610 likes | 2.24k Views
Network Protocols. Why Protocols?. Rules and procedures to govern communication Some for transferring data Some for route discovery. TCP/IP. Suite of Protocols to define communication Application – client functionality Transport - moving data Network – tasks for moving data.
E N D
Why Protocols? • Rules and procedures to govern communication • Some for transferring data • Some for route discovery
TCP/IP • Suite of Protocols to define communication • Application – client functionality • Transport - moving data • Network – tasks for moving data
Steps –Sending • Protocol responsible for breaking data into smaller parts called packets • Network address is attached to packet • Data prepared for transmission and sent through NIC
Steps - Receiving • Data received, taken off network through NIC • Address information stripped • Data packets are resembles • Packets are then sent to application for use.
TCP FTP UDP TCP/IP DHCP TFTP DNS HTTP ARP SIP RTP SSH POP3 NTP IMAP4 TELNET SMTP SNMP ICMP IGMP TLS Common Protocols
TCP • Transmission Control Protocol • Connection oriented – establishes a manually acknowledged session between two hosts. • Provides reliability to IP • Flow control, sequencing, and error detection and correction. • Transport layer
TCP Connection • Sends SYN to target host • Target opens connection and sends ACK • Originated host sends ACK ready to transfer data • Called three-way handshake
UDP • User Datagram Protocol • No guarantee delivery • “fire and forget” • Uses IP • Transport layer • Lower overhead – low bandwidth
FTP • File Transfer Protocol • Uploading and downloading of files • Uses TCP as a transport protocol • Used to transfer files over the LAN • Popular to distribute files over the internet • Application layer
Common FTP commands • know
SSH • Secure Shell • Alternative to telnet • Provides security and encryption • Allows sessions to be opened on a remote host
SFTP • Secure File Transfer Protocol • Authentication between sender and receiver • Encryption – if packets copied remain hidden • Implemented though client and server software • Allows for securely uploading and downloading files to and from remote host
TFTP • Trivial File Transfer Protocol • File transfer • Not the same file security and functionality as FTP • Simple downloads – firmware • No directory navigation • Uses UDP • Application layer
SMTP • Simple Mail Transfer Protocol • How mail is sent/transported through the network • TCP • Can be used to send and receive mail • authentication
HTTP • Hypertext Transfer Protocol • Uses TCP • Allows text, graphics, multimedia and other material to be downloaded • Requests sent in clear text
HTTPS • Hypertext Transfer Protocol Secure • SSL – encrypts • Both the client and server must support
POP3/IMAP4 • Post Office Protocol 3/ Internet Message Access Protocol • Can download email but not send • Passwords transferred in clear text
Telnet • Virtual terminal protocol • Allows session to be opened and commands executed • Used to access routers and other network devices • Not secure
ICMP • Internet Control Message Protocol • Works with the IP layer to provide error checking and reporting • Tools to provide best-delivery • PING • Used for error reporting, flow control, and route testing
ARP • Address Resolution Protocol • Resolving IP addresses to MAC addresses
RARP • Reverse ARP • Resolves MAC to IP addresses • Reveres lookups in DNS
Network Time Protocol NTP • Facilitates the communication of time between systems • Important for email and directory services
Network News Transfer Protocol NNTP • Posting and retrieval of messages • Application layer
Secure Copy Protocol SCP • Secure means of copying files • Encrypts data • More secure then RCP
Lightweight Directory Access Protocol LDAP • Access and query directory services • NDS and ADS
Internet Group Management Protocol IGMP • Manages multicast • Used to register and discover devices • Routers and videoconferencing clients
Domain Name Service DNS • Resolves host names to IP addresses • Used to use txt file hosts
WINS • On windows allows NetBIOS names to be resolved to IP addresses. • If no WINS server use LMHOSTS file
Simple Network Management Protocol SNMP • Network management of devices
Dynamic Host Configuration Protocol DHCP • Automatically assigns IP addresses • Allows a range of IP addresses to be defined • Clients ask the server for and address • Lease - scope
Transport Layer Security TLS • Ensure privacy between client/server apps
Session Initiation Protocol SIP • VOIP • Establish and maintain multimedia sessions • Internet telephone calls • Uses TCP or UDP • Application layer
Real Time Transport Protocol RTP • Transport of real-time data • Does not guarantee delivery • Transport Layer
Ports • Each protocol needs a port to access and leave the system
Ports • TCP/IP has 65,535 ports • Well known – 0-1023 • Registered ports – 1024-49151 • Used by apps or services • Dynamic or private – 49152 – 65353 • Can be used for any service or app
FTP – 20 – TCP • FTP – 21 TCP • SSH – 22 TCP • Telnet – 23 – TCP • SMTP – 25 – TCP • DNS – 53 – UDP/TCP • TFTP – 69 – UDP • HTTP – 80 – TCP/UDP • POP3 – 110 – TCP
NNTP – 119 – TCP NTP – 123 – TCP IMAP4 – 143 – TCP SNMP – 161- UDP HTTPS – 443 – TCP DHCP – 67 - UDP
IP Address • Consists of a series of 32 binary bits • Grouped into four 8-bit bytes • Called and octet • Presented in decimal value • Composed of two parts • First part – network • Second part - host
Example • 192.168.18.57 • First three octets are network • 192.168.18 • Last octet identifies the host • 57
Address Ranges • Class Address Range Default Subnet Mask • A 10.0.0.0-10.255.255.255 255.0.0.0 • B 172.16.0.0-172.31.255.255 255.255.0.0 • C 192.168.0.0-192.168.255.255 255.255.255.0
Need to Know • 169.254.0.0- no DHCP server to give address • 127 loopback
Class • IP addresses are divided into 5 classes • Class A – large networks • Class B – medium sized networks – universities • Class C – small networks – ISP’s for customers • Class D – multicasting • Class E - testing
Subnet Mask • Network portion of the address • Hosts on a LAN use the same subnet mask
Subnet Mask cont • Class A – 255.0.0.0 • Class B – 255.255.0.0 • Class C – 255.255.255.0