SYSTEM ADMINISTRATION Chapter 7 TCP/IP. Overview (OSI Model Review) The OSI Model is a layered framework that provides structure for data communications.

Slides:



Advertisements
Similar presentations
Cisco 2 - Routers Perrine. J Page 14/30/2015 Chapter 10 TCP/IP Protocol Suite The function of the TCP/IP protocol stack is to transfer information from.
Advertisements

CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
CCNA 1 v3.1 Module 11 Review.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 2: Internet Protocols.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Computer Network protocols
Chapter Overview TCP/IP Protocols IP Addressing.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Data Communications and Networks
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
WXES2106 Network Technology Semester /2005 Chapter 4 TCP/IP CCNA1: Module 9, 10.3 and 11.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Chapter 9.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
SEED Infotech Pvt. Ltd. 1 Networking in Java. SEED Infotech Pvt. Ltd. 2 Objectives of This Session Describe issues related to any type of network using.
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
Semester 2v2 Chapter 9:  TCP/IP.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
Huda AL_Omairl - Network 71 Protocols and Network Software.
Network Services Networking for Home & Small Business.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
1 Version 3.0 Module 11 TCP Application and Transport.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
TCP/IP Transport and Application (Topic 6)
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Data Communications and Networks
TCP/IP (Transmission Control Protocol / Internet Protocol)
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Introduction Chapter 1. TCP/IP Reference Model Why Another Model? Although the OSI reference model is universally recognized, the historical and technical.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
Chapter 1 Introduction Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Networking for Home and Small Businesses – Chapter 6
Networking for Home and Small Businesses – Chapter 6
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
Week 5: Network Protocols Part 1
Networking Theory (part 2)
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
OSI Reference Model Unit II
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Networking Theory (part 2)
Presentation transcript:

SYSTEM ADMINISTRATION Chapter 7 TCP/IP

Overview (OSI Model Review) The OSI Model is a layered framework that provides structure for data communications. The Application layer services applications. Protocols such as DNS, FTP, TFTP, Telnet, SNMP, and SMTP function at this layer. The Presentation layer is responsible for character conversion, encryption/decryption, and compression/decompression. No TCP/IP protocols function at this layer. (continued)

Overview (OSI Model Review) (continued) The Session layer opens, maintains, and ends sessions, provides name-recognition services, and aids in reliable data delivery. No TCP/IP protocols function at this layer. The Transport layer guarantees delivery of packets to the destination, divides messages into packets and provides the sequencing services necessary to reassemble the message at delivery, requests retransmission when non-delivery errors occur, and manages flow-control between the source and destination nodes. TCP and UDP function at this layer. (continued)

Overview (OSI Model Review) (continued) The Network l ayer is responsible for logical addressing and the routing of packets through the internetwork. IP, UDP, ARP, RARP, and ICMP are part of this layer. Data Link layer responsibilities include converting packets into bits, and defining the access methods used to allow data to be transmitted and received. No TCP/IP protocols function at this layer. The Physical layer transmits data across the physical media, and sets standards for the physical components of a network such as cable, NICs, and repeaters. No TCP/IP protocols function at this layer.

TCP Transmission Control Protocol is a connection- oriented, reliable protocol that uses IP for transport. TCP guarantees delivery of packets through use of the checksum. TCP uses port identities to provide a logical connection between the source and destination nodes.

IP IP is the most basic of all the protocols in the TCP/IP suite because it is the transport protocol all other protocols rely on. IP delivers packets. It does not guarantee delivery. IP is a connectionless protocol.

UDP UDP is a connectionless protocol used to transport data. UDP uses some very basic error-checking methods to validate the delivery of the packets. UDP is commonly used for service protocols (and therefore, applications) because of its efficiency and lower overhead.

FTP FTP allows remote nodes to share files by providing the method to retrieve those files to a local machine. FTP uses TCP for transport. FTP has two components: the client (requestor) component, and the server (service provider) component. These two components can be configured on any type of machine because FTP does not look at the machine or the operating system. It is concerned only with the service availability. (continued)

FTP (continued) Access to files is controlled in one of two ways: using a user account and password for access; or using the Anonymous account. Both require that the appropriate permissions or rights be configured on the files. The Anonymous account requires a password that is an address. The bandwidth speed, congestion on the media, and the speed of the computer hosting FTP determine the speed of an FTP session. FTP uses many commands that allow the user to download files, upload files, change directories, and request a multiple-file download or upload. Other utilities are available to make the FTP process more user-friendly.

TFTP TFTP does many of the same things FTP does, but without the overhead of a TCP connection. TFTP uses UDP for efficient transport of files. TFTP is commonly used to access router configuration files and operating system files stored on a remote computer. Any node running the TCP/IP protocol can act either as a service provider or as a client.

SMTP SMTP is the protocol used to support the transfer of messages from one system to another over a TCP/IP connection. SMTP uses TCP to provide guaranteed delivery of the packets that form an message. Use of TCP connections allows an error message to be sent to the source node if delivery of the message cannot be completed. (continued)

SMTP (continued) POP3 is a protocol that runs on an server and allows messages to be stored on the server. POP3 assumes that the client will always use the same machine when requesting messages from the server POP3 requires a client to authenticate with a valid user name and password. It will then dynamically transmit all stored messages to the client machine. (continued)

SMTP (continued) POP3 holds conversations with the client and takes those conversations through three states: oAuthorization – readiness to service the client by validating the user name and password oTransaction – sends the waiting messages to the client machine, and takes care of deleting, sending, and forwarding any marked messages. oUpdate – closes the conversation with the client. POP3 assumes that the client will always use the same machine when requesting messages from the server

IMAP IMAP allows administrators to provide their users with the ability to access through a Web browser such as Internet Explorer or Netscape. IMAP does not require that the messages stored for a user account be downloaded to the client machine, but rather will store all messages on the e- mail server, carry out commands against those messages (delete, modify, reply), and continue to store messages for a client.

HTTP HTTP is a generic, stateless protocol that gives access to Internet resources without regard for the platform or operating system of the requesting node. HTTP forms the set of rules governing the transfer of files in text format, graphic image format, audio format, and video format. HTTP can access links to other files, which create additional requests for file transfer. Hypertext Markup Language (HTML) is the coding embedded within the HTTP request.

HTTPS HTTPS is an extension of the HTTP protocol. HTTPS uses Secure Sockets Layer to encrypt data and protect that data during transmission over public media. Multiple algorithms are available to encrypt data. The algorithm chosen is dependent on the security need. HTTPS requires the presence of a certificate provider such as Verisign or Microsoft Certificate Server.

TELNET Telnet is a terminal emulation protocol. Telnet allows users to access a remote node as if they were sitting at that node. A telnet session is initialized by typing “telnet resource-name” at a command prompt, or opening a HyperTerminal session if you are using a Microsoft Windows operating system. Telnet is frequently used to access router configurations and to make changes to those router configurations.

ICMP ICMP generates an error message when delivery of a packet cannot be completed. A destination unreachable error indicates that the router is unable to complete the delivery. Routers issue four types of destination unreachable messages: –Network-unreachable –Host-unreachable –Protocol-unreachable –Port-unreachable (continued)

ICMP (continued) The PING utility issues an echo-request message, which ICMP then takes to the destination address or next router. When that destination is reached, an echo-reply is issued to acknowledge that the path for the packet is good. To encourage more efficient routing, a router issues an ICMP redirect message. When the packet’s route exceeds the TTL on the packet, and the packet has not been delivered, the packet is discarded and an ICMP time-exceeded message is issued to the sending node.

ARP/RARP ARP allows a router to discover the MAC address of the destination node and deliver the packet to that node. ARP requests are broadcasts sent over the destination segment (based on the destination IP address in the header of the packet). The node holding the IP address will respond to the broadcast with its MAC address, thus allowing delivery of the packet. (continued)

ARP/RARP (continued) Most operating systems allow ARP caching. RARP is used when the MAC address is known, but the IP address has not been identified. Some operating systems do not allow RARP requests with default installations of the TCP/IP protocol ARP/RARP.

NTP NTP allows synchronization of computer clocks on a network, internetwork, or the Internet. Time synchronization is important to some applications, as well as to some operating systems that log events with a time marker. There are three functions for NTP servers: Client – requests time Server – provides time Peer – argues with other peers to come up with an agreed-upon time. NTP typically used one of two resources for the true time setting: United States Naval Observatory (USNO) or the National Institute for Standards and Technology (NIST).

TCP/UDP Ports A port is a logical entity that identifies a specific process on both a source and destination node: it is the endpoint in a logical connection. There are 65,535 ports, and those ports are grouped into three categories: Well-known ports – ; assigned to common services Registered ports – ; registered to vendors Dynamic and/or private ports – unassigned for dynamic usage