Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.

Similar presentations


Presentation on theme: "Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route."— Presentation transcript:

1 Network Protocols

2 Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route discovery Some for route discovery

3 TCP/IP  Suite of Protocols to define communication  Application – client functionality  Transport - moving data  Network – tasks for moving data

4 Steps –Sending  Protocol responsible for breaking data into smaller parts called packets  Network address is attached to packet  Data prepared for transmission and sent through NIC

5 Steps - Receiving  Data received, taken off network through NIC  Address information stripped  Data packets are resembles  Packets are then sent to application for use.

6 Common Protocols  TCP  FTP  UDP  TCP/IP  DHCP  TFTP  DNS  HTTP  ARP  SIP  RTP  SSH  POP3  NTP  IMAP4  TELNET  SMTP  SNMP  ICMP  IGMP  TLS

7 TCP  Transmission Control Protocol  Connection oriented – establishes a manually acknowledged session between two hosts.  Provides reliability to IP  Flow control, sequencing, and error detection and correction.  Transport layer

8 TCP Connection  Sends SYN to target host  Target opens connection and sends ACK  Originated host sends ACK ready to transfer data  Called three-way handshake

9 UDP  User Datagram Protocol  No guarantee delivery  “fire and forget”  Uses IP  Transport layer  Lower overhead – low bandwidth

10 FTP  File Transfer Protocol  Uploading and downloading of files  Uses TCP as a transport protocol  Used to transfer files over the LAN Popular to distribute files over the internet Popular to distribute files over the internet  Application layer

11 Common FTP commands  know

12 SSH  Secure Shell  Alternative to telnet  Provides security and encryption  Allows sessions to be opened on a remote host

13 SFTP  Secure File Transfer Protocol  Authentication between sender and receiver  Encryption – if packets copied remain hidden  Implemented though client and server software  Allows for securely uploading and downloading files to and from remote host

14 TFTP  Trivial File Transfer Protocol  File transfer  Not the same file security and functionality as FTP  Simple downloads – firmware  No directory navigation  Uses UDP  Application layer

15 SMTP  Simple Mail Transfer Protocol  How mail is sent/transported through the network  TCP  Can be used to send and receive mail  authentication

16 HTTP  Hypertext Transfer Protocol  Uses TCP  Allows text, graphics, multimedia and other material to be downloaded  Requests sent in clear text

17 HTTPS  Hypertext Transfer Protocol Secure  SSL – encrypts  Both the client and server must support

18 POP3/IMAP4  Post Office Protocol 3/ Internet Message Access Protocol  Can download email but not send  Passwords transferred in clear text

19 Telnet  Virtual terminal protocol  Allows session to be opened and commands executed  Used to access routers and other network devices  Not secure

20 ICMP  Internet Control Message Protocol  Works with the IP layer to provide error checking and reporting  Tools to provide best-delivery  PING  Used for error reporting, flow control, and route testing

21 ARP  Address Resolution Protocol  Resolving IP addresses to MAC addresses

22 RARP  Reverse ARP  Resolves MAC to IP addresses  Reveres lookups in DNS

23 Network Time Protocol NTP  Facilitates the communication of time between systems  Important for email and directory services

24 Network News Transfer Protocol NNTP  Posting and retrieval of messages  Application layer

25 Secure Copy Protocol SCP  Secure means of copying files  Encrypts data  More secure then RCP

26 Lightweight Directory Access Protocol LDAP  Access and query directory services  NDS and ADS

27 Internet Group Management Protocol IGMP  Manages multicast  Used to register and discover devices  Routers and videoconferencing clients

28 Domain Name Service DNS  Resolves host names to IP addresses  Used to use txt file hosts

29 WINS  On windows allows NetBIOS names to be resolved to IP addresses.  If no WINS server use LMHOSTS file

30 Simple Network Management Protocol SNMP  Network management of devices

31 Dynamic Host Configuration Protocol DHCP  Automatically assigns IP addresses  Allows a range of IP addresses to be defined  Clients ask the server for and address  Lease - scope

32 Transport Layer Security TLS  Ensure privacy between client/server apps

33 Session Initiation Protocol SIP  VOIP  Establish and maintain multimedia sessions Internet telephone calls Internet telephone calls  Uses TCP or UDP  Application layer

34 Real Time Transport Protocol RTP  Transport of real-time data  Does not guarantee delivery  Transport Layer

35 Ports  Each protocol needs a port to access and leave the system

36 Ports  TCP/IP has 65,535 ports  Well known – 0-1023  Registered ports – 1024-49151 Used by apps or services Used by apps or services  Dynamic or private – 49152 – 65353 Can be used for any service or app Can be used for any service or app

37  FTP – 20 – TCP  FTP – 21 TCP  SSH – 22 TCP  Telnet – 23 – TCP  SMTP – 25 – TCP  DNS – 53 – UDP/TCP  TFTP – 69 – UDP  HTTP – 80 – TCP/UDP  POP3 – 110 – TCP

38  NNTP – 119 – TCP  NTP – 123 – TCP  IMAP4 – 143 – TCP  SNMP – 161- UDP  HTTPS – 443 – TCP  DHCP – 67 - UDP

39 IP Address  Consists of a series of 32 binary bits  Grouped into four 8-bit bytes Called and octet Called and octet Presented in decimal value Presented in decimal value  Composed of two parts First part – network First part – network Second part - host Second part - host

40 Example  192.168.18.57 First three octets are network First three octets are network 192.168.18192.168.18 Last octet identifies the host Last octet identifies the host 5757

41 Address Ranges  ClassAddress Range Default Subnet Mask  A10.0.0.0-10.255.255.255 255.0.0.0  B172.16.0.0-172.31.255.255 255.255.0.0  C192.168.0.0-192.168.255.255 255.255.255.0

42 Need to Know  169.254.0.0- no DHCP server to give address  127 loopback

43 Class  IP addresses are divided into 5 classes Class A – large networks Class A – large networks Class B – medium sized networks – universities Class B – medium sized networks – universities Class C – small networks – ISP’s for customers Class C – small networks – ISP’s for customers Class D – multicasting Class D – multicasting Class E - testing Class E - testing

44 Subnet Mask  Network portion of the address  Hosts on a LAN use the same subnet mask

45 Subnet Mask cont  Class A – 255.0.0.0  Class B – 255.255.0.0  Class C – 255.255.255.0


Download ppt "Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route."

Similar presentations


Ads by Google