection-oriented protocols
Uses ports to identify the communicating process or
application
Chapter 6: TRANSPORT LAYER PROTOCOLS
188
UDP HEADER AND FIELDS (PAGE 266)
Chapter 6: TRANSPORT LAYER PROTOCOLS
190
PORTS & SOCKETS
A port number refers to a specific application or
process running on a computer.
A socket is a combination of a port number and an
IP address. (ex: 192.168.2.10:21) this socket addresses port 21 on the system with address 192.168.2.10
The Internet Assigned Numbers Authority (IANA)
assigns well-known port numbers to common Internet applications.
Chapter 6: TRANSPORT LAYER PROTOCOLS
191
CLIENT AND WELL-KNOWN PORTS
There are two types of TCP and UDP ports:
Client ports
Variable ports with a value from 1024 through
65,534
Server (well-known) ports
Commonly used by applications and services
Port values with a value from 1 through 1023
Chapter 6: TRANSPORT LAYER PROTOCOLS
192
EXAMPLES OF WELL-KNOWN PORTS
TCP ports
File Transfer Protocol (FTP) 20 and 21
Telnet 23 Simple Mail Transfer Protocol (SMTP) 25
UDP ports
Trivial File Transfer Protocol (TFTP) 69 Domain Name System (DNS) 53 Bootstrap Protocol/Dynamic Host Configuration
Protocol (BOOTP/DHCP) 67
Chapter 6: TRANSPORT LAYER PROTOCOLS
193
SOCKETS
Chapter 6: TRANSPORT LAYER PROTOCOLS
194
NOVELL SPX AND NCP
Novells NetWare operating system has two
connection-oriented protocols that function at the transport layer:
SPX
NCP
Chapter 6: TRANSPORT LAYER PROTOCOLS
195
SPX Characteristics
SPX is the acronym for Sequenced Packet Exchange. SPX is a connection-oriented protocol.
It provides packet acknowledgment and flow control.
It is used infrequently by NetWare. Messages are carried in Internet Packet Exchange (IPX)
datagrams.
Chapter 6: TRANSPORT LAYER PROTOCOLS
196
NCP Characteristics
NCP is the acronym for NetWare Core Protocol. NCP is used for NetWare file sharing traffic. It is much more frequently used than SPX. Messages are carried in IPX datagrams. NCP requires an acknowledgment for each
transmitted message.
Chapter 6: TRANSPORT LAYER PROTOCOLS
200
SUMMARY
Connection-oriented transport layer protocols like
TCP, SPX, and NCP provide guaranteed, reliable delivery of datagrams.
They all exhibit the same characteristics: sequencing,
acknowledgments, flow control, error correction and detection, session establishment, and teardown.
Connectionless transport layer protocols like UDP
provide fast but unreliable delivery of datagrams.
control, or error correction. There is no session establishment or teardown.
They do not use sequencing, acknowledgments, flow
201
Chapter 7
TCP/IP
Chapter 7: TCP/IP
202
TCP/IP History
Developed in the 1970s Created for use on the ARPANET Used by UNIX Predates the PC, the Open Systems
Interconnection (OSI) model, and Ethernet
Platform and operating system independent
Chapter 7: TCP/IP
203
TCP/IP Standards
Developed using a collaborative process Published as Requests for Comments (RFCs) by
the Internet Engineering Task Force (IETF)
In the public domain
Chapter 7: TCP/IP
204
Advantages of a Multilayered Design
Platform independence Separate protocols make it
easier to support a variety of communicating Platforms
Quality of service Provide level of service required
Simultaneous development Can develop various
protocols simultaneously
Chapter 7: TCP/IP
205
TCP/IP AND THE OSI MODEL
Peer-to-Peer Communication
Chapter 7: TCP/IP
207
THE LINK LAYER
Transmission Control Protocol/Internet Protocol
(TCP/IP) link layer protocols include
Serial Line Internet Protocol (SLIP) Point-to-Point Protocol (PPP)
Chapter 7: TCP/IP
208
THE INTERNET LAYER
The TCP/IP internet layer is equivalent to the Open
Systems Interconnection (OSI) network layer.
IP Address Resolution Protocol (ARP) Internet Control Message Protocol (ICMP) Routing protocols:
Examples of Internet layer protocols include
Routing Information Protocol (RIP) version 1 and 2 Open Shortest Path First (OSPF)
Chapter 7: TCP/IP
209
THE TRANSPORT LAYER
The TCP/IP transport layer is equivalent to the OSI
transport layer.
TCP UDP
Examples of transport layer protocols include
Chapter 7: TCP/IP
210
THE APPLICATION LAYER
The TCP/IP application layer is equivalent to the session,
presentation, and application layers in the OSI model.
Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP)
Examples of application layer protocols include
File Transfer Protocol/Trivial File Transfer Protocol (FTP/TFTP) Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP) Telnet Simple Network Management Protocol (SNMP)
Chapter 7: TCP/IP
211
ARP
The Address Resolution Protocol (ARP) resolves
logical network layer addresses to Media Access Control (MAC) addresses.
ARP is defined in Request for Comments (RFC) 826.
ARP requests and replies are broadcasts that can
be generated by end systems and routers. routers.
ARP broadcast messages are not forwarded by
THE INTERNET CONTROL MESSAGE PROTOCOL (ICMP)
The ICMP protocol (described in RFC 792) is a
Chapter 7: TCP/IP
217
connectionless network layer messaging protocol.
and routers:
Two types of messages can be sent by end systems
Error and diagnostic. Used to report error conditions
and perform diagnostic tests on a network system
Query. Used to request information from another
Chapter 7: TCP/IP
222
IP ROUTING BASICS
Routers are network layer(Layer 3) devices that
Connect similar or dissimilar data-link layer architectures to
form an internetwork.
Use route tables to forward datagrams across an internetwork.
Datagrams are forwarded based on the logical destination
network layer address. The best path selection is determined by the least cost metric. Routes to remote destinations are learned in two ways:
Statically
Dynamically
Chapter 7: TCP/IP
223
DIRECTLY CONNECTED NETWORKS
Chapter 7: TCP/IP
224
STATIC ROUTES
Static routes are manually configured by an
administrator. network.
There must be one static route for each destination
There must be a default static route. When a specific route becomes unavailable, a new
static route must be added and the old one must be removed.
Static routes do not generate broadcast traffic.
Suitable only for small networks
Chapter 7: TCP/IP
225
DYNAMIC ROUTES
Dynamic routes are automatically learned and
advertised by routing protocols.
Routers use dynamic routing protocols to build their
route tables and advertise route information. very quickly to changes in the network.
Routing protocols, such as RIP and OSPF, can adapt
Routes are either broadcast or multicast.
The best path selection is based on metrics.
Chapter 7: TCP/IP
226
DYNAMIC ROUTES (CONT.)
Suitable for large networks Automatically compensates for network
infrastructure changes
Reduces administrative workload
Chapter 7: TCP/IP
227
ROUTING TABLE INFORMATION
Each route entry includes the following information:
The destination network and subnet mask The IP address of the next gateway (or router) used to
reach the destination destination
The specific outgoing interface used to reach the
The metric value associated with the route
Chapter 7: TCP/IP
228
MICROSOFT WINDOWS XP ROUTING TABLE
Chapter 7: TCP/IP
229
STATIC ROUTE EXAMPLE
Chapter 7: TCP/IP
230
STATIC ROUTE COMMANDS
The configuration of a static route varies, depending
on the operating system of the computer or router you are using.
either
For Microsoft Windows Server 2003 you can use
Route.exe command line interface Routing And Remote Access Console
Chapter 7: TCP/IP
231
STATIC ROUTE COMMANDS (CONT.)
For UNIX and Linux systems, use the Route
command line interface.
For NetWare servers, you can use either
Routecon.nlm or Inetcfg.nlm.
Chapter 7: TCP/IP
232
ROUTE.EXE SYNTAX
To add a static route, use the following command
line syntax:
ROUTE ADD [destination network] MASK [subnet
mask] [local interface address] IF [local interface number] METRIC [metric value for route]
For example:
ROUTE ADD 192.168.3.0 MASK 255.255.255.0
192.168.2.2 IF 1 METRIC 1
Chapter 7: TCP/IP
233
DYNAMIC ROUTING PROTOCOLS
Routers use dynamic routing protocols to advertise
and learn about networks.
Distance vector Link state
There are two types of routing protocols:
Chapter 7: TCP/IP
237
RIP (Routing Information protocol)
RIP is a distance vector routing protocol. There are two versions of RIP:
RIP version 1, or RIP v1 (defined in RFC 1058) RIP version 2, or RIP v2 (defined in RFC 2453)
RIP uses the least number of hops to determine the
best path to a destination. unreachable).
The maximum hop count is 15 (16 = destination
Chapter 7: TCP/IP
241
OSPF (Open Shortest Path First)
OSPF is a link state routing protocol defined in RFC
2328.
OSPF uses link costs with the lowest values to
determine the best path to a destination. network.
Routers maintain a database of routes for the entire
Routers exchange route information through
multicast advertisements.
OSPF supports load balancing and authentication.
Chapter 7: TCP/IP
242
APPLICATION LAYER PROTOCOLS
Provide the communication between a client Run on TCP or UDP
program and a server program across a network
Chapter 7: TCP/IP
243
DNS (Domain Name System)
Resolves Internet Protocol (IP) host names to logical
network layer addresses (converts IP addresses to Hostnames)
Runs on top of UDP or TCP
Uses well-known port 53
Chapter 7: TCP/IP
244
DNS (Domain Name System) (CONT.)
A hierarchical namespace for computer networks
Identifies computers using names composed of 3 or more words, separated by periods. Common Top Level Domains .edu .gov .mil .com .net .org
Chapter 7: TCP/IP
245
DNS (Domain Name System) (CONT.)
Top Level Domain
Second Level Domain
Chapter 7: TCP/IP
DNS Name Resolution
246
The DNS Name Resolution Process
Chapter 7: TCP/IP
247
DHCP (Dynamic Host Configuration Protocol)
Facilitates the automatic assignment of IP
DHCP
addresses
Runs on top of UDP or TCP Uses well-known server port 67 and client port 68
Chapter 7: TCP/IP
248
FTP (File Transfer Protocol)
Is a connection-oriented file transfer protocol Runs on top of TCP Uses well-known server ports 21 (for control) and 20
(for data)
Chapter 7: TCP/IP
249
TFTP (Trivial File Transfer Protocol)
Is a connectionless file transfer protocol Runs on top of UDP Uses well-known server port 69
Chapter 7: TCP/IP
250
HTTP (Hypertext Transfer Protocol)
Used to access Web services Runs on top of UDP or TCP Uses well-known server port 80
Chapter 7: TCP/IP
251
SMTP (Simple Mail Transfer Protocol)
Is an e-mail protocol Runs on top of TCP Uses well-known server port 25
Chapter 7: TCP/IP
252
SNMP (Simple Network Management Protocol)
Allows SNMP management devices to query clients
for information and set network traps. Use to gather information about the network
Runs on top of UDP or TCP
Uses well-known server port 161
Chapter 7: TCP/IP
253
THE TELNET (Terminal Emulation) PROTOCOL
Is a terminal emulation program that allows remote
access and management of network devices
Runs on top of TCP Uses well-known server port 23
Chapter 7: TCP/IP
254
TCP/IP CONFIGURATION PARAMETERS
Each TCP/IP Windows host must be configured with
the following parameters:
IP Address Subnet Mask
Default Gateway
DNS Server Address Windows Internet Name Service (WINS) Server
Address Network Basic Input/Output System (NetBIOS)/Host Name
Chapter 7: TCP/IP
255
TCP/IP AND WINDOWS
All current versions of Windows use the TCP/IP
protocol stack by default.
When the operating system detects a network
interface adapter, it automatically installs the network interface device driver and the following TCP/IP modules:
Client for Microsoft Networks File and Print Sharing for Microsoft Networks Internet Protocol (TCP/IP)
Chapter 7: TCP/IP
257
INSTALLING TCP/IP COMPONENTS
Chapter 7: TCP/IP
258
THE INTERNET PROTOCOL (TCP/IP) PROPERTIES DIALOG BOX
Chapter 7: TCP/IP
259
THE IP SETTINGS TAB
Chapter 7: TCP/IP
260
THE DNS TAB
Chapter 7: TCP/IP
261
THE WINS TAB
Chapter 7: TCP/IP
262
THE OPTIONS TAB
Chapter 7: TCP/IP
263
SUMMARY
The TCP/IP protocol stack consists of four layers: link,
internet, transport, and application. ARP resolves logical network layer addresses to MAC addresses. ICMP is a messaging protocol used to report IP errors and query hosts for information. Routers connect networks. They use static or dynamic routing protocols to learn and advertise routes. Application layer protocols provide services to IP clients, such as file transfer and e-mail capability. IP hosts must be configured with an IP Address, Subnet Mask, Default Gateway, DNS Server Address, WINS Server Address, and other parameters to communicate on a network.