1 / 45

Network Protocols

Network Protocols. Why Protocols?. Rules and procedures to govern communication Some for transferring data Some for route discovery. TCP/IP. Suite of Protocols to define communication Application – client functionality Transport - moving data Network – tasks for moving data.

sakina
Download Presentation

Network Protocols

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Protocols

  2. Why Protocols? • Rules and procedures to govern communication • Some for transferring data • Some for route discovery

  3. TCP/IP • Suite of Protocols to define communication • Application – client functionality • Transport - moving data • Network – tasks for moving data

  4. Steps –Sending • Protocol responsible for breaking data into smaller parts called packets • Network address is attached to packet • Data prepared for transmission and sent through NIC

  5. Steps - Receiving • Data received, taken off network through NIC • Address information stripped • Data packets are resembles • Packets are then sent to application for use.

  6. TCP FTP UDP TCP/IP DHCP TFTP DNS HTTP ARP SIP RTP SSH POP3 NTP IMAP4 TELNET SMTP SNMP ICMP IGMP TLS Common Protocols

  7. TCP • Transmission Control Protocol • Connection oriented – establishes a manually acknowledged session between two hosts. • Provides reliability to IP • Flow control, sequencing, and error detection and correction. • Transport layer

  8. TCP Connection • Sends SYN to target host • Target opens connection and sends ACK • Originated host sends ACK ready to transfer data • Called three-way handshake

  9. UDP • User Datagram Protocol • No guarantee delivery • “fire and forget” • Uses IP • Transport layer • Lower overhead – low bandwidth

  10. FTP • File Transfer Protocol • Uploading and downloading of files • Uses TCP as a transport protocol • Used to transfer files over the LAN • Popular to distribute files over the internet • Application layer

  11. Common FTP commands • know

  12. SSH • Secure Shell • Alternative to telnet • Provides security and encryption • Allows sessions to be opened on a remote host

  13. SFTP • Secure File Transfer Protocol • Authentication between sender and receiver • Encryption – if packets copied remain hidden • Implemented though client and server software • Allows for securely uploading and downloading files to and from remote host

  14. TFTP • Trivial File Transfer Protocol • File transfer • Not the same file security and functionality as FTP • Simple downloads – firmware • No directory navigation • Uses UDP • Application layer

  15. SMTP • Simple Mail Transfer Protocol • How mail is sent/transported through the network • TCP • Can be used to send and receive mail • authentication

  16. HTTP • Hypertext Transfer Protocol • Uses TCP • Allows text, graphics, multimedia and other material to be downloaded • Requests sent in clear text

  17. HTTPS • Hypertext Transfer Protocol Secure • SSL – encrypts • Both the client and server must support

  18. POP3/IMAP4 • Post Office Protocol 3/ Internet Message Access Protocol • Can download email but not send • Passwords transferred in clear text

  19. Telnet • Virtual terminal protocol • Allows session to be opened and commands executed • Used to access routers and other network devices • Not secure

  20. ICMP • Internet Control Message Protocol • Works with the IP layer to provide error checking and reporting • Tools to provide best-delivery • PING • Used for error reporting, flow control, and route testing

  21. ARP • Address Resolution Protocol • Resolving IP addresses to MAC addresses

  22. RARP • Reverse ARP • Resolves MAC to IP addresses • Reveres lookups in DNS

  23. Network Time Protocol NTP • Facilitates the communication of time between systems • Important for email and directory services

  24. Network News Transfer Protocol NNTP • Posting and retrieval of messages • Application layer

  25. Secure Copy Protocol SCP • Secure means of copying files • Encrypts data • More secure then RCP

  26. Lightweight Directory Access Protocol LDAP • Access and query directory services • NDS and ADS

  27. Internet Group Management Protocol IGMP • Manages multicast • Used to register and discover devices • Routers and videoconferencing clients

  28. Domain Name Service DNS • Resolves host names to IP addresses • Used to use txt file hosts

  29. WINS • On windows allows NetBIOS names to be resolved to IP addresses. • If no WINS server use LMHOSTS file

  30. Simple Network Management Protocol SNMP • Network management of devices

  31. Dynamic Host Configuration Protocol DHCP • Automatically assigns IP addresses • Allows a range of IP addresses to be defined • Clients ask the server for and address • Lease - scope

  32. Transport Layer Security TLS • Ensure privacy between client/server apps

  33. Session Initiation Protocol SIP • VOIP • Establish and maintain multimedia sessions • Internet telephone calls • Uses TCP or UDP • Application layer

  34. Real Time Transport Protocol RTP • Transport of real-time data • Does not guarantee delivery • Transport Layer

  35. Ports • Each protocol needs a port to access and leave the system

  36. Ports • TCP/IP has 65,535 ports • Well known – 0-1023 • Registered ports – 1024-49151 • Used by apps or services • Dynamic or private – 49152 – 65353 • Can be used for any service or app

  37. FTP – 20 – TCP • FTP – 21 TCP • SSH – 22 TCP • Telnet – 23 – TCP • SMTP – 25 – TCP • DNS – 53 – UDP/TCP • TFTP – 69 – UDP • HTTP – 80 – TCP/UDP • POP3 – 110 – TCP

  38. NNTP – 119 – TCP NTP – 123 – TCP IMAP4 – 143 – TCP SNMP – 161- UDP HTTPS – 443 – TCP DHCP – 67 - UDP

  39. IP Address • Consists of a series of 32 binary bits • Grouped into four 8-bit bytes • Called and octet • Presented in decimal value • Composed of two parts • First part – network • Second part - host

  40. Example • 192.168.18.57 • First three octets are network • 192.168.18 • Last octet identifies the host • 57

  41. Address Ranges • Class Address Range Default Subnet Mask • A 10.0.0.0-10.255.255.255 255.0.0.0 • B 172.16.0.0-172.31.255.255 255.255.0.0 • C 192.168.0.0-192.168.255.255 255.255.255.0

  42. Need to Know • 169.254.0.0- no DHCP server to give address • 127 loopback

  43. Class • IP addresses are divided into 5 classes • Class A – large networks • Class B – medium sized networks – universities • Class C – small networks – ISP’s for customers • Class D – multicasting • Class E - testing

  44. Subnet Mask • Network portion of the address • Hosts on a LAN use the same subnet mask

  45. Subnet Mask cont • Class A – 255.0.0.0 • Class B – 255.255.0.0 • Class C – 255.255.255.0

More Related