SlideShare a Scribd company logo
1 of 50
Chapter 6
Protocols

Networking Concepts – Eric Vanderburg ©2005
Communication
 Send

small pieces

 Lessen

impact from errors
 Minimize bandwidth usage
 Support maximum sending requirements

Networking Concepts – Eric
Vanderburg ©2005
Packets
 Header
 Source/Destination
 Sequence

number

 Priority

 Data

(Payload) – 50b-16kb
 Trailer
 Integrity

checking info

 Padding
Networking Concepts – Eric
Vanderburg ©2005
Packet Types
 Unicast

(one)

 Point-to-point

 Anycast

/ Broadcast (all)

 Destination

 Multicast

address is broadcast address

(group)

 Point-to-multipoint

communication
 Destination address is multicast address
 All computers with multicast address get
this message
Networking Concepts – Eric
Vanderburg ©2005
Protocols






Rules of communication
Protocol Suite – collection of protocols to operate at multiple
layers
Routable protocols – can operate at layer 3.
 TCP/IP
 IPX/SPX
 DECNet
 DDP (Datagram Delivery Protocol) – AppleTalk
 XNS - Xerox
Non-routable protocols
 NetBEUI
 DLC (Digital Loop Carrier) – for HP printers & IBM
mainframes
 LAT (Local Area Transport) DEC
Networking Concepts – Eric
Vanderburg ©2005
Connection
 Connection

Oriented (Statefull)

 More

reliable
 Slower (control & check data)
 TCP, FTP
 Connectionless

(Stateless)

 Less

reliable
 Faster
 UDP, TFTP, PPP
 Datagrams
Networking Concepts – Eric
Vanderburg ©2005
OSI and Protocols
 Application
 Application

Layer (7)
 Presentation Layer (6)
 Session Layer (5)
 Transport
 Transport

Layer (4)

 Network
 Network

Layer (3)
 Datalink Layer (2)
 Physical Layer (1)
Networking Concepts – Eric
Vanderburg ©2005
Application Protocols
 Application

to Application services

 SMTP

(Simple Mail Transport Protocol)
 FTP (File Transfer Protocol)
 SNMP (Simple Network Management
Protocol)
 NCP (NetWare Core Protocol) – client and
redirector
 AFP (AppleTalk File Protocol) – remote file
management
Networking Concepts – Eric
Vanderburg ©2005
Transport Protocols
 Handle

delivery between nodes

 TCP

(Transmission Control Protocol)
 SPX (Sequenced Packet Exchange)
 NetBIOS (Network Basic Input Output
System)

Networking Concepts – Eric
Vanderburg ©2005
Network Protocols
 Provides

“Link Services” that address, route,
and check for errors

 IPv6

(Internet Protocol version 6)
 IPv4 (Internet Protocol version 4)
 IPX (Internetwork Packet Exchange)
 NWLink
 NetBEUI (NetBIOS Extended User Interface)
Networking Concepts – Eric
Vanderburg ©2005
Protocol Suites
 TCP/IP
 IPX/SPX
 NetBIOS

/ NetBEUI
 AppleTalk
 DLC (Digital Loop Carrier)
 XNS (Xerox Network Systems)
 DECNet (Digital Equipment Corporation
Network)
 X.25 – WANS and connects terminals to
mainframes
Networking Concepts – Eric
Vanderburg ©2005
XNS





IDP (Internet Datagram Protocol) – Layer 2
RIP (Routing Information Protocol) – Layer 3
PEP (Packet Exchange Protocol) – Layer 4
SPP (Sequenced Packet Protocol)

Networking Concepts – Eric
Vanderburg ©2005
DECNet











RP (Routing Protocol)
MOP (Maintenance Operation Protocol) - uploading
and downloading system software, remote testing and
problem diagnosis
NSP (Network Service Protocol) - flow control
SCP (Session Control Protocol)
DAP (Data Access Protocol) – remote file access
CTERM (Command Terminal)
LAT (Local Area Transport)
STP (Spanning Tree Protocol) NIC bridging
LAVC (Local Area VAX Cluster)
Networking Concepts – Eric
Vanderburg ©2005
DECNet

Networking Concepts – Eric
Vanderburg ©2005
TCP/IP
 IP

– Connectionless, provides routing and
logical addressing
 ICMP (Internet Control Message Protocol) –
sends error messages, flow control
instructions, confirmations


Ping command

 ARP

(Address Resolution Protocol) –
associates an IP with a MAC
 TCP – fragmentation, reassembly, connection
setup & maintenance, sequencing
Networking Concepts – Eric
Vanderburg ©2005
TCP/IP
 UDP

– connectionless version of TCP,
used by NFS (Network File System) &
DNS
 FTP (File Transfer Protocol) – upload,
download, delete, move files
 Telnet – connect and control systems,
routers, & switches
 SMTP – operates at 3 upper layers, mail
Networking Concepts – Eric
Vanderburg ©2005
TCP/IP
 RIP

(Routing Information Protocol)

Distance vector – each router sends its routing
table to its neighbors, sends link costs also
 RIPv2 has better performance than RIP
 Use on smaller networks


 OSPF

(Open Shortest Path First)

Link-state routing – each router has partial map of
network. LSA (Link State Advertisement) is sent
through the network when a link goes up or down.
 Better on larger networks
 Requires more computations on each router


Networking Concepts – Eric
Vanderburg ©2005
IP Addresses






Class A - 0nnnnnnn hhhhhhhh hhhhhhhh hhhhhhhh
 First bit 0; 7 network bits; 24 host bits
 Initial byte: 0 - 127
 126 Class As exist (0 and 127 are reserved)
 16,777,214 hosts
Class B - 10nnnnnn nnnnnnnn hhhhhhhh hhhhhhhh
 First two bits 10; 14 network bits; 16 host bits
 Initial byte: 128 - 191
 16,384 Class Bs exist
 65,532 hosts
Class C - 110nnnnn nnnnnnnn nnnnnnnn hhhhhhhh
 First three bits 110; 21 network bits; 8 host bits
 Initial byte: 192 - 223
 2,097,152 Class Cs exist
 254 hosts
Networking Concepts – Eric
Vanderburg ©2005
IP Addresses




Class D - 1110mmmm mmmmmmmm mmmmmmmm
mmmmmmmm
 First four bits 1110; 28 multicast address bits
 Initial byte: 224 - 239
 Class Ds are multicast addresses
Class E - 1111rrrr rrrrrrrr rrrrrrrr rrrrrrrr
 First four bits 1111; 28 reserved address bits
 Initial byte: 240 - 255
 Reserved for experimental use

Networking Concepts – Eric
Vanderburg ©2005
IP Addresses


Register an IP




IANA (Internet Assigned Numbers Authority)

Private IP Address Ranges


Class "A" or 24Bit





Class "B" or 20 Bit









192.168.0.0 - 192.168.255.255/16 or /24
255.255.0.0 or 255.255.255.0

Requires NAT (Network Address Translation) to access the Internet

Auto-configured Addresses 169.254..




172.16.0.0 - 172.31.255.255/12 or /16
255.240.0.0 or 255.255.0.0

Class "C" or 16 Bit




10.0.0.0 - 10.255.255.255/8
Subnet Mask: 255.0.0.0

APIPA (Automatic Private IP Addressing)

Loopback Address 127… (localhost)
Networking Concepts – Eric
Vanderburg ©2005
CIDR
 Classless

Inter-Domain Routing
 Weakens boundaries between address
spaces.
 Specified by number of bits /24 denoting
the bits in the network address

Networking Concepts – Eric
Vanderburg ©2005
Subnetting
 Subnetting

– dividing an IP address
range into smaller networks (subnets)
 Subnet Mask – address that shows
which subnet a host belongs to
 Network

bits are 1’s
 Host bits are 0’s
 Each

network needs an address for the
network address and broadcast address
(all 1’s and all 0’s)
Networking Concepts – Eric
Vanderburg ©2005
Finding Host & Network Address
 Convert

from Decimal to Binary
 Compare Subnet Mask to IP in Binary
 Convert new Binary number to Decimal

Networking Concepts – Eric
Vanderburg ©2005
Subnetting
 Determine

needed hosts and networks
 Add 2 to needed networks
 Find power of 2 that is larger than the #
 Hosts is number of bits left over used in
power of 2 and subtract 2.

Networking Concepts – Eric
Vanderburg ©2005
Supernetting
 Combining

multiple IP addresses into a
larger network to support more hosts
than could be achieved separately
(synergy)
 Find how many binary digits it takes to
account for the number of IP’s you have
 If

the number of addresses is not equal to
the binary digit calc, use lower number and
some IPs will not be supernetted.
Networking Concepts – Eric
Vanderburg ©2005
NAT/PAT
 NAT

Lets an organization use Private IP’s
 Increases security
 Translates internal to external IP


 PAT

(Port Address Translation)

Maps internal IP’s to external IP and port number
 Used by most NATs


 Linux

VPN Masquerade – essentially NAT
services for Linux
Networking Concepts – Eric
Vanderburg ©2005
DHCP
 Dynamic

Host Configuration Protocol
 Gives IP addresses to clients as needed
 Scope, Reservations, & Exclusions
 Lease Length
 After

50% expired, try to renew

 Auto-configured

address used if no
assigned IP, good if DHCP goes down
or if no server is available
Networking Concepts – Eric
Vanderburg ©2005
MADCAP
 MADCAP

(Multicast Address Dynamic
Client Allocation Protocol)
 Gives multicast addresses to clients
 Multicast scope (class D)
 Scope, Reservations, & Exclusions
 Lease Length

Networking Concepts – Eric
Vanderburg ©2005
IPv6












Aka: IPNG (Internet Protocol Next Generation)
July 25, 1994 in RFC 1752, Core Protocols in 1998
128 bit address space instead of IPv4’s 32 bit address space
340,282,366,920,938,463,463,374,607,431,768,211,456
maximum possible addresses
Specified in Hex (4 Hex digits and :) in 8 sets
Leading 0 is omitted
First Set – Public topology (ISP, backbone), 48bits
Second Set – Site topology (business), 16bits
Third Set – Interface ID, 64bits
Security information, sender/receiver verification, & encryption in
each packet
Backward compatible

Networking Concepts – Eric
Vanderburg ©2005
DNS (Domain Name Service)

Networking Concepts – Eric
Vanderburg ©2005
DNS


Vendor Products


Windows DNS Server














BIND (Berkley Internet Name Domain)

Server Types




Active Directory Integrated
DDNS (Dynamic Domain Name Service)

Primary Server
Secondary Server
Caching Only Server
Forwarding Only Server (Slave)

FQDN (Fully Qualified Domain Name)
Zone – Specific DNS namespace, a server or servers can be
responsible for a zone
Reverse Lookup Zone – search for FQDN from IP

Networking Concepts – Eric
Vanderburg ©2005
DNS RRs (Resource Record)


SOA (Start of Authority) – First record, which server
manages this zone
@ IN SOA source_host email serial#



NS (Name Server) – Lists name servers in a domain.
Allows other NS’s to look up records in your zone.
Domain @ IN NS nameserver_host



A (Host) – Host to IP
hostname IN A IP_Address



PTR (Pointer) – FQDN to IP
owner ttl class PTR FQDN



CNAME – provides alternate hostnames (www)
alias IN CNAME hostname



MX (Mail Exchange)

domain IN MX priority mailserver_host

Networking Concepts – Eric
Vanderburg ©2005
Example DNS file

Networking Concepts – Eric
Vanderburg ©2005
Recursive, Iterative, & Caching

Networking Concepts – Eric
Vanderburg ©2005
NetBIOS, NetBEUI
 First

used in IBM’s PC-Net & later MS-Net
 Each computer has 15 character name and
one character for a service code
 NetBEUI created for OS/2 and LAN Manager
NetBIOS is for upper layers
 NetBEUI for layers 2-4


 Used

in early Windows systems as the default
protocol

Networking Concepts – Eric
Vanderburg ©2005
NetBIOS Service Codes
Common NetBIOS Names

Service That Registers the Name

<computer name>[00h]

Workstation (your NetBIOS Redirector)

<computer name>[03h]

Messenger(listens for messages sent to
your computer)

<computer name>[20h]

Server (Shares your resources to the
network)

<user name>[03h]

Messenger (listens for messages sent to
your logon ID)

<domain name>[1Dh]

Master Browser

<domain name>[1Bh]

Domain Master Browser

Name Cache (nbtstat –c)

Networking Concepts – Eric
Vanderburg ©2005
NBT
 NBT

(NetBIOS over
TCP/IP)
 Allows NetBIOS
names to be
translated to IP
addresses so that
they can be routed
across the network

Check the box
to enable NBT

Networking Concepts – Eric
Vanderburg ©2005
NetBIOS Node Types
B-Node (Broadcast Node)









Broadcast mode uses broadcasts only.
NetBIOS Name Cache
Broadcast a NetBIOS Name Query
Checking the LMHOSTS file
Checking a HOSTS file
Checking with a DNS server

P-Node(Peer-to-Peer Node)







NetBIOS Name Cache
Asking a NetBIOS Name Server
HOSTS file
DNS
Networking Concepts – Eric
Vanderburg ©2005
NetBIOS Node Types
M-Node(Mixed Node)









NetBIOS Name Cache
Broadcast a NetBIOS Name Query
Checking the LMHOSTS file
Asking a NetBIOS Name Server
Checking a HOSTS file
Checking with a DNS server

H-Node(Hybrid Node)









NetBIOS Name Cache
Asking a NetBIOS Name Server
Broadcast a NetBIOS Name Query
Checking the LMHOSTS file
Checking a HOSTS file
Checking with a DNS server
Networking Concepts – Eric
Vanderburg ©2005
Nbtstat switches
 -n

Lists the NetBIOS name registered by
the client
 -c Displays NetBIOS name cache.
 -R Manually reloads the NetBIOS name
cache using entries in the LMHOSTS file
with a #PRE parameter.

Networking Concepts – Eric
Vanderburg ©2005
Hosts file
Maps

NetBIOS names to IP
Addresses
 Works

on Windows and UNIX
 NT Location: %winroot
%system32driversetc
 Unix Location:- /etc/hosts
 File Name- HOSTS
 # is used for comments
Networking Concepts – Eric
Vanderburg ©2005
Example Hosts file
127.0.0.1 localhost
13.41.85.1 router
13.91.45.121 server1
13.91.45.122 server2
14.33.121.121 mcsunix # Solaris 10 machine
14.33.121.122 mail # Server 2003 Mail Server
189.11.121.11 sunshinemtn.com web # Web server

Networking Concepts – Eric
Vanderburg ©2005
LMHosts file


Maps NetBIOS names to IP Addresses













Location:- %winroot%system32driversetc
File Name- LMHOSTS

#PRE - A #PRE tag tells the computer to pre-load the entry to the name
cache during initialization or after the NBTSTAT -R command has been
issued at the command prompt. Entries of #PRE are static in the cache.
#DOM:[domain_name] - Indicates the computer is a domain controller.
#NOFNR - Avoids using NetBIOS name queries on older LAN manager
for UNIX environments.
#INCLUDE - Directs the system to the location of the central LMHOSTS
file
#BEGIN_ALTERNATE - Used in conjunction with the #INCLUDE file .
This entry marks the begining of entries that are alternative locations for
the central LMHOST file. If the first entry is unavailable.
#END ALTERNATE - End of alternative locations statement.
#MH - Multihomed computers that have more than one entry

Networking Concepts – Eric
Vanderburg ©2005
Example File
141.8.2.1 WKS-1
141.8.2.2 WKS-2 #PRE
141.8.2.3 PDC-1 #PRE
156.34.2.9 BDC-1 #PRE
141.8.2.10 Gateway-1 #MH
156.34.2.4 Gateway-1 #MH
156.34.2.7 Server-1 #PRE #INCLUDE
PDC-1Scriptslmhosts #BEGIN_ALTERNATE #INCLUDE
SERVER-1Scriptslmhosts #END_ALTERNATE

Networking Concepts – Eric
Vanderburg ©2005
SMB
 SMB

(Server Message Block)

 Sends

file lists
 Starts connection for LAN Manager
 Links Redirector and Server software
 Presentation layer

Networking Concepts – Eric
Vanderburg ©2005
IPX/SPX
 Used

on older Netware networks
 Requires all computers to use the same
frame type
 Has network address for communication
between computers

Networking Concepts – Eric
Vanderburg ©2005
NetWare
 Older

versions require IPX/SPX
 NCP (NetWare Core Protocol) - file &
print services for NetWare (similar to
Microsoft’s SMB)
 LIP (Large Internet Protocol) - negotiates
the largest packet size that can be used

Networking Concepts – Eric
Vanderburg ©2005
AppleTalk
 RTMP

(Routing Table Maintenance
Protocol)
 AURP (AppleTalk Update-Based
Routing)
 ADSP (Appletalk Data Stream Protocol)
 ZIP (Zone Information Protocol)
 AFP (AppleTalk Filing Protocol)
Networking Concepts – Eric
Vanderburg ©2005
AppleTalk

Networking Concepts – Eric
Vanderburg ©2005
Channel Access Methods
*Done at Layer 2 MAC sublayer
 Contention



CSMA/CD – check to see if anyone is using the line. If so, wait
random interval and try again. (Ethernet)
CSMA/CA – Send packet to tell other computers you are going to
send data. (reduces speed)








AppleTalk
Wireless

Switching – Data sent to same MAC at same time. Some
computers can be given higher priority (server)
Token Passing
Demand Priority – each asks intelligent hub for permission to
send data (raise hand)
Polling – allows priority, asks if there is data to send, same
limitations and advantages of token passing (IBM SNA networks)

Networking Concepts – Eric
Vanderburg ©2005

More Related Content

What's hot

Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocolssbmiller87
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOLKak Yong
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and routerAkmal Cikmat
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)NYversity
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer NetworksMukesh Chinta
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)Sri Prasanna
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scopeSanat Maharjan
 
Networking
NetworkingNetworking
NetworkingRashmi
 
Information Technology ITM1
Information Technology  ITM1Information Technology  ITM1
Information Technology ITM1Aram Mohammed
 
Computer networks
Computer networksComputer networks
Computer networksTej Kiran
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applicationsjajinekkanti
 

What's hot (20)

Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)
 
Chapter 6 - Networking
Chapter 6 - NetworkingChapter 6 - Networking
Chapter 6 - Networking
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Osi model
Osi modelOsi model
Osi model
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Unit 6 : Application Layer
Unit 6 : Application LayerUnit 6 : Application Layer
Unit 6 : Application Layer
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
 
Orientation to Computer Networks
Orientation to Computer NetworksOrientation to Computer Networks
Orientation to Computer Networks
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
Networking
NetworkingNetworking
Networking
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Information Technology ITM1
Information Technology  ITM1Information Technology  ITM1
Information Technology ITM1
 
Computer networks
Computer networksComputer networks
Computer networks
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 

Viewers also liked

PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015
PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015
PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015PeopleBrowsr
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart CityDr. Mazlan Abbas
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 

Viewers also liked (8)

OSCh21
OSCh21OSCh21
OSCh21
 
Networking
NetworkingNetworking
Networking
 
PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015
PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015
PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015
 
Samba
SambaSamba
Samba
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 

Similar to Networking Concepts Lesson 06 - Protocols - Eric Vanderburg

Networking Concepts Lesson 07 - Architectures - Eric Vanderburg
Networking Concepts Lesson 07 - Architectures - Eric VanderburgNetworking Concepts Lesson 07 - Architectures - Eric Vanderburg
Networking Concepts Lesson 07 - Architectures - Eric VanderburgEric Vanderburg
 
Normas y Estándares
Normas y EstándaresNormas y Estándares
Normas y Estándaresguestc07d512a
 
CCNA Routing and Switching Lesson 03 - TCP & IP - Eric Vanderburg
CCNA Routing and Switching Lesson 03 - TCP & IP - Eric VanderburgCCNA Routing and Switching Lesson 03 - TCP & IP - Eric Vanderburg
CCNA Routing and Switching Lesson 03 - TCP & IP - Eric VanderburgEric Vanderburg
 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolMohit Sharma
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxEric Vyncke
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfNetworkershome
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionKae Hsu
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
Gohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptxGohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptxJuvil2
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 

Similar to Networking Concepts Lesson 06 - Protocols - Eric Vanderburg (20)

Networking Concepts Lesson 07 - Architectures - Eric Vanderburg
Networking Concepts Lesson 07 - Architectures - Eric VanderburgNetworking Concepts Lesson 07 - Architectures - Eric Vanderburg
Networking Concepts Lesson 07 - Architectures - Eric Vanderburg
 
Normas y Estándares
Normas y EstándaresNormas y Estándares
Normas y Estándares
 
CCNA Routing and Switching Lesson 03 - TCP & IP - Eric Vanderburg
CCNA Routing and Switching Lesson 03 - TCP & IP - Eric VanderburgCCNA Routing and Switching Lesson 03 - TCP & IP - Eric Vanderburg
CCNA Routing and Switching Lesson 03 - TCP & IP - Eric Vanderburg
 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocol
 
Network.pptx
Network.pptxNetwork.pptx
Network.pptx
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
 
Chapter06
Chapter06Chapter06
Chapter06
 
Ccna pres
Ccna presCcna pres
Ccna pres
 
L6 6 lowpan
L6 6 lowpanL6 6 lowpan
L6 6 lowpan
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Hardware9
Hardware9Hardware9
Hardware9
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Gohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptxGohil-Network layer & Address Resolution Protocol.pptx
Gohil-Network layer & Address Resolution Protocol.pptx
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 

More from Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Networking Concepts Lesson 06 - Protocols - Eric Vanderburg

  • 1. Chapter 6 Protocols Networking Concepts – Eric Vanderburg ©2005
  • 2. Communication  Send small pieces  Lessen impact from errors  Minimize bandwidth usage  Support maximum sending requirements Networking Concepts – Eric Vanderburg ©2005
  • 3. Packets  Header  Source/Destination  Sequence number  Priority  Data (Payload) – 50b-16kb  Trailer  Integrity checking info  Padding Networking Concepts – Eric Vanderburg ©2005
  • 4. Packet Types  Unicast (one)  Point-to-point  Anycast / Broadcast (all)  Destination  Multicast address is broadcast address (group)  Point-to-multipoint communication  Destination address is multicast address  All computers with multicast address get this message Networking Concepts – Eric Vanderburg ©2005
  • 5. Protocols     Rules of communication Protocol Suite – collection of protocols to operate at multiple layers Routable protocols – can operate at layer 3.  TCP/IP  IPX/SPX  DECNet  DDP (Datagram Delivery Protocol) – AppleTalk  XNS - Xerox Non-routable protocols  NetBEUI  DLC (Digital Loop Carrier) – for HP printers & IBM mainframes  LAT (Local Area Transport) DEC Networking Concepts – Eric Vanderburg ©2005
  • 6. Connection  Connection Oriented (Statefull)  More reliable  Slower (control & check data)  TCP, FTP  Connectionless (Stateless)  Less reliable  Faster  UDP, TFTP, PPP  Datagrams Networking Concepts – Eric Vanderburg ©2005
  • 7. OSI and Protocols  Application  Application Layer (7)  Presentation Layer (6)  Session Layer (5)  Transport  Transport Layer (4)  Network  Network Layer (3)  Datalink Layer (2)  Physical Layer (1) Networking Concepts – Eric Vanderburg ©2005
  • 8. Application Protocols  Application to Application services  SMTP (Simple Mail Transport Protocol)  FTP (File Transfer Protocol)  SNMP (Simple Network Management Protocol)  NCP (NetWare Core Protocol) – client and redirector  AFP (AppleTalk File Protocol) – remote file management Networking Concepts – Eric Vanderburg ©2005
  • 9. Transport Protocols  Handle delivery between nodes  TCP (Transmission Control Protocol)  SPX (Sequenced Packet Exchange)  NetBIOS (Network Basic Input Output System) Networking Concepts – Eric Vanderburg ©2005
  • 10. Network Protocols  Provides “Link Services” that address, route, and check for errors  IPv6 (Internet Protocol version 6)  IPv4 (Internet Protocol version 4)  IPX (Internetwork Packet Exchange)  NWLink  NetBEUI (NetBIOS Extended User Interface) Networking Concepts – Eric Vanderburg ©2005
  • 11. Protocol Suites  TCP/IP  IPX/SPX  NetBIOS / NetBEUI  AppleTalk  DLC (Digital Loop Carrier)  XNS (Xerox Network Systems)  DECNet (Digital Equipment Corporation Network)  X.25 – WANS and connects terminals to mainframes Networking Concepts – Eric Vanderburg ©2005
  • 12. XNS     IDP (Internet Datagram Protocol) – Layer 2 RIP (Routing Information Protocol) – Layer 3 PEP (Packet Exchange Protocol) – Layer 4 SPP (Sequenced Packet Protocol) Networking Concepts – Eric Vanderburg ©2005
  • 13. DECNet          RP (Routing Protocol) MOP (Maintenance Operation Protocol) - uploading and downloading system software, remote testing and problem diagnosis NSP (Network Service Protocol) - flow control SCP (Session Control Protocol) DAP (Data Access Protocol) – remote file access CTERM (Command Terminal) LAT (Local Area Transport) STP (Spanning Tree Protocol) NIC bridging LAVC (Local Area VAX Cluster) Networking Concepts – Eric Vanderburg ©2005
  • 14. DECNet Networking Concepts – Eric Vanderburg ©2005
  • 15. TCP/IP  IP – Connectionless, provides routing and logical addressing  ICMP (Internet Control Message Protocol) – sends error messages, flow control instructions, confirmations  Ping command  ARP (Address Resolution Protocol) – associates an IP with a MAC  TCP – fragmentation, reassembly, connection setup & maintenance, sequencing Networking Concepts – Eric Vanderburg ©2005
  • 16. TCP/IP  UDP – connectionless version of TCP, used by NFS (Network File System) & DNS  FTP (File Transfer Protocol) – upload, download, delete, move files  Telnet – connect and control systems, routers, & switches  SMTP – operates at 3 upper layers, mail Networking Concepts – Eric Vanderburg ©2005
  • 17. TCP/IP  RIP (Routing Information Protocol) Distance vector – each router sends its routing table to its neighbors, sends link costs also  RIPv2 has better performance than RIP  Use on smaller networks   OSPF (Open Shortest Path First) Link-state routing – each router has partial map of network. LSA (Link State Advertisement) is sent through the network when a link goes up or down.  Better on larger networks  Requires more computations on each router  Networking Concepts – Eric Vanderburg ©2005
  • 18. IP Addresses    Class A - 0nnnnnnn hhhhhhhh hhhhhhhh hhhhhhhh  First bit 0; 7 network bits; 24 host bits  Initial byte: 0 - 127  126 Class As exist (0 and 127 are reserved)  16,777,214 hosts Class B - 10nnnnnn nnnnnnnn hhhhhhhh hhhhhhhh  First two bits 10; 14 network bits; 16 host bits  Initial byte: 128 - 191  16,384 Class Bs exist  65,532 hosts Class C - 110nnnnn nnnnnnnn nnnnnnnn hhhhhhhh  First three bits 110; 21 network bits; 8 host bits  Initial byte: 192 - 223  2,097,152 Class Cs exist  254 hosts Networking Concepts – Eric Vanderburg ©2005
  • 19. IP Addresses   Class D - 1110mmmm mmmmmmmm mmmmmmmm mmmmmmmm  First four bits 1110; 28 multicast address bits  Initial byte: 224 - 239  Class Ds are multicast addresses Class E - 1111rrrr rrrrrrrr rrrrrrrr rrrrrrrr  First four bits 1111; 28 reserved address bits  Initial byte: 240 - 255  Reserved for experimental use Networking Concepts – Eric Vanderburg ©2005
  • 20. IP Addresses  Register an IP   IANA (Internet Assigned Numbers Authority) Private IP Address Ranges  Class "A" or 24Bit    Class "B" or 20 Bit      192.168.0.0 - 192.168.255.255/16 or /24 255.255.0.0 or 255.255.255.0 Requires NAT (Network Address Translation) to access the Internet Auto-configured Addresses 169.254..   172.16.0.0 - 172.31.255.255/12 or /16 255.240.0.0 or 255.255.0.0 Class "C" or 16 Bit   10.0.0.0 - 10.255.255.255/8 Subnet Mask: 255.0.0.0 APIPA (Automatic Private IP Addressing) Loopback Address 127… (localhost) Networking Concepts – Eric Vanderburg ©2005
  • 21. CIDR  Classless Inter-Domain Routing  Weakens boundaries between address spaces.  Specified by number of bits /24 denoting the bits in the network address Networking Concepts – Eric Vanderburg ©2005
  • 22. Subnetting  Subnetting – dividing an IP address range into smaller networks (subnets)  Subnet Mask – address that shows which subnet a host belongs to  Network bits are 1’s  Host bits are 0’s  Each network needs an address for the network address and broadcast address (all 1’s and all 0’s) Networking Concepts – Eric Vanderburg ©2005
  • 23. Finding Host & Network Address  Convert from Decimal to Binary  Compare Subnet Mask to IP in Binary  Convert new Binary number to Decimal Networking Concepts – Eric Vanderburg ©2005
  • 24. Subnetting  Determine needed hosts and networks  Add 2 to needed networks  Find power of 2 that is larger than the #  Hosts is number of bits left over used in power of 2 and subtract 2. Networking Concepts – Eric Vanderburg ©2005
  • 25. Supernetting  Combining multiple IP addresses into a larger network to support more hosts than could be achieved separately (synergy)  Find how many binary digits it takes to account for the number of IP’s you have  If the number of addresses is not equal to the binary digit calc, use lower number and some IPs will not be supernetted. Networking Concepts – Eric Vanderburg ©2005
  • 26. NAT/PAT  NAT Lets an organization use Private IP’s  Increases security  Translates internal to external IP   PAT (Port Address Translation) Maps internal IP’s to external IP and port number  Used by most NATs   Linux VPN Masquerade – essentially NAT services for Linux Networking Concepts – Eric Vanderburg ©2005
  • 27. DHCP  Dynamic Host Configuration Protocol  Gives IP addresses to clients as needed  Scope, Reservations, & Exclusions  Lease Length  After 50% expired, try to renew  Auto-configured address used if no assigned IP, good if DHCP goes down or if no server is available Networking Concepts – Eric Vanderburg ©2005
  • 28. MADCAP  MADCAP (Multicast Address Dynamic Client Allocation Protocol)  Gives multicast addresses to clients  Multicast scope (class D)  Scope, Reservations, & Exclusions  Lease Length Networking Concepts – Eric Vanderburg ©2005
  • 29. IPv6            Aka: IPNG (Internet Protocol Next Generation) July 25, 1994 in RFC 1752, Core Protocols in 1998 128 bit address space instead of IPv4’s 32 bit address space 340,282,366,920,938,463,463,374,607,431,768,211,456 maximum possible addresses Specified in Hex (4 Hex digits and :) in 8 sets Leading 0 is omitted First Set – Public topology (ISP, backbone), 48bits Second Set – Site topology (business), 16bits Third Set – Interface ID, 64bits Security information, sender/receiver verification, & encryption in each packet Backward compatible Networking Concepts – Eric Vanderburg ©2005
  • 30. DNS (Domain Name Service) Networking Concepts – Eric Vanderburg ©2005
  • 31. DNS  Vendor Products  Windows DNS Server          BIND (Berkley Internet Name Domain) Server Types   Active Directory Integrated DDNS (Dynamic Domain Name Service) Primary Server Secondary Server Caching Only Server Forwarding Only Server (Slave) FQDN (Fully Qualified Domain Name) Zone – Specific DNS namespace, a server or servers can be responsible for a zone Reverse Lookup Zone – search for FQDN from IP Networking Concepts – Eric Vanderburg ©2005
  • 32. DNS RRs (Resource Record)  SOA (Start of Authority) – First record, which server manages this zone @ IN SOA source_host email serial#  NS (Name Server) – Lists name servers in a domain. Allows other NS’s to look up records in your zone. Domain @ IN NS nameserver_host  A (Host) – Host to IP hostname IN A IP_Address  PTR (Pointer) – FQDN to IP owner ttl class PTR FQDN  CNAME – provides alternate hostnames (www) alias IN CNAME hostname  MX (Mail Exchange) domain IN MX priority mailserver_host Networking Concepts – Eric Vanderburg ©2005
  • 33. Example DNS file Networking Concepts – Eric Vanderburg ©2005
  • 34. Recursive, Iterative, & Caching Networking Concepts – Eric Vanderburg ©2005
  • 35. NetBIOS, NetBEUI  First used in IBM’s PC-Net & later MS-Net  Each computer has 15 character name and one character for a service code  NetBEUI created for OS/2 and LAN Manager NetBIOS is for upper layers  NetBEUI for layers 2-4   Used in early Windows systems as the default protocol Networking Concepts – Eric Vanderburg ©2005
  • 36. NetBIOS Service Codes Common NetBIOS Names Service That Registers the Name <computer name>[00h] Workstation (your NetBIOS Redirector) <computer name>[03h] Messenger(listens for messages sent to your computer) <computer name>[20h] Server (Shares your resources to the network) <user name>[03h] Messenger (listens for messages sent to your logon ID) <domain name>[1Dh] Master Browser <domain name>[1Bh] Domain Master Browser Name Cache (nbtstat –c) Networking Concepts – Eric Vanderburg ©2005
  • 37. NBT  NBT (NetBIOS over TCP/IP)  Allows NetBIOS names to be translated to IP addresses so that they can be routed across the network Check the box to enable NBT Networking Concepts – Eric Vanderburg ©2005
  • 38. NetBIOS Node Types B-Node (Broadcast Node)        Broadcast mode uses broadcasts only. NetBIOS Name Cache Broadcast a NetBIOS Name Query Checking the LMHOSTS file Checking a HOSTS file Checking with a DNS server P-Node(Peer-to-Peer Node)      NetBIOS Name Cache Asking a NetBIOS Name Server HOSTS file DNS Networking Concepts – Eric Vanderburg ©2005
  • 39. NetBIOS Node Types M-Node(Mixed Node)        NetBIOS Name Cache Broadcast a NetBIOS Name Query Checking the LMHOSTS file Asking a NetBIOS Name Server Checking a HOSTS file Checking with a DNS server H-Node(Hybrid Node)        NetBIOS Name Cache Asking a NetBIOS Name Server Broadcast a NetBIOS Name Query Checking the LMHOSTS file Checking a HOSTS file Checking with a DNS server Networking Concepts – Eric Vanderburg ©2005
  • 40. Nbtstat switches  -n Lists the NetBIOS name registered by the client  -c Displays NetBIOS name cache.  -R Manually reloads the NetBIOS name cache using entries in the LMHOSTS file with a #PRE parameter. Networking Concepts – Eric Vanderburg ©2005
  • 41. Hosts file Maps NetBIOS names to IP Addresses  Works on Windows and UNIX  NT Location: %winroot %system32driversetc  Unix Location:- /etc/hosts  File Name- HOSTS  # is used for comments Networking Concepts – Eric Vanderburg ©2005
  • 42. Example Hosts file 127.0.0.1 localhost 13.41.85.1 router 13.91.45.121 server1 13.91.45.122 server2 14.33.121.121 mcsunix # Solaris 10 machine 14.33.121.122 mail # Server 2003 Mail Server 189.11.121.11 sunshinemtn.com web # Web server Networking Concepts – Eric Vanderburg ©2005
  • 43. LMHosts file  Maps NetBIOS names to IP Addresses          Location:- %winroot%system32driversetc File Name- LMHOSTS #PRE - A #PRE tag tells the computer to pre-load the entry to the name cache during initialization or after the NBTSTAT -R command has been issued at the command prompt. Entries of #PRE are static in the cache. #DOM:[domain_name] - Indicates the computer is a domain controller. #NOFNR - Avoids using NetBIOS name queries on older LAN manager for UNIX environments. #INCLUDE - Directs the system to the location of the central LMHOSTS file #BEGIN_ALTERNATE - Used in conjunction with the #INCLUDE file . This entry marks the begining of entries that are alternative locations for the central LMHOST file. If the first entry is unavailable. #END ALTERNATE - End of alternative locations statement. #MH - Multihomed computers that have more than one entry Networking Concepts – Eric Vanderburg ©2005
  • 44. Example File 141.8.2.1 WKS-1 141.8.2.2 WKS-2 #PRE 141.8.2.3 PDC-1 #PRE 156.34.2.9 BDC-1 #PRE 141.8.2.10 Gateway-1 #MH 156.34.2.4 Gateway-1 #MH 156.34.2.7 Server-1 #PRE #INCLUDE PDC-1Scriptslmhosts #BEGIN_ALTERNATE #INCLUDE SERVER-1Scriptslmhosts #END_ALTERNATE Networking Concepts – Eric Vanderburg ©2005
  • 45. SMB  SMB (Server Message Block)  Sends file lists  Starts connection for LAN Manager  Links Redirector and Server software  Presentation layer Networking Concepts – Eric Vanderburg ©2005
  • 46. IPX/SPX  Used on older Netware networks  Requires all computers to use the same frame type  Has network address for communication between computers Networking Concepts – Eric Vanderburg ©2005
  • 47. NetWare  Older versions require IPX/SPX  NCP (NetWare Core Protocol) - file & print services for NetWare (similar to Microsoft’s SMB)  LIP (Large Internet Protocol) - negotiates the largest packet size that can be used Networking Concepts – Eric Vanderburg ©2005
  • 48. AppleTalk  RTMP (Routing Table Maintenance Protocol)  AURP (AppleTalk Update-Based Routing)  ADSP (Appletalk Data Stream Protocol)  ZIP (Zone Information Protocol)  AFP (AppleTalk Filing Protocol) Networking Concepts – Eric Vanderburg ©2005
  • 49. AppleTalk Networking Concepts – Eric Vanderburg ©2005
  • 50. Channel Access Methods *Done at Layer 2 MAC sublayer  Contention   CSMA/CD – check to see if anyone is using the line. If so, wait random interval and try again. (Ethernet) CSMA/CA – Send packet to tell other computers you are going to send data. (reduces speed)       AppleTalk Wireless Switching – Data sent to same MAC at same time. Some computers can be given higher priority (server) Token Passing Demand Priority – each asks intelligent hub for permission to send data (raise hand) Polling – allows priority, asks if there is data to send, same limitations and advantages of token passing (IBM SNA networks) Networking Concepts – Eric Vanderburg ©2005