2. protocols and standards
TRANSCRIPT
-
7/31/2019 2. Protocols and Standards
1/55
Your IT Partner
Protocols and Standards
-
7/31/2019 2. Protocols and Standards
2/55
CMC Limited
Objectives
Identify a MAC address
Understand Networking Protocol Understand Standards and the OSI Reference
Model Identify seven layers of the OSI Model and their
functions Differentiate between network protocols Identify the OSI layers at which network
components work Explain the protocols within TCP/IP Define function of TCP/UDP ports Identify well-known ports
-
7/31/2019 2. Protocols and Standards
3/55
CMC Limited
Objectives contd..
Identify the purpose of certain network services
Identify IP Addressing Explain the purpose of subnetting, subnet mask
and default gateways Differentiate between Public and Private
Networks Explain the basic characteristics of certain WAN
technologies Define the function of remote access protocols
and services Explain security protocols Explain Kerberos Authentication for Microsoft
Windows Server 2003
-
7/31/2019 2. Protocols and Standards
4/55
CMC Limited
MAC Address
MAC (Media Access Control) address is used to uniquelyidentify a node of a network.
A MAC address is also known as an Ethernet address,
hardware address, physical address.MAC addresses can be hard-coded into circuitry or storedin read-only memory (ROM), and they can be configuredusing vendor-supplied software.
-
7/31/2019 2. Protocols and Standards
5/55
CMC Limited
WINDOWS 2003 Server
Click on the Start Button Click on All Programs Next, click on Accessories, and then on
Command Prompt
Once a small black window appears, type inipconfig/all Locate the number to the right of Physical
Address. This is your MAC address
-
7/31/2019 2. Protocols and Standards
6/55
CMC Limited
WINDOWS 2003 Server contd..
Physical (MAC) address displayed under Windows 2003 Server
-
7/31/2019 2. Protocols and Standards
7/55CMC Limited
In real world, if one wants to communicate successfullywith another person a certain protocol must be followed,i.e. same language should be used and while one personspeaks the other has to listen and vice versa.
This is the analogy of protocol followed by one computer tocommunicate with another.
A protocol may be defined as a set of rules governing the
exchange of data between two entities.
Networking Protocol
-
7/31/2019 2. Protocols and Standards
8/55CMC Limited
It has long been accepted in the communications industrythat standards are required to govern the physical,electrical, and procedural characteristics of communicationequipment.
A standard is a prescribed set of rules, conditions, orrequirements concerning definition of terms; classificationof components; specification of materials, performance, oroperations; delineation of procedures; or measurement of
quantity and quality in describing materials, products,systems, services or practices.
Standards
-
7/31/2019 2. Protocols and Standards
9/55CMC Limited
The OSI Reference Model
ISO (International Standards Organization) has promotedthe Open Systems Interconnection (OSI) model.
The purpose of this International Standard ReferenceModel is to provide a common basis for the coordination ofdevelopment of standards for the purpose of systemsinterconnection, while allowing existing standards to beplaced into perspective within the overall Reference Model.
Standard provides a conceptual and functional framework.
-
7/31/2019 2. Protocols and Standards
10/55CMC Limited
The OSI LayersThe OSI model categorizes the various processes needed
in a communications session into seven distinct functionallayers.
The seven layers of OSI Model are as follows:
Physical Data Link Network Transport
Session Presentation Application
-
7/31/2019 2. Protocols and Standards
11/55CMC Limited
Physical Layer
The physical layer is concerned with transmission of
unstructured bit stream over physical link.
It deals with the mechanical, electrical and proceduralcharacteristics to establish, maintain and deactivate the
physical link.
This is bottom layer of OSI model and is responsible for thetransmission of bit stream from one node to another.
Similarly, it passes to the Data Link Layer any datareceived from the physical medium.
The OSI Layers contd..
-
7/31/2019 2. Protocols and Standards
12/55CMC Limited
Data Link Layer
The data link layer provides reliable transfer of data acrossthe physical link.
The Data Link layer is responsible for detecting andcorrecting any errors resulting in frames not reaching the
destination or becoming damaged and unusable during thetransmit.
The Data Link Layer takes the help of Layer 1 below and
provides the service to the Network Layer (Layer 3).
It provides end-to-end validity of the data being transmitted.
The OSI Layers contd..
-
7/31/2019 2. Protocols and Standards
13/55CMC Limited
Network Layer
The network layer provides upper layers withindependence from the data transmission and switchingtechnologies used to connect systems.
It establishes network connection and is responsible forestablishing the route to be used between the originatingand destination nodes.
The Network Layer is responsible for establishing the
connection to the node identified in the packet.
The OSI Layers contd..
-
7/31/2019 2. Protocols and Standards
14/55CMC Limited
Transport Layer
The transport layer provides reliable, transparent transfer
of data between end points and provides end-to-end errorrecovery and flow control.
It provides reliable virtual circuit for upper layers and
sequencing of packets.
At the receiving node, these fragments need to beassembled into the proper sequence.
The Transport layer provides these services and ensuresthe reliability of the packet.
The OSI Layers contd..
-
7/31/2019 2. Protocols and Standards
15/55CMC Limited
Session Layer
The session layer provides the control structure for
communication between applications.
It establishes, manages and terminates connections(sessions) between cooperating applications.
Presentation Layer
The presentation layer performs generally usefultransformations on data to provide a standardized
application interface and to provide commoncommunications services; for example: encryption, textcompression, reformatting, code conversion etc.
The OSI Layers contd..
-
7/31/2019 2. Protocols and Standards
16/55CMC Limited
Application Layer
The application layer provides services to the users of the
OSI environment; for example: transaction server, filetransfer protocol, network management.
It is the top layer in OSI model and provides the interface
between applications and the network.
Popular Protocols
Some of the most popular protocols are TCP/IP, IPX/SPX,NETBEUI and AppleTalk.
The OSI Layers contd..
P l P l d
-
7/31/2019 2. Protocols and Standards
17/55CMC Limited
TCP/IP
The IP component provides routing from the department tothe enterprise network, then to regional networks andfinally to the global Internet.
While IP (Internet Protocol) takes care of handling the
actual delivery of data, TCP takes care of individual units ofdata (called packets).
This design allows the construction of very large networks
with less central management.
Popular Protocols contd..
P l P l d
-
7/31/2019 2. Protocols and Standards
18/55CMC Limited
IPX/SPX
IPX (Internetwork Packet Exchange) and SPX (SequencedPacket Exchange) are protocols developed by Novell andare used in NetWare based Networks.
They are based on protocols used in Xerox's XNS networkarchitecture.
IPX is a connection less protocol that works at networklayer of OSI Model.
Popular Protocols contd..
P l P t l td
-
7/31/2019 2. Protocols and Standards
19/55CMC Limited
NetBEUI
NetBIOS Extended User Interface also known as NetBEUI.
NetBEUI was mainly extended as a basic protocol tosupport NETBIOS, the windows standard for workstationnaming, communication and sharing. NetBEUI is used forworkgroup-size local area networks (LANs) with up to 200
stations.
NetBEUI was the primary protocol for LAN Manager andWindows for Workgroups.
It defines a framing mechanism at the transport layer andimplements the LLC2 protocol of the Open SystemsInterconnection (OSI) reference model for networking.
Popular Protocols contd..
P l P t l td
-
7/31/2019 2. Protocols and Standards
20/55CMC Limited
AppleTalk
AppleTalk enables users to share folders and printers for
access by other network users.
AppleTalk is a legacy technology that has been largelyreplaced by Apple Open Transport, which supports
AppleTalk, TCP/IP, and other popular network protocols.
AppleTalk is a workgroup-level networking technology thatsupports up to 254 network nodes per physical network.
AppleTalk is a suite of networking protocols that worktogether to provide file and print sharing services toMacintosh networks.
Popular Protocols contd..
-
7/31/2019 2. Protocols and Standards
21/55
CMC Limited
How TCP/IP protocol worksWhen the application needs to send a large junk of data, it
is the responsibility of the TCP layer to fragment this intosmaller, manageable packets.
It is the responsibility of the TCP to ensure that the packetsof data are fragmented and transmitted. IP takes care of
routing the data packets so that it reaches its destination.
These packets may traverse through different parts andreach the destination in different order.
The TCP at the receiving end assembles it in the properorder and passes it to the application level at thedestination.
-
7/31/2019 2. Protocols and Standards
22/55
CMC Limited
Layers of TCP/IPTCP/IP consists of five layers, which include:
Application Layer
The Application layer provides the ability to access theservices of the other layers and defines the protocols that
used to exchange data.
There are many Application layer protocols and newprotocols are still evolving.
Access layer Internet layer Transport layer Application Layer
A li ti L td
-
7/31/2019 2. Protocols and Standards
23/55
CMC Limited
FTP: FTP (File Transfer Protocol) permits files to betransferred from one computer to another using a TCP
connection. FTP uses port 20 or 21.
TELNET: Telnet is the TCP/IP protocol for remote logon.TELNET uses port 23.
SMTP: SMTP (Simple Mail Transfer Protocol) provides thebasis for a network electronic mail facility.HTTP: HTTP (Hypertext transfer protocol) facilitates theviewing of multimedia files from the World Wide Web.
Application Layer contd..
Application Layer contd
-
7/31/2019 2. Protocols and Standards
24/55
CMC Limited
TFTP: TFTP is used for reading and writing files. It doesnot support directory service of user authorization.
S-HTTP: Secure HTTP (S-HTTP) provides securecommunication mechanisms between an HTTP client-server pair in order to enable spontaneous commercial
transactions for a wide range of applications.
SNMP: SNMP (Simple Network Management Protocol) is asimple protocol that gives the architecture specification anddefines messages related to network management.
POP3: The Post Office Protocol version 3 (POP3) isintended to permit a workstation to dynamically access amaildrop on a server host.
Application Layer contd..
Application Layer contd
-
7/31/2019 2. Protocols and Standards
25/55
CMC Limited
IMAP4: The Internet Message Access Protocol, Version
4rev1 (IMAP4) allows a client to access and manipulateelectronic mail messages on a server.
NTP: The Network Time Protocol (NTP) is a timesynchronization system for computer clocks through the
Internet network.
Application Layer contd..
-
7/31/2019 2. Protocols and Standards
26/55
CMC Limited
Transport Layer
This layer provides service to the Application Layer.
The Transport layer is responsible for providing theApplication layer with session and datagramcommunication services.
TCP
The TCP is responsible for verifying the correct delivery ofdata from client to server.
TCP adds support to detect errors or lost data and totrigger retransmission until the data is correctly andcompletely received.
Transport Layer contd
-
7/31/2019 2. Protocols and Standards
27/55
CMC Limited
UDP
UDP (User Datagram Protocol) like TCP facilitates thetransmission of data streams (e.g. a complete emailmessage) between applications running on different hosts.
Unlike TCP, UDP does not divide its data packets nor doesit provide sequencing of packets.
Transport Layer contd..
-
7/31/2019 2. Protocols and Standards
28/55
CMC Limited
Internet layer
This layer is primarily responsible for addressing and
routing packets between hosts.
IP is a connectionless, unreliable datagram protocolprimarily responsible for addressing and routing packets
between hosts
IP
Internet Protocol is implemented in each endpoint
computer and in every gateway. IP running in a hostcomputer accepts data in segments from TCP and sendsthem out across the internet.
-
7/31/2019 2. Protocols and Standards
29/55
CMC Limited
Network Components
Basic network components are:
Cables Network Adapter Cards Hubs Switching Hubs
Cables: The two most popular types of network cablingare twisted-pair (also known as 10BaseT) and thin coax(also known as 10Base2).
Network Adapter Card: A network computer isconnected to the network cabling with a networkinterface card, (also called a "NIC", "nick", or networkadapter).
Network Components contd
-
7/31/2019 2. Protocols and Standards
30/55
CMC Limited
Hub: The central connecting device is called a hub. A
hub is a box that is used to gather groups of PCstogether at a central location with 10BaseT cabling.
Switching Hub: The Switching hub, sometimes called a"Switch" is a more advanced unit over the basic hub.
Network Components contd..
-
7/31/2019 2. Protocols and Standards
31/55
CMC Limited
Data Link Layer
The data link layer is the second last layer in the stack.
The two major protocols utilized by Data Link layer are:ARP (Address Resolution Protocol) and RARP (ReverseAddress resolution Protocol).
Data Link Layer is composed of Network hardware anddevice drivers. The common technologies used in LAN areEthernet and Token Ring.
ARP: ARP is a protocol used for converting an IP addressto the actual address of the computer that is recognized inthe local network.
Data Link Layer contd
-
7/31/2019 2. Protocols and Standards
32/55
CMC Limited
RARP: RARP converts physical network addresses into IPaddresses.
SLIP and PPP are two protocols that allow two computersto communicate using a serial interface.
Data Link Layer contd..
Physical LayerThe Physical Layer is the lower-most layer in TCP/IPprotocol.
This layer deals with the Hardware part, through whichdata is being transmitted.
It specifies compatibility standards and signal voltages.
-
7/31/2019 2. Protocols and Standards
33/55
CMC Limited
TCP/UDP Ports
Ports are used in TCP or UDP communications to name
the ends of logical connections that transfer data.
These are used to provide access to a host computer.
In TCP/IP networking, a
port is a mechanism that allows acomputer to simultaneously support multiplecommunication sessions with computers and programs onthe network.
A port directs the request to a particular service that can befound at that IP address.
-
7/31/2019 2. Protocols and Standards
34/55
CMC Limited
Network Services
BOOTPBOOTP (Bootstrap Protocol) is an Internet protocol thatenables a diskless workstation to discover its own IPaddress.
DHCP
The Dynamic Host Configuration Protocol (DHCP) providesInternet hosts with configuration parameters.
-
7/31/2019 2. Protocols and Standards
35/55
CMC Limited
NATNAT (Network Address Translation) is an Internet standard
that enables a local area network (LAN) to use one set ofIP addresses for internal traffic and a second set ofaddresses for external traffic.
ICSICS (Internet connection sharing) is a method used forconnecting multiple computers in a LAN to the Internetthrough a single connection and a single IP address.
DNS
The Domain Name Service (DNS) protocol searches for
resources using a database distributed among differentname servers.
-
7/31/2019 2. Protocols and Standards
36/55
CMC Limited
SNMP
The Internet community developed SNMP (Simple NetworkMessage Protocol) to allow diverse network objects toparticipate in global network management architecture.
WINS
WINS (Windows Internet Naming Service), a system, which
determines the IP address associated with a particularnetwork computer.
-
7/31/2019 2. Protocols and Standards
37/55
CMC Limited
IP Addressing Architecture
IP address is a logical address assigned to a specific node.
A unique IP address is required for each host and networkcomponent that communicates using TCP/IP.
An IP address uniquely identifies a node or host on an IPnetwork.
S b tti
-
7/31/2019 2. Protocols and Standards
38/55
CMC Limited
SubnettingThe process of partitioning a single TCP/IP network into anumber of separate networks called subnets.
Subnetting was introduced to overcome some of theproblems that parts of the Internet were beginning toexperience with the two-level addressing hierarchy:
Subnet MaskA subnet mask is a 32-bit number that is used to partitionIP addresses into a network ID and a host ID.
Subnet masks are represented as four-octet dotted-decimal numbers, just as IP addresses are, except that themost common values for an octet in a subnet mask are 0and 255.
-
7/31/2019 2. Protocols and Standards
39/55
CMC Limited
Default Gateway
To send a packet to a destination subnet a host on a
network consults its internal routing table to determinewhich router to forward the packet to in order to have itreach the destination subnet.
If the routing table does not contain any routing informationabout the destination subnet, the packet is forwarded to thedefault gateway.
The host assumes that the default gateway knows what to
do with any packets that the host itself does not know howto forward.
-
7/31/2019 2. Protocols and Standards
40/55
CMC Limited
Public Vs Private Networks
A home or a small office, which has a computer networkthat has Internet Connection Sharing (ICS) enabled, hastwo network connections one public and one private.
The public network connection is the connection to theInternet.
The private side of the network is the computers that are
connected together and communicate with each other.
-
7/31/2019 2. Protocols and Standards
41/55
CMC Limited
WAN Technologies
Switching Techniques
For transmission of data, voice and images beyond a localarea, communication is normally achieved by transmittingdata from source to destination through a network ofintermediate switching nodes.
Their purpose is to provide a switching facility that willmove the data from one node to another until the datareaches their destination.
The most common switching techniquesare:circuit switching, message switching and packet switching.
-
7/31/2019 2. Protocols and Standards
42/55
CMC Limited
Circuit Switching
Circuit switching is the dominant technology for voice as
well as data communication today.
Circuit switching implies that there is a dedicatedcommunication path between two end-stations.
Packet Switching
Instead of transmitting the complete data end-to-end, datais transmitted in short packets.
A typical upper limit on packet length is 1 kilobyte. Eachpacket contains a portion of the users data plus somecontrol information.
-
7/31/2019 2. Protocols and Standards
43/55
CMC Limited
ISDN
ISDN (Integrated Services Digital Network) is an
international communications standard for sending voice,video, and data over digital telephone lines or normaltelephone wires.
ISDN supports data transfer rates of 64 Kbps (64,000 bitsper second).
FDDI
FDDI (Fibre Distributed Data Interface) is a high-performance optic token ring LAN running at 100 Mbpsover distances up to 200 km with up to 1000 stationsconnected.
-
7/31/2019 2. Protocols and Standards
44/55
CMC Limited
ATM (Asynchronous Transfer Mode)
ATM is a high speed, broadband transmission data
communication technology based on packet switching.
It is used by telephone companies, long distance carriers,and campus-wide backbone networks to carry integrated
data, voice, and video information.
It can work with either permanent virtual circuits (PVCs) orswitched virtual circuits (SVCs), depending on your widearea network (WAN) traffic needs.
The two main benefits of ATM are its high transmissionspeeds and its flexible bandwidth-on-demand capability.
-
7/31/2019 2. Protocols and Standards
45/55
CMC Limited
Frame Relay
Frame relay is a packet switching protocol for connecting
devices on a Wide Area Network.
It is a recently introduced service to transfer bits at areasonable speed and low cost.
Sonet/SDH
SONET is a Fibre optic WAN technology used to delivervoice, data, and video.
SONET networks are often used by telecommunicationproviders to provide the underlying transport mechanismfor Asynchronous Transfer Mode (ATM), networking.
-
7/31/2019 2. Protocols and Standards
46/55
CMC Limited
T-Carrier
It is a series of digital communication services provided by
telephone companies for high-speed permanent voice anddata connections.
E-carrier
E-carrier services are generally available wherever theparallel T-carrier services are not.
E-carrier services can be used for wide area network
(WAN) connections, for high-speed Internet connections,for private videoconferencing services, and for public framerelay services.
-
7/31/2019 2. Protocols and Standards
47/55
CMC Limited
Optical Carrier (OC-x)
Optical Carrier (OC-x) is a set of signaling rates designedfor transmission over Synchronous Optical Network(SONET).
The term opticalcarrier indicates that SONET runs over
Fibre-optic cabling.
Remote access protocols and services
RAS allows users to gain access to files and print serviceson the LAN from a remote location.
RAS
RAS contd..
-
7/31/2019 2. Protocols and Standards
48/55
CMC Limited
Microsoft allows remote node remote access functionalityon both its Windows NT/2000 platform, which allowsremote users to connect to a Windows NT/2000basednetwork.
In a mixed environment of Windows NT and Windows 2000RAS and RRAS servers, there are some limitations on
these tools .
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP) is an industry standard data-link layer protocol for wide area network (WAN)transmission that was developed in the early 1990s.
-
7/31/2019 2. Protocols and Standards
49/55
CMC Limited
Point-to-Point Tunneling Protocol (PPTP)
Tunneling is a technology for sending frames from one
network to another.
It enables network traffic to be encapsulated and routedover an unsecured public network such as the Internet.
Point-to-Point Tunneling Protocol (PPTP) allows thecreation of virtual private networks (VPNs), which tunnelTCP/IP traffic through the Internet.
PPTP is an extension of PPP and is based on PPPnegotiation, authentication, and encryption schemes.
-
7/31/2019 2. Protocols and Standards
50/55
CMC Limited
Independent Computing Architecture (ICA)
Independent Computing Architecture (ICA) is a general-purpose presentation services protocol for MicrosoftWindows operating system platforms.
ICA allows the user interface of an application to run withminimal consumption of resources on a client device whilethe actual application logic executes on an ICA-enabledserver.
-
7/31/2019 2. Protocols and Standards
51/55
CMC Limited
Security Protocols
Internet Protocol Security (IPSec)
IPSec is a protocol for negotiating and controlling thesecurity of transmissions over a TCP/IP internetwork.
IPSec defines standards for data encryption and dataintegrity at the level of Internet Protocol (IP) datagrams andcan be used to encrypt transmission of data and ensurethat the data originated from the sender and was notmodified in transit.
-
7/31/2019 2. Protocols and Standards
52/55
CMC Limited
Layer 2 Tunneling Protocol (L2TP)
L2TP is an Internet Engineering Task Force (IETF)
standard tunneling protocol, which is used to encapsulatePoint-to-Point Protocol (PPP) frames for transmission overTCP/IP, X.25, frame relay, or Asynchronous Transfer Mode(ATM) networks.
L2TP supports several of the authentication optionssupported by PPP.
These include Password Authentication Protocol (PAP),
Challenge Handshake Authentication Protocol (CHAP), andMicrosoft Challenge Handshake Authentication Protocol(MS-CHAP).
-
7/31/2019 2. Protocols and Standards
53/55
CMC Limited
Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL) is a handshaking protocol for
communication over the Internet that provides secureauthentication and data encryption.
Kerberos Version 5 Authentication Protocol
The Kerberos version 5 provides a means of verifying theidentities of principals on an open, potentially insecurenetwork.
It discusses how the RFC standard Kerberos version 5authentication protocol is used in Windows Server 2003.
-
7/31/2019 2. Protocols and Standards
54/55
CMC Limited
Domain.msc: Active Directory Domains and Trusts
Dsa.msc: Active Directory Users and Computers
Eventvwr.msc: Event Viewer
Kerbtray.exe: Kerberos Tray
Klist.exe: Kerberos List
Ksetup.exe: Kerberos Setup
Kerberos Authentication Tools and Settings
Kerberos Authentication Tools and Settings contd..
-
7/31/2019 2. Protocols and Standards
55/55
Ktpass.exe: Kerberos Keytab Setup
Netdom.exe: Windows Domain Manager
Netmon.exe: Network Monitor
Setspn.exe: Manipulate Service Principal Names forAccounts