Download presentation
Presentation is loading. Please wait.
Published byEmery Garrison Modified over 9 years ago
1
11 NETWORK LAYER PROTOCOLS Chapter 5 IP IPX NetBEUI AppleTalk
2
Chapter 5: NETWORK LAYER PROTOCOLS2 EXAMPLES OF NETWORK LAYER PROTOCOLS The Transmission Control Protocol/Internet Protocol (TCP/IP) suite Internet Protocol (IP) Novell’s Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) suite Internetwork Packet Exchange (IPX) Apple Computer’s AppleTalk suite Datagram Delivery Protocol (DDP) Microsoft’s suite NetBIOS Extended User Interface (NetBEUI) The Transmission Control Protocol/Internet Protocol (TCP/IP) suite Internet Protocol (IP) Novell’s Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) suite Internetwork Packet Exchange (IPX) Apple Computer’s AppleTalk suite Datagram Delivery Protocol (DDP) Microsoft’s suite NetBIOS Extended User Interface (NetBEUI)
3
Chapter 5: NETWORK LAYER PROTOCOLS3 THE INTERNET PROTOCOL IP, defined in Request for Comments (RFC) 791, is a connectionless network layer protocol that provides Datagram encapsulation Logical addressing Fragmentation and reassembly of datagrams Routing IP, defined in Request for Comments (RFC) 791, is a connectionless network layer protocol that provides Datagram encapsulation Logical addressing Fragmentation and reassembly of datagrams Routing
4
Chapter 5: NETWORK LAYER PROTOCOLS4 IP FUNCTIONS Encapsulation IP forms a datagram by adding an IP header to information passed down from the transport layer protocol. Addressing Each datagram includes logical source and destination addresses. Fragmentation and reassembly The source host or router divides packets into smaller datagrams that can be transmitted over the network. The destination host reassembles fragments when it receives them. Routing The selection of the most efficient path. Encapsulation IP forms a datagram by adding an IP header to information passed down from the transport layer protocol. Addressing Each datagram includes logical source and destination addresses. Fragmentation and reassembly The source host or router divides packets into smaller datagrams that can be transmitted over the network. The destination host reassembles fragments when it receives them. Routing The selection of the most efficient path.
5
Chapter 5: NETWORK LAYER PROTOCOLS5 DATAGRAM ENCAPSULATION
6
Chapter 5: NETWORK LAYER PROTOCOLS6 FRAGMENTATION AND REASSEMBLY Routers connect networks that support different-sized packets. The largest packet size supported by a network is called its maximum transmission unit (MTU). When a packet is too large to be forwarded to a particular network, the router splits it into fragments.
7
Chapter 5: NETWORK LAYER PROTOCOLS7 FRAGMENTATION AND REASSEMBLY Each fragment is encapsulated with a header and is transmitted as a separate packet. Fragments are not reassembled until they reach their final destination. Fragments can themselves be fragmented. Fragmentation
8
Chapter 5: NETWORK LAYER PROTOCOLS8 FRAGMENTATION AND REASSEMBLY
9
Chapter 5: NETWORK LAYER PROTOCOLS9 ROUTER FRAGMENTATION
10
Chapter 5: NETWORK LAYER PROTOCOLS10 IP HEADER AND FIELDS
11
Chapter 5: NETWORK LAYER PROTOCOLS11 IP OPTIONS HEADER AND FIELDS
12
Chapter 5: NETWORK LAYER PROTOCOLS12 Protocol Field Values (The most commonly used values) 0IP 1ICMP 3Gateway-to-Gateway Protocol (GGP) 6TCP (most expected) 8Exterior Gateway Protocol (EGP) 17UDP (most expected)
13
Chapter 5: NETWORK LAYER PROTOCOLS13 EXAMPLE OF AN IP HEADER
14
Chapter 5: NETWORK LAYER PROTOCOLS14 IP ADDRESSING IP addresses are Logical network layer addresses used to identify networks, subnetworks, and hosts 4 bytes (or 32 bits) in length and represented in dotted decimal notation The values within each byte range from 0 to 255. Public or private IP addresses are Logical network layer addresses used to identify networks, subnetworks, and hosts 4 bytes (or 32 bits) in length and represented in dotted decimal notation The values within each byte range from 0 to 255. Public or private
15
Chapter 5: NETWORK LAYER PROTOCOLS15 DECIMAL AND BINARY NUMBERING The decimal numbering system uses 10 (base 10) values to represent numbers. Uses 0–9 The binary numbering system uses 2 (base 2) values to represent numbers. Uses 0 and 1 The decimal numbering system uses 10 (base 10) values to represent numbers. Uses 0–9 The binary numbering system uses 2 (base 2) values to represent numbers. Uses 0 and 1
16
Chapter 5: NETWORK LAYER PROTOCOLS16 EXAMPLE OF 8-BIT CONVERSION
17
Chapter 5: NETWORK LAYER PROTOCOLS17 EXAMPLE OF 16-BIT CONVERSION
18
Chapter 5: NETWORK LAYER PROTOCOLS18 THREE IP ADDRESS CLASSES
19
Chapter 5: NETWORK LAYER PROTOCOLS19 THREE DEFAULT MASKS
20
Chapter 5: NETWORK LAYER PROTOCOLS20 IP ADDRESS CLASSES AND PARAMETERS
21
Chapter 5: NETWORK LAYER PROTOCOLS21 EXAMPLE OF A CLASS A ADDRESS
22
Chapter 5: NETWORK LAYER PROTOCOLS22 EXAMPLE OF A CLASS B ADDRESS
23
Chapter 5: NETWORK LAYER PROTOCOLS23 EXAMPLE OF A CLASS C ADDRESS
24
Chapter 5: NETWORK LAYER PROTOCOLS24 IP SUBNETTING Each address class can be divided further to create subnets. Subnet bits are borrowed from the available host bits. Class A: 24 host bits Class B: 16 host bits Class C: 8 host bits Bits used to define subnets cannot be used to identify hosts. Borrowed bits are added to the mask. Each address class can be divided further to create subnets. Subnet bits are borrowed from the available host bits. Class A: 24 host bits Class B: 16 host bits Class C: 8 host bits Bits used to define subnets cannot be used to identify hosts. Borrowed bits are added to the mask.
25
Chapter 5: NETWORK LAYER PROTOCOLS25 CLASS A, CLASS B, AND CLASS C SUBNETTING
26
Chapter 5: NETWORK LAYER PROTOCOLS26 CLASS C SUBNETTING EXAMPLE
27
Chapter 5: NETWORK LAYER PROTOCOLS27 CLASS C SUBNETTING EXAMPLE (CONT.)
28
Chapter 5: NETWORK LAYER PROTOCOLS28 CLASS C SUBNETTING EXAMPLE (CONT.)
29
Chapter 5: NETWORK LAYER PROTOCOLS29 PRIVATE IP ADDRESSES
30
Chapter 5: NETWORK LAYER PROTOCOLS30 INTERNET PROTOCOL VERSION 6 (IPV6) ADDRESSING Addresses the depletion of Internet Protocol version 4 (IPv4) addresses Increases the address space from 32 bits to 128 bits Addresses the depletion of Internet Protocol version 4 (IPv4) addresses Increases the address space from 32 bits to 128 bits
31
Chapter 5: NETWORK LAYER PROTOCOLS31 INTERNET PROTOCOL VERSION 6 (IPV6) ADDRESSING (CONT.) Uses six variable-length sections: Format Prefix Registry ID Provider ID Subscriber ID Subnet ID Interface ID Uses six variable-length sections: Format Prefix Registry ID Provider ID Subscriber ID Subnet ID Interface ID
32
Chapter 5: NETWORK LAYER PROTOCOLS32 EXAMPLE OF AN IPV6 ADDRESS
33
Chapter 5: NETWORK LAYER PROTOCOLS33 THE NOVELL IPX/SPX PROTOCOL SUITE
34
Chapter 5: NETWORK LAYER PROTOCOLS34 THE IPX PROTOCOL Novell’s IPX protocol is a connectionless network layer protocol that provides Datagram encapsulation Logical addressing Fragmentation and reassembly of datagrams Routing Novell’s IPX protocol is a connectionless network layer protocol that provides Datagram encapsulation Logical addressing Fragmentation and reassembly of datagrams Routing
35
Chapter 5: NETWORK LAYER PROTOCOLS35 IPX HEADER AND FIELDS
36
Chapter 5: NETWORK LAYER PROTOCOLS36 EXAMPLE OF AN IPX HEADER
37
Chapter 5: NETWORK LAYER PROTOCOLS37 IPX ADDRESSING IPX logical network layer addresses consist of three parts: Network The network portion is four bytes long and is assigned by an administrator or dynamically during installation. Node The node portion is the hardware address of the interface attached to the network. Socket The socket is a two-byte value specifying the application process. IPX logical network layer addresses consist of three parts: Network The network portion is four bytes long and is assigned by an administrator or dynamically during installation. Node The node portion is the hardware address of the interface attached to the network. Socket The socket is a two-byte value specifying the application process.
38
Chapter 5: NETWORK LAYER PROTOCOLS38 IPX ADDRESSING
39
Chapter 5: NETWORK LAYER PROTOCOLS39 IPX ROUTING PROTOCOLS There are two routing protocols in the Novell IPX/SPX suite: IPX Routing Information Protocol (RIP) IPX RIP uses broadcasts to learn and advertise routes. The entire route table is broadcast every 60 seconds. The maximum number of network hops = 15 (16 is destination unreachable). IPX RIP uses two metrics for best path selection: hops and ticks. (A tick is one-eighteenth of a second.) There are two routing protocols in the Novell IPX/SPX suite: IPX Routing Information Protocol (RIP) IPX RIP uses broadcasts to learn and advertise routes. The entire route table is broadcast every 60 seconds. The maximum number of network hops = 15 (16 is destination unreachable). IPX RIP uses two metrics for best path selection: hops and ticks. (A tick is one-eighteenth of a second.)
40
Chapter 5: NETWORK LAYER PROTOCOLS40 IPX ROUTING PROTOCOLS (CONT.) NetWare Link Services Protocol (NLSP) NLSP is a link state routing protocol. NLSP does not broadcast; it sends route information only when there is a change in the network. The maximum number of hops is 127. The metric for the best path selection is based on link parameters, not hops. NetWare Link Services Protocol (NLSP) NLSP is a link state routing protocol. NLSP does not broadcast; it sends route information only when there is a change in the network. The maximum number of hops is 127. The metric for the best path selection is based on link parameters, not hops.
41
Chapter 5: NETWORK LAYER PROTOCOLS41 IPX RIP
42
Chapter 5: NETWORK LAYER PROTOCOLS42 THE APPLETALK DATAGRAM DELIVERY PROTOCOL The DDP protocol is a connectionless network layer protocol in the AppleTalk suite that provides Datagram encapsulation Logical addressing Fragmentation and reassembly of datagrams Routing The DDP protocol is a connectionless network layer protocol in the AppleTalk suite that provides Datagram encapsulation Logical addressing Fragmentation and reassembly of datagrams Routing
43
Chapter 5: NETWORK LAYER PROTOCOLS43 DDP HEADER AND FIELDS
44
Chapter 5: NETWORK LAYER PROTOCOLS44 EXAMPLE OF A DDP HEADER
45
Chapter 5: NETWORK LAYER PROTOCOLS45 APPLETALK ADDRESSING
46
Chapter 5: NETWORK LAYER PROTOCOLS46 NETBEUI The NetBEUI protocol was developed by IBM and then adopted by Microsoft. NetBEUI is a nonroutable protocol used for delivering NetBIOS data. NetBEUI does not contain network layer addressing. The NetBEUI frame format includes two components: A data-link layer Logical Link Control (LLC) (802.2) Type II header with control fields A transport layer NetBIOS programming interface The NetBEUI protocol was developed by IBM and then adopted by Microsoft. NetBEUI is a nonroutable protocol used for delivering NetBIOS data. NetBEUI does not contain network layer addressing. The NetBEUI frame format includes two components: A data-link layer Logical Link Control (LLC) (802.2) Type II header with control fields A transport layer NetBIOS programming interface
47
Chapter 5: NETWORK LAYER PROTOCOLS47 NETBEUI FRAME FORMAT (NBF)
48
Chapter 5: NETWORK LAYER PROTOCOLS48 EXAMPLE OF A NETBEUI FRAME
49
Chapter 5: NETWORK LAYER PROTOCOLS49 SUMMARY Network layer protocols like IP, IPX, and DDP provide data encapsulation, logical addressing, fragmentation, and reassembly. There are three classes of IP addresses: Class A, Class B, and Class C. Subnet masks are used to further subdivide Class A, B, and C networks into subnets. The NetBEUI protocol is the only network layer protocol that does not provide logical network layer addressing and is therefore not routable. Network layer protocols like IP, IPX, and DDP provide data encapsulation, logical addressing, fragmentation, and reassembly. There are three classes of IP addresses: Class A, Class B, and Class C. Subnet masks are used to further subdivide Class A, B, and C networks into subnets. The NetBEUI protocol is the only network layer protocol that does not provide logical network layer addressing and is therefore not routable.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.