1 / 76

CHAPTER 2 – NETWORK ADRESSING

CHAPTER 2 – NETWORK ADRESSING. Objectives. Understand Open System Interconnect (OSI) Model. Understand the protocol use in network communication. The OSI Model. ISO is the International Organization for Standardization.

vienna
Download Presentation

CHAPTER 2 – NETWORK ADRESSING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CHAPTER 2 – NETWORK ADRESSING

  2. Objectives • Understand Open System Interconnect (OSI) Model. • Understand the protocol use in network communication.

  3. The OSI Model • ISO is the International Organization for Standardization. • ISO developed a standard model for communications, called the OSI (Open Systems Interconnection) Model. • Enable computer platforms across the world to communicate openly. • This model, divides network communication into seven layers:

  4. The OSI Model (continued)

  5. The OSI Model (continued) • Application Layer • Does not include software applications, such as Microsoft Word or Netscape • Services communicate between software programs and lower-layer network services • File, print, message, database, and application services • Application Program : Browser, Search Engines, Email Program etc. • TCP/IP Protocol : Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), File Transfer Protocol (FTP), Telnet etc.

  6. The OSI Model (continued) • Presentation Layer • Protocols at the Presentation layer accept Application layer data and format it • Serves as a translator and are the standards which are involved in multimedia • Presentation layer protocols perform the coding, compression and also manage data encryption and decryption • Example : Text encoding methods ASCII and BCD, Compression methods like JPEG and MP3 • TCP/IP Protocol : Multipurpose Internet Mail Extensions (MIME), Secure Socket Layer (SSL), Transport Layer Security (TLS).

  7. The OSI Model (continued) • Session Layer • Protocols in the Session layer coordinate and maintain communications between two nodes • Session refers to a connection for ongoing data exchange between two parties • Example : Video and audio streams for a video session, Upload or download file session. • TCP/IP Protocol : Transmission Control Protocol (TCP), Session Initiation Protocol (SIP), Real-time Transport Protocol (RTP).

  8. The OSI Model (continued) • Session Layer (continued) • Session layer’s functions are establishing and keeping alive the communications link for the duration of the session • Keep the communication secure • Synchronizing the dialog between the two nodes • Determining whether communications have been cut off, and, if so, figuring out where to restart transmission and terminating communications

  9. The OSI Model (continued) • Transport Layer • Protocols in the Transport layer accept data from the Session layer and manage end to-end delivery • Ensures that the data is transferred from point A to point B reliably, in the correct sequence, and without errors • Breaking large data units received from Session layer into multiple smaller units called segments • Segment ( Source and Destination Port Number) • TCP/IP Protocol : Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)

  10. The OSI Model (continued) • Transport Layer (continued) • Without Transport layer services, data could not be verified or interpreted by its recipient • Handles flow control • Some Transport layer protocols take steps to ensure that data arrives exactly as it was sent. • TCP is one example of a connection-oriented protocol • Three Step Process • Request (Client sends) • Acknowledgment (ACK) • Client Acknowledgement (ACK) • Sequencing • Identifying segments that belong to the same group • Checksum: method of error checking

  11. The OSI Model (continued)

  12. Layer 3 – Network Function : Routes packets according to unique network device addresses.(IP Address or Logical Address) • Packet( Source and Destination IP Address)

  13. The OSI Model (continued) • Network Layer • Primary function of protocols at the Network layer • Translate network addresses • Decide how to route data • Network layer addresses • Also called logical addresses or virtual addresses • Routers belong in the Network layer • Perform Fragmentation • Network Devices : Router • TCP/IP Protocol - Internet Protocol (IP), Internet Protocol Security (IPsec), etc.

  14. The OSI Model (continued) • Data Link Layer • Primary function of protocols is to divide data into distinct frames that can then be transmitted by the Physical layer • Network Devices : Switch and Bridge. • TCP/IP Protocol : Point-to-Point Protocol (PPP), Serial Line Internet Protocol (SLIP), etc • IEEE has divided the Data Link layer into two sublayers • Logical Link Control (LLC) • Media Access Control (MAC)

  15. The OSI Model (continued)

  16. The OSI Model (continued) • Physical Layer • Lowest, or first, layer of the OSI Model • Example : Twisted pair, coaxial cable, optical fiber, wireless, or other transmission media. • Network Device : Hub and Repeater • Protocols at the Physical layer • Accept frames from the Data Link layer • Generate voltage so as to transmit signals • Receiving data detect voltage and accept signals • Pass on to the Data Link layer

  17. Applying The OSI Model

  18. Applying The OSI Model • C o m m unication between two syste m • At each layer of the OSI Model, some information is added to the original data

  19. Applying The OSI Model (continued) Frame Specifications • Two major categories of frame types • Ethernet • developed at X erox in the early 1 970s • Token Ring • developed by IBM in the 1980s

  20. TCP/IP Model • TCP/IP is based on a four-layer reference model. All protocols that belong to the TCP/IP protocol suite are located in the top three layers of this model. • As shown in the following illustration, each layer of the TCP/IP model corresponds to one or more layers of the seven-layer.Open Systems Interconnection (OSI) reference model proposed by the International Standards Organization (ISO).

  21. Encapsulation Process • When sending messages on a network, the protocol stack on a host operates from top to bottom. • In the web server example, a browser on the client requests a web page from a web server on destination port 80. This starts the process of sending the web page to the client. • As the web page is sent down the web server protocol stack, the application data is broken into TCP segments. Each TCP segment is given a header containing a source and destination port. • The TCP segment encapsulates HTTP protocol and web page HTML user data and sends it down to the next protocol layer, which is IP. Here the TCP segment is encapsulated within an IP packet, which adds an IP header. The IP header contains source and destination IP addresses. • Next, the IP packet is sent to the Ethernet protocol where it is encapsulated in a frame header and trailer. Each Ethernet frame header contains a source and destination MAC address. The trailer contains error checking information. Finally the bits are encoded onto the Ethernet media (copper or fiber optic cable) by the server NIC.

  22. De-Encapsulation Process • When messages are received from the network, the protocol stack on a host operates from bottom to top. The process of receiving the web page starts the de-encapsulation of the message by the client. • As the bits are received by the Client NIC, they are decoded and the destination MAC address is recognized by the client as its own. • The frame is sent up the web client protocol stack where the Ethernet header (source and destination MAC addresses) and trailer are removed (de-encapsulated). The remaining IP packet and contents are passed up to the IP layer. • At the IP layer the IP header (source and destination IP addresses) is removed and the contents passed up to the TCP layer. • At the TCP layer the TCP header (source and destination ports) is removed and the web page user data contents are passed up to the Browser application using HTTP. As TCP segments are received they are reassembled to create the web page.

  23. Exchange IPX/SPX • IPX/SPX is a routable protocol and can be used for small and large networks. It was created by Novell primarily for Novell NetWare networks, but is popular enough that it is used on products that are not from Novell. • NCP - NetWare Core Protocol provides for client/server interactions such as file and print sharing. It works at the application, presentation, and session levels. • SAP - Service Advertising Protocol packets are used by file and print servers to periodically advertise the address of the server and the services available. It works at the application, presentation, and session levels. • SPX - Sequenced Packet Exchange operates at the transport layer providing connection oriented communication on top of IPX. • IPX - Internetwork Packet Exchange supports the transport and network layers of the OSI network model. Provides for network addressing and routing. It provides fast, unreliable, communication with network nodes using a connection less datagram service.

  24. NetBIOS • Microsoft developed a suite of protocols around NetBIOS using NetBEUI for transport. The primary advantage of this protocol is that it is easy to configure and Microsoft claims that it runs faster. • NetBIOS ◘ Network Basic Input/Output allows browsing of network resources and handles basic functions of a Windows network. ◘ Two way acknowledged data transfer is used. ◘ It is a Microsoft protocol used to support Microsoft Networking. ◘ Works at the session layer. ◘ Controls the sessions between computers and maintains connections.

  25. NetBEUI • NetBEUI ◘ NetBIOS Extended User Interface. ◘ Microsoft Protocol used to support Microsoft Networking. ◘ Provides data transportation. ◘ It is not a routable transport protocol which is why NBT exists on large networks to use routable TCP protocol on large networks. ◘ This protocol may sometimes be called the NetBIOS frame (NBF) protocol. Works at the Transport and Network layers. ◘ NetBEUI - The main protocol used for networking in the windows environment. ◘ NetBIOS Extended User Interface works at the transport layer and provides data transportation. ◘ It is not a routable transport protocol.

  26. Apple Talk Apple Computers have had their own set of protocols for many years. More and more operating systems today now can communicate with Apple systems using Apple networking protocols. • ADSP - AppleTalk Data Stream Protocol is used to provide data stream service for sockets. The data stream is full duplex meaning communication may be sent both directions at the same time. Works at the OSI network model session layer. • AEP - AppleTalk echo protocol uses echoes to tell if a computer, or node, is available. It also measures the time it takes for eches to travel from the source computer (node) to the destination and back. Works at the OSI network model transport layer. • AFP - AppleTalk Filing protocol makes network files appear local by managing file sharing at the presentation layer. This protocol is build to top of ASP. AFP supports communication between different types of computers. Works at the OSI network model application and presentation layers. • AppleShare - Works at the application layer to provide services. • ARUP - AppleTalk update routing is a newer version of RTMP. • ASP - AppleTalk Session Protocol opens, maintains, and closes transactions during a session, while ADSP provides a full-duplex, byte-stream service between any two sockets on an AppleTalk Internet. Works at the OSI network model session layer.

  27. Apple Talk(cont.) • ATP - AppleTalk Transaction Protocol provides a Transport Layer connection between computers. This protocol guarantees reliability by directing the transaction process and binding the request and response. Works at the OSI network model transport layer. • DDP - Datagram Delivery Protocol is a routable protocol that provides for data packet (datagram) transportation. It operates at the network layer of the OSI network model which is the same level the IP protocol in TCP/IP operates at. Works at the OSI network model network layer. • LAP - Link-Access Protocol is a set of data link layer protocols that support LocalTalk (LLAP), EtherTalk (ELAP), TokenTalk (TLAP), and FDDITalk. The LAP manager determines which LAP to connect for the correct upper level protocol. • NBP - Name-binding protocol translates addresses into user friently three part names. Works at the OSI network model transport layer. • PAP - Printer Access Protocol is a connection oriented service for managing information between workstations and printers. It is used to send print requests to printers. • RTMP - Routing Table Maintenance Protocol is used to update routers with information about network status and address tables. The whole address table is sent across the network. This protocol sends its information as broadcasts across the network every 10 seconds. Works at the OSI network model transport layer. • ZIP - Zone Information Protocol is used by AppleTalk routers co create a Zone Information Table (ZIT). The ZIT has a list of zone names which are associated with network numbers. This list is displayed in the Apple System's file Chooser. Works at the OSI network model session layer

  28. Network Protocol • A network protocol defines rules and conventions for communication between network devices. • Various types of network protocol: • Application Protocol • Transport Protocol • Internetwork Protocol • Access Protocol

  29. Application Protocol • Hypertext Transfer Protocol (HTTP) governs the way that a web server and a web client interact. HTTP defines the format of the requests and responses exchanged between the client and server. HTTP relies on other protocols to govern how the messages are transported between client and server. Transport Protocol • Transmission Control Protocol (TCP) is the transport protocol that manages the individual conversations between web servers and web clients. TCP formats the HTTP messages into segments to be sent to the destination host. It also provides flow control and acknowledgement of packets exchanged between hosts.

  30. Internetwork Protocol • The most common internetwork protocol is Internet Protocol (IP). IP is responsible for taking the formatted segments from TCP, assigning the logical addressing, and encapsulating them into packets for routing to the destination host.

  31. Network Access Protocols • Ethernet is the most commonly used protocol for local networks. Network access protocols perform two primary functions, data link management and physical network transmissions. • Data link management protocols take the packets from IP and encapsulate them into the appropriate frame format for the local network. These protocols assign the physical addresses to the frames and prepare them to be transmitted over the network. • The standards and protocols for the physical media govern how the bits are represented on the media, how the signals are sent over the media, and how they are interpreted by the receiving hosts. Network interface cards implement the appropriate protocols for the media that is being used.

  32. Internet Protocol (IP) • The importance of Internet Protocol is to address and route messages between source and destination hosts. • IP is concerned only with the structure, addressing and routing of packets. IP does specify how the delivery or transportation of the packets takes place. Transport protocols specify how to transfer messages between hosts. • The two most common transport protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). • The IP protocol uses these transport protocols to enable hosts to communicate and transfer data.

  33. TCP (Connection-Oriented) • Required acknowledgement to ensure the message is delivered. • TCP breaks up a message into small pieces known as segments. The segments are numbered in sequence and passed to IP process for assembly into packets. • TCP keeps track of the number of segments that have been sent to a specific host from a specific application. • If the sender does not receive an acknowledgement within a certain period of time, it assumes that the segments were lost and retransmits them. Only the portion of the message that is lost is resent, not the entire message. • On the receiving host, TCP is responsible for reassembling the message segments and passing them to the application. • FTP and HTTP are examples of applications that use TCP to ensure delivery of data.

  34. UDP (Connectionless) • No acknowledgment required. • UDP is a 'best effort' delivery system that does not require acknowledgment of receipt. • UDP is preferable with applications such as streaming audio, video and voice over IP (VoIP). Acknowledgments would slow down delivery and retransmissions are undesirable. • An example of an application that uses UDP is Internet radio. If some of the message is lost during its journey over the network, it is not retransmitted. If a few packets are missed, the listener might hear a slight break in the sound.

  35. Identify the source and destination address information to the correct locations in the frame.

  36. Addressing Schemes

  37. IP Address • An IP address (Internet Protocol address) is a unique number, used by computers to refer to each other when sending information through the Internet. • Represented by a 32-bit binary number written as four octets. Octet (8 bits) ● Octet (8 bits) ● Octet (8 bits) ● Octet (8 bits) 2726252423222120 ● 2726252423222120 ● 2726252423222120 ● 2726252423222120 11000000 ● 00000101 ● 00100010 ● 00001011 EQUALS 192 ● 5 ● 34 ● 11

  38. IP Address (cont.) • The maximum decimal value of each octet is 255. • Those bits, from left to right, have decimal values of 128, 64, 32, 16, 8, 4, 2, 1. Added, they total 255. • The largest 8-bit binary number is 11111111. • An IP address has a network number and a host number, and uses dotted-decimal notation.

  39. Class A • Support extremely large networks • First octet of Class A IP address recognize with range 1 to 127. (127.0.0.0 network, is reserved for loop back addresses.) • Class A IP addresses use only the first 8 bits (1 octet) to identify the network part of the address. • The remaining three octets (24 bit) can be used for the host portion of the address. • Example of Class A IP address : 124.95.44.15

  40. Class B • Support the needs of moderate to large sized networks. • Class B IP network addresses always have values ranging from 128 to 191. • Class B IP addresses use the first 16 bits (2 octets) to identify the network part of the address. • The two remaining octets of the IP address can be used for the host portion of the address. • Example of Class B IP address: 151.10.13.28

  41. Class C • This address space was intended to support a small network. • Class C IP network addresses always have values ranging from 192 to 223. • Class C IP addresses use the first 24 bits (3 octets) to identify the network part of the address. • Only the last octet of a Class C IP address can be used for the host portion of the address. • Example of a Class C IP address : 201.110.213.28

  42. Public and Private IP Address A private IP Address • Is a network where only authorized users have access to the data. • IP address are assigned by the administrator • Use the addresses reserved

  43. Public and Private IP Address Public IP Address • All hosts that connect directly to the Internet require a unique public IP address.

  44. Unicast, Multicast and Broadcast Addresses

  45. Unicast Address

More Related