Академический Документы
Профессиональный Документы
Культура Документы
Part 1
Slide 2 of 9 23-Nov-09
2009
Sysintelligence.com
Slide 3 of 9 23-Nov-09
2009
Sysintelligence.com
Network Protocols
What is a Protocol? Protocol is a set of rules for communication to happen. Network protocols defines how computers should identify each other on the network and how data is transferred between computers. Broad Classification : LAN Protocols: NetBIOS,NetBEUI , IPX/SPX , Ethernet & AppleTalk . WAN Protocols : SLIP , PPP , PPTP , ATM , L2TP etc Protocols Developed Within Mainframe env. IBMs SNA , SDLC & HDLC . Routing protocols: RIP, IGRP, OSPF, IS-IS & BGP. Application Protocols developed for Internet : HTTP , FTP ,POP3, IMAP , SMTP, NNTP & DNS. Electronic Messaging Protocols: x.400, SMTP, POP3 & IMAP. Directory Protocols: X.500 & LDAP Security Protocols: PAP, CHAP , X.509 , Kerberos v5 , Digital certificates & various PKCS standards . Network protocol can be relatively simple or highly complex, a networking protocols can provide a variety of services, these services include . 1. Packet acknowledgment. - T 2. Segmentation. - T 3. Flow control. - T 4. Error detection. - D , T 5. Error correction. - T 6. Data compression. - P 7. Data encryption. - P Network Classification : Internet: The internet is a global network of interconnected networks, connecting private, public and university networks in one cohesive unit. Intranet: An intranet is a private enterprise network that uses internet and web technologies for information gathering and distribution within an organization. Extranet: An extranet is a community of interest created by extending an intranet to selected entities external to an organization.
Slide 4 of 9 23-Nov-09 2009
Sysintelligence.com
Sender
In 1983, the International Organization for Standardization (ISO) and what is now the Telecommunication Standardization Sector of the International Telecommunication Union (ITU-T) published a document called "The Basic Reference Model for Open Systems Interconnection (OSI) ."
Reciever
Sysintelligence.com
Slide 6 of 9 23-Nov-09
2009
Sysintelligence.com
Physical Layer
Network cables :
1. Coaxial Cable RG8 , RG48 2. Twisted-Pair Cable
i) STP - for use in environments more prone to electromagnetic interference. ii) UTP Telephones & LAN environment .
Unshielded twisted pair cable comes in a variety of different grades, called categories by the Electronics Industry Association (EIA) and the Telecommunications Industry Association (TIA) .
EIA/TIA Cable Categories Category Usage : Cat 1: Currently unrecognized by TIA/EIA. Previously used for POTS telephone communications, ISDN and doorbell wiring. Cat 2: Currently unrecognized by TIA/EIA. Previously was frequently used on 4Mbit/s token ring networks. Cat 3: Current cable standard, used for data networks utilizing frequencies up to 16 MHz. Popular for 10 Mbit/s Ethernet networks. Cat 4: Currently unrecognized by TIA/EIA. Provided performance of up to 20 MHz, and was frequently used on 16Mbit/s token ring networks. Cat 5 : Currently unrecognized by TIA/EIA. Provided performance of up to 100 MHz, used for 10/100 Mbps Ethernet . Cat 5e : Currently recognized by TIA/EIA. Provided performance of up to 100 MHz, used for 10/100/1000 Mbps Ethernet Cat 6: Defined by the ANSI TIA/EIA 568B-2.1. It provides performance of up to 250 MHz, more than double category 5 and 5e. Cat 6e: Operates at frequencies up to 500MHz and provides up to 10Gbit/s (STP) Cat 7: cat7(STP) is a cable standard for Ethernet and other interconnect technologies that can be made to be backwards compatible with traditional Cat 5 and Cat 6 Cat 7 features even more strict specifications for crosstalk and system noise than Cat 6. To achieve this, shielding has been added for individual wire pairs and the cable as a whole. designed for transmission at frequencies up to 650 MHz. The Cat 7 cable standard has been created to allow 10 Gigabit Ethernet over 100 m of copper cabling (also, 10-Gbit/s Ethernet now is typically run on Cat 6a).
Sysintelligence.com
i)
Slide 8 of 9 23-Nov-09
2009
Sysintelligence.com
Slide 9 of 9 23-Nov-09
2009
Sysintelligence.com
Network Connections :
1. Bridging & Switching is a technique used to connect networks at the data-link layer. 2. Switching extends up to Network Routing , thats more than Datalink Layer with the Layer 3 Switching Capabilities . Layer2 - Cisco 2950 , Layer3 - Cisco 3500 series , Multi Layer Switch (MLS) 6500 Series , Nexus Series 3. Routing A router connects two networks together, forming an internetwork. Unlike bridges and switches, routers function at the network layer of the OSI reference model. Packet Routing - Because they operate at the boundaries of LANs, routers do not forward broadcast messages, except in certain specific cases. A router forwards a packet based on the destination address in the network layer protocol header, which specifies the packet's ultimate destination, and not the hardware address used at the data-link layer. A router has an internal table (called a routing table) that contains information about the networks around it, and it uses this table to determine where to send each packet.
Slide 10 of 9 23-Nov-09
2009
Sysintelligence.com
Ethernetworking at DLL
Ethernet is the most popular local area network (LAN) protocol operating at the data-link layer .
Ethernet Standards
There have been two sets of Ethernet standards over the years. The first was the original Ethernet protocol, as developed by Digital Equipment Corporation, Intel, and Xerox, which came to be known as DIX Ethernet & IEEE 802.3 . Both the IEEE 802.3 and DIX Ethernet standards consist of the following three basic components: Physical layer specifications Frame format CSMA/CD MAC mechanism
Slide 11 of 9 23-Nov-09
2009
Sysintelligence.com
UTP Ethernet
Functions of the Ethernet frame fields are as follows: Preamble (7 bytes). This field contains 7 bytes of alternating 0s and 1s, which the communicating systems use to synchronize their clock signals. Start Of Frame Delimiter (1 byte). This field contains 6 bits of alternating 0s and 1s, followed by two consecutive 1s, which is a signal to the receiver that the transmission of the actual frame is about to begin. Destination Address (6 bytes). This field contains the 6-byte hexadecimal address of the network interface adapter on the local network to which the packet will be transmitted. Source Address (6 bytes). This field contains the 6-byte hexadecimal address of the network interface adapter in the system generating the packet. Ethertype/Length (2 bytes). In the DIX Ethernet frame, this field contains a code identifying the network layer protocol for which the data in the packet is intended. In the IEEE 802.3 frame, this field specifies the length of the data field (excluding the pad). Data And Pad (46 to 1500 bytes). This field contains the data received from the network layer protocol on the transmitting system, which is sent to the same protocol on the destination system. Ethernet frames (including the header and footer, except for the Preamble and Start Of Frame Delimiter) must be at least 64 bytes long; so if the data received from the network layer protocol is less than 46 bytes, the system adds padding bytes to bring it up to its minimum length. Frame Check Sequence (4 bytes). The frame's footer is a single field that comes after the network layer protocol data and contains a 4-byte checksum value for the entire packet. Ethernet Frame Note : Regular, Fast, and Gigabit Ethernet all use the same Ethernet frame format
Slide 12 of 9 23-Nov-09 2009
Sysintelligence.com
Network Classification
Operating Network Classification Intranet Enables communication between internal systems and services. High - Blue zone High - Blue zone Level of Trust - Security Zone
Extranet
Enables communication between internal and external (e.g., customers and/or vendors) systems and/or services Enables communication between Internal and public systems, e.g., Internet.
Open-net
IES defines concepts and details of the permissible data flows and communications channels for IES activities.
Slide 13 of 9 23-Nov-09
2009
Sysintelligence.com
To be Continued
To be Continued
Slide 14 of 9 23-Nov-09
2009
Sysintelligence.com