Академический Документы
Профессиональный Документы
Культура Документы
Objectives
Identify and explain the functions of the core TCP/IP protocols Explain how the TCP/IP protocols correlate to layers of the OSI model Discuss addressing schemes for TCP/IP in IPv4 and IPv6 protocols
Objectives (contd.)
Describe the purpose and implementation of DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) Identify the well-known ports for key TCP/IP services Describe common Application layer TCP/IP protocols
Flexible
Runs on combinations of network operating systems or network media Disadvantage: requires more configuration
Network+ Guide to Networks, 5th Edition 5
TCP (contd.)
TCP (contd.)
TCP (contd.)
Three segments establish connection Computer A issues message to Computer B
Sends segment
SYN field: Random synchronize sequence number
10
TCP (contd.)
Computer A responds
Sends segment
ACK field: sequence number Computer B sent plus 1 SYN field: Computer B random number
11
Lacks sophistication
More efficient than TCP
Useful situations
Great volume of data transferred quickly
Network+ Guide to Networks, 5th Edition 13
UDP (contd.)
14
IP (Internet Protocol)
Network layer protocol
How and where data delivered, including:
Datas source and destination addresses
IP (contd.)
Unreliable, connectionless protocol
No guaranteed data delivery
Reliability component
Header checksum
Verifies routing information integrity in IP header
16
IP (contd.)
17
IP (contd.)
18
19
20
Increases efficiency
21
ARP (contd.)
Two entry types
Dynamic
Created when client makes ARP request that cannot be satisfied by data in ARP table
Static
Entries entered manually using ARP utility
ARP utility
Accessed via the arp command
Windows command prompt, UNIX, or Linux shell prompt
Provides ARP table information Provides way to manipulate devices ARP table
Network+ Guide to Networks, 5th Edition 22
ARP (contd.)
23
Solution: RARP
Client sends broadcast message with MAC address
Receives IP address in reply
24
IPv4 Addressing
Networks recognize two addresses
Logical (Network layer) Physical (MAC, hardware) addresses
Example: 144.92.43.178
Network+ Guide to Networks, 5th Edition 25
IP address information
Network Class determined by first octet
Class A, Class B, Class C
26
Class B devices
Share same first two octet (bits 0-15) Host: second through fourth octets (bits 16-31)
Class C devices
Share same first three octet (bits 0-23) Host: second through fourth octets (bits 24-31)
Network+ Guide to Networks, 5th Edition 28
29
Loopback test
Attempting to connect to own machine Powerful troubleshooting tool
Unix, Linux
ifconfig command
Network+ Guide to Networks, 5th Edition 30
Figure 4-9 Results of the ipconfig /all command on a Windows XP or Windows Vista workstation
Network+ Guide to Networks, 5th Edition 31
32
33
Subnet Mask
Identifies every device on TCP/IP-based network 32-bit number (net mask)
Identifies devices subnet
Combines with device IP address Informs network about segment, network where device attached
Subnetting
Subdividing network single class into multiple, smaller logical networks (segments) Control network traffic Make best use of limited number of IP addresses Subnet mask varies depending on subnetting
Assigning IP Addresses
Government-sponsored organizations
Dole out IP addresses IANA, ICANN, RIRs
Companies, individuals
Obtain IP addresses from ISPs
36
Automatic IP addressing
BOOTP and DHCP Reduce duplication error
37
Dynamic IP address
Assigned to device upon request Changeable
38
BOOTP (contd.)
BOOTP process
Client connects to network Sends broadcast message asking for IP address
Includes clients NIC MAC address
BOOTP server looks up clients MAC address in BOOTP table Responds to client
Clients IP address Server IP address Server host name Default router IP address
39
BOOTP (contd.)
Process resembles RARP
Difference
RARP requests, responses not routable RARP only capable of issuing IP address to client BOOTP may issue additional information (clients subnet mask)
Lease time
Determine when client obtains IP address at log on User may force lease termination
45
APIPA (contd.)
APIPA
Assigns computers network adapter IP address from the pool Assigns subnet default Class B network
255.255.0.0
Disadvantage
Computer only communicates with other nodes using addresses in APIPA range
Network+ Guide to Networks, 5th Edition 46
APIPA (contd.)
APIPA suitable use
Small networks: no DHCP servers
Does not reassign new address if static Works with DHCP clients Disabled in registry
Network+ Guide to Networks, 5th Edition 47
Quick Quiz #1
1. TCP/IP is a ____ of protocols. Answer: Suite 2. TCP (Transmission Control Protocol) operates in the ___ layer of the OSI model. Answer: Transport 3. ____ is a Network layer protocol that reports on the success or failure of data delivery. Answer: ICMP (Internet Control Message Protocol) 4. With DHCP, a device borrows, or ____ an IP address while it is attached to the network. Answer: leases 5. True or False: It is unacceptable to leave APIPA enabled if it is not needed. Answer: False
48
IPv6 Addressing
IP next generation (IPng)
Replacing IPv4 (gradually)
IPv6 support
Most new applications, servers, network devices
Delay in implementation
Cost of upgrading infrastructure
IPv6 advantages
More efficient header, better security, better prioritization provisions, automatic IP address configuration Billions of additional IP addresses
Network+ Guide to Networks, 5th Edition 49
Representation
IPv4: binary numbers separated by period IPv6: hexadecimal numbers separated by colon IPv6 shorthand: :: any number of multiple, zero-value fields
Network+ Guide to Networks, 5th Edition 50
Scope
IPv6 addresses can reflect scope of transmissions recipients Unicast address represents single device interface Multicast address represents multiple interfaces (often on multiple devices)
Network+ Guide to Networks, 5th Edition 51
Port numbers
Simplify TCP/IP communications Ensures data transmitted correctly
Example
Telnet port number: 23 IPv4 host address: 10.43.3.87 Socket address: 10.43.3.87:23
Network+ Guide to Networks, 5th Edition 53
54
Registered Ports
Range: 1024 to 49151 Network users, processes with no special privileges
57
Host
Internet device
Host name
Name describing device
Network+ Guide to Networks, 5th Edition 58
Domain Names
Domain
Group of computers belonging to same organization Share common part of IP address
Domain name
Identifies domain (loc.gov) Associated with company, university, government organization
59
Example: www.google.com
Top-level domain (TLD): com Second-level domain: google Third-level domain: www
Second-level domain
May contain multiple third-level domains
62
Host Files
ARPAnet used HOSTS.TXT file
Associated host names with IP addresses Host matched by one line
Identifies hosts name, IP address Alias provides nickname
UNIX-/Linux-based computer
Host file called hosts, located in the /etc directory
64
DNS redundancy
Many computers across globe related in hierarchical manner Root servers
13 computers (ultimate authorities)
Network+ Guide to Networks, 5th Edition 65
DNS (contd.)
Three components
Resolvers
Any hosts on Internet needing to look up domain name information
Namespace
Abstract database of Internet IP addresses, associated names Describes how name servers of the world share DNS information
Network+ Guide to Networks, 5th Edition 67
DNS (contd.)
Resource record
Describes one piece of DNS database information Many different types
Dependent on function
Contents
Name field Type field Class field Time to Live field Data length field Actual data
68
Configuring DNS
Large organizations
Often maintain two name servers
Primary and secondary
69
Figure 4-16 Windows Vista Internet Protocol Version 4 (TCP/IPv4) Properties dialog box
Network+ Guide to Networks, 5th Edition 71
Process
Service provider runs program on users computer
Notifies service provider when IP address changes
Not DNS replacement Larger organizations pay for statically assigned IP address
Network+ Guide to Networks, 5th Edition 72
73
HTTP
Application layer protocol central to using Web
74
Telnet
Terminal emulation protocol
Log on to remote hosts
Using TCP/IP protocol suite
Often connects two dissimilar systems Can control remote host Drawback
Notoriously insecure
Network+ Guide to Networks, 5th Edition 75
FTP commands
Operating systems command prompt
No special client software required
FTP (contd.)
Graphical FTP clients
MacFTP, WS_FTP, CuteFTP, SmartFTP
Rendered command-line method less common
SFTP
More secure
77
Similar to e-mail
Provides means of conveying messages
PING (contd.)
Quick Quiz # 2
1. IPv6 addresses are composed of ____ bits. Answer: 128 2. Which IPv6 address type represents a single interface on a device? Answer: Unicast 3. Every process on a machine is assigned a(n) ____ number. Answer: port 4. A domain name is represented by a series of character strings, called labels, separated by ____. Answer: dots 5. True or False: Host files are the best automated solution for assigning IP addresses. Answer: False 6. True or False: Telnet is generally considered to be insecure. Answer: True
83
Summary
TCP/IP suite
Core protocol and subprotocol introduction
IPv4 addressing
Binary and dotted decimal notation Subnetting
Assigning addresses: BOOTP, DHCP, APIPA IPv6 addressing Sockets and Ports Domain names, Host files, DHCP, DNS Other application layer protocols
84