Cnw n+ 3rd Dec 2012 Cnw Batch (2)
-
Upload
essan-francois-amankoun -
Category
Documents
-
view
217 -
download
0
Transcript of Cnw n+ 3rd Dec 2012 Cnw Batch (2)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
1/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
N+
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
2/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
An Introduction to Networking
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
3/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
A network is an interconnection of a group of computersthat can communicate and share resources such as hard
disks and printers.
A network is a group of computers and other devices that
are connected by some type of transmission media.
The initial idea of a network was perceived by Departmentof Defense (DOD) in USA for the purpose of security.
Some advantages of networks are:
Sharing of information across the network
Optimum utilization of hardware resources
Centralization of data management
Introducing Networks
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
4/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
How Networks Are Used
File services: capability of a server to share data files,
applications, and disk storage space.
Print services: used to share printers across a network.
Communications services: Allow remote users to connect to theremote network.
Mail services: Transfer of e-mail between users on a network.
Internet services: Supplying Web pages, file transfer
capabilities, and a means for directly logging on to other
computers on the Internet.
Management services: centrally administer management
tasks on the network like Traffic monitoring and control.
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
5/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Internetworking services are the services in a networkingenvironment that are accessible to users within an intranet
or the Internet.
The following are some of the services provided by the
Internetworking servers:
File TransferWWW
E-mail
Understanding Internetworking Servers
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
6/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Network Topologies
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
7/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Network topology is a schematic layout or a map of the
arrangement of nodes over a network.
This layout also determines the manner in which information
is exchanged within the network.
There are five types of network topologies:
Bus
Star
Ring
Mesh
Cellular
Network Topologies
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
8/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
The bus topology connects all the nodes on a network to a
main cable called bus.
In the bus topology, each packet that is placed on the bus
contains the address of the destination node and is
transmitted in both directions along the bus.
A single high capacity cable is required thus requiring
minimum cabling and its cost.
Entire cable setup needs to be reconfigured to add a node.
Time consuming process to troubleshoot as every point
needs to be checked to locate the fault.
Bus Topology
The Bus Topology
N C ifi i
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
9/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
A Terminated Bus Topology
network
Bus Topology (Continued)
N C tifi ti
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
10/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
The star topology connects nodes over a network using acentral control unit called the hub.
Nodes to a star-based network can be easily attached to the
hub.
All the nodes are connected to the hub thus requiring lot of
cabling and cost.A faulty hub can disrupt the entire network.
Star Topology
The Star Topology
N C tifi ti
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
11/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
A Typical Star Topology Network
Star Topology (Continued)
N C tifi ti
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
12/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
The ring topology connects the nodes on a network througha point-to-point connection.
Easy to locate cable faults in a ring.
The entire network stops functioning, if any of the nodes in
the network malfunctions.
Ring Topology
The Ring Topology
N+ C tifi ti
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
13/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
A Typical Ring Topology Network
Ring Topology (Continued)
N+ C tifi ti
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
14/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
The mesh topology involves point-to-point connectionbetween every node in the network.
High reliable as network connectivity does not depend on
any one node.
Useful for large network connections.
Involves high installation and setup costs due to elaboratecabling required to connect each node with the other node.
Difficult to manage as the size of the network increases.
Mesh Topology
The Mesh Topology
N+ C tifi ti
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
15/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
The cellular topology is a wireless topology, wheregeographic area is divided into cells or regions.
In cellular topology, each cell is a separate entity that is
controlled by a central station.
Operates on wireless media, thus do not require cabling.
Easy to install as only requirement is the availability of acentral location and signal strength.
Cellular Topology
Cell Node
The Cellular Topology
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
16/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Network Categories
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
17/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
The resources and software capabilities that nodes in a
network share are commonly known as services.
Networks are categorized as:
Peer-to-peer
Client / Server
Network Categories
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
18/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
In a peer-to-peer network, there is no specific distinctionbetween a client and a server.
Every computer can communicate directly with every other
computer.
By default, no computer has more authority than another.
Every computer is capable of sending and receivinginformation to and from every other computer.
The following figure illustrates the peer-to-peer network:
Peer-to-Peer Networks
The Peer-to-Peer Network
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
19/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Resource sharing on a Simple Peer-to-Peer Network
Peer-to-Peer Networks (Continued)
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
20/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
In a client / server network, the requests are processedcentrally by one or more servers.
The server is a system with high processing power, which
provides services for the other computers in a network.
The client is a system that accesses resources available on
a server.In a client / server network setup, the server is responsible
for processing the requests sent by the clients.
Client / Server Networks
The Client / Server Network The Client-Server Network Setup
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
21/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Resource sharing on a Client / Server Network
Client / Server Networks (Continued)
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
22/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Advantages of using client/server networks over peer-to-peernetworks:
User logon accounts and passwords can be assigned in one place.
Access to multiple shared resources can be centrally granted to a
single user or groups of users.
Problems can be tracked, diagnosed, and often fixed from onelocation.
Servers are optimized to handle heavy processing loads and
dedicated to handling requests from clients, enabling faster
response time.
Because of their efficient processing and larger disk storage,
servers can connect more than a handful of computers on anetwork.
To function as a server, a computer must be running a network
operating system (NOS).
Client / Server Networks (Continued)
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
23/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
ClientServer
Network interface card (NIC)
NOS
Connectivity device
Elements of Client / Server Networks
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
24/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Network Operating Systems
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
25/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Network Operating System (NOS) is an enhanced versionof an operating system, with features that allow the
management and connectivity of nodes within a network.
NOS allows the sharing of information and resources based
on the accessibility privileges allocated to each user or
node.Popular NOSs include:
Windows Server 2008 R2
UNIX
Linux
Network Operating System
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
26/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Centrally manage network resources, such as programs, data,and devices.
Allow remote users to connect to a network.
Allow users to connect to other networks.
Secure access to a network.
Data backup & restore.
Allow for simple additions of clients and resources.
Monitor status and functionality of network elements.
Distribute programs and software updates to clients.
Provide fault tolerance in case of a hardware or softwareproblem.
Functions of Network Operating System
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
27/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Windows Server 2008 R2 is a 64-bit operating system. It isa Microsoft product, which operates on single and
multiprocessor systems.
The features of the Windows Server 2008 R2 operating
system are as follows:
Active DirectoryVirtual Private Networks (VPNs)
Terminal services
NTFS
Windows Deployment Services
Hyper VIPv6 Implementation
Windows Server 2008 R2
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
28/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Bell Labs launched the UNIX network operating system.Many versions of UNIX, such as Sun Solaris, AIX UNIX, HP
UNIX, and BSD, are available in the market.
Some of the features of UNIX, which allow networking at the
operating system level, are:
Internet-based servicesCompatibility with different protocols
Network security
UNIX
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
29/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
The Linux network operating system, developed by LinusTorvalds, is based on the UNIX architecture.
Linux is an open source operating system in which the
source code or the program of the operating system is
available free of cost.
This provides flexibility to the user to modify the operatingsystem according to individual requirements.
Linux provides services like Apache, Samba and NFS.
LINUX
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
30/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Types of Network
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
31/391
N+ Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Depending on the size and the area that networks cover,the networks are primarily categorized into the following
types:
Local Area Networks (LANs)
Wide Area Networks (WANs)
Types of Network
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
32/391
N Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
A LAN is a small-scale network that extends over relativelysmall distances.
The following figure depicts a typical LAN setup:
Local Area Network
Typical LAN Setup
Node1
Node 2 Node 3
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
33/391
N Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
A Wide Area Network (WAN) provides network connectivityspanning across large geographical area, such as across
states, countries, or across the globe.
The following figure depicts WAN connectivity between two
buildings at Miami and Texas, across the Internet using the
services of a service provider.
Wide Area Network
The WAN Connectivity
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
34/391
N Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Transmission Basics
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
35/391
N Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Transmission Direction
There are 3 different transmission modes characterized according tothe direction of the exchanges:
Simplex
Half-Duplex
Full-Duplex (Duplex)
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
36/391
N Certification
Copyright UTL Technologies Ltd 2011 All rights reserved
Simplex: signals may travel in only one direction.
Half-Duplex: signals may travel in both directions over a mediumbut only one direction at a time.
Full-Duplex or Duplex: signals free to travel in both directionsover a medium simultaneously.
Transmission Direction (Continued)
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
37/391
C
Copyright UTL Technologies Ltd 2011 All rights reserved
Bandwidth
In computer networking bandwidth refers to the data rate supportedby a network connection.
In the field of electrical engineering, bandwidth represents thedifference between highest and lowest frequencies that a mediumcan transmit.
Bandwidth represents the capacity of the connection.
The greater the capacity, the more likely that greater performancewill follow, though overall performance also depends on other
factors, such as latency.
We most commonly expresses bandwidth in terms of bits persecond (bps).
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
38/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Latency
Delay between transmission and receipt of a signal.
Many possible causes:
Cable length
Inter connectivity device e.g. routers.
Round Trip Time (RTT)
Time for packets to go from sender to receiver and back.
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
39/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Throughput
In communication networks, network throughput is the average rateof successful message delivery over a communication channel.
The throughput is usually measured in bits per second (bps).
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
40/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Baseband
In Baseband networks a digital signal is placed directly on the
transmission medium without requiring a carrier, i.e. withoutmodulation.
Only one signal may be present on the baseband channel at atime.
Baseband networks may use twisted pair, coaxial cable, oroptical fiber for data transmission.
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
41/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Broadband
A term used to describe a network that can transmit a wide range
of signals, including audio and video.
Broadband networks are especially useful in the NetworkedWorld, as they can carry many signals at once, resulting in fasterdata transmission.
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
42/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Transmission Flaws (Noise)
Electro Magnetic Interference: also called Radio FrequencyInterference RFI) is a disturbance that affects an electrical circuitdue to either electromagnetic induction or electromagneticradiation emitted from an external source such as electricaldevices or cables.
Crosstalk: refers to electromagnetic interference from oneunshielded twisted pair to another twisted pair, normally runningin parallel. In that case signal traveling on a wire or cableinfringes on signal traveling over adjacent wire or cable.
Certain amount of signal noise is unavoidable.
All forms of noise measured in decibels (db).
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
43/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Attenuation
Attenuation is a general term that refers to any reduction in thestrength of a signal.
Attenuation occurs with any type of signal, whether digital oranalog. Sometimes called loss, attenuation is a naturalconsequence of signal transmission over long distances.
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
44/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Transmission Media
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
45/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The physical channel that is used for connecting thecomponents of a network, such as nodes and printers, is
known as transmission medium.
The types of transmission media include the following:
Cables
Wireless
Transmission Media
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
46/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Cables are the conventional media used to setup networks.
There are three types of cables:
Coaxial Cables
Twisted Pair Cables
Fiber-optic Cables
Cables
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
47/391
Copyright UTL Technologies Ltd 2011 All rights reserved
These cables are designed in such a manner that the centerconductor and the outside braided metal shield share a
common axis.
Coaxial Cables
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
48/391
Copyright UTL Technologies Ltd 2011 All rights reserved
These cables use copper wires, which are good conductorsof electricity.
Color-coded pairs of insulated copper wires twisted
together.
Twist ratio: twists per meter or foot.
Higher twist ratio reduces crosstalk and increasesattenuation
Twisted Pair Cables
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
49/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Types of Twisted Pair Cables
There are two types of twisted pair cables:
Shielded Twisted Pair Cables (STP)
Unshielded Twisted Pair Cables (UTP)
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
50/391
Copyright UTL Technologies Ltd 2011 All rights reserved
These cables consist of multiple twisted pairs (TPs) surroundedby an insulator shield. This insulator shield, in turn, is covered
with a plastic encasement.
Shielded Twisted Pair (STP)
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
51/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Shielded Twisted Pair (STP) (Continued)
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
52/391
Copyright UTL Technologies Ltd 2011 All rights reserved
These cables consist of a set of twisted pairs that are coveredwith a plastic jacket, as shown in the following figure.
Most common form of cabling found on LANs today.
TIA/EIA 568 standard divides twisted-pair wiring into several
categories: CAT 3, 4, 5, 5e, 6, 6e, 7
Unshielded Twisted Pair (UTP)
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
53/391
Copyright UTL Technologies Ltd 2011 All rights reserved
CAT 3 (Category 3): up to 10 Mbps of throughputCAT 4 (Category 4): 16 Mbps throughput
CAT 5 (Category 5): up to 1000 Mbps throughput
CAT 5e (Enhanced Category 5): higher twist ratio
CAT 6 (Category 6): six times the throughput of CAT 5
CAT 6e (Enhanced Category 6): reduced attenuation and crosstalkCAT 7 (Category 7): signal rates up to 1 GHz
Categories of Unshielded Twisted Pair (UTP)
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
54/391
Copyright UTL Technologies Ltd 2011 All rights reserved
STP cables are shielded while UTP cables are unshielded.STP cables are more immune to interference and noise than UTPcables.
STP cables are better at maximizing bandwidth compared to UTPcables.
STP cables cost more per meter compared to UTP cables.STP cables are heavier per meter compared to UTP cables.
UTP cables are more prevalent in SOHO networks while STP isused in more high-end networks.
Comparing STP & UTP
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
55/391
Copyright UTL Technologies Ltd 2011 All rights reserved
These cables are based on fiber optic technology, which useslight rays instead of electricity to transmit data. The following
figure shows a fiber-optic cable.
Contains glass or plastic fibers at core surrounded by layer of
glass or plastic cladding.
Reflects light back to core.
Fiber-optic
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
56/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Fiber-optic cables can be differentiated into the following twocategories:
Single-mode
Multimode
Types of Fiber-optic
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
57/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Narrow core through which laser-generated light travels over onepath, reflecting very little.
Accommodates high bandwidths and long distances.
Expensive.
Single Mode Fiber
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
58/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Multi-mode optical fiber is a type of optical fiber mostly used forcommunication over short distances, such as within a building oron a campus.
Multi Mode Fiber
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
59/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Nearly unlimited throughput.Transmission rates exceed 10 Gigabits per second.
Very high resistance to noise.
Excellent security.
Ability to carry signals for much longer distances before requiringrepeaters than copper cable.
Cost: most expensive transmission medium.
Connector: uses 10 different types of connectors.
Typically use SC, ST & MTRJ connectors.
Noise immunity: unaffected by EMI.
Size and scalability: segment lengths vary from 150 to 40,000
meters.Industry standard for high-speed networking.
Benefits over copper cabling
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
60/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The wireless technology helps connect distant networks,
without needing to physically set up cables between thedestination and the source point.
In a wireless setup, the atmosphere is used to transmit and
receive signals in the form of electro-magnetic waves through
an antenna.
These electro-magnetic waves can be transmitted throughdifferent types of wireless transmission carriers, which include
the following:Radio: Radio transmissions operate on radio waves. Radio wavesare only limited to low transmission capacities, from 1 Mbps to 10Mbps.
Microwave: Microwaves transmit data over a higher bandwidth ascompared to radio transmissions.Infrared: Infrared transmissions use infrared radiation to transmitdata. Infrared is an electro-magnetic radiation.
Wireless Transmission
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
61/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Connectors
&Media Converters
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
62/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Connectors for Coaxial Cable
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
63/391
Copyright UTL Technologies Ltd 2011 All rights reserved
RJ45 Connector for UTP Cable
Connectors for UTP Cable
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
64/391
Copyright UTL Technologies Ltd 2011 All rights reserved
MTRJSC
ST
Connectors for Fiber-optic Cable
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
65/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Media Converters
Media converters are simple networking devices that
make it possible to connect two dissimilar media typessuch as twisted pair with fiber optic cabling.
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
66/391
Copyright UTL Technologies Ltd 2011 All rights reserved
OSI Reference Model
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
67/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Established in 1947, the International Standards Organization
(ISO) is a multinational body dedicated to worldwide agreement on
international standards.
An ISO standard that covers all aspects of network
communications is the Open Systems Interconnection (OSI)
model. It was first introduced in the late 1970s.
The OSI Model
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
68/391
Copyright UTL Technologies Ltd 2011 All rights reserved
ISO is the organization.
OSI is the model
Note:
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
69/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The OSI Model
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
70/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Application
Presentation
Session
Transport
Network
Data Link
Physical
Reduces complexity (one bigproblem to seven smaller ones)
Standardizes networking
Simplifies teaching and learning
Why a Layered Network Model?
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
71/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
72/391
Copyright UTL Technologies Ltd 2011 All rights reserved
OSI layers
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
73/391
Copyright UTL Technologies Ltd 2011 All rights reserved
An exchange using the OSI model
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
74/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Physical layer
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
75/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The physical layer is responsible
for the movement of individual bits from
one node to the next.
Note:
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
76/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Data link layer
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
77/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The data link layer is responsible for
moving frames from one hop (node) to
the next.
Note:
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
78/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Hop-to-hop delivery
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
79/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Network layer
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
80/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The network layer is responsible for the
delivery of individual packets from the
source host to the destination host.
Note:
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
81/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Source-to-destination delivery
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
82/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Transport layer
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
83/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The transport layer is responsible for
the delivery of a message from one
process to another.
Note:
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
84/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Reliable process-to-process delivery of a message
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
85/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Session layer
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
86/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Session layer is responsible for
establishing, managing, and
terminating the communication between
the two nodes.
Note:
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
87/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Presentation layer
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
88/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Presentation layer is responsible for
encoding & decoding, compression
& decompression, encryption &
decryption of data.
Note:
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
89/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Application layer
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
90/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Application layer provides the
interface between the user and the
network.
Note:
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
91/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Summary of layers
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
92/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Application Layer
Provides network access to application
programs (such as electronic mail, file
transfer)
7 Application
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
93/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Presentation Layer
Network access to application programs
Ensures data is readable by
receiving system Format of data
Negotiates data transfer syntax for
application layer
7 Application
6 Presentation Data representation
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
94/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Session Layer
Inter-host communication Establishes, manages, and
terminates sessions between
applications
7 Application
6 Presentation
5 Session
Network services to applications
Data representation
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
95/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Transport Layer
7 Application
6 Presentation
5 Session
Transport4
Inter-host communication
Network services to applications
Data representation
End-to-end connection reliability
Concerned with data transport issues
between hosts
Data transport reliability Establishes, maintains, and
terminates virtual circuits
Error detection and recovery
Information flow control
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
96/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Network Layer
7 Application
6 Presentation
5 Session
Transport4
Network3
Inter-host communication
Network services to applications
Data representation
End-to-end connection reliability
Addresses and best path
Define Logical addressing and pathselection between two end systems
Routing of packets
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
97/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Data Link Layer
7 Application
6 Presentation
5 Session
Transport4
Network3
Data Link2
Inter-host communication
Network services to applications
Data representation
End-to-end connection reliability
Addresses and best path
Access to media
Physical addressing, errornotification, flow control
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
98/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Physical Layer
7 Application
6 Presentation
5 Session
Transport4
Network3
Data Link2
Physical1
Inter-host communication
Network services to applications
Data representation
End-to-end connection reliability
Addresses and best path
Access to media
Binary transmission
Wires, connectors, data rates
N+ Certification
C i i
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
99/391
Copyright UTL Technologies Ltd 2011 All rights reserved
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Host A
Communication
Application
Presentation
Session
Transport
Network
Data Link
PhysicalBits
Frames
Packets
Segments
Host B
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
100/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Data Encapsulation
Application
Presentation
Session
Transport
Network
Physical
Data Link
Application
Presentation
Session
Transport
Network
Physical
Data Link
Host A Host B
Data} {
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
101/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Application
Presentation
Session
Transport
Network
Physical
Data Link
Application
Presentation
Session
Transport
Network
Physical
Data Link
Data} {Data
Network
Header
Host A Host B
Data Encapsulation (Continued)
N+ Certification
l i ( i d)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
102/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Application
Presentation
Session
Transport
Network
Physical
Data Link
Application
Presentation
Session
Transport
Network
Physical
Data Link
Data} {Data
Network
Header
Frame
Header
Frame
TrailerDataNetwork
Header
Host A Host B
Data Encapsulation (Continued)
N+ Certification
D E l i (C i d)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
103/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Application
Presentation
Session
Transport
Network
Physical
Data Link
Application
Presentation
Session
Transport
Network
Physical
Data Link
Data} {Data
Network
Header
Frame
Header
Frame
TrailerDataNetwork
Header
0101101010110001
Host A Host B
Data Encapsulation (Continued)
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
104/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Host Layers
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Host layers: Provide accurate
data delivery between computers.}
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
105/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Media Layers
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Host layers: Provide accurate
data delivery between computers.
Media layers: Control physical
delivery of messages over thenetwork.
}}
N+ Certification
Ph i l L
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
106/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Physical Layer
The Physical layer specifies the electrical, mechanical,
procedural, and functional requirements for activating,
maintaining, and deactivating a physical link between end
systems.
N+ Certification
D t Li k L
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
107/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Data Link Layer
Data Link layer is divided into two sub layers:
Media Access Control (MAC)
Logical Link Control (LLC)
The Data Link layer is responsible for the following aspects of
communication:Providing unique identification (MAC address) to each
node on the network.
Transforming data bits from the Physical layer into groups
called frames.
Detecting errors that occur during a transmission.
N+ Certification
Data Link La er (Contin ed)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
108/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The Data Link Layer and its Sub Layers
Data Link Layer (Continued)
N+ Certification
Data Link Layer (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
109/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Data Link Layer (Continued)
Logical Link Control (LLC):
Provides interface to Network layer protocols.
Manages flow control.
Media Access Control (MAC):
Manages access to physical layer.Appends destination computers physical address onto
data frame (MAC address, Data Link layer address, or
hardware address).
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
110/391
Copyright UTL Technologies Ltd 2011 All rights reserved
MAC Address (Physical Address, Hardware Address)
24 bits
ROM
RAM
24 bits
0000.0c12. 3456
Serial NumberVendor Code
MAC address is burned into ROM on a network interface card
N+ Certification
Data Link Layer (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
111/391
Copyright UTL Technologies Ltd 2011 All rights reserved
A NICs MAC address
Data Link Layer (Continued)
N+ Certification
Network Layer
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
112/391
Copyright UTL Technologies Ltd 2011 All rights reserved
This layer is responsible for the following functions:
Providing unique logical addresses to each node on thenetwork.
Transmitting data across networks.
Controlling network traffic.
Best Path Determination.
Network Layer
N+ Certification
Network Layer : Best Path Determination
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
113/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Which Path?Which Path?
Layer 3 functions to find the best path through the internetwork.
Network Layer : Best Path Determination
N+ Certification
Transport Layer
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
114/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Establishes an end-to-end connection.
Sends segments from one end host to another.Ensures data reliability.
Organizing messages into segments or breaking large
segments into smaller segments.
Delivering segments to the recipients.
Providing error control.
Transport Layer
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
115/391
N+ Certification
Transport Layer (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
116/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Transmit
Buffer FullNot ReadyStopProcess
Segments
Buffer OK
ReadyGo
Resume Transmission
ReceiverSender
Transport Layer (Continued)
N+ Certification
Transport Layer (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
117/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Window Size = 1
Sender
Send 1 Receive 1
Receiver
Ack 2
Send 2 Receive 2
Ack 3
Sender
Send 1
Send 2Receive 1Receive 2
Receiver
Window Size = 3
Send 3 Receive 3Ack 4
Send 4
Transport Layer (Continued)
N+ Certification
Transport Layer (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
118/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Sender Receiver
Send 2Send 1
Send 3
Ack 4
Send 5
Send 4
Send 6
Ack 5
Send 5Ack 7
1 2 3 4 5 6 7 1 2 3 4 5 6 7
Transport Layer (Continued)
N+ Certification
Transport Layer To Network Layer
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
119/391
Copyright UTL Technologies Ltd 2011 All rights reserved
End-to-End Segments
Routed Packets
Transport Layer To Network Layer
N+ Certification
Session Layer
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
120/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Service Request
Service Reply
Establishes, manages, and terminates sessions between applications.
Session Layer
N+ Certification
Presentation Layer
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
121/391
Copyright UTL Technologies Ltd 2011 All rights reserved
ASCIIEBCDIC
Encrypted
Text Data
login:
PICTTIFF
JPEGGIF
Graphics Visual images
Sound
VideoMPEG
QuickTime
MIDI
Provides code formatting and conversion for applications.
Presentation Layer
N+ Certification
Application Layer
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
122/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Word Processor
Presentation Graphics
Spreadsheet
Database
Design/Manufacturing
Others
COMPUTERAPPLICATIONS
Electronic Mail
File Transfer
Remote Access
Client-Server Process
Network Management
Others
NETWORKAPPLICATIONS INTERNETWORK
APPLICATIONS
Electronic Data Interchange
World Wide Web
E-Mail Gateways
Special-Interest Bulletin Boards
Financial Transaction Services
Internet Navigation UtilitiesConferencing (Voice, Video, Data)
Others
Provides the interface between the user and the network.
Application Layer
N+ Certification
Functions of the OSI Layer
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
123/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Functions of the OSI Layer
N+ Certification
Summary
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
124/391
Copyright UTL Technologies Ltd 2011 All rights reserved
OSI reference model describes building blocks of functions for
program-to-program communications between similar ordissimilar hosts.
Summary
N+ Certification
What is Protocol?
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
125/391
Copyright UTL Technologies Ltd 2011 All rights reserved
A protocol is a set of established and agreed-upon rules
required to enable effective communication on a network.Protocols can either be developed by a vendor or by anetworking standard organization.
A protocol suite is a hierarchical collection of protocols.
Some of the protocol suites are:
TCP/IP Protocol SuiteIPX/SPX Protocol Suite
AppleTalk Protocol Suite
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
126/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Introduction to TCP/IP
(DoD Model)
N+ Certification
TCP/IP Model (DoD Model)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
127/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The DoD model is basically a condensed version of the OSI
model.Its composed of four, instead of seven, layers:
1) Process/Application layer
2) Host-to-Host layer (Transport layer)
3) Internet layer
4) Network Access layer
/ ( )
N+ Certification
Comparing The OSI Model and TCP/IP Model
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
128/391
Copyright UTL Technologies Ltd 2011 All rights reserved
p g /
N+ Certification
TCP/IP Protocol Suite
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
129/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Application Layer
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
130/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The TCP/IP protocol suite combines all application related
issues into one layer and ensure this data is properly packagedbefore passing it on to the next layer.
Handles high-level protocols, issues of representation, encoding,decoding and session control.
pp y
N+ Certification
Application Layer Protocols
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
131/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Host-to-Host Layer (Transport Layer)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
132/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The main purpose of the Host-to-Host layer is to shield the
upper- layer applications from the complexities of the network.
This layer says to the upper layer, Just give me your datastream, with any instructions, and Ill begin the process of gettingyour information ready to send.
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
133/391
N+ Certification
Internet Layer
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
134/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The purpose of the Internet layer is to send packets from a
network host and have them arrive at the destination nodeindependent of the path taken.
N+ Certification
Internet Layer Protocols
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
135/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Network Access Layer
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
136/391
Copyright UTL Technologies Ltd 2011 All rights reserved
.
The network access layer is concerned with all of the issues that an
IP packet requires to actually make a physical link to thetransmission media.
It includes the LAN and WAN technology details, and all the detailscontained in the OSI physical and data link layers.
N+ Certification
Network Access Layer Protocols
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
137/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
138/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Transmission Control Protocol
N+ Certification
Transmission Control Protocol (TCP)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
139/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Creates a reliable connection between two computers.
TCP is one of the main protocol in TCP/IP protocol suite.
Whereas the IP protocol deals only with packets, TCP enablestwo hosts to establish a connection and exchange streams of
data.
TCP guarantees delivery of data and also guarantees thatsegment will be delivered in the same order in which they weresent.
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
140/391
Copyright UTL Technologies Ltd 2011 All rights reserved
A packet in TCP is called a
segment.
Note:
N+ Certification
Key Features of TCP
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
141/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
TCP 3 way Handshake
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
142/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
TCP 3 way Handshake (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
143/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Stream delivery
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
144/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
TCP segment format
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
145/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Control field
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
146/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Description of flags
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
147/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Description of flags (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
148/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Encapsulation and decapsulation
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
149/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
A TCP Connection
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
150/391
Copyright UTL Technologies Ltd 2011 All rights reserved
TCP is connection-oriented.
A connection-oriented transport protocol establishes a virtualpath between the source and destination.
All of the segments belonging to a message are then sent overthis virtual path.
A connection-oriented transmission requires three phases:Connection establishment
Data transfer
Connection termination
N+ Certification
Connection establishment using three-way handshaking
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
151/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
152/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The bytes of data being transferred in
each connection are numbered by TCP.
The numbering starts with a randomlygenerated number.
Note:
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
153/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The value of the acknowledgment field
in a segment defines the number of the
next byte a party expects to receive.
Note:
N+ CertificationData transfer
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
154/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Connection termination using three-way handshaking
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
155/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Example1
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
156/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Suppose a TCP connection is transferring a file of 5000 bytes.
The first byte is numbered 10001. What are the sequencenumbers for each segment if data is sent in five segments, eachcarrying 1000 bytes?
Solution
The following shows the sequence number for each segment:
Segment 1 Sequence Number: 10,001 (range: 10,001 to 11,000)
Segment 2 Sequence Number: 11,001 (range: 11,001 to 12,000)
Segment 3 Sequence Number: 12,001 (range: 12,001 to 13,000)
Segment 4 Sequence Number: 13,001 (range: 13,001 to 14,000)
Segment 5 Sequence Number: 14,001 (range: 14,001 to 15,000)
N+ Certification
Aborting a connection
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
157/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ CertificationDenying a connection
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
158/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Error Control
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
159/391
Copyright UTL Technologies Ltd 2011 All rights reserved
TCP provides reliability using error control, which detects
corrupted, lost, out-of-order, and duplicated segments.
Error control in TCP is achieved through the use of thechecksum, acknowledgment, and time-out.
N+ Certification
N t
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
160/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Data may arrive out of order and be
temporarily stored by the receiving TCP, but
TCP guarantees that no out-of-ordersegment is delivered to the process.
Note:
N+ Certification
N t
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
161/391
Copyright UTL Technologies Ltd 2011 All rights reserved
In modern implementations, a
retransmission occurs if the
retransmission timer expires.
Note:
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
162/391
Copyright UTL Technologies Ltd 2011 All rights reserved
No retransmission timer is set for an
ACK segment.
Note:
N+ Certification
Normal operation
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
163/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Lost segment
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
164/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
165/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The receiver TCP delivers only ordered
data to the process.
Note:
N+ Certification
Fast retransmission
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
166/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Lost acknowledgment
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
167/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Flow Control & Congestion Control
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
168/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Flow control regulates the amount of data a source can send
before receiving an acknowledgment from the destination.
For that TCP defines a window size depending on the capabilityof receiving host.
Congestion control refers to the mechanisms and techniques to
keep the load below the capacity.
There are two algorithms for Congestion control in TCP:
slow start algorithm
congestion avoidance algorithm
N+ Certification
Slow start, exponential increase algorithm
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
169/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Note:
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
170/391
Copyright UTL Technologies Ltd 2011 All rights reserved
In the slow start algorithm, the size of
the congestion window increases
exponentially until it reaches athreshold.
Note:
N+ Certification
Congestion avoidance, additive increase algorithm
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
171/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Note:
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
172/391
Copyright UTL Technologies Ltd 2011 All rights reserved
In the congestion avoidance algorithm
the size of the congestion window
increases additively untilcongestion is detected.
Note:
N+ Certification
T k t k f ll th diff t t h i d i
State Transition
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
173/391
Copyright UTL Technologies Ltd 2011 All rights reserved
To keep track of all the different events happening during
connection establishment, connection termination, and datatransfer, the TCP software is implemented as a finite statemachine.
N+ Certification
User Datagram Protocol (UDP)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
174/391
Copyright UTL Technologies Ltd 2011 All rights reserved
UDP uses a simple transmission model without implicit hand-
shaking dialogues for providing reliability, ordering, or dataintegrity.
Thus, UDP provides an unreliable service and datagram's mayarrive out of order, appear duplicated, or go missing withoutnotice.
N+ Certification
Comparison of TCP and UDP
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
175/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Addresses in TCP/IP
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
176/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Three different levels of addresses are used in an internet:
Physical address (MAC Address)Logical address (IP Address)
Port Address (Port Numbers)
N+ Certification
Addresses in TCP/IP
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
177/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
TCP and the upper layers dont use MAC and IP addresses to
Port Numbers
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
178/391
Copyright UTL Technologies Ltd 2011 All rights reserved
TCP and the upper layers don t use MAC and IP addresses tounderstand the sending hosts address as the Data Link andNetwork layer protocols do. Instead, they use port numbers.
TCP and UDP must use port numbers to communicate with theupper layers because theyre what keep track of differentapplications' conversations crossing the network simultaneously.
Originating source port numbers are dynamically assigned bythe operating system of the source host and will equal somenumber starting at 1024.
These port numbers identify the source and destinationapplication or process in the TCP segment.
N+ Certification
The port numbers are divided into three ranges:
Port Numbers (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
179/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The port numbers are divided into three ranges:
Well Known PortsRegistered Ports
Dynamic or Private Ports
N+ Certification
The port numbers in the range from 0 to 1023 are the well-
Well Known Ports (01023)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
180/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The port numbers in the range from 0 to 1023 are the wellknown ports. They are used by system processes that provide
widely-used types of network services.
Registered Ports (102449151)
Dynamic or Private Ports (4915265535)
The ranges of port number from 1024 to 49151 are theregistered ports. They are assigned by IANA for specific service
upon application by a requesting entity.
The range above the registered ports contains dynamic or
private ports that cannot be registered with IANA. It is used forcustom or temporary purposes and for automatic allocation byoperating system.
N+ Certification
Relationship of layers and addresses in TCP/IP
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
181/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Example1
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
182/391
Copyright UTL Technologies Ltd 2011 All rights reserved
In Figure 2.18 a node with physical address 10 sendsa frame to a node with physical address 87. The two
nodes are connected by a link. At the data link level
this frame contains physical (link) addresses in the
header. These are the only addresses needed. The restof the header contains other information needed at
this level. The trailer usually contains extra bits
needed for error detection.
See Next Slide
N+ Certification
Figure 2.18 Physical addresses
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
183/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Example2
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
184/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Most local area networks use a 48-bit (6 bytes)physical address written as 12 hexadecimal digits,
with every 2 bytes separated by a colon as shown
below:
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
N+ Certification
Example3
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
185/391
Copyright UTL Technologies Ltd 2011 All rights reserved
In Figure 2.19 we want to send data from a node withnetwork address A and physical address 10, located on one
LAN, to a node with a network address P and physical
address 95, located on another LAN. Because the two devices
are located on different networks, we cannot use link
addresses only; the link addresses have only localjurisdiction. What we need here are universal addresses that
can pass through the LAN boundaries. The network (logical)
addresses have this characteristic.
See Next Slide
N+ Certification
Example3(Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
186/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The packet at the network layer contains the logicaladdresses, which remain the same from the original source to
the final destination (A and P, respectively, in the figure).
They will not change when we go from network to network.
However, the physical addresses will change as the packet
moves from one network to another. The boxes labeled routersare internetworking devices, which we will discuss later.
See Next Slide
N+ Certification
Figure 2.19 IP addresses
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
187/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
F 2 20 h l f l
Example5
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
188/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Figure 2.20 shows an example of transport layer
communication. Data coming from the upper layers
have port addresses j and k ( j is the address of the
sending process, and k is the address of the receiving
process). Since the data size is larger than the networklayer can handle, the data are split into two packets,
each packet retaining the service-point addresses ( j
and k). Then in the network layer, network addresses
(A and P) are added to each packet.
See Next Slide
N+ Certification
Example5(Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
189/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The packets can travel on different paths and arrive atthe destination either in order or out of order. The two
packets are delivered to the destination transport layer,
which is responsible for removing the network layer
headers and combining the two pieces of data fordelivery to the upper layers.
See Next Slide
N+ Certification
Figure 2.20 Port addresses
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
190/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Port No TCP UDP Protocol / Application Comment
Well Known Port Numbers
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
191/391
Copyright UTL Technologies Ltd 2011 All rights reserved
pp
20 FTP Data Transfer21 FTP Control Commands
22 Secure Shell (SSH) Secure Remote Login
23 TELNET Remote Login
25 SMTP Sending Mails
43 WHOIS Search WHOIS
Database
53 DNS Resolves Domain
Names
67 DHCP Server
68 DHCP Client
69 TFTP Insecure File Transfer
N+ Certification
Port No TCP UDP Protocol / Application Comment
Well Known Port Numbers (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
192/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Port No TCP UDP Protocol / Application Comment
80 HTTP Retrieving Web Pages88 Kerberos Authentication
110 POP3 Receiving Mails
123 Network Time Protocol Synchronize Time
137 NetBIOS Name Service Resolves NetBIOS
Names
138 NetBIOS Datagram
Service
139 NetBIOS Session Service
143 Internet Message Access
Protocol
Retrieving Mails
161 Simple Network
Management Protocol
Network Mgt.
N+ Certification
Port No TCP UDP Protocol / Application Comment
Well Known Port Numbers (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
193/391
Copyright UTL Technologies Ltd 2011 All rights reserved
179 BGP (Border GatewayProtocol) Routing Protocol forISPs
389 Lightweight Directory
Access Protocol
Directory Services
443 HTTPS HTTP Secure
445 Windows SMB FileSharing Service
File Sharing inWindows
500 Internet Security
Association and Key
Management Protocol
(ISAKMP)
Used in IPSec VPNs
514 Syslog Sending Log Messages
N+ Certification
Port No TCP UDP Protocol / Application Comment
Well Known Port Numbers (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
194/391
Copyright UTL Technologies Ltd 2011 All rights reserved
520 Routing InformationProtocol (RIP) Routing Protocol forSmall Networks
546 DHCPv6 client For IPv6 Addressing
547 DHCPv6 server For IPv6 Addressing
860 iSCSI For Accessing Storage
over the networks
N+ Certification
Port No TCP UDP Protocol / Application Comment
Registered Ports
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
195/391
Copyright UTL Technologies Ltd 2011 All rights reserved
1293 IPSec (Internet Protocol
Security)
Encrypting IP Packets
1503 Windows Live Messenger Chat Messenger
6891-
6900
Windows Live Messenger File Transfer
6901 Windows Live Messenger Voice Calls1645 RADIUS Authentication
Protocol
Default Port for Cisco
and Juniper Networks
RADIUS servers
1646 RADIUS Accounting
Protocol
Default for Cisco and
Juniper Networks
RADIUS servers
N+ Certification
Port No TCP UDP Protocol / Application Comment
Registered Ports (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
196/391
Copyright UTL Technologies Ltd 2011 All rights reserved
1755 Microsoft Media Services Media Services
1812 RADIUS Authentication
Protocol
Microsoft
Implementation
1813 RADIUS Accounting
Protocol
Microsoft
Implementation
2049 Network File System Available in Linux
3389 Microsoft Terminal Server Remote Desktop
Protocol
3544 Teredo Tunnelling IPv4 To IPv6 Tunnelling
5050 Yahoo! Messenger Chat Messenger
5060 Session Initiation
Protocol (SIP)
Used in Cisco VOIP
N+ Certification
Port No TCP UDP Protocol / Application Comment
Registered Ports (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
197/391
Copyright UTL Technologies Ltd 2011 All rights reserved
5355 LLMNR (Link-Local
Multicast Name
Resolution)
Allows hosts to
perform name
resolution for hosts on
the same local link
(only provided by
Windows Vista and
Server 2008)
7777 Windows Backdoor
Program tini.exe
Trojan Horse
19294,
19295,
19302
Google Talk Voice and
Video connections
Chat Messenger
N+ Certification
The combination of IP address and port number. e.g. 201.0.0.1:80
Socket
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
198/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Unicast: These are sent to a single destination host.
Unicast, Multicast and Broadcast
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
199/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Multicast: These are packets sent from a single source host andtransmitted to many devices on different networks.
Broadcast (layer 2): These are sent to all hosts on a LAN.
Broadcasts (layer 3): These are sent to all hosts on the network.
N+ Certification
A broadcast domain a logical division of a computer network, in
Broadcast Domain
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
200/391
Copyright UTL Technologies Ltd 2011 All rights reserved
b oadcas do a a og ca d s o o a co pu e e o ,
which all nodes can reach each other by broadcast at the data linklayer.
N+ Certification
In TCP/IP communications, a datagram (packet) on a local-area
ARP (Address Resolution Protocol )
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
201/391
Copyright UTL Technologies Ltd 2011 All rights reserved
, g (p )
network must contain both a destination MAC address and adestination IP address.
There needs to be a way to automatically map IP to MACaddress.
ARP associates an IP address with its MAC address. On a typicalphysical network, such as a LAN, each device on a link isidentified by a physical or MAC address that is usually imprintedon the NIC.
The TCP/IP suite has a protocol, called Address ResolutionProtocol (ARP), which can automatically obtain MAC addressesfor local transmission.
N+ Certification
Used b a sending host hen it kno s the IP address of the
Address Resolution Protocol (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
202/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Used by a sending host when it knows the IP address of the
destination but needs the MAC address.
N+ Certification
ARP operation
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
203/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Each device on a network maintains
Address Resolution Protocol (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
204/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Each device on a network maintains
its own ARP table.
A device that requires an IP andMAC address pair broadcasts an
ARP request.
If one of the local devices matchesthe IP address of the request, itsends back an ARP reply thatcontains its IP-MAC pair.
N+ Certification
ARP is a broadcast protocol every host on the network receives
Address Resolution Protocol (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
205/391
Copyright UTL Technologies Ltd 2011 All rights reserved
p y
the request.
Each host checks the request against its IP address the rightone responds.
N+ Certification
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
206/391
Copyright UTL Technologies Ltd 2011 All rights reserved
An ARP request is broadcast;
an ARP reply is unicast.
Note:
N+ Certification
Four cases using ARP
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
207/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
RARP finds the IP address for a machine that only knows its
RARP (Reverse Address Resolution Protocol)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
208/391
Copyright UTL Technologies Ltd 2011 All rights reserved
RARP finds the IP address for a machine that only knows its
MAC address.
N+ Certification
ARP and RARP
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
209/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
ICMP is a network protocol used for reporting errors that might
ICMP (Internet Control Message Protocol)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
210/391
Copyright UTL Technologies Ltd 2011 All rights reserved
p p g g
have occurred while transferring data packets over networks.
ICMP is designed for network diagnosis and to find out as to whatwent wrong in the data communication.
ICMP can be used to report:errors in the underlying communications of networkapplications.
availability of remote hosts.
Best known example of ICMP in practice is the ping utility,that uses ICMP protocol.
N+ Certification
ICMP In Action
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
211/391
Copyright UTL Technologies Ltd 2011 All rights reserved
When Host A sends a packet destined for Host B, the Lab_B routerwill send an ICMP destination unreachable message back to thesending device (Host A in this example).
N+ Certification
HTTP
Application Layer Protocols
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
212/391
Copyright UTL Technologies Ltd 2011 All rights reserved
FTPTFTP
TELNET
SSH
DNS
SMTPPOP
IMAP
N+ Certification
Web servers implement this protocol.
HTTP (Hyper Text Transport Protocol )
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
213/391
Copyright UTL Technologies Ltd 2011 All rights reserved
p p
The underlying protocol used by the World Wide Web.
HTTP defines how messages are formatted and transmitted,and what actions Web servers and browsers should take inresponse to various commands.
For example, when you enter a URL in your browser, thisactually sends an HTTP command to the Web server directing itto fetch and transmit the requested Web page.
N+ Certification
FTP protocol is used for downloading and uploading files over
FTP (File Transfer Protocol)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
214/391
Copyright UTL Technologies Ltd 2011 All rights reserved
p g p g
the Internet.
FTP works in the same way as HTTP for transferring Webpages from a server to a user's browser.
FTP is most commonly used to download a file from a serverusing the Internet or to upload a file to a server (e.g. uploading adocument file to a server).
N+ Certification
It can do nothing but send and receive files.
TFTP (Trivial File Transfer Protocol)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
215/391
Copyright UTL Technologies Ltd 2011 All rights reserved
TFTP has no directory-browsing abilities.
Theres no authentication as with FTP, so its insecure.
N+ Certification
It allows a user to remotely access the resources of anothers stem on the net ork
TELNET
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
216/391
Copyright UTL Technologies Ltd 2011 All rights reserved
system on the network.
Telnet is a text-mode type program.
Telnet is not secure.
N+ Certification
SSH (Secure Shell)
SSH is a network protocol that allows you to remotely accessthe resources of another system on the network
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
217/391
Copyright UTL Technologies Ltd 2011 All rights reserved
the resources of another system on the network.
Allows data to be exchanged using a secure channel betweentwo networked devices.
SSH was designed as a replacement for Telnet which send
information, notably passwords, in plaintext, rendering themsusceptible to packet analysis.
The encryption used by SSH is intended to provideconfidentiality and integrity of data over an unsecured network,
such as the Internet.
N+ Certification
A Domain Name Server (DNS) lookup is the conversion of adomain name into its respective IP address
DNS (Domain Name Service)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
218/391
Copyright UTL Technologies Ltd 2011 All rights reserved
domain name into its respective IP address.
Domain names are alphabetic, they're easier to remember.
The Internet however, is really based on IP addresses, Everytime you use a domain name, therefore, a DNS service must
translate the name into the corresponding IP address.
N+ Certification
For example, the domain name www.example.com mighttranslate to 198 105 232 4
DNS (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
219/391
Copyright UTL Technologies Ltd 2011 All rights reserved
translate to 198.105.232.4.
If one DNS server doesn't know how to translate a particulardomain name, it asks another one, and so on, until the correctIP address is returned.
N+ Certification
Domain name space
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
220/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Domain names and labels
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
221/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
FQDN
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
222/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Hierarchy of name servers
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
223/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
The domain name space (tree) is divided into two differentsections:
DNS In The Internet
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
224/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Generic domainsCountry domains
N+ Certification
DNS used in the Internet
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
225/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Generic domains
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
226/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Generic Domain Labels
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
227/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Generic Domain Labels (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
228/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Country Domains
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
229/391
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
In Linux and Windows, the nslookup utility can be used to
retrieve address/name mapping The following shows how we
Example3
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
230/391
Copyright UTL Technologies Ltd 2011 All rights reserved
retrieve address/name mapping. The following shows how we
can retrieve an address when the domain name is given.
$ nslookup india.comName: india.com
Address: 153.18.8.1
N+ Certification
Note:
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
231/391
Copyright UTL Technologies Ltd 2011 All rights reserved
DNS can use the services of UDP or
TCP using the well-known port 53.
N+ Certification
Every operating system has a hosts file.
The Hosts File
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
232/391
Copyright UTL Technologies Ltd 2011 All rights reserved
The hosts file stores information on where to find or locate aparticular computer on the network.
It basically maps hostnames or domain names to IP addresses.
One can think of it as the local system version of the DomainName System (DNS).
N+ Certification
Depending upon your operating system, the hosts file can befound at different locations:
The Hosts File (Continued)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
233/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Microsoft Windows \windows\system32\drivers\etc
Unix & Linux \etc
The hosts file can be tweaked to carry out a number of
interesting things:
Block certain websites.
Redirecting the user to an embarrassing website eachtime he enters the address of a regular website.
N+ Certification
SMTP is used for sending email messages.
SMTP (Simple Mail Transfer Protocol)
-
7/30/2019 Cnw n+ 3rd Dec 2012 Cnw Batch (2)
234/391
Copyright UTL Technologies Ltd 2011 All rights reserved
Most e-mail systems that send mail over the Internet use SMTPto send messages from one server to another; the messagescan then be retrieved with an e-mail client using either POP orIMAP.
In addition, SMTP is generally used to send messages from amail client to a mail server. This is why you need to specify boththe POP or IMAP server and the SMTP server when youconfigure your e-mail application.
N+ Certification
Note:
-
7/30/2019 Cn