Top Banner
Confidential Network+ Guide to Networks, Fourth Edition Chapter 4 Network Protocols
78
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network Protocols

Confidential

Network+ Guide to Networks, Fourth Edition

Chapter 4

Network Protocols

Page 2: Network Protocols

Confidential2

Objectives

Identify the characteristics of TCP/IP, IPX/SPX, NetBIOS, and

AppleTalk

Understand how network protocols correlate to layers of the OSI

Model

Identify the core protocols of the TCP/IP suite and describe their

functions

Identify the well-known ports for key TCP/IP services

Page 3: Network Protocols

Confidential3

Objectives (continued)

Understand addressing schemes for TCP/IP, IPX/SPX, NetBEUI,

and AppleTalk

Describe the purpose and implementation of DNS (Domain Name

System) and WINS (Windows Internet Naming Service)

Install protocols on Windows XP clients

Page 4: Network Protocols

Confidential4

Introduction to Protocols

Protocols vary according to purpose, speed, transmission efficiency,

utilization of resources, ease of setup, compatibility, and ability to

travel between different LANs

Multiprotocol networks: networks running more than one protocol

Most popular protocol suite is TCP/IP

Others: IPX/SPX, NetBIOS, and AppleTalk

Page 5: Network Protocols

Confidential5

TCP/IP (Transmission Control Protocol/Internet Protocol)

Suite of specialized subprotocols

TCP, IP, UDP, ARP, and many others

De facto standard on Internet

Protocol of choice for LANs and WANs

Protocols able to span more than one LAN are routable

Can run on virtually any combination of NOSs or network media

TCP/IP core protocols operate in Transport or Network layers

Page 6: Network Protocols

Confidential6

The TCP/IP Core Protocols: TCP (Transmission Control Protocol)

Provides reliable data delivery services

Operates in Transport layer

Connection-oriented

Ensures reliable data delivery through sequencing and checksums

Provides flow control

Port hosts address where an application makes itself available to

incoming or outgoing data

Page 7: Network Protocols

Confidential7

NetBIOS/NetBEUI

Network Basic Input/Output System (NetBIOS) used for communication

within LAN

Operates at Transport and Session layers of OSI model

NetBIOS Extended User Interface (NetBEUI) adds capabilities to NetBIOS

and an advanced version of NetBIOS

Widely used in Ethernet, Token Ring and Windows NT networks

Page 8: Network Protocols

Confidential8

NetBIOS Services

NetBIOS Name Service is implemented in Microsoft Windows as Windows

Internet Name Service (WINS).

NetBIOS Services

Name ServiceSession Service

Datagram Service

Page 9: Network Protocols

Confidential9

Name Service

Implemented in Microsoft Windows as Windows Internet Name

Service (WINS).

Provides means to application to register its NetBIOS name

Name Service functions include

Add Name

Add Group Name

Delete Name

Find Name

Page 10: Network Protocols

Confidential10

Session Service

Establishes session for data exchange between computers using TCP port 139

Session Establishment Process Session Termination Process

Page 11: Network Protocols

Confidential11

Datagram Service

Uses the UDP port 138 and provides a connectionless and broadcast-oriented data communication between two devices.

Divides data in datagrams before sending Datagram service functions include:

Send Datagram Send Broadcast Datagram Receive Datagram Receive Broadcast Datagram

Page 12: Network Protocols

Confidential12

NetBIOS Name Resolution

Used to map NetBIOS names to IP addresses Methods used to resolve names:

NetBIOS Name Cache NetBIOS Name Server (NBNS) Local Broadcast

Order of resolving names depends on node types: B-node (broadcast) P-node (peer-peer) M-node (mixed) H-node (hybrid)

Page 13: Network Protocols

Confidential13

NetBEUI

Enhanced version of NetBIOS

NetBIOS is used in Ethernet and Win NT where as NetBEUI is used in Win

95, Win 98 and LAN

Uses unacknowledged connectionless mode for name service and datagram

service

Uses virtual circuit approach for session service

NetBEUI provides name service, datagram service and session service

Page 14: Network Protocols

Confidential14

TCP/IP

Two layer communication protocol used by Internet TCP provides connection-oriented reliable transport service Divides the message into smaller packets called segments IP is a connectionless and unreliable datagram protocol and provides no

error checking IP transfers data in the form of packets called datagrams

Page 15: Network Protocols

Confidential15

TCP/IP Protocol Suite

Designed before OSI model

Consists of five layers

Provides independent

protocols at each layer

Page 16: Network Protocols

Confidential16

TCP Segment Format

.

Page 17: Network Protocols

Confidential17

IPv4 Datagram Format

Page 18: Network Protocols

Confidential18

IP Datagram Fragmentation

Fragmentation refers to breaking datagrams into pieces

Maximum Transfer Unit (MTU) is maximum amount of data that frame can

carry

Datagram is fragmented when its size exceeds MTU of network

Fragments follow different paths to reach destination

Page 19: Network Protocols

Confidential19

ARP/RARP

To deliver packet both physical and logical addresses are necessary

Address Resolution Protocol (ARP) provides physical address when logical

address is known

Reverse Address Resolution Protocol (RARP) maps logical address to

physical address

RARP is useful when device is booted for first time

Page 20: Network Protocols

Confidential20

ICMP/IGMP

Internet Control Message Protocol (ICMP) provides error reporting and

query management mechanism

ICMP handles problems occurring while packet transmission

Internet Group Message Protocol (IGMP) manages multicasting and group

membership of devices

Page 21: Network Protocols

Confidential21

ICMP Message Types

Error Reporting

Destination Unreachable

Router Solicitation and Advertisement

Timestamp request and reply

Address MaskRequest and reply

Echo request and reply

Query

Source Quench

Time Exceeded

Redirection

Parameter Problem

ICMP Messages

Page 22: Network Protocols

Confidential22

IGMP Message Types

IGMP Messages

QueryMembership

Report Leave Report

General Query Special Query

Page 23: Network Protocols

Confidential23

UDP

User Datagram Protocol (UDP) provides connectionless process-to-process

communication

UDP packets are called user data grams.

User Datagram Format:

Page 24: Network Protocols

Confidential24

UDP Operation - I

Encapsulation Decapsulation

Page 25: Network Protocols

Confidential25

UDP Operation - II

Client Queue Server Queue

Page 26: Network Protocols

Confidential26

IPX/SPX

Novell NetWare system uses IPX/SPX as communication protocol within

networks

IPX operates at Network layer for connectionless communication

SPX operates at Transport layer for connection-oriented communication

Together, IPX/SPX provides same services as TCP/IP

Page 27: Network Protocols

Confidential27

IPX/SPX Protocol Suite

Page 28: Network Protocols

Confidential28

IPX/SPX Naming Conventions

IPX/SPX/NetBIOS Compatible Transport Protocol (NWLink) uses two types

of IPX network numbers for routing purposes:

Internal network number – Mentioned as Internal network number in

NWLink IPX/SPX/NetBIOS Compatible Transport Protocol Properties dialog

box

External network number – Mentioned as Network number in Manual Frame

Detection dialog box

Page 29: Network Protocols

Confidential29

HDLC/SDLC

High Level Data Link Control (HDLC) and Synchronous Data Link Control

(SDLC) are bit-oriented synchronous protocols in which data frames are

interpreted as series of bits

Both are useful for half-duplex and full-duplex communication

Windows XP still support DLC

Page 30: Network Protocols

Confidential30

HDLC Nodes and Configurations

Types of HDLC nodes are:

Primary Station

Secondary Station

Combined Station

Supported link configurations:

Unbalanced

Balanced

Page 31: Network Protocols

Confidential31

HDLC Data Transfer Modes

Normal Response Mode (NRM) – Secondary station requires permission

from primary station before sending data

Asynchronous Response Mode (ARM) – Secondary station can transfer

without permission from primary station

Asynchronous Balanced Mode (ABM) – Either of the combined station can

initiate the transmission

Page 32: Network Protocols

Confidential32

SDLC

Bit-oriented protocol and similar to HDLC

Only primary and secondary stations are used

Configurations

Point-to-Point Multipoint Loop Hub go-ahead

Page 33: Network Protocols

Confidential33

Protocols at Different Layers

OSI Layers Protocols

Physical Layer No protocols defined

Data Link Layer HDLC, SDLC

Network Layer NetBEUI, IP, ICMP, IGMP, ARP, RARP, IPX

Transport Layer NetBEUI, TCP, UDP, SPX

Session Layer NetBIOS, SAP, SMTP, FTP, DNS, SNMP,

Presentation Layer NCP, RIP, NLSP, SMTP, FTP, DNS, SNMP, NFS

Application Layer SMTP, DNS, SNMP, NFS, TFTP

Page 34: Network Protocols

Confidential34

The TCP/IP Core Protocols: TCP (continued)

Figure 4-1: A TCP segment

Page 35: Network Protocols

Confidential35

The TCP/IP Core Protocols: TCP (continued)

Figure 4-2: TCP segment data

Page 36: Network Protocols

Confidential36

The TCP/IP Core Protocols: TCP (continued)

Figure 4-3: Establishing a TCP connection

Page 37: Network Protocols

Confidential37

UDP (User Datagram Protocol)

Figure 4-4: A UDP segment

Page 38: Network Protocols

Confidential38

IP (Internet Protocol)

Provides information about how and where data should be delivered

Data’s source and destination addresses

Network layer protocol

Enables TCP/IP to internetwork

Unreliable, connectionless protocol

IP datagram: packet, in context of TCP/IP

Envelope for data

Page 39: Network Protocols

Confidential39

IP (continued)

Figure 4-5: An IP datagram

Page 40: Network Protocols

Confidential40

IP (continued)

Figure 4-6: IP datagram data

Page 41: Network Protocols

Confidential41

ICMP (Internet Control Message Protocol)

Network layer protocol that reports on success or failure of data

delivery

Indicates when part of network congested

Indicates when data fails to reach destination

Indicates when data discarded because allotted time for delivery (TTL)

expired

Cannot correct errors it detects

Page 42: Network Protocols

Confidential42

IGMP (Internet Group Management Protocol)

Network layer protocol that manages multicasting

Transmission method allowing one node to send data to defined group

of nodes

Point-to-multipoint method

Teleconferencing or videoconferencing over Internet

Routers use IGMP to determine which nodes belong to multicast

group and to transmit data to all nodes in that group

Page 43: Network Protocols

Confidential43

ARP (Address Resolution Protocol)

Network layer protocol

Obtains MAC (physical) address of host

Creates database that maps MAC address to host’s IP (logical) address

ARP table or cache: local database containing recognized MAC-to-

IP address mappings

Dynamic ARP table entries created when client makes ARP request that

cannot be satisfied by data already in ARP table

Static ARP table entries entered manually using ARP utility

Page 44: Network Protocols

Confidential44

RARP (Reverse Address Resolution Protocol)

Allows client to broadcast MAC address and receive IP address in

reply

If device doesn’t know own IP address, cannot use ARP

RARP server maintains table of MAC addresses and associated IP

addresses

Page 45: Network Protocols

Confidential45

Addressing in TCP/IP

IP core protocol responsible for logical addressing

IP Address: unique 32-bit number

Divided into four octets separated by periods

0 reserved as placeholder referring to entire group of computers on a network

255 reserved for broadcast transmissions

Page 46: Network Protocols

Confidential46

Addressing in TCP/IP (continued)

Figure 4-8: IP addresses and their classes

Page 47: Network Protocols

Confidential47

Addressing in TCP/IP (continued)

Many Internet addresses go unused

Cannot be reassigned because they are reserved

IP version 6 (IPv6) will incorporate new addressing scheme

Some IP addresses reserved for special functions

127 reserved for a device communicating with itself

Loopback test

ipconfig: Windows XP command to view IP information

ifconfig on Unix and Linux

Page 48: Network Protocols

Confidential48

Binary and Dotted Decimal Notation

Most common way of expressing IP addresses

Decimal number between 0 and 255 represents each binary octet

Separated by period

Each number in dotted decimal address has binary equivalent

Page 49: Network Protocols

Confidential49

Subnet Mask

Every device on TCP/IP-based network identified by subnet mask 32-bit number that, when combined with device’s IP address, informs

rest of network about segment or network to which a device is attached Subnetting: subdividing single class of networks into multiple,

smaller logical networks or segments

Page 50: Network Protocols

Confidential50

Assigning IP Addresses

Nodes on a network must have unique IP addresses

Static IP address: manually assigned

Can easily result in duplication of addresses

Most network administrators rely on network service to automatically

assign IP addresses

Page 51: Network Protocols

Confidential51

BOOTP (Bootstrap Protocol)

Uses central list of IP addresses and associated devices’ MAC

addresses to assign IP addresses to clients dynamically

Dynamic IP addresses

Application layer protocol

Client broadcasts MAC address, BOOTP server replies with:

Client’s IP address

IP address of server

Host name of server

IP address of a default router

Page 52: Network Protocols

Confidential52

DHCP (Dynamic Host Configuration Protocol)

Automated means of assigning unique IP address to every device

on a network

Application layer protocol

Reduces time and planning spent on IP address management

Reduces potential for errors in assigning IP addresses

Enables users to move workstations and printers without having to

change TCP/IP configuration

Makes IP addressing transparent for mobile users

Page 53: Network Protocols

Confidential53

DHCP (continued)

Figure 4-11: The DHCP leasing process

Page 54: Network Protocols

Confidential54

APIPA (Automatic Private IP Addressing)

Provides computer with IP address automatically

For Windows 98, Me, 2000, XP client and

Windows 2003 server

For situations where DHCP server unreachable

Assigns computer’s network adapter IP address from predefined pool of

addresses

169.254.0.0 through 169.254.255.255

Computer can only communicate with other nodes using addresses in

APIPA range

Page 55: Network Protocols

Confidential55

Sockets and Ports

Every process on a machine assigned a port number 0 to 65535

Process’s port number plus host machine’s IP address equals

process’s socket

Ensures data transmitted to correct application

Well Known Ports: in range 0 to 1023

Assigned to processes that only the OS or system administrator can

access

Page 56: Network Protocols

Confidential56

Sockets and Ports (continued)

Registered Ports: in range 1024 to 49151

Accessible to network users and processes that do not have special

administrative privileges

Dynamic and/or Private Ports: in range 49152 through 65535

Open for use without restriction

Page 57: Network Protocols

Confidential57

Addressing in IPv6

IPv6 slated to replace current IP protocol, IPv4

More efficient header, better security, better prioritization

Billions of additional IP addresses

Differences:

Address size

Representation

Distinguishes among different types of network interfaces

Format Prefix

Page 58: Network Protocols

Confidential58

Host Names and DNS (Domain Name System): Domain Names

Every host can take a host name

Every host is member of a domain

Group of computers belonging to same organization and has part of

their IP addresses in common

Domain name usually associated with company or other type of

organization

Fully qualified host name: local host name plus domain name

Domain names must be registered with an Internet naming authority

that works on behalf of ICANN

Page 59: Network Protocols

Confidential59

Host Files

ASCII text file called HOSTS.TXT

Associate host names with IP addresses

Growth of Internet made this arrangement impossible to maintain

Figure 4-13: Example host file

Page 60: Network Protocols

Confidential60

DNS (Domain Name System)

Hierarchical method of associating domain names with IP addresses Refers to Application layer service that accomplishes association and

organized system of computers and databases making association possible

Relies on many computers around world Thirteen root servers Three components:

Resolvers Name servers Name space

Page 61: Network Protocols

Confidential61

DNS (continued)

Figure 4-14: Domain name resolution

Page 62: Network Protocols

Confidential62

DNS (continued)

Figure 4-14 (continued): Domain name resolution

Page 63: Network Protocols

Confidential63

DDNS (Dynamic DNS)

DNS is reliable as long as host’s address is static

Many Internet users subscribe to type of Internet service in which IP

address changes periodically

In DDNS, service provider runs program on user’s computer that

notifies service provider when IP address changes

DNS record update effective throughout Internet in minutes

Page 64: Network Protocols

Confidential64

Zeroconf (Zero Configuration)

Collection of protocols designed by IETF to simplify setup of nodes

on TCP/IP networks

Assigns IP address

Resolves node’s host name and IP address without requiring DNS

server

Discovers available services

Enables directly connected workstations to communicate without relying

on static IP addressing

IP addresses are assigned through IPv4LL (IP version 4 Link Local)

Page 65: Network Protocols

Confidential65

Some TCP/IP Application Layer Protocols

Telnet: terminal emulation protocol used to log on to remote hosts

using TCP/IP protocol suite

TCP connection established

Keystrokes on user’s machine act like keystrokes on remotely

connected machine

FTP (File Transfer Protocol): Application layer protocol used to send

and receive files via TCP/IP

Server and clients

FTP commands work from OS’s command prompt

Anonymous logons

Page 66: Network Protocols

Confidential66

Some TCP/IP Application Layer Protocols (continued)

Trivial File Transfer Protocol (TFTP): enables file transfers between

computers

Simpler than FTP

Relies on UDP at Transport layer

Connectionless

Network Time Protocol (NTP): Application layer protocol used to

synchronize clocks of computers

Network News Transfer Protocol (NNTP): facilitates exchange of

newsgroup messages between multiple servers and users

Page 67: Network Protocols

Confidential67

Some TCP/IP Application Layer Protocols (continued)

Packet Internet Groper (PING): utility that can verify that TCP/IP is

installed, bound to the NIC, configured correctly, and

communicating

Pinging:

Echo request and echo reply

Can ping either an IP address or a host name

Pinging loopback address, 127.0.0.1, to determine whether

workstation’s TCP/IP services are running

Many useful switches

e.g., -?, -a, -n, -r

Page 68: Network Protocols

Confidential68

IPX/SPX (Internetwork Exchange/Sequenced Packet Exchange)

Required to ensure interoperability of LANs running NetWare

versions 3.2 and lower

Replaced by TCP/IP on Netware 5.0 and higher

Page 69: Network Protocols

Confidential69

The IPX and SPX Protocols

Internetwork Packet Exchange (IPX): provides logical addressing

and internetworking services

Operates at Network layer

Similar to IP

Connectionless

Sequenced Packet Exchange (SPX): Works with IPX to ensure data

received whole, in sequence, and error free

Belongs to Transport layer

Connection-oriented

Page 70: Network Protocols

Confidential70

Addressing in IPX/SPX

Each node on network must be assigned unique address

IPX address

Network address: chosen by network administrator

Node address: by default equal to network device’s MAC address

Page 71: Network Protocols

Confidential71

NetBIOS and NetBEUI

NetBIOS originally designed to provide Transport and Session layer services for applications running on small, homogenous networks

Microsoft added standard Transport layer component called NetBEUI Efficient on small networks

Consumes few network resources Provides excellent error correction

Does not allow for good security Few possible connections Cannot be routed

Page 72: Network Protocols

Confidential72

Addressing in NetBEUI

Network administrators must assign NetBIOS name to each

workstation

After NetBIOS has found workstation’s NetBIOS name, it discovers

workstation’s MAC address

Uses this address in further communications

Page 73: Network Protocols

Confidential73

WINS (Windows Internet Naming Service)

Provides means to resolve NetBIOS names to

IP addresses

Used exclusively with systems using NetBIOS

Microsoft Windows

Automated service that runs on a server

Guarantees unique NetBIOS name used for each computer on

network

Clients do not have to broadcast NetBIOS names to rest of network

Improves network performance

Page 74: Network Protocols

Confidential74

AppleTalk

Protocol suite originally designed to interconnect Macintosh

computers

Can be routed between network segments and integrated with

NetWare-, UNIX-, Linux-, or Microsoft-based networks

AppleTalk network separated into logical groups of computers called

AppleTalk zones

Enable users to share file and printer resources

AppleTalk node ID: Unique 8- or 16-bit number that identifies

computer on an AppleTalk network

Page 75: Network Protocols

Confidential75

Binding Protocols on a Windows XP Workstation

Windows Internet Naming Service (WINS): process of assigning one network component to work with another

Core Network and Transport layer protocols normally included with OS When enabled, attempt to bind with network interfaces on computer

For optimal network performance, bind only protocols absolutely needed

Possible to bind multiple protocols to same network adapter

Page 76: Network Protocols

Confidential76

Summary

Protocols define the standards for communication between nodes on a network

TCP/IP is most popular protocol suite, because of its low cost, open nature, ability to communicate between dissimilar platforms, and routability

TCP provides reliability through checksum, flow control, and sequencing information

IP provides information about how and where data should be delivered

Every IP address contains two types of information: network and host

Page 77: Network Protocols

Confidential77

Summary (continued)

Subnetting is implemented to control network traffic and conserve a

limited number of IP addresses

Dynamic IP address assignment can be achieved using BOOTP or

the more sophisticated DHCP

A socket is a logical address assigned to a specific process running

on a host

IPv6 provides several other benefits over IPv4

A domain is a group of hosts that share a domain name and have

part of their IP addresses in common

Page 78: Network Protocols

Confidential78

Summary (continued)

DNS is a hierarchical way of tracking domain names and their addresses

IPX/SPX is a suite of protocols that reside at different layers of the OSI Model

NetBEUI is a protocol that consumes few network resources, provides error correction, and requires little configuration

WINS is a service used on Windows systems to map IP addresses to NetBIOS names

AppleTalk is the protocol suite originally used to interconnect Macintosh computers