Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.

Slides:



Advertisements
Similar presentations
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Advertisements

SCSC 455 Computer Security Virtual Private Network (VPN)
WAN Technologies Dial-up modem connections Cheap Slow
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Chapter Three Network Protocols.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Network Protocols and Standards (Part 1). Network Protocols Understanding the concepts of networking protocols is critical to being able to troubleshoot.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Windows Server 2008 Chapter 9 Last Update
1 Chapter Overview Understanding the Windows 2000 Networking Architecture Using Microsoft Management Console.
TC 361 Data Networking Test Review
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
CHAPTER Protocols and IEEE Standards. Chapter Objectives Discuss different protocols pertaining to communications and networking.
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
Introducing Protocols
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
Defining Network Protocols Introduction to Protocols TCP/IP NetWare Protocols Other Common Protocols 1.
Section 5.1 Explain why standards are necessary for networking
Network Protocols ©Richard L. Goldman September 18, 2001.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Point-to-Point Tunneling Protocol [PPTP] Team: Invincibles Deepak Tripathi Habibeh Deyhim Karthikeyan Gopal Satish Madiraju Tusshar RakeshNLN.
Infrastructure in Teleradiology CONTENT 1. Introduction 2. Overview of Data Communication 3. Local Area Network 4. Wide Area Network 5. Emerging Technology.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, September 2011.
Module 5: Configuring Access for Remote Clients and Networks.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
Addressing Through the Layers  Data Link Layer Address  Network Layer Address.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
1 Chapter Overview Understanding the TCP/IP protocol suite Configuring and troubleshooting TCP/IP Installing, configuring, and troubleshooting NWLink Understanding.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
Network Programming Chapter 1 Networking Concepts and Protocols.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Networking Protocols John R. Durrett ISQS 6343 #1.
Mr C Johnston ICT Teacher G055 - Lecture 10 Network Protocols.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 44 – Exploring Network Properties.
LAN Protocols Chapter 5. Learning Objectives Explain the following LAN protocols and how they work with network operating systems: IPX/SPX, NetBEUI, AppleTalk,
Virtual Private Network (VPN)
VPN: Virtual Private Network
Chapter Three Network Protocols.
Examining Network Protocols
DATA COMMUNICATION Lecture-10.
Virtual Private Network (VPN)
Goals Introduce the Windows Server 2003 family of operating systems
VPN: Virtual Private Network
OSI Reference Model Kashif Ishaq.
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Virtual Private Network zswu
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Examining Network Protocols

Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote Access Protocols

 Introduction to Protocols Types of Protocols Open Systems Interconnection (OSI) Reference Model Protocol Stacks

Types of Protocols Open Protocols Internet TCP/IP Vendor-Specific Protocols IPX/SPX

Open Systems Interconnection (OSI) Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer

Protocol Stacks Application Protocols Transport Protocols Network Protocols Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Protocols Transport Protocols Network Protocols

 Protocols and Data Transmissions Routable/Non-Routable Protocols Types of Data Transmission

Routable/Non-Routable Protocols Routable Protocols TCP/IP Router Non-Routable Protocols NetBEUI Router

Types of Data Transmissions BroadcastUnicast Multicast

 Common Protocols Transmission Control Protocol/Internet Protocol (TCP/IP) Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) NetBIOS Enhanced User Interface (NetBEUI) AppleTalk

Transmission Control Protocol/Internet Protocol (TCP/IP) Routed Network Environment Segment 1Segment 2 TCP/IP Windows Client Router

Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) Routed Network Environment Segment 1Segment 2 IPX/SPX NetWare Client Windows 2000 Server Router

NetBIOS Enhanced User Interface (NetBEUI) Routed Network Environment Segment 1Segment 2 NetBEUI Windows Client Router NetBEUI Routed Network Environment Segment 1Segment 2 Windows Client NetBEUI Router

AppleTalk Routed Network Environment Segment 1Segment 2 AppleTalk Macintosh Client Windows 2000 Server Router

 Other Communication Protocols Asynchronous Transfer Mode (ATM) Infrared Data Association (IrDA)

Asynchronous Transfer Mode (ATM) Transmission of Video, Audio, or Data by Using ATM ATM Switch

Infrared Data Association (IrDA) Wireless Communication by Using IrDA Windows Client Mouse Laptop

 Remote Access Protocols Dial-up Protocols VPN Protocols

Dial-up Protocols Remote Access Server Windows 2000 Server Remote Access Client Windows 2000 Professional TCP/IP PPP TCP/IP PPP NetBEUI TCP/IP or IPX/SPX PPP NetBEUI TCP/IP or IPX/SPX PPP TCP/IP SLIP TCP/IP SLIP UNIX SLIP Server Local Area Network Remote Access Server Windows 2000 Server Internet

VPN Protocols Internetwork must be IP-based Header compression No tunnel authentication Uses MPPE encryption PPTPPPTP Internetwork can be IP, frame relay, X.25, or ATM-based Header compression Tunnel authentication Uses IPSec encryption L2TPL2TP Ensures data security in IP-based communications Can be used by both PPTP and L2TPIPSecIPSec Remote Access Client Remote Access Server TCP/IP, IPX/SPX, NetBEUI traffic PPTP or L2TP

Review Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote Access Protocols