SlideShare una empresa de Scribd logo
1 de 45
Guide to Networking Essentials
Fifth Edition
Chapter 6
Network Communications and
Protocols
Guide to Networking Essentials, Fifth Edition 2
Objectives
• Explain the function of protocols in a network
• Describe common protocol suites
Guide to Networking Essentials, Fifth Edition 3
Protocols
• Strictly speaking, protocols are the rules and
procedures for communicating
– For two computers to communicate, they must speak
the same language and agree on the rules of
communication
Guide to Networking Essentials, Fifth Edition 4
The Function of Protocols
• To avoid chaos in communication
• Protocol stack / protocol suite - when a set of
protocols works cooperatively
Example:
 TCP/IP
IPX/SPX (older version of Novell Netware
Guide to Networking Essentials, Fifth Edition 5
Connectionless Versus Connection-
Oriented Protocols
• Connectionless:
– assumes data delivery will get through
– not entirely reliable
– fast: little overhead, don’t waste time
establishing/managing/tearing down connections
• Connection-oriented
– more reliable
– slower
For Connection-Oriented
– establish computer connection before data transfer
begins
– data is sent in an orderly fashion
– Ensures data is received
– Ensures data received is accurate
– Generates error messages
Guide to Networking Essentials, Fifth Edition 6
Guide to Networking Essentials, Fifth Edition 7
Routable Versus Nonroutable
Protocols
• Responsibility of Network Layer Protocols
Routable: moving data across multiple networks
Routers- responsible for routing process
Examples: TCP/IP and IPX/SPX
Nonroutable : contain only a device address and not
a network address
Example: protocol
NetBIOS
• Network Basic Input/Output System
• provides services related to the session layer
• allowing applications on separate computers to
communicate over a local area network
Guide to Networking Essentials, Fifth Edition 8
Guide to Networking Essentials, Fifth Edition 9
Protocols in a Layered Architecture
Guide to Networking Essentials, Fifth Edition 10
Protocols in a Layered Architecture
(continued)
Guide to Networking Essentials, Fifth Edition 11
Network Protocols
• Some popular network protocols include:
– Internet Protocol version 4 (IPv4 or simply IP)
• Provides addressing and routing information
– Internetwork Packet Exchange (IPX)
• Novell’s protocol for packet routing and forwarding
• Belongs to the IPX/SPX protocol suite
• Serves many of the same functions as TCP/IP’s IP
– Internet Protocol version 6 (IPv6)
• A new version of IP that’s being implemented on many
current networking devices and operating systems
– Addresses some weaknesses of IPv4
Guide to Networking Essentials, Fifth Edition 12
Transport Protocols
• Transport protocols can be connection-oriented
(reliable) or connectionless (best-effort) delivery
– Transmission Control Protocol (TCP)
• Responsible for reliable data delivery in TCP/IP
– Sequential Packet Exchange (SPX)
• Novell’s connection-oriented protocol used to
guarantee data delivery
– NetBIOS/NetBEUI
• NetBIOS establishes/manages communications
between computers and provides naming services
• NetBEUI provides data transport services for these
communications
Guide to Networking Essentials, Fifth Edition 13
Application Protocols
• Application protocols provide services to client
applications
– Simple Mail Transport Protocol (SMTP) in TCP/IP
– File Transfer Protocol (FTP) in TCP/IP
– Simple Network Management Protocol (SNMP)
• Manages and monitors network devices (TCP/IP)
– NetWare Core Protocol (NCP)
• Novell’s client shells and redirectors
– AppleTalk File Protocol (AFP)
• Apple’s remote file-management protocol
Guide to Networking Essentials, Fifth Edition 14
Common Protocol Suites
• Because most protocols contain a combination of
components, these components are usually
bundled as a protocol suite
– TCP/IP
• Dominates the networking arena to the point of
making most of the other suites nearly obsolete
– IPX/SPX
– NetBIOS/NetBEUI
– AppleTalk
Guide to Networking Essentials, Fifth Edition 15
Transmission Control Protocol/Internet
Protocol (TCP/IP)
Guide to Networking Essentials, Fifth Edition 16
TCP/IP Network Layer Protocols
• Internet Protocol version 4 (IPv4) is a Network
layer protocol that provides source and destination
addressing and routing for the TCP/IP suite
– Connectionless protocol; fast but unreliable
• Internet Control Message Protocol (ICMP) is a
Network layer protocol used to send error and
control messages between systems or devices
– The Ping utility uses ICMP to request a response
from a remote host to verify availability
• Address Resolution Protocol (ARP) resolves
logical (IP) addresses to physical (MAC) addresses
Guide to Networking Essentials, Fifth Edition 17
IP, ICMP, and ARP in Action
Guide to Networking Essentials, Fifth Edition 18
IP, ICMP, and ARP in Action
(continued)
Guide to Networking Essentials, Fifth Edition 19
TCP/IP Transport Layer Protocols
• Transmission Control Protocol (TCP) is the
primary Internet transport protocol
– Connection oriented using a three-way handshake
– Message fragmentation and reassembly
– Uses acknowledgements to ensure that all data was
received and to provide flow control
• User Datagram Protocol (UDP) is connectionless
– Generally faster, although less reliable, than TCP
• Doesn’t segment data or resequence packets
• Doesn’t use acknowledgements for reliability
• Used by NFS and DNS
Guide to Networking Essentials, Fifth Edition 20
TCP/IP Application Layer Protocols
• Domain Name System (DNS)
– Session layer name-to-address resolution protocol
• Hypertext Transport Protocol (HTTP)
– To transfer Web pages from Web server to browser
• File Transfer Protocol (FTP)
– For file transfer and directory and file manipulation
• Telnet
– Remote terminal emulation; operates at layers 7-5
• Simple Mail Transport Protocol (SMTP)
– Operates at layers 7-5; provides messaging services
Guide to Networking Essentials, Fifth Edition 21
IP Addressing
• Logical addresses are 32 bits (4 bytes) long
– Each byte is represented as an octet (decimal
number from 0 to 255)
– Usually represented in dotted decimal notation
• E.g., 172.24.208.192
– Address has two parts: network and host ID
• E.g. 172.24.208.192 (172.24.0.0 and 208.192)
– Categorized into ranges referred to as classes
• Class system provides basis for determining which
part of address is the network and which is the host ID
• The first octet of an address denotes its class
Guide to Networking Essentials, Fifth Edition 22
IP Addressing (continued)
• Classes
– Class A: first octet between 1-126
• 16,777,214 hosts per network address
– Class B: first octet between 128-191
• 65,534 hosts per network address
– Class C: first octet between 192-223
• 254 hosts per network address
– Class D: first octet between 224-239
• Reserved for multicasting
– Class E: first octet between 240-255
• Reserved for experimental use
Guide to Networking Essentials, Fifth Edition 23
IP Addressing (continued)
• 127.0.0.0 network is called the loopback address
– localhost always corresponds to address 127.0.0.1
• IETF reserved addresses for private networks
– Class A addresses beginning with 10
– Class B addresses from 172.16 to 172.31
– Class C addresses from 192.168.0 to 192.168.255
– These addresses can’t be routed across the Internet
– To access the Internet, NAT is needed
– IPv6 eliminates need for private addressing;
provides a 128-bit address (vs. IPv4’s 32 bits)
Guide to Networking Essentials, Fifth Edition 24
Classless Interdomain Routing (CIDR)
• Addressing by class has been superseded by a
more flexible addressing method
– Classless Interdomain Routing (CIDR)
– The network and host demarcation can be made
with any number of bits from beginning of address
– E.g., a Class C address’s network section is 24 bits
• Using CIDR, an address registry can assign an
address with a network section of 26 bits
– 192.203.187.0/26
– Subnetting divides network address in two or more
subnetwork addresses (with fewer host IDs for each)
Guide to Networking Essentials, Fifth Edition 25
Why Subnet?
• Subnetting
– Makes more efficient use of available IP addresses
– Enables dividing networks into logical groups
– Can make network communication more efficient
• Broadcast frames are sent to all computers on the
same IP network
– Hubs and switches forward broadcast frames;
routers do not
– Broadcast domain: extent to which a broadcast
frame is forwarded without going through a router
– Subnetting reduces broadcast traffic
Guide to Networking Essentials, Fifth Edition 26
Subnet Masks
• Subnet mask determines which part of address
denotes network portion and which denotes host
– 32-bit number
– A binary 1 signifies that the corresponding bit in the
IP address belongs to the network portion; a 0
signifies that bit in address belongs to host portion
– Default subnet mask uses a 255 in each octet in
address that corresponds to the network portion
• Class A: 255.0.0.0
• Class B: 255.255.0.0
• Class C: 255.255.255.0
Guide to Networking Essentials, Fifth Edition 27
Some Simple Binary Arithmetic
• Four kinds of binary calculations:
– Converting between binary and decimal
– Converting between decimal and binary
– Understanding how setting high-order bits to the
value of 1 in 8-bit binary numbers corresponds to
specific decimal numbers
– Recognizing the decimal values for numbers that
correspond to low-order bits when set to 1
Guide to Networking Essentials, Fifth Edition 28
Converting Decimal to Binary
• 125 is converted to binary as follows:
– 125 divided by 2 equals 62, remainder 1
– 62 divided by 2 equals 31, remainder 0
– 31 divided by 2 equals 15, remainder 1
– 15 divided by 2 equals 7, remainder 1
– 7 divided by 2 equals 3, remainder 1
– 3 divided by 2 equals 1, remainder 1
– 1 divided by 2 equals 0, remainder 1
Guide to Networking Essentials, Fifth Edition 29
Converting Binary to Decimal
• To convert 11010011 to decimal:
1. Count the total number of digits in the number (8)
2. Subtract one from the total (8 - 1 = 7)
3. That number (7) is the power of 2 to associate with
the highest exponent for two in the number
4. Convert to exponential notation, using all the digits
as multipliers
5. 11010011, therefore, converts to:
Guide to Networking Essentials, Fifth Edition 30
High-Order Bit Patterns
Guide to Networking Essentials, Fifth Edition 31
Low-Order Bit Patterns
Guide to Networking Essentials, Fifth Edition 32
Calculating a Subnet Mask
• To decide how to build a subnet mask:
1. Decide how many subnets you need
2. Decide how many bits you need to meet or exceed
the number of required subnets
• Use the formula 2n, with n representing the number
of bits you must add to the starting subnet mask
3. Borrow bits from the top of the host portion of the
address down
4. Ensure that you have enough host bits available to
assign to computers on each subnet (2n-2)
Guide to Networking Essentials, Fifth Edition 33
Calculating a Subnet Mask (continued)
Guide to Networking Essentials, Fifth Edition 34
Calculating a Subnet Mask (continued)
Guide to Networking Essentials, Fifth Edition 35
Calculating Supernets
• Supernetting “borrows” bits from network portion
of an IP address to “lend” those bits to host portion
– Permits consecutive IP network addresses to be
combined and viewed in a single logical network
• Combining two or more small networks into one
larger network is only one reason to supernet
– Supernetting can combine multiple routing table
entries into a single entry, which can drastically
decrease the table’s size on Internet routers
– This reduction in routing table size increases the
speed and efficiency of Internet routers
Guide to Networking Essentials, Fifth Edition 36
Network Address Translation (NAT)
Guide to Networking Essentials, Fifth Edition 37
Dynamic Host Configuration Protocol
(DHCP)
• Detailed configuration of devices, keeping track of
assigned addresses and to which machine they
were assigned, etc., is difficult in large networks
– DHCP was developed to make this process easier
– DHCP server must be configured with a block of
available IP addresses and their subnet masks
– Clients must be configured to use DHCP
• Broadcast request message is sent on boot
– Client leases the address the server assigns to it
– If no answer is received, in an APIPA-enabled OS, the
computer assigns itself an address (169.254.x.x)
Guide to Networking Essentials, Fifth Edition 38
Internet Protocol Version 6 (IPv6)
• IPv6 solves several IPv4 problems
– Limiting 32-bit address space
• An IPv6 address is 128 bits long
– Lack of built-in security
• IPSec provides authentication and encryption
– A sometimes complicated setup
• IPv6 is autoconfiguring (stateless or stateful)
– Lack of built-in QoS
• QoS headers in IPv6 packets can identify packets that
require special or priority handling, making
applications such as streaming audio and video much
easier to implement
Guide to Networking Essentials, Fifth Edition 39
IPv6 Addresses
• IPv6 addresses are specified in hexadecimal
format in 16-bit sections separated by a colon
– Longhand notation: 2001:260:0:0:0:2ed3:340:ab
– Shorthand notation: 2001:260::2ed3:340:ab
• If one of the 16-bit numbers doesn’t require four
hexadecimal digits, the leading 0s are omitted
– Addresses have a three-part addressing hierarchy
• A public topology (first three 16-bit sections)
• A site topology (next 16 bits)
• An interface identifier (last 64 bits)
– Derived from the MAC address on the host’s NIC
Guide to Networking Essentials, Fifth Edition 40
Other Protocol Suites
• Other protocol suites are sometimes used on older
networks, where the need to change to TCP/IP is
not warranted, or in environments suited to the
suite’s features
– NetBIOS/NetBEUI
• Used primarily on older Windows networks
– IPX/SPX
• Designed for use on NetWare networks
– AppleTalk
• Used almost exclusively on Macintosh networks
Guide to Networking Essentials, Fifth Edition 41
NetBIOS and NetBEUI
Guide to Networking Essentials, Fifth Edition 42
IPX/SPX
Guide to Networking Essentials, Fifth Edition 43
AppleTalk
• Although the AppleTalk standard defines physical
transport in Apple Macintosh networks, it also
establishes a suite of protocols those computers
use to communicate
• Apple created AppleTalk Phase II to allow
connectivity outside the Macintosh world
• AppleTalk divides computers into zones
– Allow a network administrator to logically group
computers and other resources that have frequent
communication, in a manner similar to subnetting
Guide to Networking Essentials, Fifth Edition 44
Implementing and Removing Protocols
Guide to Networking Essentials, Fifth Edition 45
Summary
• Many protocols are available for network
communications, each with its strengths/weaknesses
• The TCP/IP protocol suite dominates network
communication in part due to its use on the Internet
• IP addressing involves several concepts, including
address classes, subnetting, and supernetting
• IPv6 will eventually replace IPv4 because it offers
several advantages: 128-bit address
space, autoconfiguration, built-in security, and QoS

Más contenido relacionado

La actualidad más candente

Router & functionality
Router & functionalityRouter & functionality
Router & functionalityAmzadKhn
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6Adeel Rasheed
 
Routing Presentation
Routing PresentationRouting Presentation
Routing PresentationMohsin Ali
 
Introduction to Router and Routing Basics
Introduction to Router and Routing BasicsIntroduction to Router and Routing Basics
Introduction to Router and Routing BasicsDarwish Ahmad
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
The Physical Layer
The Physical LayerThe Physical Layer
The Physical Layeradil raja
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)NetProtocol Xpert
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4Sachii Dosti
 
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003  -may10_-_lect01a_-_intro_to_network_applications_servicesUccn1003  -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_servicesShu Shin
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path FirstKashif Latif
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 

La actualidad más candente (20)

Router & functionality
Router & functionalityRouter & functionality
Router & functionality
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Finite automata
Finite automataFinite automata
Finite automata
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
 
Introduction to Router and Routing Basics
Introduction to Router and Routing BasicsIntroduction to Router and Routing Basics
Introduction to Router and Routing Basics
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
The Physical Layer
The Physical LayerThe Physical Layer
The Physical Layer
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
 
Application Layer
Application Layer Application Layer
Application Layer
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003  -may10_-_lect01a_-_intro_to_network_applications_servicesUccn1003  -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
 
Ipv6
Ipv6Ipv6
Ipv6
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
SIP for geeks
SIP for geeksSIP for geeks
SIP for geeks
 

Similar a Chapter 6 - Networking

Similar a Chapter 6 - Networking (20)

Unit04
Unit04Unit04
Unit04
 
ENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdfENC_254_PPT_ch04.pdf
ENC_254_PPT_ch04.pdf
 
Basic ip and networking ver 3 kl
Basic ip and networking ver 3 klBasic ip and networking ver 3 kl
Basic ip and networking ver 3 kl
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Tcp
TcpTcp
Tcp
 
4. Understanding Internet Protocol.pptx
4. Understanding Internet Protocol.pptx4. Understanding Internet Protocol.pptx
4. Understanding Internet Protocol.pptx
 
MVA slides lesson 4
MVA slides lesson 4MVA slides lesson 4
MVA slides lesson 4
 
TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.TCP/IP Training Basic Concepts.
TCP/IP Training Basic Concepts.
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 
Web technology unit I - Part B
Web technology unit I - Part BWeb technology unit I - Part B
Web technology unit I - Part B
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 06
 

Más de Rosie Jane Enomar

Más de Rosie Jane Enomar (7)

IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
 
Software development
Software developmentSoftware development
Software development
 
Java Inheritance
Java InheritanceJava Inheritance
Java Inheritance
 
Special operators in Database
Special operators in DatabaseSpecial operators in Database
Special operators in Database
 
Aggregate functions
Aggregate functionsAggregate functions
Aggregate functions
 
Juncture
JunctureJuncture
Juncture
 
Types of Reaction
Types of ReactionTypes of Reaction
Types of Reaction
 

Último

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

Último (20)

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 

Chapter 6 - Networking

  • 1. Guide to Networking Essentials Fifth Edition Chapter 6 Network Communications and Protocols
  • 2. Guide to Networking Essentials, Fifth Edition 2 Objectives • Explain the function of protocols in a network • Describe common protocol suites
  • 3. Guide to Networking Essentials, Fifth Edition 3 Protocols • Strictly speaking, protocols are the rules and procedures for communicating – For two computers to communicate, they must speak the same language and agree on the rules of communication
  • 4. Guide to Networking Essentials, Fifth Edition 4 The Function of Protocols • To avoid chaos in communication • Protocol stack / protocol suite - when a set of protocols works cooperatively Example:  TCP/IP IPX/SPX (older version of Novell Netware
  • 5. Guide to Networking Essentials, Fifth Edition 5 Connectionless Versus Connection- Oriented Protocols • Connectionless: – assumes data delivery will get through – not entirely reliable – fast: little overhead, don’t waste time establishing/managing/tearing down connections • Connection-oriented – more reliable – slower
  • 6. For Connection-Oriented – establish computer connection before data transfer begins – data is sent in an orderly fashion – Ensures data is received – Ensures data received is accurate – Generates error messages Guide to Networking Essentials, Fifth Edition 6
  • 7. Guide to Networking Essentials, Fifth Edition 7 Routable Versus Nonroutable Protocols • Responsibility of Network Layer Protocols Routable: moving data across multiple networks Routers- responsible for routing process Examples: TCP/IP and IPX/SPX Nonroutable : contain only a device address and not a network address Example: protocol
  • 8. NetBIOS • Network Basic Input/Output System • provides services related to the session layer • allowing applications on separate computers to communicate over a local area network Guide to Networking Essentials, Fifth Edition 8
  • 9. Guide to Networking Essentials, Fifth Edition 9 Protocols in a Layered Architecture
  • 10. Guide to Networking Essentials, Fifth Edition 10 Protocols in a Layered Architecture (continued)
  • 11. Guide to Networking Essentials, Fifth Edition 11 Network Protocols • Some popular network protocols include: – Internet Protocol version 4 (IPv4 or simply IP) • Provides addressing and routing information – Internetwork Packet Exchange (IPX) • Novell’s protocol for packet routing and forwarding • Belongs to the IPX/SPX protocol suite • Serves many of the same functions as TCP/IP’s IP – Internet Protocol version 6 (IPv6) • A new version of IP that’s being implemented on many current networking devices and operating systems – Addresses some weaknesses of IPv4
  • 12. Guide to Networking Essentials, Fifth Edition 12 Transport Protocols • Transport protocols can be connection-oriented (reliable) or connectionless (best-effort) delivery – Transmission Control Protocol (TCP) • Responsible for reliable data delivery in TCP/IP – Sequential Packet Exchange (SPX) • Novell’s connection-oriented protocol used to guarantee data delivery – NetBIOS/NetBEUI • NetBIOS establishes/manages communications between computers and provides naming services • NetBEUI provides data transport services for these communications
  • 13. Guide to Networking Essentials, Fifth Edition 13 Application Protocols • Application protocols provide services to client applications – Simple Mail Transport Protocol (SMTP) in TCP/IP – File Transfer Protocol (FTP) in TCP/IP – Simple Network Management Protocol (SNMP) • Manages and monitors network devices (TCP/IP) – NetWare Core Protocol (NCP) • Novell’s client shells and redirectors – AppleTalk File Protocol (AFP) • Apple’s remote file-management protocol
  • 14. Guide to Networking Essentials, Fifth Edition 14 Common Protocol Suites • Because most protocols contain a combination of components, these components are usually bundled as a protocol suite – TCP/IP • Dominates the networking arena to the point of making most of the other suites nearly obsolete – IPX/SPX – NetBIOS/NetBEUI – AppleTalk
  • 15. Guide to Networking Essentials, Fifth Edition 15 Transmission Control Protocol/Internet Protocol (TCP/IP)
  • 16. Guide to Networking Essentials, Fifth Edition 16 TCP/IP Network Layer Protocols • Internet Protocol version 4 (IPv4) is a Network layer protocol that provides source and destination addressing and routing for the TCP/IP suite – Connectionless protocol; fast but unreliable • Internet Control Message Protocol (ICMP) is a Network layer protocol used to send error and control messages between systems or devices – The Ping utility uses ICMP to request a response from a remote host to verify availability • Address Resolution Protocol (ARP) resolves logical (IP) addresses to physical (MAC) addresses
  • 17. Guide to Networking Essentials, Fifth Edition 17 IP, ICMP, and ARP in Action
  • 18. Guide to Networking Essentials, Fifth Edition 18 IP, ICMP, and ARP in Action (continued)
  • 19. Guide to Networking Essentials, Fifth Edition 19 TCP/IP Transport Layer Protocols • Transmission Control Protocol (TCP) is the primary Internet transport protocol – Connection oriented using a three-way handshake – Message fragmentation and reassembly – Uses acknowledgements to ensure that all data was received and to provide flow control • User Datagram Protocol (UDP) is connectionless – Generally faster, although less reliable, than TCP • Doesn’t segment data or resequence packets • Doesn’t use acknowledgements for reliability • Used by NFS and DNS
  • 20. Guide to Networking Essentials, Fifth Edition 20 TCP/IP Application Layer Protocols • Domain Name System (DNS) – Session layer name-to-address resolution protocol • Hypertext Transport Protocol (HTTP) – To transfer Web pages from Web server to browser • File Transfer Protocol (FTP) – For file transfer and directory and file manipulation • Telnet – Remote terminal emulation; operates at layers 7-5 • Simple Mail Transport Protocol (SMTP) – Operates at layers 7-5; provides messaging services
  • 21. Guide to Networking Essentials, Fifth Edition 21 IP Addressing • Logical addresses are 32 bits (4 bytes) long – Each byte is represented as an octet (decimal number from 0 to 255) – Usually represented in dotted decimal notation • E.g., 172.24.208.192 – Address has two parts: network and host ID • E.g. 172.24.208.192 (172.24.0.0 and 208.192) – Categorized into ranges referred to as classes • Class system provides basis for determining which part of address is the network and which is the host ID • The first octet of an address denotes its class
  • 22. Guide to Networking Essentials, Fifth Edition 22 IP Addressing (continued) • Classes – Class A: first octet between 1-126 • 16,777,214 hosts per network address – Class B: first octet between 128-191 • 65,534 hosts per network address – Class C: first octet between 192-223 • 254 hosts per network address – Class D: first octet between 224-239 • Reserved for multicasting – Class E: first octet between 240-255 • Reserved for experimental use
  • 23. Guide to Networking Essentials, Fifth Edition 23 IP Addressing (continued) • 127.0.0.0 network is called the loopback address – localhost always corresponds to address 127.0.0.1 • IETF reserved addresses for private networks – Class A addresses beginning with 10 – Class B addresses from 172.16 to 172.31 – Class C addresses from 192.168.0 to 192.168.255 – These addresses can’t be routed across the Internet – To access the Internet, NAT is needed – IPv6 eliminates need for private addressing; provides a 128-bit address (vs. IPv4’s 32 bits)
  • 24. Guide to Networking Essentials, Fifth Edition 24 Classless Interdomain Routing (CIDR) • Addressing by class has been superseded by a more flexible addressing method – Classless Interdomain Routing (CIDR) – The network and host demarcation can be made with any number of bits from beginning of address – E.g., a Class C address’s network section is 24 bits • Using CIDR, an address registry can assign an address with a network section of 26 bits – 192.203.187.0/26 – Subnetting divides network address in two or more subnetwork addresses (with fewer host IDs for each)
  • 25. Guide to Networking Essentials, Fifth Edition 25 Why Subnet? • Subnetting – Makes more efficient use of available IP addresses – Enables dividing networks into logical groups – Can make network communication more efficient • Broadcast frames are sent to all computers on the same IP network – Hubs and switches forward broadcast frames; routers do not – Broadcast domain: extent to which a broadcast frame is forwarded without going through a router – Subnetting reduces broadcast traffic
  • 26. Guide to Networking Essentials, Fifth Edition 26 Subnet Masks • Subnet mask determines which part of address denotes network portion and which denotes host – 32-bit number – A binary 1 signifies that the corresponding bit in the IP address belongs to the network portion; a 0 signifies that bit in address belongs to host portion – Default subnet mask uses a 255 in each octet in address that corresponds to the network portion • Class A: 255.0.0.0 • Class B: 255.255.0.0 • Class C: 255.255.255.0
  • 27. Guide to Networking Essentials, Fifth Edition 27 Some Simple Binary Arithmetic • Four kinds of binary calculations: – Converting between binary and decimal – Converting between decimal and binary – Understanding how setting high-order bits to the value of 1 in 8-bit binary numbers corresponds to specific decimal numbers – Recognizing the decimal values for numbers that correspond to low-order bits when set to 1
  • 28. Guide to Networking Essentials, Fifth Edition 28 Converting Decimal to Binary • 125 is converted to binary as follows: – 125 divided by 2 equals 62, remainder 1 – 62 divided by 2 equals 31, remainder 0 – 31 divided by 2 equals 15, remainder 1 – 15 divided by 2 equals 7, remainder 1 – 7 divided by 2 equals 3, remainder 1 – 3 divided by 2 equals 1, remainder 1 – 1 divided by 2 equals 0, remainder 1
  • 29. Guide to Networking Essentials, Fifth Edition 29 Converting Binary to Decimal • To convert 11010011 to decimal: 1. Count the total number of digits in the number (8) 2. Subtract one from the total (8 - 1 = 7) 3. That number (7) is the power of 2 to associate with the highest exponent for two in the number 4. Convert to exponential notation, using all the digits as multipliers 5. 11010011, therefore, converts to:
  • 30. Guide to Networking Essentials, Fifth Edition 30 High-Order Bit Patterns
  • 31. Guide to Networking Essentials, Fifth Edition 31 Low-Order Bit Patterns
  • 32. Guide to Networking Essentials, Fifth Edition 32 Calculating a Subnet Mask • To decide how to build a subnet mask: 1. Decide how many subnets you need 2. Decide how many bits you need to meet or exceed the number of required subnets • Use the formula 2n, with n representing the number of bits you must add to the starting subnet mask 3. Borrow bits from the top of the host portion of the address down 4. Ensure that you have enough host bits available to assign to computers on each subnet (2n-2)
  • 33. Guide to Networking Essentials, Fifth Edition 33 Calculating a Subnet Mask (continued)
  • 34. Guide to Networking Essentials, Fifth Edition 34 Calculating a Subnet Mask (continued)
  • 35. Guide to Networking Essentials, Fifth Edition 35 Calculating Supernets • Supernetting “borrows” bits from network portion of an IP address to “lend” those bits to host portion – Permits consecutive IP network addresses to be combined and viewed in a single logical network • Combining two or more small networks into one larger network is only one reason to supernet – Supernetting can combine multiple routing table entries into a single entry, which can drastically decrease the table’s size on Internet routers – This reduction in routing table size increases the speed and efficiency of Internet routers
  • 36. Guide to Networking Essentials, Fifth Edition 36 Network Address Translation (NAT)
  • 37. Guide to Networking Essentials, Fifth Edition 37 Dynamic Host Configuration Protocol (DHCP) • Detailed configuration of devices, keeping track of assigned addresses and to which machine they were assigned, etc., is difficult in large networks – DHCP was developed to make this process easier – DHCP server must be configured with a block of available IP addresses and their subnet masks – Clients must be configured to use DHCP • Broadcast request message is sent on boot – Client leases the address the server assigns to it – If no answer is received, in an APIPA-enabled OS, the computer assigns itself an address (169.254.x.x)
  • 38. Guide to Networking Essentials, Fifth Edition 38 Internet Protocol Version 6 (IPv6) • IPv6 solves several IPv4 problems – Limiting 32-bit address space • An IPv6 address is 128 bits long – Lack of built-in security • IPSec provides authentication and encryption – A sometimes complicated setup • IPv6 is autoconfiguring (stateless or stateful) – Lack of built-in QoS • QoS headers in IPv6 packets can identify packets that require special or priority handling, making applications such as streaming audio and video much easier to implement
  • 39. Guide to Networking Essentials, Fifth Edition 39 IPv6 Addresses • IPv6 addresses are specified in hexadecimal format in 16-bit sections separated by a colon – Longhand notation: 2001:260:0:0:0:2ed3:340:ab – Shorthand notation: 2001:260::2ed3:340:ab • If one of the 16-bit numbers doesn’t require four hexadecimal digits, the leading 0s are omitted – Addresses have a three-part addressing hierarchy • A public topology (first three 16-bit sections) • A site topology (next 16 bits) • An interface identifier (last 64 bits) – Derived from the MAC address on the host’s NIC
  • 40. Guide to Networking Essentials, Fifth Edition 40 Other Protocol Suites • Other protocol suites are sometimes used on older networks, where the need to change to TCP/IP is not warranted, or in environments suited to the suite’s features – NetBIOS/NetBEUI • Used primarily on older Windows networks – IPX/SPX • Designed for use on NetWare networks – AppleTalk • Used almost exclusively on Macintosh networks
  • 41. Guide to Networking Essentials, Fifth Edition 41 NetBIOS and NetBEUI
  • 42. Guide to Networking Essentials, Fifth Edition 42 IPX/SPX
  • 43. Guide to Networking Essentials, Fifth Edition 43 AppleTalk • Although the AppleTalk standard defines physical transport in Apple Macintosh networks, it also establishes a suite of protocols those computers use to communicate • Apple created AppleTalk Phase II to allow connectivity outside the Macintosh world • AppleTalk divides computers into zones – Allow a network administrator to logically group computers and other resources that have frequent communication, in a manner similar to subnetting
  • 44. Guide to Networking Essentials, Fifth Edition 44 Implementing and Removing Protocols
  • 45. Guide to Networking Essentials, Fifth Edition 45 Summary • Many protocols are available for network communications, each with its strengths/weaknesses • The TCP/IP protocol suite dominates network communication in part due to its use on the Internet • IP addressing involves several concepts, including address classes, subnetting, and supernetting • IPv6 will eventually replace IPv4 because it offers several advantages: 128-bit address space, autoconfiguration, built-in security, and QoS