Download presentation
Presentation is loading. Please wait.
1
Y …AL FIN…. TCP/IP
2
Network Interface Layer
THE TCP/IP PROTOCOL SUITE Application Layer Transport Layer Internet Layer Network Interface Layer HTTP, HTTPS, POP/IMAP SMTP, TFTP, TELNET, NTP Application Layer Transport Layer UDP TCP Internet Layer IP ICMP IGMP ARP Network Interface Layer Ethernet ATM
3
TRANSMISSION CONTROL PROTOCOL
IP ICMP IGMP ARP UDP TCP
4
USER DATAGRAM PROTOCOL
UDP TCP IP ICMP IGMP ARP
5
INTERNET PROTOCOL Router UDP TCP IP ICMP IGMP ARP
6
INTERNET CONTROL MESSAGE PROTOCOL
UDP TCP IP ICMP IGMP ARP Router
7
INTERNET GROUP MANAGEMENT PROTOCOL
UDP TCP IP ICMP IGMP ARP
8
ARP B A C UDP TCP IP ICMP IGMP ADDRESS RESOLUTION PROTOCOL 1 5 2 3 6 4
Cache 2 1 4 6 5 1. ARP cache is checked 2. ARP request is sent 3. ARP entry is added 4. ARP reply is sent 5. ARP entry is added 6. IP packet is sent 3
9
Network Interface Layer
THE TCP/IP PROTOCOL SUITE Application Layer Transport Layer Internet Layer Network Interface Layer HTTP, HTTPS, POP/IMAP SMTP, TFTP, TELNET, NTP Application Layer Transport Layer UDP TCP Internet Layer IP ICMP IGMP ARP Network Interface Layer Ethernet ATM
10
Data Flow UDP TCP FTP HTTP IP ICMP IGMP ARP Ethernet ATM Data Internet
Preamble Data CRC IP ICMP IGMP ARP Ethernet ATM Transport Data UDP TCP FTP HTTP Application Data FTP HTTP Data UDP TCP FTP HTTP Preamble Internet Transport Application Data CRC FTP HTTP Data IP ICMP IGMP ARP Ethernet ATM Data Ethernet ATM Data UDP TCP IP ICMP IGMP ARP
11
FTP COMMANDS Command Purpose ls Lists the files in the current directory. cd Changes the working directory on the remote host. lcd Changes the working directory on the local host. put Uploads a single file to the remote host. get Downloads a single file from the remote host. mput Uploads multiple files to the remote host. mget Downloads multiple files from the remote host. binary Switches transfers into binary mode. ascii Switches transfers into ASCII mode (the default).
12
TCP/IP PROTOCOL SUITE SUMMARY
Full Name Description OSI Layer IP Internet Protocol Connectionless protocol used for moving data around a network. Network TCP Transmission Control Protocol Connection-oriented protocol that offers flow control, sequencing, and retransmission of dropped packets. Transport UDP User Datagram Protocol Connectionless alternative to TCP that is used for applications that do not require the functions offered by TCP. FTP File Transfer Protocol Protocol for uploading and downloading files to and from a remote host; also accommodates basic file-management tasks. Application TFTP Trivial File Transfer Protocol File transfer protocol that does not have the security or error-checking capabilities of FTP; uses UDP as a transport protocol and is therefore connectionless. SMTP Simple Mail Transfer Protocol Mechanism for transporting across networks. HTTP Hypertext Transfer Protocol Protocol for retrieving files from a Web server. HTTPS Hypertext Transfer Protocol Secure Secure protocol for retrieving files from a Web server. POP/IMAP Post Office Protocol/Internet Message Access Protocol Used for retrieving from a server on which the mail is stored. Telnet Allows sessions to be opened on a remote host. ICMP Internet Control Message Protocol Used for error reporting, flow control, and route testing. ARP Address Resolution Protocol Resolves IP addresses to MAC addresses, to enable communication between devices. NTP Network Time Protocol Used to communicate time synchronization information between devices.
13
TCP/UDP PORT FUNCTIONS
Protocol Port Assignment TCP/UDP Service FTP 21 TCP SSH 22 Telnet 23 SMTP 25 DNS 53 UDP TFTP 69 HTTP 80 TCP/UDP POP3 110 NNTP 119 NTP 123 IMAP4 143 SNMP 161 HTTPS 443
14
NETWORK SERVICES: DHCP DNS NAT ICS SNMP WINS
15
Configuring TCP/IP to Obtain an IP Address Automatically
DHCP Automatically Assigns IP Addresses and Other Configuration Information to DHCP Clients Automatic Private IP Addressing Enables the Configuration of IP Addresses Without Using Static IP Addresses or Installing the DHCP Server Service. Request for IP address Yes please! ip Lo quieres? Tomalo! Actualizo tabla Kimberly, the or has to be in the same build as “If no IP Address returned, and the second (bottom 2) has to come after the blue arrow pointing to it. DHCP Client DHCP Server OR Automatic Private IP Addressing Generates IP Address If No DHCP is Available
16
Domain Naming Domain Name (example.microsoft.com)
Top-level domain (com) Second-level domain (microsoft.com) Subdomain (example.microsoft.com) com example.microsoft.com microsoft.com
17
NAT Internet 192.168.0.10 w1.x1.y1.z1 w2.x2.y2.z2 Web Browser NAT
Web Server
18
Host Names NetBIOS Names
TYPES OF NAMES Host Names Assigned to a computer’s IP address 255 characters in length Can contain alphabetic and numeric characters, hyphens, and periods Can take various forms Alias Domain name 16-byte address Used to represent a single computer or group of computers 15 of the characters may be used for the name 16th character is used by the services that a computer offers to the network NetBIOS Names
19
Hosts File Lmhosts File
STATIC IP MAPPING Provides name resolution for host names to IP addresses Multiple host names can be assigned to the same IP address Entries are case sensitive Hosts File Provides name resolution for NetBIOS names to IP addresses A part of the Lmhosts file is pre-loaded into memory Lmhosts File
20
DYNAMIC IP MAPPING DNS is a system for naming computers and network services DNS naming system is organized in a hierarchical fashion Maps domain names to IP address Mapping records are stored on a DNS server DNS Server Provides a distributed database for registering dynamic mappings of NetBIOS names WINS maps NetBIOS names to IP addresses WINS Server
21
NetBIOS Name Resolution Host Name Resolution
Enter Command 1 Local Host Name 2 DNS Server 4 WINS Server 6 LMHOSTS File 8 NetBIOS Name Cache 5 HOSTS 3 7 Broadcast Host Name Resolution NetBIOS Name Cache 2 WINS Server 3 Broadcast 4 DNS Server 7 HOSTS File 6 LMHOSTS 5 Enter Command 1 NetBIOS Name Resolution NAME RESOLUTION Enter Command 1 Local Host Name 2 DNS Server 4 WINS Server 6 LMHOSTS File 8 NetBIOS Name Cache 5 HOSTS 3 7 Broadcast Host Name Resolution NetBIOS Name Resolution
22
IP ADDRESSING IPv4 SUBNETTING
23
NO MORE SUBNETTING!!!!
24
IPv6 USES 8 OCTECT ADDRESSING = 128 BITS IS EXPRESSED IN 8 CUARTETS OF HEXADECIMAL NUMBERS YELDS TO E POSSIBLE ADDRESSES
25
DEFAULT GATEWAYS MEANS BY WHICH A DEVICE CAN ACCESS HOSTS OR DEVICES IN OTHER NETWORKS EACH HOST MUST DECIDE IF A PACKET IS REMOTE OR LOCAL DO NOT CONFUSE DEFAULT GATEWAY WITH THE GATEWAY DEVICE
26
Class Mask Address Range Default Subnet
PUBLIC AND PRIVATE NETWORKS RESERVED PRIVATE NETWORKS Class Mask Address Range Default Subnet A – B – C –
27
PRACTICE EXAM
28
What is the function of ARP?
A. It resolves IP addresses to MAC addresses. B. It resolves NetBIOS names to IP addresses. C. It resolves WINS addresses to DNS addresses. D. It resolves hostnames to IP addresses.
29
The correct answer is A. The function of ARP is to resolve IP addresses to MAC addresses. Answer B is incorrect; the responsibility for resolving NetBIOS names to IP addresses is a function of WINS. Answer C is invalid. Resolving hostnames to IP addresses is a function of DNS, thus, answer D is incorrect.
30
As the network administrator you decide to block port 80
As the network administrator you decide to block port 80. Which of the following services will be unavailable for network users? A. DNS B. POP3 C. FTP D. HTTP
31
The correct answer is D. This is correct because the HTTP service uses port 80, so blocking port 80 will prevent users from using the HTTP service. Answer A is incorrect as DNS uses port 53; answer B is also incorrect, as POP3 uses port 110, and finally FTP (answer C) is incorrect as it uses port 21.
32
Which of the following addresses is a Class B address?
33
The correct answer is A. Class B addresses fall into the range 128 to 191. Therefore, answer A is the only one of the addresses listed that falls into that range. Answer B is a Class A address, and answers C and D are both Class C IP addresses.
34
You are the administrator of a small organization
You are the administrator of a small organization. All the workstations used in the office are Windows-based systems, and the server is a Windows 2000 Server system. Presently, the only Internet access is from a single PC that uses a modem, but your manager has asked you to get cable Internet access and share the connection with all the other workstations on the network. Which of the following services might you use to accomplish this? A. SNMP B. ICS C. DNS D. WINS
35
The correct answer is B. Answer B is correct, as ICS allows a single Internet connection to be shared among multiple computers. None of the other services mentioned are used to share an Internet connection.
36
Which of the following port ranges is described as "well known"?
A. 0 to 1023 B to 49151 C to 65535 D to 78446
37
The correct answer is A. Answer A is correct, as well-known ports are defined in the range 0 to None of the other answers are referred to as the well-known ports.
38
You are called into troubleshoot a problem whereby two workstations on a network are unable to resolve hostnames to IP address. The network does not use a DNS server. What can you do to correct the problem? A. Edit the LMHOSTS file on the server. B. Edit the LMHOSTS file on the workstations. C. Edit the HOSTS file on the server. D. Edit the HOSTS file on the workstations.
39
The correct answer is D. Answer D is correct as the HOSTS file on workstations can be used to resolve hostnames to the IP address when a DNS server is not used in a network. Answers A and B are incorrect as LMHOSTS is a text file used to manually configure NetBIOS to IP resolution. Answer C is incorrect as the HOSTS file resides on the workstations.
40
You have been tasked with temporarily disabling Telnet access for external users. Which is the best way to accomplish this? A. Block port 53 on the corporate firewall. B. Block port 23 on the corporate firewall. C. Uninstall the Telnet service. D. Configure ICS to ignore client-initiated Telnet requests.
41
The correct answer is B. By blocking port 23, you can disable the Telnet service. Answer A is incorrect as port 53 is used by DNS. Uninstalling the Telnet service (answer C) is not a practical solution and D is an invalid answer.
42
Which of the following layer 4 protocols is used to provide connectionless service?
A. UDP B. TCP C. IP D. FTP
43
The correct answer is A. Answer A is correct; UDP provides connectionless service and operates at layer 4 or the transport layer of the OSI model. TCP also operates at layer 4 but provides connection-oriented service. None of the other options function at the transport layer.
44
Which of the following protocols provides the security for HTTPS?
A. HTTP B. SSL C. Telnet D. TCP
45
The correct answer is B. Answer B is correct as the secure socket layer protocol is used to provide security for HTTPS. None of the other answers are valid.
46
Which of the following best describes the function of the default gateway?
A. Provides the route for destinations outside of the local subnet. B. Allows a single Internet connection to be used by several users. C. Identifies the local subnet and formulates a routing table. D. Used to communicate in a multiple-platform environment.
47
The correct answer is A. The default gateway allows systems on one local subnet to access those on another. None of the other descriptions define the function of a default gateway.
48
CHAPTER 6 OBJECTIVES WAN TECHNOLOGIES REMOTE ACCESS SECURITY PROTOCOLS
49
WAN TECHNOLOGIES: DIAL UP MODEM CONECTIONS ASYNCRONOUS SYNCRONOUS
50
INTEGRATED SERVICES DIGITAL NETWORK (ISDN) BRI PRI
Characteristic PRI BRI Speed 1.544Mbps 128Kbps Channels 23B+D 2B+D Transmission carrier T1 PSTN
51
T CARRIER LINES FDDI ATM X25 FRAME RELAY SONET/OC-X LEVELS
52
T-carrier lines
53
Transmission rates in terms of Optical Carrier (OC)
Optical Level Electrical Level Line Rate (Mbps) Payload Rate (Mbps) Overhead Rate (Mbps) SDH Equivalent OC-1 STS-1 51.840 50.112 1.728 - OC-3 STS-3 5.184 STM-1 OC-9 STS-9 15.552 STM-3 OC-12 STS-12 20.736 STM-4 OC-18 STS-18 31.104 STM-6 OC-24 STS-24 41.472 STM-8 OC-36 STS-36 62.208 STM-13 OC-48 STS-48 82.944 STM-16 OC-96 STS-96 STM-32 OC-192 STS-192 STM-64
54
Fiber Distributed Data Interface
Secondary Ring Primary Ring Characteristics Description Access Method Token passing Transfer Speed Fiber-optic at 155 Mbps to 622 Mbps
55
Asynchronous Transfer Mode
ATM Switch Cell Characteristics Description Access Method Point-to-point. Transfers fixed-sized packets from one computer to another through ATM switching equipment Transfer Speed Fiber-optic at 155 Mbps to 622 Mbps
56
X.25 X.25 Based on Packet Switching
Modem Based on Packet Switching X.25 Packet Assembler/Disassembler (PAD) Client Configuration Server Configuration X.25 X.25 Smart Card Client Server PAD Service
57
Frame Relay Characteristics Description Access Method Transfer Speed
Main Office Frame Relay Network Frame Branch Offices Frame Frame Characteristics Access Method Transfer Speed Description Point-to-point Dependent upon transmittal capabilities of digital leased lines
58
REMOTE ACCESS PROTOCOLS AND SERVICES
RAS SLIP PPP PPTP ICA
59
Remote Access Connection
Local Area Network LAN Protocols Remote Access Protocols LAN Protocols Remote Access Server Remote Access Protocols Internet Remote Access Client
60
Data Transport Protocols
PPP SLIP (client only) Microsoft RAS ARAP (server only) TCP/IP NWLink NetBEUI AppleTalk Remote Access Protocols LAN Protocols Remote Access Server Remote Access Client
61
Virtual Private Network Protocols
Client Server PPTP Internetwork Must Be IP Based No Header Compression No Tunnel Authentication Built-in PPP Encryption L2TP Internetwork Can Be IP, Frame Relay, X.25, or ATM Based Header Compression Tunnel Authentication Uses IPSec Encryption Internet PPTP or L2TP
64
SECURITY PROTOCOLS IP SECURITY IPSec LAYER 2 FORWARDING L2F LAYER 2 TUNNELING PROTOCOL L2TP SECURE SOCKETS LAYER SSL KERBEROS SSH
65
Examining the Role of IPSec in a Network
Active Directory IPSec Policy Security Association Negotiation TCP Layer IPSec Driver IPSec Driver Encrypted IP Packets
66
Configuring IPSec for Security Between Computers
Using IPSec in Transport Mode Enforces IPSec policies for traffic between systems Supports Windows 2000 Provides end-to-end security Is the default mode for IPSec Security Between Computers Windows 2000 Professional Windows 2000 Server
67
Configuring IPSec for Security Between Networks
Using IPSec in Tunnel Mode Enforces IPSec policies for all Internet traffic Supports legacy operating systems predominantly Supports point-to-point security Specifies tunnel endpoint at both routers Security Between Networks Router Router Windows 2000-based Server/Router Windows 2000-based Server/Router
68
PHYSICAL CONECTIONS PUBLIC SWITCHED TELEPHONE NETWORK PSTN INTEGRATED SERVICES DIGITAL NETWORK ISDN CABLE DSL SATELLITE
69
Hardware Options Connection Methods PSTN ISDN Cable Modem X.25
Direct Connection
70
Public Switched Telephone Network (PSTN)
Wires Client Analog Modem Analog Modem Server Analog Voice Data Worldwide Availability Analog Modem 56 Kbps PSTN
71
Integrated Services Digital Network (ISDN)
Digital Telephone Lines or Telephone Wires Client ISDN Modem ISDN Modem Server International Communication Standard Digital Transmission Extends over Local Telephone Exchange ISDN Modem 64 Kbps or Faster ISDN
72
Asymmetric Digital Subscriber Line (ADSL)
LAN Adapter Copper Telephone Lines Simultaneous Voice and Data Transmission 1.5 to 9 Mbps Downstream Rate 16 to 640 Kbps Upstream Rate LAN Interface or Dial-up Interface ADSL ATM Client Server ADSL Wires
73
Ancho de banda contra distancia sobre UTP categoria 3.
74
Division de bandas de frecuencia
En DSL se divide el espectro en: Voz Flujo ascendente Flujo descendente
75
Esquema de un ASDL comun.
76
PROTOCOLS PPP SLIP PPPoE TCP/IP IPX/SPX
77
Standard Authentication Protocols
Security Use when PAP Low The client and server cannot negotiate using more secure validation SPAP Medium Connecting a Shiva LANRover and Windows 2000–based client or a Shiva client and a Windows 2000–based remote access server CHAP Medium You have clients that are not running Microsoft operating systems MS-CHAP High You have clients running Windows NT version 4.0 and later or, Microsoft Windows 95 and later MS-CHAP v2 High You have dial-up clients running Windows 2000, or VPN clients running Windows NT 4.0 or Windows 98
78
DIAL UP ACCESS
79
Creating a Dial-up Connection
Network Connection Type You can choose the type of network connection... Network Connection Wizard Dial-up to private network Dial-up to the Internet Connect using my phone line (modem or ISDN) Connect to the Internet using my phone line (modem or ISDN) Client Remote Access Server ISP Internet
80
Configuring Multilink Connections
A Remote Access Server B Multilink with BAP A Remote Access Server B C Connection Switches on Demand
81
Connecting to a Virtual Private Network
Windows 2000 VPN Server Internet Adapter Intranet Adapter Corporate Intranet VPN Remote Access Client Internet Tunnel
82
PRACTICE EXAM
83
Which of the following dial-up protocols can use multiple LAN protocols over a link?
A. PPP B. SLIP C. IPX/SPX D. UDP/TCP
84
The correct answer is A. The PPP protocol can use multiple LAN protocols such as IPX/SPX, TCP/IP, or NetBEUI.
85
Which of the following protocols is used with HTTPS?
A. SSH B. SSL C. Proxy D. IPSec
86
The correct answer is B. HTTPS uses SSL to create secure connections over the Internet. Answer A is incorrect as SSH provides a secure multiplatform replacement for Telnet. Answer C is not valid, and IPSec is designed to encrypt data during communication between two computers.
87
What is the total bandwidth available when combining all BRI ISDN communication channels?
A. 128Kbps B. 64Kbps C. 96Kbps D. 1,544Kbps
88
The correct answer is A. BRI ISDN uses two 64Kbps channels which, when combined, offer 128Mbps transfer speeds. None of the other options are valid.
89
As a remote user you need to access your company's private network through the Internet. Which of the following protocols can you use to establish a secure connection? A. IPX/SPX B. TCP/IP C. PPP D. PPTP
90
The correct answer is D. PPTP is used to establish a secure transmission tunnel over an insecure public network such as the Internet. The other protocols mentioned do not provide secure transmissions over a public network.
91
Which of the following is an advantage of ISDN over PSTN?
A. ISDN is more reliable. B. ISDN is cheaper. C. ISDN is faster. D. ISDN uses fixed-length packets called cells.
92
The correct answer is C. One clear advantage that ISDN has over the PSTN is its speed. ISDN can combine 64Kbps channels for faster transmission speeds than the PSTN can provide. ISDN is no more or less reliable than the PSTN. ISDN is more expensive than the PSTN. Answer D describes ATM, not ISDN, thus it is not a valid answer.
93
Which of the following technologies requires dial-up access?
A. FDDI B. ISDN C. Packet switching D. ATM
94
The correct answer is B. ISDN require dial-up connections to establish communication sessions. The other answers are not valid.
95
Your company wants to create a secure link between two networks over the Internet. Which of the following protocols would you use to do this? A. PPP B. VPN C. PPTP D. SLIP
96
The correct answer is C. To establish the VPN connection between the two networks, you should use PPTP. PPP is a protocol used on dial-up links. A VPN is a type of network, not a protocol. SLIP is not a secure dial-up protocol.
97
Which of the following protocols is used in thin-client computing?
A. ICA B. PPP C. PPTP D. RAS
98
The correct answer is A. The ICA protocol is used in thin-client networking, where only screen, keyboard, and mouse inputs are sent across the line. PPP is a dial-up protocol used over serial links. PPTP is a technology used in VPNs, and RAS is a remote access service.
99
Which of the following URLs is using SSL?
A. B. C. httpssl:// D.
100
The correct answer is D. You can identify when SSL is used by the s in the URL (in this case Answer B is a valid HTTP URL, but it is not secure. None of the other answers are correct.
101
In a remote access scenario, what function does PPP serve?
A. It is a secure technology that allows information to be securely downloaded from a Web site. B. It is a dial-up protocol used over serial links. C. It is a technology that allows a secure tunnel to be created through a public network. D. It provides a public key/private key exchange mechanism.
102
The correct answer is B. PPP is a protocol that allows for dial-up connections over serial links. Answer A describes SSL; answer C describes a VPN, and answer D describes PKI.
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.