chapter 6 l.
Skip this Video
Loading SlideShow in 5 Seconds..
Chapter 6 PowerPoint Presentation
Download Presentation
Chapter 6

Loading in 2 Seconds...

play fullscreen
1 / 50

Chapter 6 - PowerPoint PPT Presentation

  • Uploaded on

Chapter 6. Networking Protocols. Introduction. Topics Protocol Basics Protocol Characteristics Transmission Control Protocol/Internet Protocol Network Access Layer Protocols Internet Layer Protocols Transport Layer Protocols Application Layer Protocols. Protocol Basics.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

Chapter 6

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. Chapter 6 Networking Protocols

    2. Introduction • Topics • Protocol Basics • Protocol Characteristics • Transmission Control Protocol/Internet Protocol • Network Access Layer Protocols • Internet Layer Protocols • Transport Layer Protocols • Application Layer Protocols

    3. Protocol Basics • A protocol is a set of rules that determines how computers exchange information over a network medium • A wide variety of communication protocols exist, and many of them rely on others for operation • Groups of related protocols are often called stacksorprotocol stacks

    4. Protocol Characteristics • Data packets can be sent over a medium using any one of a number of protocols • Protocols can be either standard or proprietary • Standard protocols • Support universal communication so equipment from different manufacturers can interact

    5. Proprietary Protocols • Proprietary protocols are vendor specific and are usually protected by patents or other legal stipulations • Proprietary protocols include • XNS • NetBIOS • IPX/SPX • AppleTalk • DECNet

    6. Xerox Network System (XNS) • XNS is a suite of protocols created by Xerox in the late 1970s for Ethernet networks • XNS is rarely used in new networks today

    7. NetBios • The Network Basic Input/Output System (NetBIOS) interface was developed in 1983 for IBM • The intention was to allow applications on different computers to communicate within a local area network • NetBIOS was not designed for large networks

    8. IPX/SPX • Novell introduced Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) in the early 80s • This stack was based on the XNS network protocol family • IPX is the Network layer protocol • SPX is the Transport layer protocol

    9. AppleTalk • AppleTalk is Macintosh’s networking protocol • It is designed to be a flexible, simple, and inexpensive network means for connecting computers, peripherals, and servers • Newer versions of Macintosh operating systems use TCP/IP and SMB as default protocols rather than AppleTalk • AppleTalk is a protocol and LocalTalk is a media type

    10. DECnet • DECnetis a proprietary network protocol designed by Digital Equipment Corporation • Currently two versions of DECnet are in use: • DECnet Phase IV which is based on the Phase IV Digital Network Architecture (DNA) • DECnet/OSI also called DECnet Phase V is a layered model

    11. Transmission Control Protocol/Internet Protocol • TCP/IP is considered the language of the Internet • It is the most widely used protocol today • It is a suite, or stack, of small, specialized protocols • Because of its routing ability, TCP/IP has become the standard for many LANs, as well as for the Internet

    12. Transmission Control Protocol/Internet Protocol • In the early 1970s, the Department of Defense funded ARPA to design a new set of computer communication protocols that would allow multiple networks to be interconnected in a flexible and dynamic way • The protocol developed was originally called Network Control Protocol • This success led to the implementation of the two main Internet protocols • These are Transmission Control Protocol and Internet Protocol (TCP/IP)

    13. Transmission Control Protocol/Internet Protocol • The TCP/IP suite maps the seven layers of the OSI model to a four-layer model • The TCP/IP model focuses more on interconnectivity than on functional layers

    14. Internet and OSI Model

    15. Transmission Control Protocol/Internet Protocol • The TCP/IP model is also called the Internet reference model • Layers • Network Access • Internet • Transport • Application

    16. The TCP/IP Protocol Suite

    17. Network Access Layer Protocols • The Network Access layer is the lowest layer in the model • It Maps to Layers 1 (Physical) and 2 (Data Link) of the OSI model • It is responsible for the framing (DL) and physical delivery of datagrams

    18. Network Access Layer Protocols • Access Layer Protocols deliver data to computers and devices on the network • These include Serial Line Interface Protocol (SLIP) and Point-to-Point Protocol (PPP) • These protocols support serial data transmission over a modem

    19. Network Access Layer Protocols • Other Network Access protocols • the Address Resolution Protocol (ARP) • the Reverse Address Resolution Protocol (RARP) • Provide a means of mapping IP addresses to MAC addresses • These protocols provide a means for last hop message delivery

    20. Local ARP Broadcast

    21. RARP Broadcast Example

    22. Internet Layer Protocols • The layer above the Network Access layer is called the Internet layer • It manages the routing of packets that are to be forwarded on to different networks • It relies on routable protocols for delivery

    23. Internet Layer Protocols • The Internet Protocol (IP) is responsible addressing and routing of data packets • Routing tables created by routing protocols are used to forward messages from one network to another • It is a low overhead, best effort delivery protocol

    24. The Internet Layer Protocols • IP • ICMP • ARP • RARP

    25. IP Message Format • IP Packets or datagrams consist of a header, data (payload), and a trailer • The header contains routing information • Trailers contain a checksum value, which is used to determine if data was corrupted during transmission

    26. IP Header

    27. Packet Delivery • IP compares the destination address in the packet header to router table addresses • If the address corresponds to a local network, the datagram is delivered to the appropriate computer • If the address corresponds to a remote network, the packet is passed to a router for delivery

    28. Routing Controls • Time to Live (TTL) • prevents packets from circulating on the network forever • The TTL value is decremented by one each time the packet traverses a router (each hop) • Default value is usually 120 • Fragmentation – Routers may break oversize packets into fragments, then route the individual fragments, which are reassembled at the destination computer

    29. Fragmentation • Each subnetwork has a maximum transmission unit (MTU), which is the largest packet it can transfer • A datagram received from one network may be too large to be transmitted as a single packet on another network • Fragmentation is the process of dividing a packet into smaller pieces

    30. Internet Control Message Protocol • ICMP • Internet layer protocol • uses IP to send its messages • uses IP as if it was higher-level protocol • used as an aid for other protocols • used to test for connectivity and search for configuration errors in a network

    31. ICMP Error Messages • Destination Unreachable – message returned to sender if a router cannot forward an IP datagram • Buffer Full – message returned until congestion due to full buffer has abated • Hops – an IP datagram has passed through its allotted number of routers • Ping – ICMP echo messages are returned to sender if destination exists and is reachable • Traceroute – ICMP timeouts used to discover path a packet takes as it traverses an internetwork

    32. PING • Used to test connectivity • uses the ICMP echo function • A small packet containing an ICMPecho message is sent through the network to a particular IP address • The computer that sent the packet then waits for a return packet • If the connections are good and the target computer is up, an echo message is returned to the sender

    33. Traceroute • Originally developed for the Unix operating system • used to track the path a packet takes from sender to destination • Calculates travel time for each hop • uses an ICMP echo request packet to determine the path

    34. Transport Layer Protocols • The protocol layer above the Internet layer • provides a reliable communication service so that extended two-way conversations may take place • responsible for providing end-to-end data integrity

    35. Key Features of TCP and UDP

    36. Transport Layer Protocols • Transmits data as a stream of characters • initiates and terminates the connections between sender and receiver • Two main protocols • Transmission Control Protocol (TCP) • User Datagram Protocol (UDP)

    37. Protocols That Use TCP and UDP

    38. Transmission Control Protocol (TCP) • provides connection-oriented data transmission • supports multiple data streams • provides for flow and error control • uses sequence numbers and acknowledgements to guarantee delivery

    39. TCP Connections • TCP communications are port to port • A socket is an IP address plus a port number • Well-defined port numbers have been assigned to common applications

    40. Port Numbers • Used to communicate with upper layers by keeping track of conversations with different services (applications) • Well-Known port numbers define different application locations on the server that hosts the applications

    41. Well-Known Port Numbers

    42. TCP Segment Format

    43. User Datagram Protocol (UDP) • a connectionless protocol • Low overhead - does not provide either sequencing or acknowledgements • used a lot in telephony traffic and the Remote Procedure Call (RPC) • UDP does not provide the reliability that TCP provides

    44. UDP Segment Format

    45. Application Layer Protocols • The top layer in the Internet reference model • Provides applications access to network services

    46. ApplicationLayer Protocols • Telnet – remote client access to resources on a Telnet server • FTP – reliable file transport using TCP; requires authentication • TFTP – Unreliable file transport using UDP • NFS – allows file sharing on different platforms • SMTP – delivers mail to a server; use POP or IMAP to retrieve mail • LPD – for printer sharing • X Window – graphical interface for client/server applications • SNMP –Provides network management by polling capable devices • DNS –maps host names to IP addresses • DHCP – provides IP address configuration to workstations

    47. File Transfer and Remote Access • File Transfer Protocol (FTP) which allows files to be uploaded and downloaded on port 21 • Telnet which uses terminal emulation for access to remote hosts using port 23 • Both FTP and Telnet use TCP as their Transport layer protocol

    48. Mail and Internet • Simple Mail Transfer Protocol (SMTP) which supports basic message delivery services to mail servers on port 25 • HyperText Transfer Protocol (HTTP) which is a low-overhead Web browser service protocol that uses port 80

    49. Management and News • Simple Network Management Protocol (SNMP) which uses UDP port 161 to collect information from network devices. • Network News Transfer Protocol (NNTP): handles distribution and posting of news articles using port 119

    50. Address Assignment and Name Mapping • Dynamic Host Configuration Protocol (DHCP) allows for automatic IP addressing • Domain Name Service (DNS) uses UDP port 53 for resolving domain names to IP addresses