Download presentation
Presentation is loading. Please wait.
Published byBarry Robinson Modified over 9 years ago
1
Network Protocols
2
Why Protocols? Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route discovery Some for route discovery
3
TCP/IP Suite of Protocols to define communication Application – client functionality Transport - moving data Network – tasks for moving data
4
Steps –Sending Protocol responsible for breaking data into smaller parts called packets Network address is attached to packet Data prepared for transmission and sent through NIC
5
Steps - Receiving Data received, taken off network through NIC Address information stripped Data packets are resembles Packets are then sent to application for use.
6
Common Protocols TCP FTP UDP TCP/IP DHCP TFTP DNS HTTP ARP SIP RTP SSH POP3 NTP IMAP4 TELNET SMTP SNMP ICMP IGMP TLS
7
TCP Transmission Control Protocol Connection oriented – establishes a manually acknowledged session between two hosts. Provides reliability to IP Flow control, sequencing, and error detection and correction. Transport layer
8
TCP Connection Sends SYN to target host Target opens connection and sends ACK Originated host sends ACK ready to transfer data Called three-way handshake
9
UDP User Datagram Protocol No guarantee delivery “fire and forget” Uses IP Transport layer Lower overhead – low bandwidth
10
FTP File Transfer Protocol Uploading and downloading of files Uses TCP as a transport protocol Used to transfer files over the LAN Popular to distribute files over the internet Popular to distribute files over the internet Application layer
11
Common FTP commands know
12
SSH Secure Shell Alternative to telnet Provides security and encryption Allows sessions to be opened on a remote host
13
SFTP Secure File Transfer Protocol Authentication between sender and receiver Encryption – if packets copied remain hidden Implemented though client and server software Allows for securely uploading and downloading files to and from remote host
14
TFTP Trivial File Transfer Protocol File transfer Not the same file security and functionality as FTP Simple downloads – firmware No directory navigation Uses UDP Application layer
15
SMTP Simple Mail Transfer Protocol How mail is sent/transported through the network TCP Can be used to send and receive mail authentication
16
HTTP Hypertext Transfer Protocol Uses TCP Allows text, graphics, multimedia and other material to be downloaded Requests sent in clear text
17
HTTPS Hypertext Transfer Protocol Secure SSL – encrypts Both the client and server must support
18
POP3/IMAP4 Post Office Protocol 3/ Internet Message Access Protocol Can download email but not send Passwords transferred in clear text
19
Telnet Virtual terminal protocol Allows session to be opened and commands executed Used to access routers and other network devices Not secure
20
ICMP Internet Control Message Protocol Works with the IP layer to provide error checking and reporting Tools to provide best-delivery PING Used for error reporting, flow control, and route testing
21
ARP Address Resolution Protocol Resolving IP addresses to MAC addresses
22
RARP Reverse ARP Resolves MAC to IP addresses Reveres lookups in DNS
23
Network Time Protocol NTP Facilitates the communication of time between systems Important for email and directory services
24
Network News Transfer Protocol NNTP Posting and retrieval of messages Application layer
25
Secure Copy Protocol SCP Secure means of copying files Encrypts data More secure then RCP
26
Lightweight Directory Access Protocol LDAP Access and query directory services NDS and ADS
27
Internet Group Management Protocol IGMP Manages multicast Used to register and discover devices Routers and videoconferencing clients
28
Domain Name Service DNS Resolves host names to IP addresses Used to use txt file hosts
29
WINS On windows allows NetBIOS names to be resolved to IP addresses. If no WINS server use LMHOSTS file
30
Simple Network Management Protocol SNMP Network management of devices
31
Dynamic Host Configuration Protocol DHCP Automatically assigns IP addresses Allows a range of IP addresses to be defined Clients ask the server for and address Lease - scope
32
Transport Layer Security TLS Ensure privacy between client/server apps
33
Session Initiation Protocol SIP VOIP Establish and maintain multimedia sessions Internet telephone calls Internet telephone calls Uses TCP or UDP Application layer
34
Real Time Transport Protocol RTP Transport of real-time data Does not guarantee delivery Transport Layer
35
Ports Each protocol needs a port to access and leave the system
36
Ports TCP/IP has 65,535 ports Well known – 0-1023 Registered ports – 1024-49151 Used by apps or services Used by apps or services Dynamic or private – 49152 – 65353 Can be used for any service or app Can be used for any service or app
37
FTP – 20 – TCP FTP – 21 TCP SSH – 22 TCP Telnet – 23 – TCP SMTP – 25 – TCP DNS – 53 – UDP/TCP TFTP – 69 – UDP HTTP – 80 – TCP/UDP POP3 – 110 – TCP
38
NNTP – 119 – TCP NTP – 123 – TCP IMAP4 – 143 – TCP SNMP – 161- UDP HTTPS – 443 – TCP DHCP – 67 - UDP
39
IP Address Consists of a series of 32 binary bits Grouped into four 8-bit bytes Called and octet Called and octet Presented in decimal value Presented in decimal value Composed of two parts First part – network First part – network Second part - host Second part - host
40
Example 192.168.18.57 First three octets are network First three octets are network 192.168.18192.168.18 Last octet identifies the host Last octet identifies the host 5757
41
Address Ranges ClassAddress Range Default Subnet Mask A10.0.0.0-10.255.255.255 255.0.0.0 B172.16.0.0-172.31.255.255 255.255.0.0 C192.168.0.0-192.168.255.255 255.255.255.0
42
Need to Know 169.254.0.0- no DHCP server to give address 127 loopback
43
Class IP addresses are divided into 5 classes Class A – large networks Class A – large networks Class B – medium sized networks – universities Class B – medium sized networks – universities Class C – small networks – ISP’s for customers Class C – small networks – ISP’s for customers Class D – multicasting Class D – multicasting Class E - testing Class E - testing
44
Subnet Mask Network portion of the address Hosts on a LAN use the same subnet mask
45
Subnet Mask cont Class A – 255.0.0.0 Class B – 255.255.0.0 Class C – 255.255.255.0
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.