Networking Concepts. Week-7 Network Protocols Three Major Components:  Application Interface –Connects programs to network  Global Network Transport.

Slides:



Advertisements
Similar presentations
Introduction to TCP/IP
Advertisements

Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Network Operating Systems
Upper OSI Layers Lecture 10, May 7, 2003 Mr. Greg Vogl Data Communications and Networks Uganda Martyrs University.
Network Operating System By Elena Otte Distributed Data Processing.
Chapter Three Network Protocols.
Homework 3.2 Clients Hub What’s wrong with this picture? Clients Using 100TX.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Network Shares and Accounts Sharing Printers, Drives, Folders – Setup Windows 95/98 Windows NT (2000, XP) Linux – Users – Groups.
OSI Reference Model An overview. Standards and the internet International Organization for Standardization ISO 70’s.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Computer Network protocols
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Understanding How Networks Communicate. Copyright © Texas Education Agency, All rights reserved.2 We Will Learn: Basic networked communications.
CHAPTER Other Network Protocols and Services. Other Network Protocols and Services DLC Network Monitor Agent Remote Access Service Services for Macintosh.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Protocols and the OSI Layers Different protocols work at different levels of the OSI model. Here, we look at a few of the main protocols for this exam,
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
1 Chapter Overview Understanding the Windows 2000 Networking Architecture Using Microsoft Management Console.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Workshop 1: Introduction to TCP/IP
1 Chapter Overview Network Operating Systems Network Clients Directory Services.
Windows 2000 Networking Computing Department, Lancaster University, UK.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
SEED Infotech Pvt. Ltd. 1 Networking in Java. SEED Infotech Pvt. Ltd. 2 Objectives of This Session Describe issues related to any type of network using.
Chapter 7 Low-Level Protocols
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
PPTTEST 10/6/ :29 1 IT Ron Williams Business Innovation Through Information Technology Networking.
IT COOKBOOK Windows Network Programming. Chapter 01. Intro. to Network and Socket Programming.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Samba version What is the Samba? Samba is a suite of programs which work together to allow clients to access to a server's filespace and printers.
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Addressing Through the Layers  Data Link Layer Address  Network Layer Address.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Networking in Windows NT Layered Network Architecture Network Interface Card Network Adapter Card Drivers NDIS InterfaceStreams Transport Protocols.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Application Layer Honolulu Community College Cisco Academy Training Center Semester 1 Version
Microsoft enterprise concepts. NT Layered Network Architecture Network Interface Card Network Adapter Card Drivers NDIS InterfaceStreams Transport Protocols.
Interfaces and Services Each layer provides a service to the layer above it. A service is a set of primitive operations. Under UNIX, primitives are implemented.
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
WINDOWS NT Network Architecture Amy, Mei-Hsuan Lu CML/CSIE/NTU August 19, 1998.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Cisco – Chapter 15 Application Layer closest to you as an end-user, when you are interacting with software.
ITI-510 Computer Networks ITI 510 – Computer Networks Meeting 6 Rutgers University Center for Applied Computer Technologies Instructor: Chris Uriarte.
Microsoft Windows XP Professional
Network Programming Chapter 1 Networking Concepts and Protocols.
Networking Protocols John R. Durrett ISQS 6343 #1.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 44 – Exploring Network Properties.
LAN Protocols Chapter 5. Learning Objectives Explain the following LAN protocols and how they work with network operating systems: IPX/SPX, NetBEUI, AppleTalk,
Win Phillips, Ph.D Win Phillips, Ph.D. Clinical Assistant Professor University of Missouri Columbia, MO.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Some Network Commands n Some useful network commands –ping –finger –nslookup –tracert –ipconfig.
Network Communications Technology
Microsoft enterprise concepts
Network Operating Systems Examples
What the OSI Protocol Layers Do
Lec 2: Protocols.
Chapter Three Network Protocols.
Examining Network Protocols
Chapter 3: Windows7 Part 4.
Chapter 15 – Part 2 Networks The Internal Operating System
Presentation transcript:

Networking Concepts. Week-7

Network Protocols Three Major Components:  Application Interface –Connects programs to network  Global Network Transport –Exchange data between remote hosts  Local Network Transport –Exchange data between local hosts

Application Interface System:provides:  TCP/IPTCP or UDP sockets  NovellNetware Shell  MicrosoftNetBIOS port

Global Network Transport System:provides:  TCP/IPIP Layer  NovellIPX  MicrosoftNetBEUI

Host-to-Host Network Transport  Ethernet (local nets spanning ~1Km)  IBM Token Ring (ditto)  Fibre Distributed Data Interface  Frame Relay  Asynchronous Transfer Mode  Others

OSI model Laye r NameExample 7Application Program protocol command 6 Presentatio n eXternal Data Representation 5Session Remote Procedure Call Socket connection 4Transport TCP or UDP, SPX, NetBIOS 3Network IP, IPX, NetBEUI 2 Data Link Ethernet, Token Ring, ATM 1Physical Cables, plugs, microwaves

Network Operating Systems  For the Server-Based and Peer-to-Peer networking environments there needs to be mechanisms that allow communications between workstations and servers  For Example –Netware from Novell –Windows for WorkGroups from Microsoft –TCP/IP from UNIX

Netware Uses Netware Core Protocol requests from the client and responses from the Server  Open(file) >>FileHandle  Read(FileHandle) >>DataBlock  Close(FileHandle) >>FileClosed  …etc…

Microsoft  Uses Server Message Blocks (SMB) for the same purpose

Novell Netware  can use –IPX/SPX or –TCP/IP for client-server communication.

Microsoft Windows Windows XP, 2000, NT, ME, 9X can use NetBEUI, TCP/IP or IPX/SPX for communication

NETBIOS is used to setup links Each computer has a name Resources are given sharenames eg \\tonto\drive_c Before communications can take place a client must broadcast a connection request (get all server info)

Server responds with a Connection number Communications can then commence. A connection must be established for each shared device (drive or printer). NetBIOS requests may be sent native or may be encapsulated in TCP/IP or IPX/SPX.

Network Capabilities provided by Operating Systems

Common Application Interface Networking Issues  Identification of remote system/server  Determining the availability of remote system  Establish authority to communicate  Agreement on encryption mechanism  Authentication of the remote system  Selection of dialog discipline, such as initialisation and release protocol  Agreement on responsibility for error recovery  Identification of constraints on data syntax (character set, data structures, etc)

Windows Server  ASP  COM .NET –Intermediate Language (IL) –P2P technologies, disk groups –Web services for remote execution of code

Novell  CGI  Java  Perl  Cross platform connectivity with MS- Win, Linux, and MacOS.  Web-based access to files and printers.  Support for NDS

CYGWIN  Unix for Wintel  Secure shell (ssh) client  Secure shell daemon (sshd)  Secure FTP (sftp)  Secure copy (scp)  Mirroring tools e.g. rsync

Linux  Standard TCP/IP and Unix like environment  Virtually no licensing costs  Slightly more time consuming to administer  Developments at times lag behind the MS (owing to licensing restrictions)  Ideal for small business environments  Clustering