Mr C Johnston ICT Teacher www.computechedu.co.uk BTEC IT Unit 05 - Lesson 05 Network Protocols.

Slides:



Advertisements
Similar presentations
Computer networks Fundamentals of Information Technology Session 6.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Instructor & Todd Lammle
A+ Guide to Software, 4e Chapter 9 Windows on the Internet.
IS 247 Introduction to Web Application Development Tim Wu.
Internet…issues Managing the Internet
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Module 1: Reviewing the Suite of TCP/IP Protocols.
Mr C Johnston ICT Teacher
Workshop 1: Introduction to TCP/IP
Hands-on Networking Fundamentals
Guide to MCSE , Second Edition, Enhanced1 Windows XP Network Overview Most versatile Windows operating system Supports local area network (LAN) connections.
Unit 4, Lesson 11 How Data Travels the Internet
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 12 Windows on the Internet.
How the Internet Works: What happens when information is sent from your computer?
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Examining TCP/IP.
Mr C Johnston ICT Teacher
Networks QUME 185 Introduction to Computer Applications.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
1 Version 3.0 Module 11 TCP Application and Transport.
G053 – Lecture 09 Domain Names Mr C Johnston ICT Teacher
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
TCP/IP (Transmission Control Protocol / Internet Protocol)
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
IT ELECTRONIC COMMERCE THEORY NOTES
Mr C Johnston ICT Teacher
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Linux Operations and Administration Chapter Eight Network Communications.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 05 Evidencing P1 / P2.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 04 Application Layer Protocols.
Mr C Johnston ICT Teacher G055 - Lecture 10 Network Protocols.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
HOW THE INTERNET WORKS. Introduction : The internet has brought revolutionary changes Has become a medium for interaction and information Can access to.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Lec 2: Protocols.
Lecture 6: TCP/IP Networking By: Adal Alashban
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Web Development & Design Chapter 1, Sections 4, 5 & 6
Chapter 9 Windows on the Internet
Part of Chapter 1 Key Concepts Networks
Protocols 2 Key Revision Points.
Protocol Application TCP/IP Layer Model
Presentation transcript:

Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 05 Network Protocols

Session Objectives Understand the meaning and use of common protocol suites used when networking computers including: SNMPv3, ICMP, HTTP, FTP, TFTP, NTP

What Is A Protocol? A protocol is a set of rules governing how computers communicate together and exchange data, A example of a protocol in real life is the rules of English – a sentence must start with a capital letter and end with a punctuation mark, In networking a protocol defines: how data should be sent, how its received and how computers acknowledge receipt of data, To use a protocol software will need to be installed – these often come as part of your OS or NIC driver, All computers within a network must use the same protocol in order for communication to take place.

Overview of Protocols 1 You need to know about the following protocols: SNMPv3 – Simple Network Management Protocol version 3 - is a protocol which is widely used in networks to control devices such as routers, switches, networked printers etc. It monitors the devices for adverse conditions and that require attention. SNMP works by server-based ‘manager’ processes polling ‘agents’ (SNMP processes running on devices) to find out how well they are performing. The ‘manager’ process then reports these statistics to the network manager. Some ‘manager’ processes can then make changes to device performance via its ‘agent’. In addition, each ‘agent’ is able to generate an alert (called a ‘trap’) when something unexpected occurs that requires immediate attention. V3 of the protocol has better security than previous versions. SNMP is the technology behind a lot of network operator consoles showing the status of the device on-screen so they can be reconfigured.

Dell Management Console for PowerConnect Switch Switch status animation SNMP Options

Overview of Protocols 2 ICMP – Internet Control Message Protocol - used within TCP/IP networks to diagnose problems during data transmissions e.g. not being able to find a server or device. One of the most common manual uses of ICMP messages is ‘ping’, which uses echo request to test connectivity between two IP devices by forwarding and acknowledging receipt of a chunk of data (and the timetaken for the transmission to take place). Some network utilities such as the traceroute command are based on ICMP.

Using ICMP - Ping Pinging a server which is working OK Pinging a client which is turned off Pinging a website URL to check internet connection is functional.

Using ICMP – TraceRT (trace route) TraceRT from client to server – only takes 1 step with average response of 1ms TraceRT from client to router – only takes 1 step with average response of 3.7ms Each of the 3 columns are a response from that router, and how long it took (each hop (step) is tested 3 times). For example, in the second routeTR, the first try took 3ms (3 milliseconds), the second took 2ms, and the third took 6ms. TraceRT from client to client which is switched off – tries 30 times to contact with each request failing. * = failed contact.

TraceRT from my house to – each data packet goes through 13 different routers before the website is found.

Overview of Protocols 2 TCP/IP – Transmission Control / Internet Protocol - protocol which is capable of allowing data to be routed so suitable for both LANs and WANs (can send data for same destination through different routes so very useful. Works with different LAN technologies and is not OS dependant and because of this was chosen as the protocol used on the internet in TCP deals with how data will be spilt / sent (data transmission protocol), IP adds addressing (addressing protocol) FTP – File Transfer Protocol - a standard for moving files between computers on a WAN. Software used to transfer files between machines and allows files to be moved between different operating systems, HTTP – Hypertext Transfer Protocol - defines how a web page is requested (such as by hyperlink), how it is found and how it is displayed. Secure HTTP (HTTPS) is an extension to the HTTP protocol that allows encryption and authentication for extra security of transactions over the Internet, NTP – Network Time Protocol – used to synchronising the internal clocks of computer systems over a typical packet-switched network. This would, for example, enable all servers and workstations on a LAN to have the same time.

Applied A2 Book – p39