Lesson 5—Networking BASICS1 Networking BASICS Protocols and Network Software Unit 2 Lesson 5.

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Advertisements

CCNA – Network Fundamentals
Intermediate TCP/IP TCP Operation.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Layer and Transport Layer.
Chapter 2 Network Models.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Chapter 2 Network Models.
Chapter 14 TCP/IP and Routing Part #1 Unix System Administration.
2.1 Background Information Network Models LAYERED TASKS We use the concept of layers in our daily life. As an example, let us consider two friends.
The OSI Model and the TCP/IP Protocol Suite
OSI Model.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
What Is TCP/IP? The large collection of networking protocols and services called TCP/IP denotes far more than the combination of the two key protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
NETWORKING CONCEPTS. TCP/IP The TCPIIP protocol suite was developed prior to the OSI model TCP/IP protocol suite was defined as having four layers: Host-to-network,
The OSI Model and the TCP/IP Protocol Suite
Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.
Layering and the TCP/IP protocol Suite  The TCP/IP Protocol only contains 5 Layers in its networking Model  The Layers Are 1.Physical -> 1 in OSI 2.Network.
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Five 1 Business Data Communications Chapter Five Network, Transport,
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 2 The OSI Model and TCP/IP Protocol Suite.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
TCP/IP Yang Wang Professor: M.ANVARI.
Huda AL_Omairl - Network 71 Protocols and Network Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications 1.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
University of the Western Cape Chapter 12: The Transport Layer.
Routers and Routing Basics CCNA 2 Chapter 10.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 2 Network Models.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
1 Kyung Hee University Chapter 2 Network Models. 2 Kyung Hee University 2.1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
BZUPAGES.COM 2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Linux Operations and Administration Chapter Eight Network Communications.
Internet Architecture. 2 INTRODUCTION INTERNET developed by a community of researchers centered around the Defense Advanced Research Projects Agency (DARPA)
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
2.1 Chapter 2 Network Models – cont. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite and IP Addressing Presented By : Dupien AMS.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
NT1210 Introduction to Networking
TCP/IP PROTOCOL UNIT 6. Overview of TCP/IP Application FTP, Telnet, SMTP, HTTP.. Presentation Session TransportHost-to-HostTCP, UDP NetworkInternetIP,
Chapter 2 Network Models.
Lecture 3 By Miss Irum Matloob.
The OSI Model and the TCP/IP Protocol Suite
Net 431: ADVANCED COMPUTER NETWORKS
The OSI Model and the TCP/IP Protocol Suite
Data and Computer Communications by William Stallings Eighth Edition
The OSI Model and the TCP/IP Protocol Suite
INFORMATION FLOW ACROSS THE INTERNET
Layering and the TCP/IP protocol Suite
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Lesson 5—Networking BASICS1 Networking BASICS Protocols and Network Software Unit 2 Lesson 5

Lesson 5—Networking BASICS2 Objectives Explain the OSI reference model. Define protocol. List and describe the functions of TCP/IP. Explain the functions of client and server network software.

Lesson 5—Networking BASICS3 OSI Reference Model It was created by the International Standards Organization (ISO). It breaks network functions into seven layers. It illustrates how each layer provides specific services and shares with the layers above and below.

Lesson 5—Networking BASICS4 OSI Reference Model The “flow” between layers goes down when data is sent and up when data is received. The function that each layer performs is to add or remove network information on a packet.

Lesson 5—Networking BASICS5 OSI Reference Model

Lesson 5—Networking BASICS6 OSI Reference Model Physical Data Link Network Transport Session Presentation Application

Lesson 5—Networking BASICS7 Protocols Protocols are rules for communication. A combination of protocols is called a protocol stack or protocol suite. A connectionless protocol assumes that packets will arrive. A connection-oriented protocol establishes a link between devices.

Lesson 5—Networking BASICS8 TCP/IP Transmission Control Protocol/Internet Protocol (TCP/IP) It is the most common protocol suite used today for LANs as well as the Internet. It is composed of several different protocols.

Lesson 5—Networking BASICS9 TCP/IP

Lesson 5—Networking BASICS10 Internet Protocol (IP) The hosts on a TCP/IP network use a logical address. This logical address, called the IP address, is assigned to each host. IP is responsible for the addressing of packets.

Lesson 5—Networking BASICS11 IP Addressing An IP address is four bytes (octets). Each contains eight bits (total of 32 bits in length). Each octet is a number from 1 to 254. IP addresses are usually given as dotted decimal notation.

Lesson 5—Networking BASICS12 IP Addressing

Lesson 5—Networking BASICS13 Classes There are five classes of IP ad- dresses, Class A through Class E. Each class uses a different com- bination of octets to indicate the number of the network and the number of the host.

Lesson 5—Networking BASICS14 Class A The first octet indicates the number of the network, and the remaining three octets indicate the number of the host. 126 network addresses 16 million hosts per network

Lesson 5—Networking BASICS15 Class A

Lesson 5—Networking BASICS16 Class B The first two octets indicate the network number, and last two octets indicate the host. It is intended for organizations that have more networks, but not as many hosts per network. 16,384 network addresses 65,534 hosts per network

Lesson 5—Networking BASICS17 Class B

Lesson 5—Networking BASICS18 Class C The first three octets are for the network number, and last octet is for the host. It is intended for organizations that have many networks, but few hosts per network. Over 2 million network numbers 254 hosts per network

Lesson 5—Networking BASICS19 Class C

Lesson 5—Networking BASICS20 Other Classes Class D and Class E addresses are for special uses. Special IP addresses are known as private addresses.

Lesson 5—Networking BASICS21 Subnet Mask A subnet mask is used to separate a network number from the host number in an IP address. 1 represents a network and 0 represents a host. Subnet masks are also used to subdivide networks.

Lesson 5—Networking BASICS22 Transmission Control Protocol(TCP) TCP is responsible for the reliable transmission of data from one host to another. It is based on port numbers. The combination of an IP address and a port number is called a socket.

Lesson 5—Networking BASICS23 IPv6 The current version of the IP protocol is IPv4. The next generation of the IP protocol is called IPv trillion, trillion, trillion addresses It uses a fixed packet header size of 24 bytes so that information always appears in the same place.

Lesson 5—Networking BASICS24 Network Software Software that runs on the client Software that runs on the server

Lesson 5—Networking BASICS25 Client Software Network Driver Interfaces - “Middleman” between NIC and client’s operating system software. Redirector - Sends request to network. Designator - Keeps track of which drive letter is associated with which network device.

Lesson 5—Networking BASICS26 Server Software Network operating system - Manages and coordinates users and requests across the network. Directory service - Database stored on the network containing information about users and privileges to resources.

Lesson 5—Networking BASICS27 Summary The International Standards Organization (ISO) released a set of specifications that was intended to describe how dissimilar computers could be connected together on a network. Called the Open Systems Interconnections (OSI) reference model, it illustrates how a network device prepares data for delivery over the network to another device and how data is handled when it is received. The key to the OSI reference model is layers. The model breaks networking steps down into a series of seven dif- ferent layers. Each layer cooperates with the layer immediately above and below it by sending and receiving information.

Lesson 5—Networking BASICS28 Summary (continued) The rules for communication between network devices are known as protocols. These protocols are essential for proper communication to take place between the OSI reference models on the network devices. Instead of having just one single proto- col, computer networks typically employ several different proto- cols that function together. This combination of protocols is known as a protocol stack or a protocol suite. Protocols use one of two different methods for delivering data through a network: connectionless protocols, which place the packets on the net- work and then assume that they will arrive at the destination, and connection-oriented protocols, which establish a connection between the two devices before sending any packets. As each packet is received, an acknowledgment is sent back to the sender.

Lesson 5—Networking BASICS29 Summary (continued) The most common protocol suite used today for LANs as well as the Internet is Transmission Control Protocol/Internet Protocol (TCP/IP). Because it is a suite, TCP/IP is composed of several different protocols that all function together. Although the TCP/IP suite is composed of several different protocols, the two major protocols are those that make up its name, TCP and IP. The IP is responsible for addressing the packets and sending them on the correct route to the destination. Each device on a TCP/IP computer network must have a unique number. Com- puters on a TCP/IP network use a logical address instead. This logical address, called an IP address, is assigned to each host computer.

Lesson 5—Networking BASICS30 Summary (continued) IP addresses are also broken down into groups, called classes: Class A through Class E. In addition, special IP addresses, known as private addresses, are used when the computer is not connected to another network. A subnet mask is used to sepa- rate the network number from the host number in an IP address. Subnet masks are also used to subdivide networks. IP uses Address Resolution Protocol (ARP) to determine a host’s IP address. The Transmission Control Protocol (TCP) portion of the TCP/IP suite is responsible for the reliable transmission of data from one host to another. TCP is based on port numbers. A port num- ber identifies what program or service on the receiving computer is being accessed.

Lesson 5—Networking BASICS31 Summary (continued) Because TCP/IP is a connection-oriented protocol, it establishes a session, or link, between the sending and receiving devices. This session is created through a three-way handshake be- tween the devices. The current version of the IP protocol is ver- sion 4, called IPv4. Developed in 1981, long before the Internet was universally popular, IPv4 has begun to show some weak- nesses. The next generation of the IP protocol is IPv6. IPv6 provides several significant improvements. IP addresses under IPv6 will be 16 bytes long or four times the length of IPv4 ad- resses. IPv6 also uses a fixed packet header size of 24 bytes, so information always appears in the same place. This speeds up finding information in the packet and processing the packet.

Lesson 5—Networking BASICS32 Summary (continued) Software that runs on the client computer performs many differ- ent functions that enable the device to function effectively on the network. The Network Device Interface Specifications (NDIS) and Open Date-link Interface (ODI) specifications outline precise standards regarding NIC network driver interfaces. Drivers that follow these standards allow multiple protocols to function simul- taneously on a single computer. Client software called a redirec- tor works closely with the operating system of a client computer. When the user gives a command to the computer, the computer goes first to the client operating system. If that command doesn’t apply to the client computer, the operating system gives the command to the redirector, which sends it out to the network. A designator is designed to keep track of which drive letter is associated with which network device.

Lesson 5—Networking BASICS33 Summary (continued) Server software plays a critical role on a computer network. A network server uses network operating system (NOS) software. NOS software manages and coordinates all users and their requests across the network. A directory service is a database stored on the network. It contains information about users and network devices. A directory service also keeps track of the resources on the network and a user’s privileges to those resources.