Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking.

Slides:



Advertisements
Similar presentations
Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Introduction to IPv4 Introduction to Networks.
Network+ Guide to Networks 5th Edition
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Module 4: Configuring Network Connectivity
Resolving IP Connectivity Issues Lesson 2. Objectives 2.
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
SYSTEM ADMINISTRATION Chapter 19
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Module 4: Configuring Network Connectivity
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Network+ Guide to Networks, Fourth Edition
Chapter 8 Administering TCP/IP.
Chapter 11: Networking with TCP/IP and the Internet Network+ Guide to Networks Third Edition.
Subnetting.
1 Version 3.0 Module 9 TCP/IP Protocol and IP Addressing.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Chapter Overview TCP/IP Protocols IP Addressing.
Chapter 11: Networking with TCP/IP and the Internet.
Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking.
Chapter Overview TCP/IP Overview Configuring TCP/IP Clients
CIS 1140 Network Fundamentals Chapter 10 – In Depth TCP/IP Networking Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft IT Academy Administrator.
CIS 1140 Network Fundamentals
Chapter Twelve Using TCP/IP on the Network. Objectives Here, we’ll examine how to configure TCP/IP. The concepts of subnetting will be examined in detail.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking.
Chapter 11 In-Depth TCP/IP Networking Network+ Guide to Networks, Fourth Edition.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Five 1 Business Data Communications Chapter Five Network, Transport,
Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking.
Guide to MCSE , Second Edition, Enhanced1 Windows XP Network Overview Most versatile Windows operating system Supports local area network (LAN) connections.
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 8 The Dynamic Host Configuration Protocol (DHCP)
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Networking with TCP/IP and the Internet. Objectives Discuss additional details of TCP/IP addressing and subprotocols Comprehend the purpose and procedure.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 2: Configuring Network Protocols.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
1 TCP/IP Networking. 2 TCP/IP TCP/IP is the networking protocol suite most commonly used with UNIX, Windows, NT and most other OS’s. TCP/IP defines a.
1 Objectives Identify the basic components of a network Describe the features of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Guide to TCP/IP, Third Edition Chapter 8: The Dynamic Host Configuration Protocol.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
Linux Operations and Administration Chapter Eight Network Communications.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
CPMT 1449 Computer Networking Technology – Lesson 3
Guide to Parallel Operating Systems with Windows 7 and Linux Chapter 11 Networking.
1 Objectives Identify the basic components of a network Describe the features of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
CEG 2400 FALL 2012 Chapter 9 In-Depth TCP/IP Networking 1.
Chapter 11 In-Depth TCP/IP Networking. Designing TCP/IP-Based Networks Review of some TCP/IP fundamentals: IP is a routable protocol On a network using.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
Network Layer IP Address.
Windows Vista Configuration MCTS : Advanced Networking.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 3 Networking with Windows Server 2008.
Click to edit Master subtitle style
CompTIA Network+ N Authorized Cert Guide
Chapter 9 Objectives Understand TCP/IP Protocol.
Network+ Guide to Networks 6th Edition
Presentation transcript:

Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking

Objectives Describe methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation Explain the differences between public and private TCP/IP networks Describe protocols used between mail clients and mail servers, including SMTP, POP3, and IMAP4 Employ multiple TCP/IP utilities for network discovery and troubleshooting 2

Designing TCP/IP-Based Networks TCP/IP protocol suite use –Internet connectivity –Private connection data transmission TCP/IP fundamentals –IP: routable protocol Interfaces requires unique IP address Node may use multiple IP addresses –Two IP versions: IPv4 and IPv6 –Networks may assign IP addresses dynamically 3

Subnetting Separates network –Multiple logically defined segments (subnets) Geographic locations, departmental boundaries, technology types Subnet traffic separated from other subnet traffic Reasons to separate traffic –Enhance security –Improve performance –Simplify troubleshooting 4

Subnetting (cont’d.) Classful addressing in IPv4 –First, simplest IPv4 addressing type –Adheres to network class distinctions –Recognizes Class A, B, C addresses Drawbacks –Fixed network ID size limits number of network hosts –Difficult to separate traffic from various parts of a network 5

Subnetting (cont’d.) 6 Figure 9-1 Network and host information in classful IPv4 addressing Courtesy Course Technology/Cengage Learning

Subnetting (cont’d.) 7 Figure 9-2 Sample IPv4 addresses with classful addressing Courtesy Course Technology/Cengage Learning

Subnetting (cont’d.) IPv4 subnet masks –Identifies how network subdivided –Indicates where network information located –Subnet mask bits 1: corresponding IPv4 address bits contain network information 0: corresponding IPv4 address bits contain host information Network class –Associated with default subnet mask 8

Subnetting (cont’d.) 9 Table 9-1 Default IPv4 subnet masks Courtesy Course Technology/Cengage Learning

Subnetting (cont’d.) ANDing –Combining bits Bit value of 1 AND another bit value of 1 results in 1 Bit value of 0 AND any other bit results in 0 –Logic 1: “true” 0: “false” 10

Logical Operations of Binary Numbers AND, OR, XOR, NOT 11 bit abit ba & b (a AND b) Bitwise AND "&"

Logical Operations of Binary Numbers OR “ | “ 0 OR 0 is 0 0 OR 1 is 1 1 OR 0 is 1 1 OR 1 is 1 XOR (excusive or) “ ^ “ 0 XOR 0 is 0 0 XOR 1 is 1 1 XOR 0 is 1 1 XOR 1 is 0 12

Logical Operations of Binary Numbers NOT NOT 0 = 1 NOT 1 =0 13 bit abit ba & b (a AND b)a | b (a OR b)a ^ b (a XOR b) Summary of bitwise operators

14 Table 9-2 ANDing Courtesy Course Technology/Cengage Learning Figure 9-3 Example of calculating a host’s network ID Courtesy Course Technology/Cengage Learning

Subnetting (cont’d.) Special addresses –Cannot be assigned to node network interface –Used as subnet masks Examples of special addresses –Network ID –Broadcast address 15

16 Table 9-3 IPv4 addresses reserved for special functions Courtesy Course Technology/Cengage Learning

Subnetting (cont’d.) IPv4 subnetting techniques –Subnetting alters classful IPv4 addressing rules –IP address bits representing host information change to represent network information –Reduces usable host addresses per subnet –Number of hosts, subnets available after subnetting depend on host information bits borrowed 17

18 Table 9-4 Class B subnet masks Courtesy Course Technology/Cengage Learning

19 Table 9-5 IPv4 Class C subnet masks Courtesy Course Technology/Cengage Learning

Subnetting (cont’d.) Calculating IPv4 Subnets –Formula: 2 n −2=Y n: number of subnet mask bits needed to switch from 0 to 1 Y: number of resulting subnets Example –Class C network Network ID: Want to divide into six subnets 20

21 Table 9-6 Subnet information for six subnets in a sample IPv4 Class C network Courtesy Course Technology/Cengage Learning

Subnetting (cont’d.) 22 Class C network Network ID: Want to divide into ten subnets Y= 10 n=? Subnet mask = ? Number of host per subnet ? Extended network prefix ? Usable host IP addresses? Broadcast address ?

Subnetting (cont’d.) Class A, Class B, and Class C networks –Can be subnetted Each class has different number of host information bits usable for subnet information Varies depending on network class and the way subnetting is used LAN subnetting –LAN’s devices interpret device subnetting information –External routers Need network portion of device IP address 23

24 Figure 9-4 A router connecting several subnets Courtesy Course Technology/Cengage Learning

CIDR (Classless Interdomain Routing) Also called classless routing or supernetting Not exclusive of subnetting –Provides additional ways of arranging network and host information in an IP address –Conventional network class distinctions do not exist Example: subdividing Class C network into six subnets of 30 addressable hosts each Supernet –Subnet created by moving subnet boundary left 25

26 Figure 9-5 Subnet mask and supernet mask Courtesy Course Technology/Cengage Learning

CIDR (cont’d.) Example: class C range of IPv4 addresses sharing network ID –Need to greatly increase number of default host addresses 27 Figure 9-6 Calculating a host’s network ID on a supernetted network Courtesy Course Technology/Cengage Learning

CIDR (cont’d.) CIDR notation (or slash notation) –Shorthand denoting subnet boundary position –Form Network ID followed by forward slash ( / ) Followed by number of bits used for extended network prefix –CIDR block Forward slash, plus number of bits used for extended network prefix Example: /22 28

Subnetting in IPv6 Each ISP can offer customers an entire IPv6 subnet Subnetting in IPv6 –Simpler than IPv4 –Classes not used –Subnet masks not used Subnet represented by leftmost 64 bits in an address Route prefix –Slash notation is used 29

30 Figure 9-8 Hierarchy of IPv6 routes and subnets Figure 9-7 Subnet prefix and interface ID in an IPv6 address Courtesy Course Technology/Cengage Learning

Internet Gateways Combination of software and hardware Enables different network segments to exchange data Default gateway –Interprets outbound requests to other subnets –Interprets inbound requests from other subnets Network nodes – Allowed one default gateway Assigned manually or automatically (DHCP) 31

Internet Gateways (cont’d.) Gateway interface on router –Advantages One router can supply multiple gateways Gateway assigned own IP address Default gateway connections –Multiple internal networks –Internal network with external networks WANs, Internet –Router used as gateway Must maintain routing tables 32

33 Figure 9-9 The use of default gateways Courtesy Course Technology/Cengage Learning

Address Translation Public network –Any user may access –Little or no restrictions Private network –Access restricted Clients, machines with proper credentials –Hiding IP addresses Provides more flexibility in assigning addresses NAT (Network Address Translation) –Gateway replaces client’s private IP address with Internet-recognized IP address 34

Address Translation (cont’d.) Reasons for using address translation –Overcome IPv4 address quantity limitations –Add marginal security to private network when connected to public network –Use own network addressing scheme SNAT (Static Network Address Translation) –Client associated with one private IP address, one public IP address –Addresses never change –Useful when operating mail server 35

36 Figure 9-10 SNAT (Static Network Address Translation) Courtesy Course Technology/Cengage Learning

Address Translation (cont’d.) DNAT (Dynamic Network Address Translation) –Also called IP masquerading –Internet-valid IP address might be assigned to any client’s outgoing transmission PAT (Port Address Translation) –Each client session with server on Internet assigned separate TCP port number Client server request datagram contains port number –Internet server responds with datagram’s destination address including same port number 37

38 Figure 9-11 PAT (Port Address Translation) Courtesy Course Technology/Cengage Learning

Address Translation (cont’d.) NAT –Separates private, public transmissions on TCP/IP network Gateways conduct network translation –Most networks use router Gateway might operate on network host –Windows operating systems ICS (Internet Connection Sharing) 39

TCP/IP Mail Services Internet mail services –Mail delivery, storage, pickup Mail servers –Communicate with other mail servers –Deliver messages, send, receive, store messages –Popular programs: Sendmail, Microsoft Exchange Server Mail clients –Send and retrieve messages to/from mail servers –Popular programs: Microsoft Outlook, Thunderbird 40

SMTP (Simple Mail Transfer Protocol) Protocol responsible for moving messages –From one mail server to another Over TCP/IP-based networks Operates at Application layer –Relies on TCP at Transport layer Operates from port 25 Provides basis for Internet service –Relies on higher-level programs for its instructions Services provide friendly, sophisticated mail interfaces 41

SMTP (cont’d.) Simple subprotocol –Transports mail, holds it in a queue Client configuration –Identify user’s SMTP server Use DNS: Identify name only –No port definition Client workstation, server assume port 25 42

MIME (Multipurpose Internet Mail Extensions) SMPT drawback: 1000 ASCII character limit MIME standard –Encodes, interprets binary files, images, video, non- ASCII character sets within message –Identifies each mail message element according to content type Text, graphics, audio, video, multipart Does not replace SMTP –Works in conjunction with it Encodes different content types –Fools SMTP 43

POP (Post Office Protocol) Application layer protocol –Retrieve messages from mail server POP3 (Post Office Protocol, version 3) –Current, popular version –Relies on TCP; operates over port 110 –Store-and-forward type of service Advantages –Minimizes server resources Mail deleted from server after retrieval (disadvantage for mobile users) –Mail server, client applications support POP3 44

IMAP (Internet Message Access Protocol) More sophisticated alternative to POP3 IMAP4: current version Advantages –Replace POP3 without having to change programs – stays on server after retrieval Good for mobile users 45

IMAP (cont’d.) Features –Users can retrieve all or portion of mail message –Users can review messages and delete them While messages remain on server –Users can create sophisticated methods of organizing messages on server –Users can share mailbox in central location 46

IMAP (cont’d.) Disadvantages –Requires more storage space, processing resources than POP servers –Network managers must watch user allocations closely –IMAP4 server failure Users cannot access mail 47

Additional TCP/IP Utilities TCP/IP transmission process –Many points of failure Increase with network size, distance Utilities –Help track down most TCP/IP-related problems –Help discover information about node, network Nearly all TCP/IP utilities –Accessible from command prompt –Syntax differs per operating system 48

Ipconfig Command-line utility providing network adapter information –IP address, subnet mask, default gateway Windows operating system tool –Command prompt window Type ipconfig and press Enter –Switches manage TCP/IP settings Forward slash ( / ) precedes command switches Requires administrator rights –To change workstation’s IP configuration 49

50 Figure 9-12 Output of an ipconfig command on a Windows workstation Courtesy Course Technology/Cengage Learning

Ifconfig Utility used on UNIX and Linux systems –Modify TCP/IP network interface settings –Release, renew DHCP-assigned addresses –Check TCP/IP setting status –Runs at UNIX, Linux system starts Establishes computer TCP/IP configuration Used alone or with switches –Uses hyphen ( - ) before some switches –No preceding character for other switches 51

52 Figure 9-13 Detailed information available through ifconfig Courtesy Course Technology/Cengage Learning

Netstat Displays TCP/IP statistics, component details, host connections Used without switches –Displays active TCP/IP connections on machine Can be used with switches 53

54 Figure 9-14 Output of a netstat –a command Courtesy Course Technology/Cengage Learning

Nbtstat NetBIOS –Protocol runs in Session and Transport layers –Associates NetBIOS names with workstations –Not routable Can be made routable by encapsulation Nbtstat utility –Provides information about NetBIOS statistics –Resolves NetBIOS names to IP addresses –Useful only on Windows-based operating systems and NetBIOS Limited use as TCP/IP diagnostic utility 55

Hostname, Host, and Nslookup Hostname utility –Provides client’s host name Administrator may change Host utility –Learn IP address from host name –No switches: returns host IP address or host name Nslookup –Query DNS database from any network computer Find the device host name by specifying its IP address –Verify host configured correctly; troubleshoot DNS resolution problems 56

57 Figure 9-15 Output of a simple nslookup command Courtesy Course Technology/Cengage Learning

Dig Domain information groper Similar to nslookup –Query DNS database –Find specific IP address host name Useful for diagnosing DNS problems Dig utility provides more detailed information than nslookup Flexible: two dozen switches Included with UNIX, Linux operating systems Windows system: must obtain third party code 58

59 Figure 9-16 Output of a simple dig command Courtesy Course Technology/Cengage Learning

Traceroute (Tracert) Windows-based systems: tracert Linux systems: tracepath ICMP ECHO requests –Trace path from one networked node to another –Identifying all intermediate hops between two nodes Transmits UDP datagrams to specified destination –Using either IP address or host name To identify destination Several switches available 60

61 Figure 9-17 Output of a traceroute command Courtesy Course Technology/Cengage Learning

Mtr (my traceroute) Comes with UNIX, Linux operating systems –Route discovery, analysis utility Combines ping, traceroute functions –Output: easy-to-read chart Simplest form –mtr ip_address or mtr host_name Run continuously Stop with Ctrl+C or add limiting option to command Number of switches refine functioning, output Results misleading –If devices prevented from responding to ICMP traffic 62

Mtr (my traceroute) Windows operating systems –Pathping program as command-line utility –Similar switches to mtr –Pathping output differs slightly Displays path first Then issues hundreds of ICMP ECHO requests before revealing reply, packet loss statistics 63

64 Figure 9-18 Output of the mtr command Courtesy Course Technology/Cengage Learning

Route Route utility –Shows host’s routing table UNIX or Linux system –Type route and press Enter Windows-based system –Type route print and press Enter Cisco-brand router –Type show ip route and press Enter 65

66 Figure 9-19 Sample routing table Courtesy Course Technology/Cengage Learning

67 Table 9-7 Fields in routing table on a UNIX host Courtesy Course Technology/Cengage Learning

Route (cont’d.) Route command –Add, delete, modify routes Route command help –UNIX or Linux system Type man route –Windows system Type route ? 68

Summary Subnetting separates network into multiple segments or subnets Creating subnets involves changing IP address bits to represent network information CIDR is a newer variation on traditional subnetting Last four blocks represent interface in IPv6 Gateways facilitate communication between subnets Different types of address translation protocols exist Several utilities exist for TCP/IP network discovery, troubleshooting 69