Cnw n+ 3rd Dec 2012 Cnw Batch (2)

download Cnw n+ 3rd Dec 2012 Cnw Batch (2)

of 391

Transcript of Cnw n+ 3rd Dec 2012 Cnw Batch (2)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    1/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    2/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    An Introduction to Networking

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    3/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    A network is an interconnection of a group of computersthat can communicate and share resources such as hard

    disks and printers.

    A network is a group of computers and other devices that

    are connected by some type of transmission media.

    The initial idea of a network was perceived by Departmentof Defense (DOD) in USA for the purpose of security.

    Some advantages of networks are:

    Sharing of information across the network

    Optimum utilization of hardware resources

    Centralization of data management

    Introducing Networks

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    4/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    How Networks Are Used

    File services: capability of a server to share data files,

    applications, and disk storage space.

    Print services: used to share printers across a network.

    Communications services: Allow remote users to connect to theremote network.

    Mail services: Transfer of e-mail between users on a network.

    Internet services: Supplying Web pages, file transfer

    capabilities, and a means for directly logging on to other

    computers on the Internet.

    Management services: centrally administer management

    tasks on the network like Traffic monitoring and control.

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    5/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Internetworking services are the services in a networkingenvironment that are accessible to users within an intranet

    or the Internet.

    The following are some of the services provided by the

    Internetworking servers:

    File TransferWWW

    E-mail

    Understanding Internetworking Servers

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    6/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Network Topologies

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    7/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Network topology is a schematic layout or a map of the

    arrangement of nodes over a network.

    This layout also determines the manner in which information

    is exchanged within the network.

    There are five types of network topologies:

    Bus

    Star

    Ring

    Mesh

    Cellular

    Network Topologies

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    8/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The bus topology connects all the nodes on a network to a

    main cable called bus.

    In the bus topology, each packet that is placed on the bus

    contains the address of the destination node and is

    transmitted in both directions along the bus.

    A single high capacity cable is required thus requiring

    minimum cabling and its cost.

    Entire cable setup needs to be reconfigured to add a node.

    Time consuming process to troubleshoot as every point

    needs to be checked to locate the fault.

    Bus Topology

    The Bus Topology

    N C ifi i

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    9/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    A Terminated Bus Topology

    network

    Bus Topology (Continued)

    N C tifi ti

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    10/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The star topology connects nodes over a network using acentral control unit called the hub.

    Nodes to a star-based network can be easily attached to the

    hub.

    All the nodes are connected to the hub thus requiring lot of

    cabling and cost.A faulty hub can disrupt the entire network.

    Star Topology

    The Star Topology

    N C tifi ti

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    11/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    A Typical Star Topology Network

    Star Topology (Continued)

    N C tifi ti

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    12/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The ring topology connects the nodes on a network througha point-to-point connection.

    Easy to locate cable faults in a ring.

    The entire network stops functioning, if any of the nodes in

    the network malfunctions.

    Ring Topology

    The Ring Topology

    N+ C tifi ti

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    13/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    A Typical Ring Topology Network

    Ring Topology (Continued)

    N+ C tifi ti

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    14/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The mesh topology involves point-to-point connectionbetween every node in the network.

    High reliable as network connectivity does not depend on

    any one node.

    Useful for large network connections.

    Involves high installation and setup costs due to elaboratecabling required to connect each node with the other node.

    Difficult to manage as the size of the network increases.

    Mesh Topology

    The Mesh Topology

    N+ C tifi ti

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    15/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The cellular topology is a wireless topology, wheregeographic area is divided into cells or regions.

    In cellular topology, each cell is a separate entity that is

    controlled by a central station.

    Operates on wireless media, thus do not require cabling.

    Easy to install as only requirement is the availability of acentral location and signal strength.

    Cellular Topology

    Cell Node

    The Cellular Topology

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    16/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Network Categories

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    17/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The resources and software capabilities that nodes in a

    network share are commonly known as services.

    Networks are categorized as:

    Peer-to-peer

    Client / Server

    Network Categories

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    18/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    In a peer-to-peer network, there is no specific distinctionbetween a client and a server.

    Every computer can communicate directly with every other

    computer.

    By default, no computer has more authority than another.

    Every computer is capable of sending and receivinginformation to and from every other computer.

    The following figure illustrates the peer-to-peer network:

    Peer-to-Peer Networks

    The Peer-to-Peer Network

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    19/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Resource sharing on a Simple Peer-to-Peer Network

    Peer-to-Peer Networks (Continued)

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    20/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    In a client / server network, the requests are processedcentrally by one or more servers.

    The server is a system with high processing power, which

    provides services for the other computers in a network.

    The client is a system that accesses resources available on

    a server.In a client / server network setup, the server is responsible

    for processing the requests sent by the clients.

    Client / Server Networks

    The Client / Server Network The Client-Server Network Setup

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    21/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Resource sharing on a Client / Server Network

    Client / Server Networks (Continued)

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    22/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Advantages of using client/server networks over peer-to-peernetworks:

    User logon accounts and passwords can be assigned in one place.

    Access to multiple shared resources can be centrally granted to a

    single user or groups of users.

    Problems can be tracked, diagnosed, and often fixed from onelocation.

    Servers are optimized to handle heavy processing loads and

    dedicated to handling requests from clients, enabling faster

    response time.

    Because of their efficient processing and larger disk storage,

    servers can connect more than a handful of computers on anetwork.

    To function as a server, a computer must be running a network

    operating system (NOS).

    Client / Server Networks (Continued)

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    23/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    ClientServer

    Network interface card (NIC)

    NOS

    Connectivity device

    Elements of Client / Server Networks

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    24/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Network Operating Systems

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    25/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Network Operating System (NOS) is an enhanced versionof an operating system, with features that allow the

    management and connectivity of nodes within a network.

    NOS allows the sharing of information and resources based

    on the accessibility privileges allocated to each user or

    node.Popular NOSs include:

    Windows Server 2008 R2

    UNIX

    Linux

    Network Operating System

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    26/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Centrally manage network resources, such as programs, data,and devices.

    Allow remote users to connect to a network.

    Allow users to connect to other networks.

    Secure access to a network.

    Data backup & restore.

    Allow for simple additions of clients and resources.

    Monitor status and functionality of network elements.

    Distribute programs and software updates to clients.

    Provide fault tolerance in case of a hardware or softwareproblem.

    Functions of Network Operating System

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    27/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Windows Server 2008 R2 is a 64-bit operating system. It isa Microsoft product, which operates on single and

    multiprocessor systems.

    The features of the Windows Server 2008 R2 operating

    system are as follows:

    Active DirectoryVirtual Private Networks (VPNs)

    Terminal services

    NTFS

    Windows Deployment Services

    Hyper VIPv6 Implementation

    Windows Server 2008 R2

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    28/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Bell Labs launched the UNIX network operating system.Many versions of UNIX, such as Sun Solaris, AIX UNIX, HP

    UNIX, and BSD, are available in the market.

    Some of the features of UNIX, which allow networking at the

    operating system level, are:

    Internet-based servicesCompatibility with different protocols

    Network security

    UNIX

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    29/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The Linux network operating system, developed by LinusTorvalds, is based on the UNIX architecture.

    Linux is an open source operating system in which the

    source code or the program of the operating system is

    available free of cost.

    This provides flexibility to the user to modify the operatingsystem according to individual requirements.

    Linux provides services like Apache, Samba and NFS.

    LINUX

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    30/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Types of Network

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    31/391

    N+ Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Depending on the size and the area that networks cover,the networks are primarily categorized into the following

    types:

    Local Area Networks (LANs)

    Wide Area Networks (WANs)

    Types of Network

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    32/391

    N Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    A LAN is a small-scale network that extends over relativelysmall distances.

    The following figure depicts a typical LAN setup:

    Local Area Network

    Typical LAN Setup

    Node1

    Node 2 Node 3

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    33/391

    N Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    A Wide Area Network (WAN) provides network connectivityspanning across large geographical area, such as across

    states, countries, or across the globe.

    The following figure depicts WAN connectivity between two

    buildings at Miami and Texas, across the Internet using the

    services of a service provider.

    Wide Area Network

    The WAN Connectivity

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    34/391

    N Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Transmission Basics

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    35/391

    N Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Transmission Direction

    There are 3 different transmission modes characterized according tothe direction of the exchanges:

    Simplex

    Half-Duplex

    Full-Duplex (Duplex)

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    36/391

    N Certification

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Simplex: signals may travel in only one direction.

    Half-Duplex: signals may travel in both directions over a mediumbut only one direction at a time.

    Full-Duplex or Duplex: signals free to travel in both directionsover a medium simultaneously.

    Transmission Direction (Continued)

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    37/391

    C

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Bandwidth

    In computer networking bandwidth refers to the data rate supportedby a network connection.

    In the field of electrical engineering, bandwidth represents thedifference between highest and lowest frequencies that a mediumcan transmit.

    Bandwidth represents the capacity of the connection.

    The greater the capacity, the more likely that greater performancewill follow, though overall performance also depends on other

    factors, such as latency.

    We most commonly expresses bandwidth in terms of bits persecond (bps).

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    38/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Latency

    Delay between transmission and receipt of a signal.

    Many possible causes:

    Cable length

    Inter connectivity device e.g. routers.

    Round Trip Time (RTT)

    Time for packets to go from sender to receiver and back.

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    39/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Throughput

    In communication networks, network throughput is the average rateof successful message delivery over a communication channel.

    The throughput is usually measured in bits per second (bps).

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    40/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Baseband

    In Baseband networks a digital signal is placed directly on the

    transmission medium without requiring a carrier, i.e. withoutmodulation.

    Only one signal may be present on the baseband channel at atime.

    Baseband networks may use twisted pair, coaxial cable, oroptical fiber for data transmission.

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    41/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Broadband

    A term used to describe a network that can transmit a wide range

    of signals, including audio and video.

    Broadband networks are especially useful in the NetworkedWorld, as they can carry many signals at once, resulting in fasterdata transmission.

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    42/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Transmission Flaws (Noise)

    Electro Magnetic Interference: also called Radio FrequencyInterference RFI) is a disturbance that affects an electrical circuitdue to either electromagnetic induction or electromagneticradiation emitted from an external source such as electricaldevices or cables.

    Crosstalk: refers to electromagnetic interference from oneunshielded twisted pair to another twisted pair, normally runningin parallel. In that case signal traveling on a wire or cableinfringes on signal traveling over adjacent wire or cable.

    Certain amount of signal noise is unavoidable.

    All forms of noise measured in decibels (db).

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    43/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Attenuation

    Attenuation is a general term that refers to any reduction in thestrength of a signal.

    Attenuation occurs with any type of signal, whether digital oranalog. Sometimes called loss, attenuation is a naturalconsequence of signal transmission over long distances.

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    44/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Transmission Media

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    45/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The physical channel that is used for connecting thecomponents of a network, such as nodes and printers, is

    known as transmission medium.

    The types of transmission media include the following:

    Cables

    Wireless

    Transmission Media

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    46/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Cables are the conventional media used to setup networks.

    There are three types of cables:

    Coaxial Cables

    Twisted Pair Cables

    Fiber-optic Cables

    Cables

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    47/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    These cables are designed in such a manner that the centerconductor and the outside braided metal shield share a

    common axis.

    Coaxial Cables

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    48/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    These cables use copper wires, which are good conductorsof electricity.

    Color-coded pairs of insulated copper wires twisted

    together.

    Twist ratio: twists per meter or foot.

    Higher twist ratio reduces crosstalk and increasesattenuation

    Twisted Pair Cables

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    49/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Types of Twisted Pair Cables

    There are two types of twisted pair cables:

    Shielded Twisted Pair Cables (STP)

    Unshielded Twisted Pair Cables (UTP)

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    50/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    These cables consist of multiple twisted pairs (TPs) surroundedby an insulator shield. This insulator shield, in turn, is covered

    with a plastic encasement.

    Shielded Twisted Pair (STP)

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    51/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Shielded Twisted Pair (STP) (Continued)

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    52/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    These cables consist of a set of twisted pairs that are coveredwith a plastic jacket, as shown in the following figure.

    Most common form of cabling found on LANs today.

    TIA/EIA 568 standard divides twisted-pair wiring into several

    categories: CAT 3, 4, 5, 5e, 6, 6e, 7

    Unshielded Twisted Pair (UTP)

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    53/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    CAT 3 (Category 3): up to 10 Mbps of throughputCAT 4 (Category 4): 16 Mbps throughput

    CAT 5 (Category 5): up to 1000 Mbps throughput

    CAT 5e (Enhanced Category 5): higher twist ratio

    CAT 6 (Category 6): six times the throughput of CAT 5

    CAT 6e (Enhanced Category 6): reduced attenuation and crosstalkCAT 7 (Category 7): signal rates up to 1 GHz

    Categories of Unshielded Twisted Pair (UTP)

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    54/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    STP cables are shielded while UTP cables are unshielded.STP cables are more immune to interference and noise than UTPcables.

    STP cables are better at maximizing bandwidth compared to UTPcables.

    STP cables cost more per meter compared to UTP cables.STP cables are heavier per meter compared to UTP cables.

    UTP cables are more prevalent in SOHO networks while STP isused in more high-end networks.

    Comparing STP & UTP

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    55/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    These cables are based on fiber optic technology, which useslight rays instead of electricity to transmit data. The following

    figure shows a fiber-optic cable.

    Contains glass or plastic fibers at core surrounded by layer of

    glass or plastic cladding.

    Reflects light back to core.

    Fiber-optic

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    56/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Fiber-optic cables can be differentiated into the following twocategories:

    Single-mode

    Multimode

    Types of Fiber-optic

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    57/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Narrow core through which laser-generated light travels over onepath, reflecting very little.

    Accommodates high bandwidths and long distances.

    Expensive.

    Single Mode Fiber

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    58/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Multi-mode optical fiber is a type of optical fiber mostly used forcommunication over short distances, such as within a building oron a campus.

    Multi Mode Fiber

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    59/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Nearly unlimited throughput.Transmission rates exceed 10 Gigabits per second.

    Very high resistance to noise.

    Excellent security.

    Ability to carry signals for much longer distances before requiringrepeaters than copper cable.

    Cost: most expensive transmission medium.

    Connector: uses 10 different types of connectors.

    Typically use SC, ST & MTRJ connectors.

    Noise immunity: unaffected by EMI.

    Size and scalability: segment lengths vary from 150 to 40,000

    meters.Industry standard for high-speed networking.

    Benefits over copper cabling

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    60/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The wireless technology helps connect distant networks,

    without needing to physically set up cables between thedestination and the source point.

    In a wireless setup, the atmosphere is used to transmit and

    receive signals in the form of electro-magnetic waves through

    an antenna.

    These electro-magnetic waves can be transmitted throughdifferent types of wireless transmission carriers, which include

    the following:Radio: Radio transmissions operate on radio waves. Radio wavesare only limited to low transmission capacities, from 1 Mbps to 10Mbps.

    Microwave: Microwaves transmit data over a higher bandwidth ascompared to radio transmissions.Infrared: Infrared transmissions use infrared radiation to transmitdata. Infrared is an electro-magnetic radiation.

    Wireless Transmission

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    61/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Connectors

    &Media Converters

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    62/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Connectors for Coaxial Cable

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    63/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    RJ45 Connector for UTP Cable

    Connectors for UTP Cable

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    64/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    MTRJSC

    ST

    Connectors for Fiber-optic Cable

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    65/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Media Converters

    Media converters are simple networking devices that

    make it possible to connect two dissimilar media typessuch as twisted pair with fiber optic cabling.

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    66/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    OSI Reference Model

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    67/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Established in 1947, the International Standards Organization

    (ISO) is a multinational body dedicated to worldwide agreement on

    international standards.

    An ISO standard that covers all aspects of network

    communications is the Open Systems Interconnection (OSI)

    model. It was first introduced in the late 1970s.

    The OSI Model

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    68/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    ISO is the organization.

    OSI is the model

    Note:

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    69/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The OSI Model

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    70/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Application

    Presentation

    Session

    Transport

    Network

    Data Link

    Physical

    Reduces complexity (one bigproblem to seven smaller ones)

    Standardizes networking

    Simplifies teaching and learning

    Why a Layered Network Model?

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    71/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    72/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    OSI layers

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    73/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    An exchange using the OSI model

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    74/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Physical layer

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    75/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The physical layer is responsible

    for the movement of individual bits from

    one node to the next.

    Note:

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    76/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Data link layer

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    77/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The data link layer is responsible for

    moving frames from one hop (node) to

    the next.

    Note:

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    78/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Hop-to-hop delivery

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    79/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Network layer

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    80/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The network layer is responsible for the

    delivery of individual packets from the

    source host to the destination host.

    Note:

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    81/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Source-to-destination delivery

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    82/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Transport layer

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    83/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The transport layer is responsible for

    the delivery of a message from one

    process to another.

    Note:

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    84/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Reliable process-to-process delivery of a message

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    85/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Session layer

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    86/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Session layer is responsible for

    establishing, managing, and

    terminating the communication between

    the two nodes.

    Note:

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    87/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Presentation layer

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    88/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Presentation layer is responsible for

    encoding & decoding, compression

    & decompression, encryption &

    decryption of data.

    Note:

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    89/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Application layer

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    90/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Application layer provides the

    interface between the user and the

    network.

    Note:

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    91/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Summary of layers

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    92/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Application Layer

    Provides network access to application

    programs (such as electronic mail, file

    transfer)

    7 Application

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    93/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Presentation Layer

    Network access to application programs

    Ensures data is readable by

    receiving system Format of data

    Negotiates data transfer syntax for

    application layer

    7 Application

    6 Presentation Data representation

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    94/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Session Layer

    Inter-host communication Establishes, manages, and

    terminates sessions between

    applications

    7 Application

    6 Presentation

    5 Session

    Network services to applications

    Data representation

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    95/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Transport Layer

    7 Application

    6 Presentation

    5 Session

    Transport4

    Inter-host communication

    Network services to applications

    Data representation

    End-to-end connection reliability

    Concerned with data transport issues

    between hosts

    Data transport reliability Establishes, maintains, and

    terminates virtual circuits

    Error detection and recovery

    Information flow control

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    96/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Network Layer

    7 Application

    6 Presentation

    5 Session

    Transport4

    Network3

    Inter-host communication

    Network services to applications

    Data representation

    End-to-end connection reliability

    Addresses and best path

    Define Logical addressing and pathselection between two end systems

    Routing of packets

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    97/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Data Link Layer

    7 Application

    6 Presentation

    5 Session

    Transport4

    Network3

    Data Link2

    Inter-host communication

    Network services to applications

    Data representation

    End-to-end connection reliability

    Addresses and best path

    Access to media

    Physical addressing, errornotification, flow control

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    98/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Physical Layer

    7 Application

    6 Presentation

    5 Session

    Transport4

    Network3

    Data Link2

    Physical1

    Inter-host communication

    Network services to applications

    Data representation

    End-to-end connection reliability

    Addresses and best path

    Access to media

    Binary transmission

    Wires, connectors, data rates

    N+ Certification

    C i i

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    99/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    7 Application

    6 Presentation

    5 Session

    4 Transport

    3 Network

    2 Data Link

    1 Physical

    Host A

    Communication

    Application

    Presentation

    Session

    Transport

    Network

    Data Link

    PhysicalBits

    Frames

    Packets

    Segments

    Host B

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    100/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Data Encapsulation

    Application

    Presentation

    Session

    Transport

    Network

    Physical

    Data Link

    Application

    Presentation

    Session

    Transport

    Network

    Physical

    Data Link

    Host A Host B

    Data} {

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    101/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Application

    Presentation

    Session

    Transport

    Network

    Physical

    Data Link

    Application

    Presentation

    Session

    Transport

    Network

    Physical

    Data Link

    Data} {Data

    Network

    Header

    Host A Host B

    Data Encapsulation (Continued)

    N+ Certification

    l i ( i d)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    102/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Application

    Presentation

    Session

    Transport

    Network

    Physical

    Data Link

    Application

    Presentation

    Session

    Transport

    Network

    Physical

    Data Link

    Data} {Data

    Network

    Header

    Frame

    Header

    Frame

    TrailerDataNetwork

    Header

    Host A Host B

    Data Encapsulation (Continued)

    N+ Certification

    D E l i (C i d)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    103/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Application

    Presentation

    Session

    Transport

    Network

    Physical

    Data Link

    Application

    Presentation

    Session

    Transport

    Network

    Physical

    Data Link

    Data} {Data

    Network

    Header

    Frame

    Header

    Frame

    TrailerDataNetwork

    Header

    0101101010110001

    Host A Host B

    Data Encapsulation (Continued)

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    104/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Host Layers

    7 Application

    6 Presentation

    5 Session

    4 Transport

    3 Network

    2 Data Link

    1 Physical

    Host layers: Provide accurate

    data delivery between computers.}

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    105/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Media Layers

    7 Application

    6 Presentation

    5 Session

    4 Transport

    3 Network

    2 Data Link

    1 Physical

    Host layers: Provide accurate

    data delivery between computers.

    Media layers: Control physical

    delivery of messages over thenetwork.

    }}

    N+ Certification

    Ph i l L

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    106/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Physical Layer

    The Physical layer specifies the electrical, mechanical,

    procedural, and functional requirements for activating,

    maintaining, and deactivating a physical link between end

    systems.

    N+ Certification

    D t Li k L

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    107/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Data Link Layer

    Data Link layer is divided into two sub layers:

    Media Access Control (MAC)

    Logical Link Control (LLC)

    The Data Link layer is responsible for the following aspects of

    communication:Providing unique identification (MAC address) to each

    node on the network.

    Transforming data bits from the Physical layer into groups

    called frames.

    Detecting errors that occur during a transmission.

    N+ Certification

    Data Link La er (Contin ed)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    108/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The Data Link Layer and its Sub Layers

    Data Link Layer (Continued)

    N+ Certification

    Data Link Layer (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    109/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Data Link Layer (Continued)

    Logical Link Control (LLC):

    Provides interface to Network layer protocols.

    Manages flow control.

    Media Access Control (MAC):

    Manages access to physical layer.Appends destination computers physical address onto

    data frame (MAC address, Data Link layer address, or

    hardware address).

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    110/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    MAC Address (Physical Address, Hardware Address)

    24 bits

    ROM

    RAM

    24 bits

    0000.0c12. 3456

    Serial NumberVendor Code

    MAC address is burned into ROM on a network interface card

    N+ Certification

    Data Link Layer (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    111/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    A NICs MAC address

    Data Link Layer (Continued)

    N+ Certification

    Network Layer

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    112/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    This layer is responsible for the following functions:

    Providing unique logical addresses to each node on thenetwork.

    Transmitting data across networks.

    Controlling network traffic.

    Best Path Determination.

    Network Layer

    N+ Certification

    Network Layer : Best Path Determination

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    113/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Which Path?Which Path?

    Layer 3 functions to find the best path through the internetwork.

    Network Layer : Best Path Determination

    N+ Certification

    Transport Layer

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    114/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Establishes an end-to-end connection.

    Sends segments from one end host to another.Ensures data reliability.

    Organizing messages into segments or breaking large

    segments into smaller segments.

    Delivering segments to the recipients.

    Providing error control.

    Transport Layer

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    115/391

    N+ Certification

    Transport Layer (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    116/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Transmit

    Buffer FullNot ReadyStopProcess

    Segments

    Buffer OK

    ReadyGo

    Resume Transmission

    ReceiverSender

    Transport Layer (Continued)

    N+ Certification

    Transport Layer (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    117/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Window Size = 1

    Sender

    Send 1 Receive 1

    Receiver

    Ack 2

    Send 2 Receive 2

    Ack 3

    Sender

    Send 1

    Send 2Receive 1Receive 2

    Receiver

    Window Size = 3

    Send 3 Receive 3Ack 4

    Send 4

    Transport Layer (Continued)

    N+ Certification

    Transport Layer (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    118/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Sender Receiver

    Send 2Send 1

    Send 3

    Ack 4

    Send 5

    Send 4

    Send 6

    Ack 5

    Send 5Ack 7

    1 2 3 4 5 6 7 1 2 3 4 5 6 7

    Transport Layer (Continued)

    N+ Certification

    Transport Layer To Network Layer

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    119/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    End-to-End Segments

    Routed Packets

    Transport Layer To Network Layer

    N+ Certification

    Session Layer

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    120/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Service Request

    Service Reply

    Establishes, manages, and terminates sessions between applications.

    Session Layer

    N+ Certification

    Presentation Layer

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    121/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    ASCIIEBCDIC

    Encrypted

    Text Data

    login:

    PICTTIFF

    JPEGGIF

    Graphics Visual images

    Sound

    VideoMPEG

    QuickTime

    MIDI

    Provides code formatting and conversion for applications.

    Presentation Layer

    N+ Certification

    Application Layer

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    122/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Word Processor

    Presentation Graphics

    Spreadsheet

    Database

    Design/Manufacturing

    Others

    COMPUTERAPPLICATIONS

    Electronic Mail

    File Transfer

    Remote Access

    Client-Server Process

    Network Management

    Others

    NETWORKAPPLICATIONS INTERNETWORK

    APPLICATIONS

    Electronic Data Interchange

    World Wide Web

    E-Mail Gateways

    Special-Interest Bulletin Boards

    Financial Transaction Services

    Internet Navigation UtilitiesConferencing (Voice, Video, Data)

    Others

    Provides the interface between the user and the network.

    Application Layer

    N+ Certification

    Functions of the OSI Layer

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    123/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Functions of the OSI Layer

    N+ Certification

    Summary

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    124/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    OSI reference model describes building blocks of functions for

    program-to-program communications between similar ordissimilar hosts.

    Summary

    N+ Certification

    What is Protocol?

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    125/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    A protocol is a set of established and agreed-upon rules

    required to enable effective communication on a network.Protocols can either be developed by a vendor or by anetworking standard organization.

    A protocol suite is a hierarchical collection of protocols.

    Some of the protocol suites are:

    TCP/IP Protocol SuiteIPX/SPX Protocol Suite

    AppleTalk Protocol Suite

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    126/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Introduction to TCP/IP

    (DoD Model)

    N+ Certification

    TCP/IP Model (DoD Model)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    127/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The DoD model is basically a condensed version of the OSI

    model.Its composed of four, instead of seven, layers:

    1) Process/Application layer

    2) Host-to-Host layer (Transport layer)

    3) Internet layer

    4) Network Access layer

    / ( )

    N+ Certification

    Comparing The OSI Model and TCP/IP Model

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    128/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    p g /

    N+ Certification

    TCP/IP Protocol Suite

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    129/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Application Layer

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    130/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The TCP/IP protocol suite combines all application related

    issues into one layer and ensure this data is properly packagedbefore passing it on to the next layer.

    Handles high-level protocols, issues of representation, encoding,decoding and session control.

    pp y

    N+ Certification

    Application Layer Protocols

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    131/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Host-to-Host Layer (Transport Layer)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    132/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The main purpose of the Host-to-Host layer is to shield the

    upper- layer applications from the complexities of the network.

    This layer says to the upper layer, Just give me your datastream, with any instructions, and Ill begin the process of gettingyour information ready to send.

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    133/391

    N+ Certification

    Internet Layer

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    134/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The purpose of the Internet layer is to send packets from a

    network host and have them arrive at the destination nodeindependent of the path taken.

    N+ Certification

    Internet Layer Protocols

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    135/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Network Access Layer

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    136/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    .

    The network access layer is concerned with all of the issues that an

    IP packet requires to actually make a physical link to thetransmission media.

    It includes the LAN and WAN technology details, and all the detailscontained in the OSI physical and data link layers.

    N+ Certification

    Network Access Layer Protocols

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    137/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    138/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Transmission Control Protocol

    N+ Certification

    Transmission Control Protocol (TCP)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    139/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Creates a reliable connection between two computers.

    TCP is one of the main protocol in TCP/IP protocol suite.

    Whereas the IP protocol deals only with packets, TCP enablestwo hosts to establish a connection and exchange streams of

    data.

    TCP guarantees delivery of data and also guarantees thatsegment will be delivered in the same order in which they weresent.

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    140/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    A packet in TCP is called a

    segment.

    Note:

    N+ Certification

    Key Features of TCP

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    141/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    TCP 3 way Handshake

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    142/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    TCP 3 way Handshake (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    143/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Stream delivery

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    144/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    TCP segment format

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    145/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Control field

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    146/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Description of flags

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    147/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Description of flags (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    148/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Encapsulation and decapsulation

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    149/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    A TCP Connection

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    150/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    TCP is connection-oriented.

    A connection-oriented transport protocol establishes a virtualpath between the source and destination.

    All of the segments belonging to a message are then sent overthis virtual path.

    A connection-oriented transmission requires three phases:Connection establishment

    Data transfer

    Connection termination

    N+ Certification

    Connection establishment using three-way handshaking

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    151/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    152/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The bytes of data being transferred in

    each connection are numbered by TCP.

    The numbering starts with a randomlygenerated number.

    Note:

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    153/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The value of the acknowledgment field

    in a segment defines the number of the

    next byte a party expects to receive.

    Note:

    N+ CertificationData transfer

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    154/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Connection termination using three-way handshaking

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    155/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Example1

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    156/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Suppose a TCP connection is transferring a file of 5000 bytes.

    The first byte is numbered 10001. What are the sequencenumbers for each segment if data is sent in five segments, eachcarrying 1000 bytes?

    Solution

    The following shows the sequence number for each segment:

    Segment 1 Sequence Number: 10,001 (range: 10,001 to 11,000)

    Segment 2 Sequence Number: 11,001 (range: 11,001 to 12,000)

    Segment 3 Sequence Number: 12,001 (range: 12,001 to 13,000)

    Segment 4 Sequence Number: 13,001 (range: 13,001 to 14,000)

    Segment 5 Sequence Number: 14,001 (range: 14,001 to 15,000)

    N+ Certification

    Aborting a connection

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    157/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ CertificationDenying a connection

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    158/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Error Control

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    159/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    TCP provides reliability using error control, which detects

    corrupted, lost, out-of-order, and duplicated segments.

    Error control in TCP is achieved through the use of thechecksum, acknowledgment, and time-out.

    N+ Certification

    N t

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    160/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Data may arrive out of order and be

    temporarily stored by the receiving TCP, but

    TCP guarantees that no out-of-ordersegment is delivered to the process.

    Note:

    N+ Certification

    N t

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    161/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    In modern implementations, a

    retransmission occurs if the

    retransmission timer expires.

    Note:

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    162/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    No retransmission timer is set for an

    ACK segment.

    Note:

    N+ Certification

    Normal operation

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    163/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Lost segment

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    164/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    165/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The receiver TCP delivers only ordered

    data to the process.

    Note:

    N+ Certification

    Fast retransmission

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    166/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Lost acknowledgment

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    167/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Flow Control & Congestion Control

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    168/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Flow control regulates the amount of data a source can send

    before receiving an acknowledgment from the destination.

    For that TCP defines a window size depending on the capabilityof receiving host.

    Congestion control refers to the mechanisms and techniques to

    keep the load below the capacity.

    There are two algorithms for Congestion control in TCP:

    slow start algorithm

    congestion avoidance algorithm

    N+ Certification

    Slow start, exponential increase algorithm

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    169/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Note:

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    170/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    In the slow start algorithm, the size of

    the congestion window increases

    exponentially until it reaches athreshold.

    Note:

    N+ Certification

    Congestion avoidance, additive increase algorithm

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    171/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Note:

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    172/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    In the congestion avoidance algorithm

    the size of the congestion window

    increases additively untilcongestion is detected.

    Note:

    N+ Certification

    T k t k f ll th diff t t h i d i

    State Transition

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    173/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    To keep track of all the different events happening during

    connection establishment, connection termination, and datatransfer, the TCP software is implemented as a finite statemachine.

    N+ Certification

    User Datagram Protocol (UDP)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    174/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    UDP uses a simple transmission model without implicit hand-

    shaking dialogues for providing reliability, ordering, or dataintegrity.

    Thus, UDP provides an unreliable service and datagram's mayarrive out of order, appear duplicated, or go missing withoutnotice.

    N+ Certification

    Comparison of TCP and UDP

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    175/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Addresses in TCP/IP

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    176/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Three different levels of addresses are used in an internet:

    Physical address (MAC Address)Logical address (IP Address)

    Port Address (Port Numbers)

    N+ Certification

    Addresses in TCP/IP

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    177/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    TCP and the upper layers dont use MAC and IP addresses to

    Port Numbers

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    178/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    TCP and the upper layers don t use MAC and IP addresses tounderstand the sending hosts address as the Data Link andNetwork layer protocols do. Instead, they use port numbers.

    TCP and UDP must use port numbers to communicate with theupper layers because theyre what keep track of differentapplications' conversations crossing the network simultaneously.

    Originating source port numbers are dynamically assigned bythe operating system of the source host and will equal somenumber starting at 1024.

    These port numbers identify the source and destinationapplication or process in the TCP segment.

    N+ Certification

    The port numbers are divided into three ranges:

    Port Numbers (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    179/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The port numbers are divided into three ranges:

    Well Known PortsRegistered Ports

    Dynamic or Private Ports

    N+ Certification

    The port numbers in the range from 0 to 1023 are the well-

    Well Known Ports (01023)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    180/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The port numbers in the range from 0 to 1023 are the wellknown ports. They are used by system processes that provide

    widely-used types of network services.

    Registered Ports (102449151)

    Dynamic or Private Ports (4915265535)

    The ranges of port number from 1024 to 49151 are theregistered ports. They are assigned by IANA for specific service

    upon application by a requesting entity.

    The range above the registered ports contains dynamic or

    private ports that cannot be registered with IANA. It is used forcustom or temporary purposes and for automatic allocation byoperating system.

    N+ Certification

    Relationship of layers and addresses in TCP/IP

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    181/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Example1

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    182/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    In Figure 2.18 a node with physical address 10 sendsa frame to a node with physical address 87. The two

    nodes are connected by a link. At the data link level

    this frame contains physical (link) addresses in the

    header. These are the only addresses needed. The restof the header contains other information needed at

    this level. The trailer usually contains extra bits

    needed for error detection.

    See Next Slide

    N+ Certification

    Figure 2.18 Physical addresses

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    183/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Example2

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    184/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Most local area networks use a 48-bit (6 bytes)physical address written as 12 hexadecimal digits,

    with every 2 bytes separated by a colon as shown

    below:

    07:01:02:01:2C:4B

    A 6-byte (12 hexadecimal digits) physical address.

    N+ Certification

    Example3

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    185/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    In Figure 2.19 we want to send data from a node withnetwork address A and physical address 10, located on one

    LAN, to a node with a network address P and physical

    address 95, located on another LAN. Because the two devices

    are located on different networks, we cannot use link

    addresses only; the link addresses have only localjurisdiction. What we need here are universal addresses that

    can pass through the LAN boundaries. The network (logical)

    addresses have this characteristic.

    See Next Slide

    N+ Certification

    Example3(Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    186/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The packet at the network layer contains the logicaladdresses, which remain the same from the original source to

    the final destination (A and P, respectively, in the figure).

    They will not change when we go from network to network.

    However, the physical addresses will change as the packet

    moves from one network to another. The boxes labeled routersare internetworking devices, which we will discuss later.

    See Next Slide

    N+ Certification

    Figure 2.19 IP addresses

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    187/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    F 2 20 h l f l

    Example5

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    188/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Figure 2.20 shows an example of transport layer

    communication. Data coming from the upper layers

    have port addresses j and k ( j is the address of the

    sending process, and k is the address of the receiving

    process). Since the data size is larger than the networklayer can handle, the data are split into two packets,

    each packet retaining the service-point addresses ( j

    and k). Then in the network layer, network addresses

    (A and P) are added to each packet.

    See Next Slide

    N+ Certification

    Example5(Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    189/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The packets can travel on different paths and arrive atthe destination either in order or out of order. The two

    packets are delivered to the destination transport layer,

    which is responsible for removing the network layer

    headers and combining the two pieces of data fordelivery to the upper layers.

    See Next Slide

    N+ Certification

    Figure 2.20 Port addresses

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    190/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Port No TCP UDP Protocol / Application Comment

    Well Known Port Numbers

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    191/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    pp

    20 FTP Data Transfer21 FTP Control Commands

    22 Secure Shell (SSH) Secure Remote Login

    23 TELNET Remote Login

    25 SMTP Sending Mails

    43 WHOIS Search WHOIS

    Database

    53 DNS Resolves Domain

    Names

    67 DHCP Server

    68 DHCP Client

    69 TFTP Insecure File Transfer

    N+ Certification

    Port No TCP UDP Protocol / Application Comment

    Well Known Port Numbers (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    192/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Port No TCP UDP Protocol / Application Comment

    80 HTTP Retrieving Web Pages88 Kerberos Authentication

    110 POP3 Receiving Mails

    123 Network Time Protocol Synchronize Time

    137 NetBIOS Name Service Resolves NetBIOS

    Names

    138 NetBIOS Datagram

    Service

    139 NetBIOS Session Service

    143 Internet Message Access

    Protocol

    Retrieving Mails

    161 Simple Network

    Management Protocol

    Network Mgt.

    N+ Certification

    Port No TCP UDP Protocol / Application Comment

    Well Known Port Numbers (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    193/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    179 BGP (Border GatewayProtocol) Routing Protocol forISPs

    389 Lightweight Directory

    Access Protocol

    Directory Services

    443 HTTPS HTTP Secure

    445 Windows SMB FileSharing Service

    File Sharing inWindows

    500 Internet Security

    Association and Key

    Management Protocol

    (ISAKMP)

    Used in IPSec VPNs

    514 Syslog Sending Log Messages

    N+ Certification

    Port No TCP UDP Protocol / Application Comment

    Well Known Port Numbers (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    194/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    520 Routing InformationProtocol (RIP) Routing Protocol forSmall Networks

    546 DHCPv6 client For IPv6 Addressing

    547 DHCPv6 server For IPv6 Addressing

    860 iSCSI For Accessing Storage

    over the networks

    N+ Certification

    Port No TCP UDP Protocol / Application Comment

    Registered Ports

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    195/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    1293 IPSec (Internet Protocol

    Security)

    Encrypting IP Packets

    1503 Windows Live Messenger Chat Messenger

    6891-

    6900

    Windows Live Messenger File Transfer

    6901 Windows Live Messenger Voice Calls1645 RADIUS Authentication

    Protocol

    Default Port for Cisco

    and Juniper Networks

    RADIUS servers

    1646 RADIUS Accounting

    Protocol

    Default for Cisco and

    Juniper Networks

    RADIUS servers

    N+ Certification

    Port No TCP UDP Protocol / Application Comment

    Registered Ports (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    196/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    1755 Microsoft Media Services Media Services

    1812 RADIUS Authentication

    Protocol

    Microsoft

    Implementation

    1813 RADIUS Accounting

    Protocol

    Microsoft

    Implementation

    2049 Network File System Available in Linux

    3389 Microsoft Terminal Server Remote Desktop

    Protocol

    3544 Teredo Tunnelling IPv4 To IPv6 Tunnelling

    5050 Yahoo! Messenger Chat Messenger

    5060 Session Initiation

    Protocol (SIP)

    Used in Cisco VOIP

    N+ Certification

    Port No TCP UDP Protocol / Application Comment

    Registered Ports (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    197/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    5355 LLMNR (Link-Local

    Multicast Name

    Resolution)

    Allows hosts to

    perform name

    resolution for hosts on

    the same local link

    (only provided by

    Windows Vista and

    Server 2008)

    7777 Windows Backdoor

    Program tini.exe

    Trojan Horse

    19294,

    19295,

    19302

    Google Talk Voice and

    Video connections

    Chat Messenger

    N+ Certification

    The combination of IP address and port number. e.g. 201.0.0.1:80

    Socket

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    198/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Unicast: These are sent to a single destination host.

    Unicast, Multicast and Broadcast

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    199/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Multicast: These are packets sent from a single source host andtransmitted to many devices on different networks.

    Broadcast (layer 2): These are sent to all hosts on a LAN.

    Broadcasts (layer 3): These are sent to all hosts on the network.

    N+ Certification

    A broadcast domain a logical division of a computer network, in

    Broadcast Domain

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    200/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    b oadcas do a a og ca d s o o a co pu e e o ,

    which all nodes can reach each other by broadcast at the data linklayer.

    N+ Certification

    In TCP/IP communications, a datagram (packet) on a local-area

    ARP (Address Resolution Protocol )

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    201/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    , g (p )

    network must contain both a destination MAC address and adestination IP address.

    There needs to be a way to automatically map IP to MACaddress.

    ARP associates an IP address with its MAC address. On a typicalphysical network, such as a LAN, each device on a link isidentified by a physical or MAC address that is usually imprintedon the NIC.

    The TCP/IP suite has a protocol, called Address ResolutionProtocol (ARP), which can automatically obtain MAC addressesfor local transmission.

    N+ Certification

    Used b a sending host hen it kno s the IP address of the

    Address Resolution Protocol (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    202/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Used by a sending host when it knows the IP address of the

    destination but needs the MAC address.

    N+ Certification

    ARP operation

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    203/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Each device on a network maintains

    Address Resolution Protocol (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    204/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Each device on a network maintains

    its own ARP table.

    A device that requires an IP andMAC address pair broadcasts an

    ARP request.

    If one of the local devices matchesthe IP address of the request, itsends back an ARP reply thatcontains its IP-MAC pair.

    N+ Certification

    ARP is a broadcast protocol every host on the network receives

    Address Resolution Protocol (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    205/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    p y

    the request.

    Each host checks the request against its IP address the rightone responds.

    N+ Certification

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    206/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    An ARP request is broadcast;

    an ARP reply is unicast.

    Note:

    N+ Certification

    Four cases using ARP

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    207/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    RARP finds the IP address for a machine that only knows its

    RARP (Reverse Address Resolution Protocol)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    208/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    RARP finds the IP address for a machine that only knows its

    MAC address.

    N+ Certification

    ARP and RARP

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    209/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    ICMP is a network protocol used for reporting errors that might

    ICMP (Internet Control Message Protocol)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    210/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    p p g g

    have occurred while transferring data packets over networks.

    ICMP is designed for network diagnosis and to find out as to whatwent wrong in the data communication.

    ICMP can be used to report:errors in the underlying communications of networkapplications.

    availability of remote hosts.

    Best known example of ICMP in practice is the ping utility,that uses ICMP protocol.

    N+ Certification

    ICMP In Action

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    211/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    When Host A sends a packet destined for Host B, the Lab_B routerwill send an ICMP destination unreachable message back to thesending device (Host A in this example).

    N+ Certification

    HTTP

    Application Layer Protocols

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    212/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    FTPTFTP

    TELNET

    SSH

    DNS

    SMTPPOP

    IMAP

    N+ Certification

    Web servers implement this protocol.

    HTTP (Hyper Text Transport Protocol )

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    213/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    p p

    The underlying protocol used by the World Wide Web.

    HTTP defines how messages are formatted and transmitted,and what actions Web servers and browsers should take inresponse to various commands.

    For example, when you enter a URL in your browser, thisactually sends an HTTP command to the Web server directing itto fetch and transmit the requested Web page.

    N+ Certification

    FTP protocol is used for downloading and uploading files over

    FTP (File Transfer Protocol)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    214/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    p g p g

    the Internet.

    FTP works in the same way as HTTP for transferring Webpages from a server to a user's browser.

    FTP is most commonly used to download a file from a serverusing the Internet or to upload a file to a server (e.g. uploading adocument file to a server).

    N+ Certification

    It can do nothing but send and receive files.

    TFTP (Trivial File Transfer Protocol)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    215/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    TFTP has no directory-browsing abilities.

    Theres no authentication as with FTP, so its insecure.

    N+ Certification

    It allows a user to remotely access the resources of anothers stem on the net ork

    TELNET

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    216/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    system on the network.

    Telnet is a text-mode type program.

    Telnet is not secure.

    N+ Certification

    SSH (Secure Shell)

    SSH is a network protocol that allows you to remotely accessthe resources of another system on the network

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    217/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    the resources of another system on the network.

    Allows data to be exchanged using a secure channel betweentwo networked devices.

    SSH was designed as a replacement for Telnet which send

    information, notably passwords, in plaintext, rendering themsusceptible to packet analysis.

    The encryption used by SSH is intended to provideconfidentiality and integrity of data over an unsecured network,

    such as the Internet.

    N+ Certification

    A Domain Name Server (DNS) lookup is the conversion of adomain name into its respective IP address

    DNS (Domain Name Service)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    218/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    domain name into its respective IP address.

    Domain names are alphabetic, they're easier to remember.

    The Internet however, is really based on IP addresses, Everytime you use a domain name, therefore, a DNS service must

    translate the name into the corresponding IP address.

    N+ Certification

    For example, the domain name www.example.com mighttranslate to 198 105 232 4

    DNS (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    219/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    translate to 198.105.232.4.

    If one DNS server doesn't know how to translate a particulardomain name, it asks another one, and so on, until the correctIP address is returned.

    N+ Certification

    Domain name space

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    220/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Domain names and labels

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    221/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    FQDN

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    222/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Hierarchy of name servers

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    223/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    The domain name space (tree) is divided into two differentsections:

    DNS In The Internet

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    224/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Generic domainsCountry domains

    N+ Certification

    DNS used in the Internet

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    225/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Generic domains

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    226/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Generic Domain Labels

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    227/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Generic Domain Labels (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    228/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    Country Domains

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    229/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    N+ Certification

    In Linux and Windows, the nslookup utility can be used to

    retrieve address/name mapping The following shows how we

    Example3

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    230/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    retrieve address/name mapping. The following shows how we

    can retrieve an address when the domain name is given.

    $ nslookup india.comName: india.com

    Address: 153.18.8.1

    N+ Certification

    Note:

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    231/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    DNS can use the services of UDP or

    TCP using the well-known port 53.

    N+ Certification

    Every operating system has a hosts file.

    The Hosts File

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    232/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    The hosts file stores information on where to find or locate aparticular computer on the network.

    It basically maps hostnames or domain names to IP addresses.

    One can think of it as the local system version of the DomainName System (DNS).

    N+ Certification

    Depending upon your operating system, the hosts file can befound at different locations:

    The Hosts File (Continued)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    233/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Microsoft Windows \windows\system32\drivers\etc

    Unix & Linux \etc

    The hosts file can be tweaked to carry out a number of

    interesting things:

    Block certain websites.

    Redirecting the user to an embarrassing website eachtime he enters the address of a regular website.

    N+ Certification

    SMTP is used for sending email messages.

    SMTP (Simple Mail Transfer Protocol)

  • 7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)

    234/391

    Copyright UTL Technologies Ltd 2011 All rights reserved

    Most e-mail systems that send mail over the Internet use SMTPto send messages from one server to another; the messagescan then be retrieved with an e-mail client using either POP orIMAP.

    In addition, SMTP is generally used to send messages from amail client to a mail server. This is why you need to specify boththe POP or IMAP server and the SMTP server when youconfigure your e-mail application.

    N+ Certification

    Note:

  • 7/30/2019 Cn