Chapter 7 Low-Level Protocols

Slides:



Advertisements
Similar presentations
CCNA – Network Fundamentals
Advertisements

1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Point-to-Point Protocol
Gursharan Singh Tatla SLIP and PPP 27-Mar
Data Communications System By Ajarn Preecha Pangsuban.
CompTIA Network+ Chapter 2
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Chapter Three Network Protocols.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
OSI Reference Model An overview. Standards and the internet International Organization for Standardization ISO 70’s.
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
Data/Link Layer Issues Protocol & Services Topology Error Detection & Recovery.
Example Data Link Protocols Quick review Reference Models? Layers? Flow Control? Bit stuffing? Connection Oriented? Synchronous transmission?
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Communication Network Protocols Jaya Kalidindi CSC 8320(fall 2008)
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Data Communications and Networks
Ministry of Communications and Information Technology Information Technology Institute Network Fundamentals Introduction to Internet Lec2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Data Link Layer Network Fundamentals – Chapter 7.
Chapter 1-3 The Ethernet LAN. Ethernet The networking protocol used in most modern computer networks is Ethernet. Ethernet is a CSMA/CD LAN protocol.
Midterm Review - Network Layers. Computer 1Computer 2 2.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Network Protocols.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
Wide Area Networks(WANs) Lecture Week 2. Point-to-Point Protocol (PPP) Accessing the WAN.
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
Chapter Overview IP IPX NetBEUI AppleTalk.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
11 NETWORK LAYER PROTOCOLS Chapter 5 IP IPX NetBEUI AppleTalk.
© Agilent Technologies Copyright 2000 H7211A+212, Rev. 2.0 Review of WAN Protocol Basics.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Addressing Through the Layers  Data Link Layer Address  Network Layer Address.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
4 Semester 4 CHAPTER 4 REVIEW JEOPARDY S2C04 Jeopardy Review.
1 Physical and Data Link Layer Computer Network System Sirak Kaewjamnong.
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
Linux Operations and Administration Chapter Eight Network Communications.
Chapter 7 OSI Data Link Layer.
Week #8 OBJECTIVES Chapter #5. CHAPTER 5 Making Networks Work Two Networking Models –OSI OPEN SYSTEMS INTERCONNECTION PROPOSED BY ISO –INTERNATIONAL STANDARDS.
Data Link Protocols Relates to Lab 2.
CIS 173 Networking Week #9 OBJECTIVES Chapter #6 Network Communications Protocols.
Data Communications Data Link Layer.
Point-Point Protocol (PPP) by William F. Widulski.
OSI LAYERS.
Chapter 5: Making Networks Work
Lesson 6 Point to Point Protocol
Click to edit Master subtitle style
The OSI Model and the TCP/IP Protocol Suite
What the OSI Protocol Layers Do
Lec 2: Protocols.
Lec 5 Layers Computer Networks Al-Mustansiryah University
Net431:advanced net services
The OSI Model and the TCP/IP Protocol Suite
Chapter 3: Open Systems Interconnection (OSI) Model
The OSI Model and the TCP/IP Protocol Suite
Presentation transcript:

Chapter 7 Low-Level Protocols Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 7 Low-Level Protocols 1

Objectives Describe the format of a serial data transmission List the differences between SLIP and PPP Explain the operation of the Logical Link Control sublayer Discuss the role of NetBEUI, NetBIOS, and NetBIOS over TCP/IP in a Windows network Computer Networking From LANs to WANs: Hardware, Software, and Security

Serial Data Communication Communication over single communication line One bit at a time (least significant bit first) 11-bit transmission waveform standard Used for transmitting 7-bit ASCII characters First bit: start bit (always low) Identifies beginning of new transmission Next seven bits: ASCII code Last data bit: parity bit Last two transmission frame bits: stop bits (always high) May be one, one and one-half, two stop bits Computer Networking From LANs to WANs: Hardware, Software, and Security

Serial Data Communication (cont’d.) Parity bits Determine error in the received character Odd parity Occurs if odd number of 1s Even parity Occurs if even number of 1s Transmission error: Received parity not in line with expected parity Computer Networking From LANs to WANs: Hardware, Software, and Security

Serial Data Communication (cont’d.) Example: ASCII character lower case I ASCII code is 69 hexadecimal (1101001 binary) Figure 7-1 11-bit transmission code Computer Networking From LANs to WANs: Hardware, Software, and Security

Serial Data Communication (cont’d.) Each waveform bit takes same amount of time Related to baud rate of the serial transmission Baud rate Generally: number of bits per second in a transmission Actually: number of transitions per second Advantages Simple connection requirements Single transmit wire, single receive wire (plus ground) Asynchronous communication not possible Start bit used to synchronize transmitter and receiver Computer Networking From LANs to WANs: Hardware, Software, and Security

Serial Data Communication (cont’d.) UARTs (universal asynchronous receiver transmitter) Digital devices handling serial data transmission Parallel input data converted to serial output data Serial input data converted into parallel output data Figure 7-2 The UART Computer Networking From LANs to WANs: Hardware, Software, and Security

SLIP First protocol to transmit TCP/IP over dial-up lines Provides basic method to encapsulate TCP/IP data Not provided Error detection Internet Protocol (IP) address assignments Link testing Synchronous communication Transmission protocols other than TCP/IP Compressed SLIP (CSLIP) available Replaced Point-to-Point Protocol (PPP) Computer Networking From LANs to WANs: Hardware, Software, and Security

PPP Provides serial connection encapsulation PPP frame provides: TCP/IP, IPX, NetBEUI, AppleTalk, other protocols PPP frame provides: Error detection Checksum value tests data validity Ability to assign IP addresses As needed during session duration Link testing Mechanism to periodically test PPP link operation status Computer Networking From LANs to WANs: Hardware, Software, and Security

PPP (cont’d.) PPP frame provides: (cont’d.) Synchronous, asynchronous communication modes Security (user name, password authentication) Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Compression Operates on layers 1 (Physical) and 2 (Data-Link) Figure 7-3 PPP frame format Computer Networking From LANs to WANs: Hardware, Software, and Security

PPP (cont’d.) Table 7-1 Comparing SLIP and PPP Computer Networking From LANs to WANs: Hardware, Software, and Security

PPPoE Allows multiple LAN users to share a single Internet connection Encapsulates PPP within an Ethernet frame User establishes PPPoE session through the single ISP Internet connection Each PPPoE user session can be monitored (billing) Computer Networking From LANs to WANs: Hardware, Software, and Security

PPPoE (cont’d.) Code field: PPPoE frame type (discovery, session) Session ID, Ethernet frame’s source and destination MAC addresses Uniquely identify PPPoE session Length field: payload size or user data, sent Figure 7-4 PPPoE frame format Computer Networking From LANs to WANs: Hardware, Software, and Security

Logical Link Control Data-Link layer contains two parts Figure 7-5 Data-Link layer details Computer Networking From LANs to WANs: Hardware, Software, and Security

Logical Link Control (cont’d.) Three types of service: Type 1: Connectionless communication (unreliable) Type 2: Connection-oriented communication (reliable) Type 3: Acknowledged connectionless communication LLC protocol: Based on HDLC (High-Level Data-Link Control) Provides mechanism for sending commands and responses over a communication link Computer Networking From LANs to WANs: Hardware, Software, and Security

Logical Link Control (cont’d.) DSAP and SSAP fields Indicate how payload interpreted SNAP (subnetwork access protocol) payload use When high-level protocol handled by LLC sublayer Figure 7-6 Logical Link Control PDU Computer Networking From LANs to WANs: Hardware, Software, and Security

Logical Link Control (cont’d.) MAC sublayer Interfaces LLC sublayer with different network technologies LLC sublayer does not know details Allows the same LLC sublayer to work with different network technologies Additional responsibilities Controlling access to network media Recovering from errors Addressing (working with MAC addresses) Computer Networking From LANs to WANs: Hardware, Software, and Security

NetBIOS Provides all functionality to share resources between networked computers Utilizes three types of services: Name: Finding and naming machines Session: Connection-oriented reliable transfer of messages Datagram: Connectionless non-reliable datagram transfer NetBIOS message main component SMB (server message block) Provide all functionality possible under NetBIOS Computer Networking From LANs to WANs: Hardware, Software, and Security

Table 7-2 Sample NetBIOS commands NetBIOS (cont’d.) Table 7-2 Sample NetBIOS commands Computer Networking From LANs to WANs: Hardware, Software, and Security

NetBIOS (cont’d.) Machine names NetBIOS names that identify each machine Up to 15 characters (letters, numbers, limited set of symbols) Figure 7-7 Windows 9x Network Identification display Figure 7-8 Invalid NetBIOS computer name error message Computer Networking From LANs to WANs: Hardware, Software, and Security

NetBEUI Transport mechanism to deliver NetBIOS messages over a LAN Does not conform to OSI model Uses Transport, Network, LLC part of Data-Link Not a routable protocol Uses MAC addresses to specify source, destination computers Only used on small networks Windows Internet Name Service (WINS) Maps NetBIOS names to IP addresses Computer Networking From LANs to WANs: Hardware, Software, and Security

NetBEUI (cont’d.) NetBIOS over TCP/IP NetBIOS messages transported using TCP Used to share resources over a WAN View Network properties window NETSTAT displays active NetBIOS ports Some may cause computer vulnerability Table 7-3 NetBIOS over TCP/IP port assignments Computer Networking From LANs to WANs: Hardware, Software, and Security

Figure 7-9 Active network connections on a Windows system Computer Networking From LANs to WANs: Hardware, Software, and Security

Figure 7-10(a) Network Properties showing protocol bindings on a Windows 9x computer Computer Networking From LANs to WANs: Hardware, Software, and Security

NetBEUI (cont’d.) Communication channel Formed between protocol and adapter When protocol bound to network adapter Protocol cannot use an adapter until it is bound to it Multiple protocols May be bound to single adapter or multiple adapters NetBEUI originally used by IBM LAN Manager network Now adapted by Microsoft for use in Windows Computer Networking From LANs to WANs: Hardware, Software, and Security

Figure 7-10(b) Windows 9x NetBEUI Properties window Computer Networking From LANs to WANs: Hardware, Software, and Security

Figure 7-10(c) Windows 9x NetBEUI Properties window Computer Networking From LANs to WANs: Hardware, Software, and Security

Figure 7-11 NetBEUI Properties windows on Windows 2003 server Computer Networking From LANs to WANs: Hardware, Software, and Security

Troubleshooting Techniques Protocol information sources http://www.protocols.com http://www.whatis.com Computer Networking From LANs to WANs: Hardware, Software, and Security

Summary Low-level protocols Serial data communication Establish serial communication Exchange data over different hardware technologies Provide peer-to-peer communication Serial data communication One bit at a time over a single communication line Parity bits help determine errors in the received waveform Many protocols available SLIP, PPP, PPPoE, NetBIOS, NetBEUI Computer Networking From LANs to WANs: Hardware, Software, and Security