Beruflich Dokumente
Kultur Dokumente
N+
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
An Introduction to Networking
N+ Certification
Introducing Networks A network is an interconnection of a group of computers that can communicate and share resources such as hard disks and printers. A network is a group of computers and other devices that are connected by some type of transmission media. The initial idea of a network was perceived by Department of Defense (DOD) in USA for the purpose of security. Some advantages of networks are:
Sharing of information across the network Optimum utilization of hardware resources Centralization of data management
N+ Certification
How Networks Are Used File services: capability of a server to share data files, applications, and disk storage space. Print services: used to share printers across a network. Communications services: Allow remote users to connect to the
remote network.
Mail services: Transfer of e-mail between users on a network. Internet services: Supplying Web pages, file transfer capabilities, and a means for directly logging on to other computers on the Internet. Management services: centrally administer management tasks on the network like Traffic monitoring and control.
N+ Certification
Understanding Internetworking Servers Internetworking services are the services in a networking environment that are accessible to users within an intranet or the Internet. The following are some of the services provided by the Internetworking servers:
File Transfer WWW E-mail
N+ Certification
Network Topologies
N+ Certification
Network Topologies Network topology is a schematic layout or a map of the arrangement of nodes over a network. This layout also determines the manner in which information is exchanged within the network. There are five types of network topologies:
Bus Star Ring Mesh Cellular
N+ Certification
Bus Topology The bus topology connects all the nodes on a network to a main cable called bus. In the bus topology, each packet that is placed on the bus contains the address of the destination node and is transmitted in both directions along the bus. A single high capacity cable is required thus requiring minimum cabling and its cost. Entire cable setup needs to be reconfigured to add a node. Time consuming process to troubleshoot as every point needs to be checked to locate the fault.
N+ Certification
Bus Topology (Continued)
network
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Star Topology The star topology connects nodes over a network using a central control unit called the hub. Nodes to a star-based network can be easily attached to the hub. All the nodes are connected to the hub thus requiring lot of cabling and cost. A faulty hub can disrupt the entire network.
N+ Certification
Star Topology (Continued)
N+ Certification
Ring Topology The ring topology connects the nodes on a network through a point-to-point connection. Easy to locate cable faults in a ring. The entire network stops functioning, if any of the nodes in the network malfunctions.
N+ Certification
Ring Topology (Continued)
N+ Certification
Mesh Topology The mesh topology involves point-to-point connection between every node in the network. High reliable as network connectivity does not depend on any one node. Useful for large network connections. Involves high installation and setup costs due to elaborate cabling required to connect each node with the other node. Difficult to manage as the size of the network increases.
N+ Certification
Cellular Topology The cellular topology is a wireless topology, where geographic area is divided into cells or regions. In cellular topology, each cell is a separate entity that is controlled by a central station. Operates on wireless media, thus do not require cabling. Easy to install as only requirement is the availability of a central location and signal strength.
Cell Node
N+ Certification
Network Categories
N+ Certification
Network Categories
The resources and software capabilities that nodes in a network share are commonly known as services. Networks are categorized as:
Peer-to-peer Client / Server
N+ Certification
Peer-to-Peer Networks In a peer-to-peer network, there is no specific distinction between a client and a server. Every computer can communicate directly with every other computer. By default, no computer has more authority than another. Every computer is capable of sending and receiving information to and from every other computer. The following figure illustrates the peer-to-peer network:
N+ Certification
Peer-to-Peer Networks (Continued)
N+ Certification
Client / Server Networks In a client / server network, the requests are processed centrally by one or more servers. The server is a system with high processing power, which provides services for the other computers in a network. The client is a system that accesses resources available on a server. In a client / server network setup, the server is responsible for processing the requests sent by the clients.
N+ Certification
Client / Server Networks (Continued)
N+ Certification
Client / Server Networks (Continued) Advantages of using client/server networks over peer-to-peer networks:
User logon accounts and passwords can be assigned in one place. Access to multiple shared resources can be centrally granted to a single user or groups of users. Problems can be tracked, diagnosed, and often fixed from one location. Servers are optimized to handle heavy processing loads and dedicated to handling requests from clients, enabling faster response time. Because of their efficient processing and larger disk storage, servers can connect more than a handful of computers on a network. To function as a server, a computer must be running a network operating system (NOS).
N+ Certification
Elements of Client / Server Networks Client Server Network interface card (NIC) NOS Connectivity device
N+ Certification
N+ Certification
Network Operating System Network Operating System (NOS) is an enhanced version of an operating system, with features that allow the management and connectivity of nodes within a network. NOS allows the sharing of information and resources based on the accessibility privileges allocated to each user or node. Popular NOSs include:
Windows Server 2008 R2 UNIX Linux
N+ Certification
Functions of Network Operating System Centrally manage network resources, such as programs, data, and devices. Allow remote users to connect to a network. Allow users to connect to other networks. Secure access to a network. Data backup & restore. Allow for simple additions of clients and resources. Monitor status and functionality of network elements. Distribute programs and software updates to clients. Provide fault tolerance in case of a hardware or software problem.
N+ Certification
Windows Server 2008 R2 Windows Server 2008 R2 is a 64-bit operating system. It is a Microsoft product, which operates on single and multiprocessor systems. The features of the Windows Server 2008 R2 operating system are as follows:
Active Directory Virtual Private Networks (VPNs) Terminal services NTFS Windows Deployment Services Hyper V IPv6 Implementation
N+ Certification
UNIX Bell Labs launched the UNIX network operating system. Many versions of UNIX, such as Sun Solaris, AIX UNIX, HP UNIX, and BSD, are available in the market. Some of the features of UNIX, which allow networking at the operating system level, are:
Internet-based services Compatibility with different protocols Network security
N+ Certification
LINUX The Linux network operating system, developed by Linus Torvalds, is based on the UNIX architecture. Linux is an open source operating system in which the source code or the program of the operating system is available free of cost. This provides flexibility to the user to modify the operating system according to individual requirements. Linux provides services like Apache, Samba and NFS.
N+ Certification
Types of Network
N+ Certification
Types of Network Depending on the size and the area that networks cover, the networks are primarily categorized into the following types:
Local Area Networks (LANs) Wide Area Networks (WANs)
N+ Certification
Local Area Network A LAN is a small-scale network that extends over relatively small distances. The following figure depicts a typical LAN setup:
Node1
Node 2
Node 3
N+ Certification
Wide Area Network A Wide Area Network (WAN) provides network connectivity spanning across large geographical area, such as across states, countries, or across the globe. The following figure depicts WAN connectivity between two buildings at Miami and Texas, across the Internet using the services of a service provider.
N+ Certification
Transmission Basics
N+ Certification
Transmission Direction There are 3 different transmission modes characterized according to the direction of the exchanges:
Simplex Half-Duplex Full-Duplex (Duplex)
N+ Certification
Transmission Direction (Continued) Simplex: signals may travel in only one direction.
Half-Duplex: signals may travel in both directions over a medium but only one direction at a time.
Full-Duplex or Duplex: signals free to travel in both directions over a medium simultaneously.
N+ Certification
Bandwidth In computer networking bandwidth refers to the data rate supported by a network connection. In the field of electrical engineering, bandwidth represents the difference between highest and lowest frequencies that a medium can transmit.
N+ Certification
Latency Delay between transmission and receipt of a signal.
Many possible causes: Cable length Inter connectivity device e.g. routers.
Round Trip Time (RTT) Time for packets to go from sender to receiver and back.
N+ Certification
Throughput In communication networks, network throughput is the average rate of successful message delivery over a communication channel. The throughput is usually measured in bits per second (bps).
N+ Certification
Baseband In Baseband networks a digital signal is placed directly on the transmission medium without requiring a carrier, i.e. without modulation. Only one signal may be present on the baseband channel at a time. Baseband networks may use twisted pair, coaxial cable, or optical fiber for data transmission.
N+ Certification
Broadband A term used to describe a network that can transmit a wide range of signals, including audio and video. Broadband networks are especially useful in the Networked World, as they can carry many signals at once, resulting in faster data transmission.
N+ Certification
Transmission Flaws (Noise) Electro Magnetic Interference: also called Radio Frequency Interference RFI) is a disturbance that affects an electrical circuit due to either electromagnetic induction or electromagnetic radiation emitted from an external source such as electrical devices or cables. Crosstalk: refers to electromagnetic interference from one unshielded twisted pair to another twisted pair, normally running in parallel. In that case signal traveling on a wire or cable infringes on signal traveling over adjacent wire or cable. Certain amount of signal noise is unavoidable. All forms of noise measured in decibels (db).
N+ Certification
Attenuation Attenuation is a general term that refers to any reduction in the strength of a signal. Attenuation occurs with any type of signal, whether digital or analog. Sometimes called loss, attenuation is a natural consequence of signal transmission over long distances.
N+ Certification
Transmission Media
N+ Certification
Transmission Media The physical channel that is used for connecting the components of a network, such as nodes and printers, is known as transmission medium. The types of transmission media include the following:
Cables Wireless
N+ Certification
Cables Cables are the conventional media used to setup networks.
There are three types of cables:
N+ Certification
Coaxial Cables These cables are designed in such a manner that the center conductor and the outside braided metal shield share a common axis.
N+ Certification
Twisted Pair Cables These cables use copper wires, which are good conductors of electricity. Color-coded pairs of insulated copper wires twisted together. Twist ratio: twists per meter or foot. Higher twist ratio reduces crosstalk and increases attenuation
N+ Certification
Types of Twisted Pair Cables There are two types of twisted pair cables:
N+ Certification
Shielded Twisted Pair (STP) These cables consist of multiple twisted pairs (TPs) surrounded by an insulator shield. This insulator shield, in turn, is covered with a plastic encasement.
N+ Certification
Shielded Twisted Pair (STP) (Continued)
N+ Certification
Unshielded Twisted Pair (UTP) These cables consist of a set of twisted pairs that are covered with a plastic jacket, as shown in the following figure. Most common form of cabling found on LANs today. TIA/EIA 568 standard divides twisted-pair wiring into several categories: CAT 3, 4, 5, 5e, 6, 6e, 7
N+ Certification
Categories of Unshielded Twisted Pair (UTP) CAT 3 (Category 3): up to 10 Mbps of throughput CAT 4 (Category 4): 16 Mbps throughput CAT 5 (Category 5): up to 1000 Mbps throughput CAT 5e (Enhanced Category 5): higher twist ratio CAT 6 (Category 6): six times the throughput of CAT 5 CAT 6e (Enhanced Category 6): reduced attenuation and crosstalk CAT 7 (Category 7): signal rates up to 1 GHz
N+ Certification
Comparing STP & UTP STP cables are shielded while UTP cables are unshielded. STP cables are more immune to interference and noise than UTP cables. STP cables are better at maximizing bandwidth compared to UTP cables. STP cables cost more per meter compared to UTP cables. STP cables are heavier per meter compared to UTP cables. UTP cables are more prevalent in SOHO networks while STP is used in more high-end networks.
N+ Certification
Fiber-optic These cables are based on fiber optic technology, which uses light rays instead of electricity to transmit data. The following figure shows a fiber-optic cable. Contains glass or plastic fibers at core surrounded by layer of glass or plastic cladding. Reflects light back to core.
N+ Certification
Types of Fiber-optic Fiber-optic cables can be differentiated into the following two categories: Single-mode Multimode
N+ Certification
Single Mode Fiber Narrow core through which laser-generated light travels over one path, reflecting very little. Accommodates high bandwidths and long distances. Expensive.
N+ Certification
Multi Mode Fiber Multi-mode optical fiber is a type of optical fiber mostly used for communication over short distances, such as within a building or on a campus.
N+ Certification
Benefits over copper cabling Nearly unlimited throughput. Transmission rates exceed 10 Gigabits per second. Very high resistance to noise. Excellent security. Ability to carry signals for much longer distances before requiring repeaters than copper cable. Cost: most expensive transmission medium. Connector: uses 10 different types of connectors. Typically use SC, ST & MTRJ connectors. Noise immunity: unaffected by EMI. Size and scalability: segment lengths vary from 150 to 40,000 meters. Industry standard for high-speed networking.
N+ Certification
Wireless Transmission The wireless technology helps connect distant networks, without needing to physically set up cables between the destination and the source point. In a wireless setup, the atmosphere is used to transmit and receive signals in the form of electro-magnetic waves through an antenna. These electro-magnetic waves can be transmitted through different types of wireless transmission carriers, which include the following:
Radio: Radio transmissions operate on radio waves. Radio waves are only limited to low transmission capacities, from 1 Mbps to 10 Mbps. Microwave: Microwaves transmit data over a higher bandwidth as compared to radio transmissions. Infrared: Infrared transmissions use infrared radiation to transmit data. Infrared is an electro-magnetic radiation.
N+ Certification
N+ Certification
Connectors for Coaxial Cable
N+ Certification
Connectors for UTP Cable
N+ Certification
Connectors for Fiber-optic Cable
MTRJ
SC
ST
N+ Certification
Media Converters Media converters are simple networking devices that make it possible to connect two dissimilar media types such as twisted pair with fiber optic cabling.
N+ Certification
N+ Certification
The OSI Model Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s.
N+ Certification
N+ Certification
The OSI Model
N+ Certification
Why a Layered Network Model?
Reduces complexity (one big problem to seven smaller ones) Standardizes networking Simplifies teaching and learning
N+ Certification
N+ Certification
OSI layers
N+ Certification
An exchange using the OSI model
N+ Certification
Physical layer
N+ Certification
Note: The physical layer is responsible for the movement of individual bits from one node to the next.
N+ Certification
Data link layer
N+ Certification
Note: The data link layer is responsible for moving frames from one hop (node) to the next.
N+ Certification
Hop-to-hop delivery
N+ Certification
Network layer
N+ Certification
Note: The network layer is responsible for the delivery of individual packets from the source host to the destination host.
N+ Certification
Source-to-destination delivery
N+ Certification
Transport layer
N+ Certification
Note: The transport layer is responsible for the delivery of a message from one process to another.
N+ Certification
Reliable process-to-process delivery of a message
N+ Certification
Session layer
N+ Certification
Note: Session layer is responsible for establishing, managing, and terminating the communication between the two nodes.
N+ Certification
Presentation layer
N+ Certification
Note: Presentation layer is responsible for encoding & decoding, compression & decompression, encryption & decryption of data.
N+ Certification
Application layer
N+ Certification
Note: Application layer provides the interface between the user and the network.
N+ Certification
Summary of layers
N+ Certification
Application Layer
Application
Provides network access to application programs (such as electronic mail, file transfer)
N+ Certification
Presentation Layer
7 6
Application
Network access to application programs Data representation Ensures data is readable by receiving system Format of data Negotiates data transfer syntax for application layer
Presentation
N+ Certification
Session Layer
7 6 5
Application
Network services to applications Data representation Inter-host communication Establishes, manages, and terminates sessions between applications
Presentation
Session
N+ Certification
Transport Layer
7 6 5
Application
Network services to applications Data representation Inter-host communication End-to-end connection reliability Concerned with data transport issues between hosts Data transport reliability Establishes, maintains, and terminates virtual circuits Error detection and recovery Information flow control
Presentation
Session
Transport
N+ Certification
Network Layer
7 6 5
Application
Network services to applications Data representation Inter-host communication End-to-end connection reliability Addresses and best path Define Logical addressing and path selection between two end systems Routing of packets
Presentation
Session
4
3
Transport
Network
N+ Certification
Data Link Layer 7 6 5 4 Application Presentation Session Transport Network Data Link Network services to applications Data representation
3
2
N+ Certification
Physical Layer 7
Application
Presentation Session Transport Network Data Link Physical
6
5 4 3 2 1
Data representation
Inter-host communication End-to-end connection reliability
N+ Certification
Communication
Host A
7 6 Application Presentation
5
4 3
Session
Transport Network Segments Packets Frames Bits
Session
Transport Network
2
1
Data Link
Physical
Data Link
Physical
N+ Certification
Data Encapsulation
Host A
Application Presentation
Host B
Session
Transport Network Data Link Physical
} {
Data
Application Presentation
Session
Transport Network Data Link Physical
N+ Certification
Data Encapsulation (Continued)
Host A
Application Presentation
Host B
Session
Transport Network Data Link Physical
} {
Data Network Data Header
Application Presentation
Session
Transport Network Data Link Physical
N+ Certification
Data Encapsulation (Continued)
Host A
Application Presentation
Host B
Session
Transport Network Data Link Physical
} {
Data Network Data Header Frame Header Network Header Frame Trailer Data
Application Presentation
Session
Transport Network Data Link Physical
N+ Certification
Data Encapsulation (Continued)
Host A
Application Presentation
Host B
Session
Transport Network Data Link Physical
} {
Data Network Data Header Frame Header Network Header Frame Trailer Data
Application Presentation
Session
Transport Network Data Link Physical
0101101010110001
N+ Certification
Host Layers
7 6 5 4 3
2 1
N+ Certification
Media Layers
7 6 5 4 3
}
}
2 1
N+ Certification
Physical Layer The Physical layer specifies the electrical, mechanical, procedural, and functional requirements for activating, maintaining, and deactivating a physical link between end systems.
N+ Certification
Data Link Layer Data Link layer is divided into two sub layers: Media Access Control (MAC) Logical Link Control (LLC) The Data Link layer is responsible for the following aspects of communication: Providing unique identification (MAC address) to each node on the network. Transforming data bits from the Physical layer into groups called frames. Detecting errors that occur during a transmission.
N+ Certification
Data Link Layer (Continued)
N+ Certification
Data Link Layer (Continued) Logical Link Control (LLC): Provides interface to Network layer protocols. Manages flow control. Media Access Control (MAC): Manages access to physical layer. Appends destination computers physical address onto data frame (MAC address, Data Link layer address, or hardware address).
N+ Certification
MAC Address (Physical Address, Hardware Address) 24 bits 24 bits
Vendor Code
Serial Number
0000.0c12. 3456
ROM RAM
N+ Certification
Data Link Layer (Continued)
N+ Certification
Network Layer This layer is responsible for the following functions: Providing unique logical addresses to each node on the network. Transmitting data across networks. Controlling network traffic. Best Path Determination.
N+ Certification
Network Layer : Best Path Determination Layer 3 functions to find the best path through the internetwork.
N+ Certification
Transport Layer
Establishes an end-to-end connection. Sends segments from one end host to another. Ensures data reliability. Organizing messages into segments or breaking segments into smaller segments. Delivering segments to the recipients. Providing error control.
large
N+ Certification
Transport Layer (Continued)
Sender
Receiver
Acknowledge
Connection Established
Data Transfer
(Send Segments)
N+ Certification
Transport Layer (Continued)
Transmit
Sender Receiver
Stop
Not Ready
Go
Buffer OK
N+ Certification
Transport Layer (Continued)
Window Size = 1
Send 1
Sender
Send 2
Sender
Receiver
N+ Certification
Transport Layer (Continued)
Sender
Receiver
Send 1 Send 2 Send 3 Ack 4 Send 4 Send 5 Send 6 Ack 5 Send 5 Ack 7
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Transport Layer To Network Layer
End-to-End Segments
Routed Packets
N+ Certification
Session Layer
N+ Certification
Presentation Layer Provides code formatting and conversion for applications.
login:
Text Data
ASCII EBCDIC Encrypted
Sound
MIDI
Video
MPEG QuickTime
N+ Certification
Application Layer Provides the interface between the user and the network.
COMPUTER APPLICATIONS
Word Processor Presentation Graphics Spreadsheet Database Design/Manufacturing Others
NETWORK APPLICATIONS
Electronic Mail File Transfer Remote Access Client-Server Process Network Management Others
INTERNETWORK APPLICATIONS
Electronic Data Interchange World Wide Web E-Mail Gateways
Others
N+ Certification
Functions of the OSI Layer
N+ Certification
Summary
OSI reference model describes building blocks of functions for program-to-program communications between similar or dissimilar hosts.
N+ Certification
What is Protocol? A protocol is a set of established and agreed-upon rules required to enable effective communication on a network. Protocols can either be developed by a vendor or by a networking standard organization. A protocol suite is a hierarchical collection of protocols. Some of the protocol suites are:
TCP/IP Protocol Suite IPX/SPX Protocol Suite AppleTalk Protocol Suite
N+ Certification
N+ Certification
TCP/IP Model (DoD Model) The DoD model is basically a condensed version of the OSI model. Its composed of four, instead of seven, layers: 1) Process/Application layer 2) Host-to-Host layer (Transport layer) 3) Internet layer 4) Network Access layer
N+ Certification
Comparing The OSI Model and TCP/IP Model
N+ Certification
TCP/IP Protocol Suite
N+ Certification
Application Layer The TCP/IP protocol suite combines all application related issues into one layer and ensure this data is properly packaged before passing it on to the next layer. Handles high-level protocols, issues of representation, encoding, decoding and session control.
N+ Certification
Application Layer Protocols
N+ Certification
Host-to-Host Layer (Transport Layer) The main purpose of the Host-to-Host layer is to shield the upper- layer applications from the complexities of the network. This layer says to the upper layer, Just give me your data stream, with any instructions, and Ill begin the process of getting your information ready to send.
N+ Certification
Host-to-Host Layer (Transport Layer) Protocols
N+ Certification
Internet Layer The purpose of the Internet layer is to send packets from a network host and have them arrive at the destination node independent of the path taken.
N+ Certification
Internet Layer Protocols
N+ Certification
Network Access Layer . The network access layer is concerned with all of the issues that an IP packet requires to actually make a physical link to the transmission media. It includes the LAN and WAN technology details, and all the details contained in the OSI physical and data link layers.
N+ Certification
Network Access Layer Protocols
N+ Certification
N+ Certification
Transmission Control Protocol (TCP) Creates a reliable connection between two computers.
N+ Certification
N+ Certification
Key Features of TCP
N+ Certification
TCP 3 way Handshake
N+ Certification
TCP 3 way Handshake (Continued)
N+ Certification
Stream delivery
N+ Certification
TCP segment format
N+ Certification
Control field
N+ Certification
Description of flags
N+ Certification
Description of flags (Continued)
N+ Certification
Encapsulation and decapsulation
N+ Certification
A TCP Connection TCP is connection-oriented.
A connection-oriented transport protocol establishes a virtual path between the source and destination.
All of the segments belonging to a message are then sent over this virtual path. A connection-oriented transmission requires three phases:
Connection establishment Data transfer Connection termination
N+ Certification
Connection establishment using three-way handshaking
N+ Certification
Note: The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a randomly generated number.
N+ Certification
Note: The value of the acknowledgment field in a segment defines the number of the next byte a party expects to receive.
N+ Certification
Data transfer
N+ Certification
Connection termination using three-way handshaking
N+ Certification
Example 1
Suppose a TCP connection is transferring a file of 5000 bytes. The first byte is numbered 10001. What are the sequence numbers for each segment if data is sent in five segments, each carrying 1000 bytes? Solution The following shows the sequence number for each segment:
Segment 1 Sequence Number: 10,001 (range: 10,001 to 11,000) Segment 2 Sequence Number: 11,001 (range: 11,001 to 12,000) Segment 3 Sequence Number: 12,001 (range: 12,001 to 13,000) Segment 4 Sequence Number: 13,001 (range: 13,001 to 14,000) Segment 5 Sequence Number: 14,001 (range: 14,001 to 15,000)
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Aborting a connection
N+ Certification
Denying a connection
N+ Certification
Error Control TCP provides reliability using error control, which detects corrupted, lost, out-of-order, and duplicated segments. Error control in TCP is achieved through the use of the checksum, acknowledgment, and time-out.
N+ Certification
Note: Data may arrive out of order and be temporarily stored by the receiving TCP, but TCP guarantees that no out-of-order segment is delivered to the process.
N+ Certification
N+ Certification
Note:
No retransmission timer is set for an ACK segment.
N+ Certification
Normal operation
N+ Certification
Lost segment
N+ Certification
Note: The receiver TCP delivers only ordered data to the process.
N+ Certification
Fast retransmission
N+ Certification
Lost acknowledgment
N+ Certification
Flow Control & Congestion Control Flow control regulates the amount of data a source can send before receiving an acknowledgment from the destination. For that TCP defines a window size depending on the capability of receiving host. Congestion control refers to the mechanisms and techniques to keep the load below the capacity. There are two algorithms for Congestion control in TCP: slow start algorithm congestion avoidance algorithm
N+ Certification
Slow start, exponential increase algorithm
N+ Certification
Note: In the slow start algorithm, the size of the congestion window increases exponentially until it reaches a threshold.
N+ Certification
Congestion avoidance, additive increase algorithm
N+ Certification
Note: In the congestion avoidance algorithm the size of the congestion window increases additively until congestion is detected.
N+ Certification
State Transition To keep track of all the different events happening during connection establishment, connection termination, and data transfer, the TCP software is implemented as a finite state machine.
N+ Certification
User Datagram Protocol (UDP) UDP uses a simple transmission model without implicit handshaking dialogues for providing reliability, ordering, or data integrity. Thus, UDP provides an unreliable service and datagram's may arrive out of order, appear duplicated, or go missing without notice.
N+ Certification
Comparison of TCP and UDP
N+ Certification
Addresses in TCP/IP Three different levels of addresses are used in an internet: Physical address (MAC Address) Logical address (IP Address) Port Address (Port Numbers)
N+ Certification
Addresses in TCP/IP
N+ Certification
Port Numbers TCP and the upper layers dont use MAC and IP addresses to understand the sending hosts address as the Data Link and Network layer protocols do. Instead, they use port numbers. TCP and UDP must use port numbers to communicate with the upper layers because theyre what keep track of different applications' conversations crossing the network simultaneously. Originating source port numbers are dynamically assigned by the operating system of the source host and will equal some number starting at 1024.
These port numbers identify the source and destination application or process in the TCP segment.
N+ Certification
Port Numbers (Continued) The port numbers are divided into three ranges: Well Known Ports Registered Ports Dynamic or Private Ports
N+ Certification
Well Known Ports (01023) The port numbers in the range from 0 to 1023 are the wellknown ports. They are used by system processes that provide widely-used types of network services. Registered Ports (102449151) The ranges of port number from 1024 to 49151 are the registered ports. They are assigned by IANA for specific service upon application by a requesting entity. Dynamic or Private Ports (4915265535) The range above the registered ports contains dynamic or private ports that cannot be registered with IANA. It is used for custom or temporary purposes and for automatic allocation by operating system.
N+ Certification
Relationship of layers and addresses in TCP/IP
N+ Certification
Example 1
In Figure 2.18 a node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link. At the data link level this frame contains physical (link) addresses in the header. These are the only addresses needed. The rest of the header contains other information needed at this level. The trailer usually contains extra bits needed for error detection. See Next Slide
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Figure 2.18 Physical addresses
N+ Certification
Example 2
Most local area networks use a 48-bit (6 bytes) physical address written as 12 hexadecimal digits, with every 2 bytes separated by a colon as shown below:
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
N+ Certification
Example 3
In Figure 2.19 we want to send data from a node with network address A and physical address 10, located on one LAN, to a node with a network address P and physical address 95, located on another LAN. Because the two devices are located on different networks, we cannot use link addresses only; the link addresses have only local jurisdiction. What we need here are universal addresses that can pass through the LAN boundaries. The network (logical) addresses have this characteristic.
N+ Certification
Example 3 (Continued)
The packet at the network layer contains the logical addresses, which remain the same from the original source to the final destination (A and P, respectively, in the figure). They will not change when we go from network to network. However, the physical addresses will change as the packet moves from one network to another. The boxes labeled routers are internetworking devices, which we will discuss later.
N+ Certification
Figure 2.19 IP addresses
N+ Certification
Example 5
Figure 2.20 shows an example of transport layer communication. Data coming from the upper layers have port addresses j and k ( j is the address of the sending process, and k is the address of the receiving process). Since the data size is larger than the network layer can handle, the data are split into two packets, each packet retaining the service-point addresses ( j and k). Then in the network layer, network addresses (A and P) are added to each packet. See Next Slide
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Example 5 (Continued)
The packets can travel on different paths and arrive at the destination either in order or out of order. The two packets are delivered to the destination transport layer, which is responsible for removing the network layer headers and combining the two pieces of data for delivery to the upper layers.
N+ Certification
Figure 2.20 Port addresses
N+ Certification
Well Known Port Numbers
Port No 20 21 22 23 25 43 53 67 68 69 TCP UDP Protocol / Application FTP FTP Secure Shell (SSH) TELNET SMTP WHOIS DNS DHCP DHCP TFTP Comment Data Transfer Control Commands Secure Remote Login Remote Login Sending Mails Search WHOIS Database Resolves Domain Names Server Client Insecure File Transfer
N+ Certification
Well Known Port Numbers (Continued)
Port No 80 88 110 123 137 138 139 TCP UDP Protocol / Application HTTP Kerberos POP3 Network Time Protocol NetBIOS Name Service NetBIOS Datagram Service NetBIOS Session Service Comment Retrieving Web Pages Authentication Receiving Mails Synchronize Time Resolves NetBIOS Names
143
161
Retrieving Mails
Network Mgt.
N+ Certification
Well Known Port Numbers (Continued)
Port No 179 389 443 445 TCP UDP Protocol / Application BGP (Border Gateway Protocol) Lightweight Directory Access Protocol HTTPS Windows SMB File Sharing Service Internet Security Association and Key Management Protocol (ISAKMP) Syslog Comment Routing Protocol for ISPs Directory Services HTTP Secure File Sharing in Windows Used in IPSec VPNs
500
514
N+ Certification
Well Known Port Numbers (Continued)
Port No 520 546 547 860 TCP UDP Protocol / Application Routing Information Protocol (RIP) DHCPv6 client DHCPv6 server iSCSI Comment Routing Protocol for Small Networks For IPv6 Addressing For IPv6 Addressing For Accessing Storage over the networks
N+ Certification
Registered Ports
Port No TCP UDP Protocol / Application Comment
1293
1503 68916900 6901 1645
Encrypting IP Packets
Chat Messenger File Transfer Voice Calls Default Port for Cisco and Juniper Networks RADIUS servers Default for Cisco and Juniper Networks RADIUS servers
1646
N+ Certification
Registered Ports (Continued)
Port No 1755 1812 1813 TCP UDP Protocol / Application Microsoft Media Services RADIUS Authentication Protocol RADIUS Accounting Protocol Network File System Microsoft Terminal Server Teredo Tunnelling Yahoo! Messenger Session Initiation Protocol (SIP) Comment Media Services Microsoft Implementation Microsoft Implementation Available in Linux Remote Desktop Protocol IPv4 To IPv6 Tunnelling Chat Messenger Used in Cisco VOIP
N+ Certification
Registered Ports (Continued)
Port No 5355 TCP UDP Protocol / Application LLMNR (Link-Local Multicast Name Resolution) Comment Allows hosts to perform name resolution for hosts on the same local link (only provided by Windows Vista and Server 2008)
7777
19294, 19295, 19302
Trojan Horse
Chat Messenger
N+ Certification
Socket The combination of IP address and port number. e.g. 201.0.0.1:80
N+ Certification
Unicast, Multicast and Broadcast Unicast: These are sent to a single destination host.
Multicast: These are packets sent from a single source host and transmitted to many devices on different networks.
Broadcast (layer 2): These are sent to all hosts on a LAN.
Broadcasts (layer 3): These are sent to all hosts on the network.
N+ Certification
Broadcast Domain A broadcast domain a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer.
N+ Certification
ARP (Address Resolution Protocol ) In TCP/IP communications, a datagram (packet) on a local-area network must contain both a destination MAC address and a destination IP address. There needs to be a way to automatically map IP to MAC address.
ARP associates an IP address with its MAC address. On a typical physical network, such as a LAN, each device on a link is identified by a physical or MAC address that is usually imprinted on the NIC. The TCP/IP suite has a protocol, called Address Resolution Protocol (ARP), which can automatically obtain MAC addresses for local transmission.
N+ Certification
Address Resolution Protocol (Continued) Used by a sending host when it knows the IP address of the destination but needs the MAC address.
N+ Certification
ARP operation
N+ Certification
Address Resolution Protocol (Continued) Each device on a network maintains its own ARP table. A device that requires an IP and MAC address pair broadcasts an ARP request. If one of the local devices matches the IP address of the request, it sends back an ARP reply that contains its IP-MAC pair.
N+ Certification
Address Resolution Protocol (Continued) ARP is a broadcast protocol every host on the network receives the request. Each host checks the request against its IP address the right one responds.
N+ Certification
Note:
An ARP request is broadcast; an ARP reply is unicast.
N+ Certification
Four cases using ARP
N+ Certification
RARP (Reverse Address Resolution Protocol) RARP finds the IP address for a machine that only knows its MAC address.
N+ Certification
ARP and RARP
N+ Certification
ICMP (Internet Control Message Protocol) ICMP is a network protocol used for reporting errors that might have occurred while transferring data packets over networks. ICMP is designed for network diagnosis and to find out as to what went wrong in the data communication. ICMP can be used to report: errors in the underlying communications of network applications. availability of remote hosts. Best known example of ICMP in practice is the ping utility, that uses ICMP protocol.
N+ Certification
ICMP In Action
When Host A sends a packet destined for Host B, the Lab_B router will send an ICMP destination unreachable message back to the sending device (Host A in this example).
N+ Certification
Application Layer Protocols HTTP FTP TFTP TELNET SSH DNS SMTP POP IMAP
N+ Certification
HTTP (Hyper Text Transport Protocol ) Web servers implement this protocol. The underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page.
N+ Certification
FTP (File Transfer Protocol) FTP protocol is used for downloading and uploading files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user's browser. FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g. uploading a document file to a server).
N+ Certification
TFTP (Trivial File Transfer Protocol) It can do nothing but send and receive files. TFTP has no directory-browsing abilities. Theres no authentication as with FTP, so its insecure.
N+ Certification
TELNET It allows a user to remotely access the resources of another system on the network. Telnet is a text-mode type program. Telnet is not secure.
N+ Certification
SSH (Secure Shell) SSH is a network protocol that allows you to remotely access the resources of another system on the network. Allows data to be exchanged using a secure channel between two networked devices. SSH was designed as a replacement for Telnet which send information, notably passwords, in plaintext, rendering them susceptible to packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.
N+ Certification
DNS (Domain Name Service) A Domain Name Server (DNS) lookup is the conversion of a domain name into its respective IP address. Domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses, Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address.
N+ Certification
DNS (Continued) For example, the domain name www.example.com might translate to 198.105.232.4. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.
N+ Certification
Domain name space
N+ Certification
Domain names and labels
N+ Certification
FQDN
N+ Certification
Hierarchy of name servers
N+ Certification
DNS In The Internet The domain name space (tree) is divided into two different sections: Generic domains Country domains
N+ Certification
DNS used in the Internet
N+ Certification
Generic domains
N+ Certification
Generic Domain Labels
N+ Certification
Generic Domain Labels (Continued)
N+ Certification
Country Domains
N+ Certification
Example 3
In Linux and Windows, the nslookup utility can be used to retrieve address/name mapping. The following shows how we can retrieve an address when the domain name is given. $ nslookup india.com
Name: india.com Address: 153.18.8.1
N+ Certification
Note: DNS can use the services of UDP or TCP using the well-known port 53.
N+ Certification
The Hosts File
N+ Certification
The Hosts File (Continued)
Depending upon your operating system, the hosts file can be found at different locations:
Microsoft Windows Unix & Linux \windows\system32\drivers\etc \etc
The hosts file can be tweaked to carry out a number of interesting things: Block certain websites. Redirecting the user to an embarrassing website each time he enters the address of a regular website.
N+ Certification
SMTP (Simple Mail Transfer Protocol) SMTP is used for sending email messages.
Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application.
N+ Certification
Note: Some examples of GUI-based user agents are Outlook Express, and Thunderbird.
N+ Certification
Email address
N+ Certification
SMTP range
N+ Certification
POP (Post Office Protocol Version 3) POP3 protocol is used to retrieve e-mail from a mail server. Most e-mail applications (sometimes called an e-mail client) use the POP3 protocol, although some can use the newer IMAP (Internet Message Access Protocol).
N+ Certification
IMAP (Internet Message Access Protocol) A protocol for retrieving e-mail messages. IMAP was developed at Stanford University in 1986.
N+ Certification
LAN Technologies
N+ Certification
LAN Technologies Ethernet Token Ring FDDI
N+ Certification
Ethernet Ethernet is a contention media access method that allows all hosts on a network to share the same bandwidth of a link. Ethernet is popular because its scalable, meaning that its comparatively easy to integrate new technologies, such as Fast Ethernet and Gigabit Ethernet, into an existing network infrastructure. Ethernet uses both Data Link and Physical layer specifications.
N+ Certification
Ethernet layers
N+ Certification
Ethernet frame
N+ Certification
Ethernet Frame Format
N+ Certification
Collision In a half duplex Ethernet network, a collision is the result of two devices on the same Ethernet network attempting to transmit data at exactly the same time. The network detects the "collision" of the two transmitted packets and discards them both.
N+ Certification
Collision Domain A collision domain is a physical network segment where data packets can collide with one another when being sent on a shared medium, in particular, when using the Ethernet networking protocol.
N+ Certification
Ethernet Operation
Collision
JAM
JAM
JAM
JAM
JAM
JAM
N+ Certification
Ethernet Communication Ethernet networking uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD). CSMA/CD is a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium.
CSMA/CD was created to overcome the problem of those collisions that occur when packets are transmitted simultaneously from different devices.
N+ Certification
How does the CSMA/CD Protocols works?
N+ Certification
Ethernet Communication Steps
1.
The device will first listen to the media to determine is someone transmitting. If no device is transmitting, the it can start transmitting. While transmitting, the device will continue listening for other devices trying to transmit. If it detects another device transmitting, it will signal a COLLISION. If a collision occurs both devices will stop transmitting, wait a random amount of time and start back a step 1
2. 3.
4.
N+ Certification
CSMA/CD The previous steps define the protocol used by Ethernet called CSMA/CD. Carrier Sense Multiple Access with Collision Detect Carrier Sense The device must check the media to see if its free. Multiple Access More than one device is attached to the network. Collision detect The ability to detect and respond to collisions.
N+ Certification
N+ Certification
Ethernet : CSMA/CD (Continued)
CSMA/CD Process
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Effects of Collisions The following are the effects of having a CSMA/CD network sustaining heavy collisions: Delay Low throughput Congestion The best remedy for collisions is to upgrade to a full duplex switched environment.
N+ Certification
High Speed Ethernet Options
Ethernet (10 MBPS) Fast Ethernet (100 MBPS) Gigabit Ethernet (1000 MBPS)
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
What is Fast Ether Channel?
Grouping of multiple Fast Ethernet interfaces into one logical transmission path
800 Mb
Using industry-standard Fast Ethernet Load balancing across parallel links Extendable to Gigabit Ethernet
600 Mb
400 Mb
N+ Certification
What is Gigabit Ethernet? 1000-Mbps data rate 802.3/Ethernet frames Full duplex or half duplex Fiber or copper media 100% compatible with existing: Network protocols Network operating systems
20% 80% Backbone
20%
Network applications
Network management
80% Workgroup
N+ Certification
What is PoE (Power Over Ethernet) ?
N+ Certification
Token Ring LAN Technology developed by IBM. Token Ring uses a ring topology. However, the devices are connected in a star configuration with a MAU (Media Access Unit), not a hub, being in the center.
N+ Certification
FDDI (Fiber Distributed Data Interface) FDDI uses fiber optic cables. Because of the cost, FDDI is usually used to connect LANs together and not devices.
N+ Certification
FDDI (Continued) FDDI is sometimes called Dual-Counter Rotating Rings.
There are two pieces of fiber that carry data in opposite directions.
N+ Certification
FDDI (Continued) One ring is called the Primary and the other is Secondary.
N+ Certification
Networking Devices
N+ Certification
Network Devices LANs or WANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs or WANs, we use network connecting devices. Network devices can operate in different layers of the Internet model. Any network requires hardware components that make up the network so that the nodes within it can communicate with each other and exchange information.
N+ Certification
Network Devices (Continued)
N+ Certification
Network Device Function at Layers
7 6 5 4 3 2
NIC Card
Physical
Hub
N+ Certification
Network Device Function at Layers (Continued)
N+ Certification
Layer 1 Network Devices The contents of the frame have no meaning at Layer 1. Layer 1 devices cannot process any of the data in the frame. Since a layer 1 device cannot read either the MAC (layer 2) address or the network (layer 3) address they cannot make any decisions about where frames should be forwarded (or sent).
N+ Certification
Repeater Repeaters amplify and regenerate the signal from one node to another in a network.
N+ Certification
Repeater
N+ Certification
Note:
A repeater connects segments of a LAN.
N+ Certification
Note:
A repeater forwards every bit; it has no filtering capability.
N+ Certification
Note:
A repeater is a regenerator, not an amplifier.
N+ Certification
Function of a repeater
N+ Certification
Hub A hub is a device that receives a signal on one port and retransmits it on one or more other ports. Hubs can be used to extend the distance that a signal travels. In the process of retransmitting the signal, the signal is reconditioned. Hubs used at the center of a star topology.
N+ Certification
Hub In Action
N+ Certification
Hub In Action (Continued)
Hub
N+ Certification
Hub (Continued)
N+ Certification
Hub In Star Topology
Hub
N+ Certification
Network Sniffing In Hub Networks Assume you want to intercept the frames carrying passwords on the network below. A user is entering their password at Node A on the network. Where should you connect to the network?
Hub
Node A
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Ethernet Collision Domains
2. Just before the frame arrives at node B, node B begins transmitting a frame.
N+ Certification
Bridge Bridges are devices to connect network segments to each other.
The following figure depicts the use of bridges in management of network traffic.
N+ Certification
Bridge
N+ Certification
Note:
A bridge has a table used for filtering decisions.
N+ Certification
Note:
A bridge does not change the physical (MAC) addresses in a frame.
N+ Certification
Learning bridge
N+ Certification
Switches Switches are intelligent network devices that provide universal connectivity. Switch can create multiple, simultaneous virtual connections between nodes. This allows each node to have a dedicated connection to the network instead of a shared connection. Can operate at layer 2, 3, or 4 of OSI model.
N+ Certification
Switches Switches are multiport bridges. Each port on switch is a separate collision domain. Each connected device effectively receives own dedicated channel.
N+ Certification
Switches (Continued)
N+ Certification
Hub In Star Topology
Collision
Repeater
N+ Certification
Switch In Star Topology
Switch
N+ Certification
A switch on a small network
N+ Certification
Switched Ethernet Network
N+ Certification
Components of Switch Ports
Ports on a single switch can have different speeds or use different media.
Frame buffers
Frames may be stored temporarily for various reasons in memory called frame buffers.
Backplane bus
The circuitry that connects line cards and ports.
Switching Fabric
Transfers data from port to port.
N+ Certification
Switch Operation
Backplane
Ports
N+ Certification
Functions of Switch Address Learning
Switches examine the source MAC address of each frame and build a MAC address table (CAM) so they can forward frames correctly.
N+ Certification
Address Learning
N+ Certification
Frame Forwarding Decision Broadcast
Forwarded out every port except the one it arrived on. Acts like a layer 1 repeater.
Unicast
If the destination address is in the CAM then. If the address is on a different port than the one the frame arrived on, the frame is forwarded out the correct port. If the destination address is not in the CAM then the frame is treated like a broadcast.
N+ Certification
Frame Forwarding Decision (Continued)
Broadcast Frame?
Yes
No
Look up Destination MAC Address
Address Found?
Yes
N+ Certification
Switch Forwarding Frames
N+ Certification
Server In Shared LAN
Server
Repeater
In a shared media LAN only one client can access the server at a time.
N+ Certification
Server In Switched LAN
Replacing the repeater with a switch doesnt necessarily help by itself since most of the traffic is still going over the link to the server
Server
Switch
However by replacing the link to the server with a higher speed architecture, LAN throughput increases.
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Full Duplex Ethernet Switches allow connections to be full-duplex.
Each individual port can be configured independently.
A full-duplex Fast Ethernet connection has a total potential throughput of 200 Mbps.
N+ Certification
Full Duplex Ethernet (Continued)
N+ Certification
Full Duplex Ethernet (Continued)
N+ Certification
Routers Routers are layer 3 network devices that provide connectivity between WANs and LANs, between networks with different topologies, or between networks using different network standards. The following figure depicts a network setup with routers:
N+ Certification
Routers (Continued) A router is a layer 3 device that provides these functions:
Packet Switching Best Path Determination Packet Filtering Internetwork Communications
N+ Certification
Note:
A router is a three-layer (physical, data link, and network) device.
N+ Certification
Note:
A repeater or a bridge connects segments of a LAN & A router connects independent LANs or WANs to create an internetwork (internet).
N+ Certification
Note:
A router changes the physical addresses in a packet.
N+ Certification
CSU / DSU The Channel Service Unit / Digital Service Unit (CSU/DSU) is a hardware device that connects a leased line to a users hardware device.
N+ Certification
CSU / DSU (Continued)
N+ Certification
Integrated CSU / DSU In Cisco Routers
N+ Certification
Identifying Collision Domains and Broadcast Domains
N+ Certification
N+ Certification
Introducing IP Address (Online Identity) Every system connected to a network has a unique IP address associated with itself. An IP address acts as the unique identity of a computer at which it can be contacted. If I want to connect to your computer, then I need to know your computers IP address. All data sent or received by a system will be addressed from or to its IP address.
N+ Certification
Introducing IP Address (Online Identity) (Continued) An IP address is to your computer what your mobile number is to you in the real world An identity at which you can be contacted. An hackers first step is to find out the IP address of the target system. An IP address is a 32-bit address that uniquely and universally defines the connection of a host or a router to the Internet.
N+ Certification
Introducing IP Address (Online Identity) (Continued) Two devices on the Internet can never have the same address.
They are unique in the sense that each address defines one, and only one, connection to the Internet.
IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but there's no direct link between you and the recipient. TCP/IP, on the other hand, establishes a connection between two hosts so that they can send messages back and forth for a period of time.
N+ Certification
Introducing IP Address (Online Identity) (Continued) This address allows nodes to connect and communicate over a network, as shown in the following figure:
N+ Certification
Introducing IP Address (Online Identity) (Continued) Internet Assigned Numbers Authority (IANA) manages, distributes, and ensures that every node on the Internet has a unique IP address. With the phenomenal growth of the Internet, it has been virtually impossible for IANA to manage IP address allocation. As a result, the IP address allocation has been divided into sub registries, known as Regional Internet Registries (RIR), for various geographical regions. RIRs include:
Asia-Pacific Network Information Center (APNIC) American Registry for Internet Numbers (ARIN) Latin American and Caribbean IP Network Information Center (LACNIC) Reseaux IP Europeans (RIPE)
N+ Certification
Introducing IP Address (Online Identity) (Continued) Depending on the region, an Internet Service Provider (ISP) must obtain the required IP address block from the registry that controls IP address allocation in its region. An IP address is divided into four groups, which are separated by dots ("."). These groups are commonly known as octets. Each octet constitutes 8 bits, where each bit can either have a binary value of 1 or 0, as shown in the following figure.
N+ Certification
Introducing IP Address (Online Identity) (Continued) To make the IP address easier to use, the address is usually written as four decimal numbers separated by periods. This way of writing the address is called the dotted decimal format.
N+ Certification
IPv4 Address
N+ Certification
N+ Certification
N+ Certification
Classes of IPv4 Address
N+ Certification
Classes of IPv4 Address (Continued)
N+ Certification
Classes of IPv4 Address (Continued)
N+ Certification
Classes of IPv4 Address (Continued)
N+ Certification
N+ Certification
Dotted-decimal notation
N+ Certification
Example 1
Change the following IP addresses from binary notation to dotted-decimal notation.
a. 10000001 00001011 00001011 11101111 b. 11000001 10000011 00011011 11111111 c. 11100111 11011011 10001011 01101111 d. 11111001 10011011 11111011 00001111
Solution We replace each group of 8 bits with its equivalent decimal number (see Appendix B) and add dots for separation:
a. 129.11.11.239 c. 231.219.139.111
b. 193.131.27.255 d. 249.155.251.15
N+ Certification
Example 2
Change the following IP addresses from dotted-decimal notation to binary notation. a. 111.56.45.78 c. 241.8.56.12 Solution We replace each decimal number with its binary equivalent: b. 221.34.7.82 d. 75.45.34.78
a. 01101111 00111000 00101101 01001110 b. 11011101 00100010 00000111 01010010 c. 11110001 00001000 00111000 00001100 d. 01001011 00101101 00100010 01001110
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Example 3
Find the error, if any, in the following IP addresses: a. 111.56.045.78 b. 221.34.7.8.20
c. 75.45.301.14
d. 11100010.23.14.67
Solution
a. There are no leading zeroes in dotted-decimal notation (045). b. We may not have more than four numbers in an IP address. c. In dotted-decimal notation, each number is less than or equal to 255; 301 is outside this range. d. A mixture of binary notation and dotted-decimal notation is not allowed.
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Example 4
Change the following IP addresses from binary notation to hexadecimal notation.
N+ Certification
Classful IP Addressing IP addresses, when started a few decades ago, used the concept of classes. This architecture is called Classful addressing. In the mid-1990s, a new architecture, called classless addressing, was introduced and will eventually supersede the original architecture.
N+ Certification
Occupation of the address space
N+ Certification
N+ Certification
Figure 4.3 Finding the address class in binary notation
N+ Certification
Figure 4.4 Finding the address class in binary notation (Continued)
N+ Certification
Example 5
How can we prove that we have 2,147,483,648 addresses in class A?
Solution In class A, only 1 bit defines the class. The remaining 31 bits are available for the address. With 31 bits, we can have 231 or 2,147,483,648 addresses.
N+ Certification
Example 6
Find the class of each address: a. 00000001 00001011 00001011 11101111 b. 11000001 10000011 00011011 11111111 c. 10100111 11011011 10001011 01101111 d. 11110011 10011011 11111011 00001111 Solution See the procedure in Figure 4.4. a. The first bit is 0. This is a class A address. b. The first 2 bits are 1; the third bit is 0. This is a class C address. c. The first bit is 0; the second bit is 1. This is a class B address. d. The first 4 bits are 1s. This is a class E address..
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Finding the class in decimal notation
N+ Certification
Example 7
Find the class of each address:
a. 227.12.14.87 d. 252.5.15.111 b.193.14.56.22 e.134.11.78.56 c.14.23.120.8
Solution a. The first byte is 227 (between 224 and 239); the class is D. b. The first byte is 193 (between 192 and 223); the class is C. c. The first byte is 14 (between 0 and 127); the class is A. d. The first byte is 252 (between 240 and 255); the class is E. e. The first byte is 134 (between 128 and 191); the class is B.
N+ Certification
Example 8
In Example 5 we showed that class A has 231 (2,147,483,648) addresses. How can we prove this same fact using dotteddecimal notation? Solution The addresses in class A range from 0.0.0.0 to 127.255.255.255. We need to show that the difference between these two numbers is 2,147,483,648. This is a good exercise because it shows us how to define the range of addresses between two addresses. We notice that we are dealing with base 256 numbers here. Each byte in the notation has a weight. The weights are as follows (see Appendix B):
N+ Certification
Example 8 (continued)
2563, 2562, 2561, 2560 Now to find the integer value of each number, we multiply each byte by its weight: Last address: 127 2563 + 255 2562 + 255 2561 + 255 2560 = 2,147,483,647 First address: = 0 If we subtract the first from the last and add 1 to the result (remember we always add 1 to get the range), we get 2,147,483,648 or 231.
N+ Certification
Figure 4.6 Netid and hostid
N+ Certification
Note:
Millions of class A addresses are wasted.
N+ Certification
Figure 4.7 Blocks in class A
N+ Certification
Figure 4.8 Blocks in class B
N+ Certification
N+ Certification
Figure 4.9 Blocks in class C
N+ Certification
Note: The number of addresses in class C is smaller than the needs of most organizations.
N+ Certification
Note: Class D addresses are used for multicasting; there is only one block in this class.
N+ Certification
Note: Class E addresses are reserved for future purposes; most of the block is wasted.
N+ Certification
Note: In classful addressing, the network address (the first address in the block) is the one that is assigned to the organization. The range of addresses can automatically be inferred from the network address.
N+ Certification
Example 9
Given the network address 17.0.0.0, find the class, the block, and the range of the addresses.
Solution The class is A because the first byte is between 0 and 127. The block has a netid of 17. The addresses range from 17.0.0.0 to 17.255.255.255.
N+ Certification
Example 10
Given the network address 132.21.0.0, find the class, the block, and the range of the addresses.
Solution The class is B because the first byte is between 128 and 191. The block has a netid of 132.21. The addresses range from 132.21.0.0 to 132.21.255.255.
N+ Certification
Example 11
Given the network address 220.34.76.0, find the class, the block, and the range of the addresses.
Solution The class is C because the first byte is between 192 and 223. The block has a netid of 220.34.76. The addresses range from 220.34.76.0 to 220.34.76.255.
N+ Certification
Default masks
N+ Certification
Note: The network address is the beginning address of each block. It can be found by applying the default mask to any of the addresses in the block (including itself). It retains the netid of the block and sets the hostid to zero.
N+ Certification
Example 12
Given the address 23.56.7.91, find the beginning address (network address).
Solution The default mask is 255.0.0.0, which means that only the first byte is preserved and the other 3 bytes are set to 0s. The network address is 23.0.0.0.
N+ Certification
Example 13
Given the address 132.6.17.85, find the beginning address (network address).
Solution The default mask is 255.255.0.0, which means that the first 2 bytes are preserved and the other 2 bytes are set to 0s. The network address is 132.6.0.0.
N+ Certification
Example 14
Given the address 201.180.56.5, find the beginning address (network address).
Solution The default mask is 255.255.255.0, which means that the first 3 bytes are preserved and the last byte is set to 0. The network address is 201.180.56.0.
N+ Certification
Note:
Note that we must not apply the default mask of one class to an address belonging to another class.
N+ Certification
Special addresses
N+ Certification
Reserved IP Addresses Certain host addresses are reserved and cannot be assigned to devices on a network. An IP address that has binary 0s in all host bit positions is reserved for the network address. An IP address that has binary 1s in all host bit positions is reserved for the network address.
N+ Certification
Figure 4.13 Network address
N+ Certification
Figure 4.14 Example of direct broadcast address
N+ Certification
Figure 4.15 Example of limited broadcast address
N+ Certification
Figure 4.16 Examples of this host on this network
N+ Certification
Figure 4.17 Example of specific host on this network
N+ Certification
Figure 4.18 Example of loopback address
N+ Certification
Public Vs Private IP Addresses No two machines that connect to a public network can have the same IP address because public IP addresses are global and standardized. However, private networks that are not connected to the Internet may use any IP addresses, as long as each host within the private network is unique. Connecting a network using private addresses to the Internet requires translation of the private addresses to public addresses using Network Address Translation (NAT).
N+ Certification
Private IP Address Range
N+ Certification
What is Subnet? A sub network or a subnet is a logical division of a large network into smaller networks, as shown in the following figure:
Subnets on a Network
Creation of subnets enables better management of the network and optimum utilization of networks capabilities. These are attributed to the following reasons:
Reduced network traffic Enhanced network management Improved network connectivity over a large geographical area
N+ Certification
Addresses in a network with and without Subnetting
N+ Certification
Hierarchy concept in a telephone number
N+ Certification
Default mask and subnet mask
N+ Certification
Example 15
What is the sub network address if the destination address is 200.45.34.56 and the subnet mask is 255.255.240.0? Solution We apply the AND operation on the address and the subnet mask.
Address Subnet Mask
N+ Certification
Figure 4.25 Comparison of a default mask and a subnet mask
N+ Certification
Note:
In subnetting, we need the first address of the subnet and the subnet mask to define the range of addresses.
N+ Certification
N+ Certification
TCP/IP Network Utilities TCP/IP comes with complete set of utilities that can help to track down most TCP/IP-related problems. For example: Ping, Netstat, Tracert Nearly all TCP/IP utilities can be accessed from command prompt on any type of server or client running TCP/IP. Command Syntax and options may differ depending on OS.
385
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Ping Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network. Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP echo response. In the process it measures the time from transmission to reception (round-trip time) and records any packet loss.
386
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Netstat Displays TCP/IP statistics and details about TCP/IP components and connections on a host:
Port on which a particular TCP/IP service is running Network connections currently established Number of packets handled by network interface since activation Number of data errors
387
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Traceroute (Tracert) When data packets travel from source to destination system, then they dont always take the same path. Data packets sent between the two systems may take different paths. Traceroute is a tool that allows you to trace the path between two systems. It was designed for network troubleshooting purposes.
388
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Traceroute (Tracert) (Continued) The Time to Live (TTL) value of a data packet represents its maximum possible age. Originally TTL values were introduced to ensure that data packets dont end up in infinite loop. It defines the maximum number of routers through which the data packet can travel before it is declared dead and dropped. Each router reduces the TTL value of the packet by 1 hence; it has now become a Hop Counter.
389
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
Traceroute (Tracert) (Continued) Uses ICMP to trace path from one node to another
Identifies all intermediate hops Useful for determining router and connectivity problems.
390
Copyright UTL Technologies Ltd 2011 All rights reserved
N+ Certification
WHOIS The whois database is a worldwide database maintained by various domain registration companies across the globe containing listings of the domains registered at their company or country. The whois query searches this database to gather useful information on both domain names and IP addresses.
391
Copyright UTL Technologies Ltd 2011 All rights reserved