Вы находитесь на странице: 1из 39

Jazeera

University(JU)
Faculty Of Computer and
Information Technology
Course : Data
communication and
Networking II
Topic3: Introduction to
TCP/IP & DoD Model
© 2002, Cisco Systems, Inc. All rights reserved. 1
Why Another Model?

Although the OSI reference model is universally


recognized, the historical and technical open standard
of the Internet is Transmission Control Protocol / Internet
Protocol (TCP/IP).

The TCP/IP reference model and the TCP/IP protocol


stack make data communication possible between any
two computers, anywhere in the world, at nearly the
speed of light.
The U.S. Department of Defense (DoD) created the
TCP/IP reference model because it wanted a network
that could survive any conditions, even a nuclear war.
2

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-2


TCP/IP Protocol Stack

6 5

5
4
4
3
3
2
2
1
1

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-3


The Process/Application Layer
Protocols

• Telnet
• SSH
• FTP
• TFTP
• SNMP
• HTTP
• HTTPS
• NTP
• DNS
• DHCP/BootP

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-4


Department of Defense DoD Model

6 5

5
4
4
3
3
2
2
1
1

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-5


Telnet
• Telnet was one of the first Internet standards,
developed in 1969, and is the chameleon of
protocols—its specialty is terminal emulation. It
allows a user on a remote client machine, called
the Telnet client, to access the resources of
another machine, the Telnet server, in order to
access a command-line interface.

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-6


Secure Shell (SSH)
• Secure Shell (SSH) protocol sets up a secure
session that’s similar to Telnet over a standard
TCP/IP connection and is employed for doing
things like logging into systems, running
programs on remote systems, and moving files
from one system to another. And it does all of this
while maintaining an encrypted connection.

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-7


File Transfer Protocol (FTP)
• File Transfer Protocol (FTP) actually lets us transfer files, and
it can accomplish this between any two machines using it.
But FTP isn’t just a protocol; it’s also a program. Operating
as a protocol, FTP is used by applications. As a program, it’s
employed by users to perform file tasks by hand. FTP also
allows for access to both directories and files and can
accomplish certain types of directory operations, such as
relocating into different ones

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-8


Trivial File Transfer Protocol
(TFTP)
• File Transfer Protocol (FTP) actually lets us transfer files, and
it can accomplish this between any two machines using it.
But FTP isn’t just a protocol; Trivial File Transfer Protocol
(TFTP) is the stripped-down, stock version of FTP, but it’s the
protocol of choice if you know exactly what you want and
where to find it because it’s fast and so easy to use!

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-9


Simple Network Management
Protocol (SNMP v1, v2, v3)

• Simple Network Management Protocol (SNMP) collects and


manipulates valuable network information. It gathers data by
polling the devices on the network from a network management
station (NMS) at fixed or random intervals, requiring them to
disclose certain information, or even asking for certain information
from the device. In addition, network devices can inform the NMS
station about problems as they occur so the network administrator
is alerted. SNMP receives something called a. This protocol can
also stand as a watchdog over the network, quickly notifying
managers of any sudden turn of events. These network watchdogs
are called agents, and when aberrations occur, agents send an
alert called a trap to the management station.

10

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-10


Hypertext Transfer Protocol (HTTP)

• It’s used to manage communications between web browsers and


web servers and opens the right resource when you click a link,
wherever that resource may actually reside.
• In order for a browser to display a web page, it must find the exact
server that has the right web page, plus the exact details that
identify the information requested.

• Hypertext Transfer Protocol Secure (HTTPS) is also known as


Secure Hypertext Transfer Protocol. It uses Secure Sockets Layer
(SSL). Sometimes you’ll see it referred to as SHTTP or S-HTTP,

11

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-11


Network Time Protocol (NTP)

• used to synchronize the clocks on our computers


to one standard time source (typically, an atomic
clock). Network Time Protocol (NTP) works by
synchronizing devices to ensure that all
computers on a given network agree on the time

12

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-12


Domain Name Service (DNS)

• Domain Name Service (DNS) resolves hostnames.

13

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-13


Protocol (DHCP)/Bootstrap Protocol
(BootP)

• Dynamic Host Configuration Protocol (DHCP) assigns IP


addresses to hosts. It allows for easier administration and
works well in small to very large network environments.
• DHCP differs from BootP in that BootP assigns an IP
address to a host but the host’s hardware address must be
entered manually in a BootP table. You can think of DHCP
as a dynamic BootP. But remember that BootP is also used
to send an operating system that a host can boot from.
DHCP can’t do that.

DHCP server can provide:


• IP address
• Subnet mask
• Domain name
• Default gateway (routers)
• DNS server address
14
• WINS server address
© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-14
DHCP client four-step process

15

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-15


Automatic Private IP Addressing
(APIPA)

• Windows operating systems provide a


feature called Automatic Private IP
Addressing (APIPA). With APIPA, clients can
automatically self-configure an IP address
and subnet mask—basic IP information that
hosts use to communicate—when a DHCP
server isn’t available. The IP address range
for APIPA is 169.254.0.1 through
169.254.255.254.

16

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-16


The Host-to-host Layer Protocols

There two main protocols at this layer:


• Transmission Control Protocol (TCP) (connection
oriented)
• User Datagram Protocol (UDP) (connectionless)

• Transmission Control Protocol (TCP) takes large blocks of


information from an application and breaks them into
segments. It numbers and sequences each segment so that
the destination’s TCP stack can put the segments back into
the order the application intended.
• After these segments are sent on the transmitting host,
TCP waits for an acknowledgment of the receiving end’s
TCP virtual circuit session, retransmitting any segments
that aren’t acknowledged.

17

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-17


User Datagram Protocol (UDP)
(Connectionless protocol)

• User Datagram Protocol (UDP) is basically


the scaled-down economy model of TCP,
which is why UDP is sometimes referred to
as a thin protocol. Like a thin person on a
park bench, a thin protocol doesn’t take up
a lot of room—or in this case, require much
bandwidth on a network.

18

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-18


Key protocols that use TCP and UDP

19

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-19


The Internet Layer Protocols

• Internet Protocol (IP)


• Internet Control Message Protocol (ICMP)
• Address Resolution Protocol (ARP)

20

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-20


Internet Protocol (IP)

• Internet Protocol (IP) essentially is the


Internet layer. The other protocols found
here merely exist to support it. IP holds the
big picture and could be said to “see all,”
because it’s aware of all the interconnected
networks. It can do this because all the
machines on the network have a software,
or logical, address called an IP address

21

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-21


Internet Protocol (IP)

• Internet Protocol (IP) essentially is the


Internet layer. The other protocols found
here merely exist to support it. IP holds the
big picture and could be said to “see all,”
because it’s aware of all the interconnected
networks. It can do this because all the
machines on the network have a software,
or logical, address called an IP address

22

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-22


Possible protocols found in the
Protocol field of an IP header

23

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-23


Internet Control Message Protocol
(ICMP)

• Internet Control Message Protocol (ICMP) works at


the Network layer and is used by IP for many
different services. ICMP is basically a management
protocol and messaging service provider for IP.
ICMP packets have the following characteristics:
• They can provide hosts with information about
network problems.
• They are encapsulated within IP datagrams.

24

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-24


Ping & Traceroute

• Ping Packet Internet Groper (Ping) uses ICMP echo


request and reply messages to check the physical
and logical connectivity of machines on an
internetwork.
• Traceroute (or tracert in windows) Using ICMP time-
outs, Traceroute is used to discover the path a
packet takes as it traverses an internetwork.

25

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-25


Address Resolution Protocol

I need the
I heard that
Ethernet
broadcast. The
address of
message is for me.
176.16.3.2.
Here is my Ethernet
address.
172.16.3.1 172.16.3.2

IP:
IP: 172.16.3.2
172.16.3.2 =
= ???
???

IP:
IP: 172.16.3.2
172.16.3.2
Ethernet:
Ethernet: 0800.0020.1111
0800.0020.1111

Map IP MAC
Local ARP 26

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-26


Address Resolution Protocol (ARP)

• Address Resolution Protocol (ARP) finds the hardware


address of a host from a known IP address. Here’s how it
works: When IP has a datagram to send, it must inform a
Network Access protocol, such as Ethernet or wireless, of
the destination’s hardware address on the local network.
• As IP’s detective, ARP interrogates the local network by
sending out a broadcast asking the machine with the
specified IP address to reply with its hardware address. So
basically, ARP translates the software (IP) address into a
hardware address

27

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-27


Reverse ARP

I heard
that
What is
broadcast.
my IP
Your IP
address?
address is
172.16.3.25
.

Ethernet:
Ethernet: 0800.0020.1111
0800.0020.1111 IP
IP =
= ???
???

Ethernet:
Ethernet: 0800.0020.1111
0800.0020.1111
IP:
IP: 172.16.3.25
172.16.3.25

Map MAC IP
28

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-28


Introduction to TCP/IP Addresses

172.18.0.1 172.16.0.1

172.18.0.2 HD 172.16.0.2
SA DA DATA
10.13.0.0 R 192.168.1.0
10.13.0.1 172.17.0.1 172.17.0.2 192.168.1.1

• Unique addressing allows communication


between end stations.
• Path choice is based on destination address.
Location is represented by an address
29

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-29


IP Addressing

32 Bits
otted
Network Host
ecimal

Maximum 255 255 255 255


1 8 9 16 17 24 25 32

Binary 11111111 11111111 11111111 11111111

16
128
64
32

8
4
2
16
128

8
4
2
1
64
32
16
16

128
128

8
4
2
1
64
32

8
4
2
1
64
32

Example 172 16 122 204


Decimal
xample 1010110000010000 01111010 11001100
30
Binary
© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-30
IP Address Classes

8 Bits 8 Bits 8 Bits 8 Bits

Network
Network Host
Host Host
Host Host
Host
Class A:
Network
Network Network
Network Host
Host Host
Host
Class B:
Network
Network Network
Network Network
Network Host
Host
Class C:
Class D: Multicast
Class E: Research
31

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-31


IP Address Classes

Bits: 1 8 9 16 17 24 25 32
0NNNNNNN
0NNNNNNN Host
Host Host
Host Host
Host
Class A:
Range (1-126)

Bits: 1 8 9 16 17 24 25 32
10NNNNNN
10NNNNNN Network
Network Host
Host Host
Host
Class B:
Range (128-191)
1 8 9 16 17 2425 32
Bits:
110NNNNN
110NNNNN Network
Network Network
Network Host
Host
Class C:
Range (192-223)
1 8 9 16 17 2425 32
Bits:
1110MMMM
1110MMMMMulticast
Multicast Group
Multicast
GroupMulticast Group
Multicast
Multicast Group
Group Group
Class D:
Range (224-239)
32

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-32


Host Addresses

172.16.2.2 10.1.1.1
10.6.24.2
E1
172.16.3.10 E0 10.250.8.11
172.16.2.1

172.16.12.12 10.180.30.118

Routing Table
172.16 . 12 . 12 Network Interfac
e
Network Host 172.16.0. E0
0 E1
10.0.0.0 33

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-33


IP Address Classes Exercise

Address Class Network Host

10.2.1.1 A 10.0.0.0 0.2.1.1

128.63.2.100 B 128.63.0.0 0.0.2.100

201.222.5.64 C 201.222.5.0 0.0.0.64

192.6.141.2 C 192.6.141.0 0.0.0.2

130.113.64.16 B 130.113.0.0 0.0.64.16

256.241.201.1
Nonexistent
0
34

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-34


Reserved IP addresses

35

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-35


Private IP addresses

The ranges and the amount of usable


IP's are as follows:
10.0.0.0 - 10.255.255.255
Addresses: 16,777,216
172.16.0.0 - 172.31.255.255
169.254.0.0 through 169.254.255.255
(APIPA)
Addresses: 1,048,576
192.168.0.0 - 192.168.255.255
Addresses: 65,536 36

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-36


IP Address Types

• Unicast
• Multicast
• Broadcast
• Anycast

Layer 2 Broadcasts: Layer 2 Broadcasts


• First, understand that layer 2 broadcasts are also known as
hardware broadcasts—they only go out on a LAN, but they
don’t go past the LAN boundary (router). The broadcast
would be all 1s in binary, which would be all Fs in
hexadecimal, as in ff:ff:ff:ff:ff:ff
Layer 3 Broadcasts
• Then there are the plain old broadcast addresses at layer
3. Here’s an example that you’re already familiar with: The
network address of 172.16.0.0 255.255.0.0 would have a
broadcast address of 172.16.255.255

37

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-37


Local layer 2 broadcasts Vs Layer 3
broadcasts

38

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-38


Question & Answer
39
© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—1-39

Вам также может понравиться