0% found this document useful (0 votes)
59 views42 pages

The Network Protocol and TCP

This document discusses network protocols and the TCP/IP model. It begins by defining what a network protocol is and how it enables the efficient exchange of data between connected nodes. It then describes several legacy LAN protocols like IPX/SPX, AppleTalk, NetBEUI, and how TCP/IP became the most commonly used protocol. The core components of TCP/IP are described as IP, TCP, and UDP. IPv4 and IPv6 are also summarized, including subnet masking and CIDR notation. Various TCP/IP application protocols are also listed.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views42 pages

The Network Protocol and TCP

This document discusses network protocols and the TCP/IP model. It begins by defining what a network protocol is and how it enables the efficient exchange of data between connected nodes. It then describes several legacy LAN protocols like IPX/SPX, AppleTalk, NetBEUI, and how TCP/IP became the most commonly used protocol. The core components of TCP/IP are described as IP, TCP, and UDP. IPv4 and IPv6 are also summarized, including subnet masking and CIDR notation. Various TCP/IP application protocols are also listed.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

THE NETWORK

PROTOCOL AND TCP/IP


MODEL
Objectives

1. To know the Different properties of a Network.


2. To know on how to differentiate protocols of the
Network.
3. To know the use of the IPV4 and IPV6.
What is Network Protocol?

Protocols provides an efficient way to


exchange data among connected nodes. A
computer must have protocols or set of
guidelines to follow just as how we
humans use a language to communicate
with one another.
Example Of Lan Protocol.
LAN PROTOCOL.

Enables a secure way of linking networks, and can


transfer data at a relatively high speed. A LAN also
has the ability to handle “source and destination node
addressing”. LAN protocols must conform to the
safety and quality standards set by various governing
network organizations especially the IEEE 802
standards. The IEEE 802 standard is specifically in
charge with signal quality transmission checks.
LAN supports different types of
Protocols
1. IPX/SPX, AppleTalk, NetBEUI, and
TCP/IP.
2. Legacy Protocols.
What is TCP/IP?

TCP/IP are no longer widely used. TCP/IP


is type of protocol that became the
commonly used protocol as it’s highly
compatible with most of the internet
networking standards.
What is Legacy Protocols?

Legacy means that software or a specific


device can no longer be updated or the vendor
no longer upgrades that specific product. The
following examples are the different legacy
protocols before the TCP/IP become
universally used language or protocol of the
internet.
What is IPX?

Internetwork Packet Exchange (also known


as IPX) is type of legacy network protocol
developed by the firm Novell for its NetWare
operating system. IPX was often used with
Ethernet bus and token ring networks. It is
based from a Xerox Network System (XNS)
protocol.
What is Xerox Network System?

Is a Set of protocols that were used by


Xerox Systems for Data
Communication. Used for File Transfer,
Sharing Networks resources, Packet
Transfers, sharing routing information
and remote procedure calls.
What is SPX?

Sequenced Packet Exchange (SPX) works


hand in hand with IPX protocol; it supports the
use of applications like databases.
What is NetBEUI and AppleTalk?

NetBIOS Extended User Interface is a type of network protocol


developed by Microsoft to be compatible to a “LAN Manager” and
“LAN Server”. This protocol is commonly used in the earlier versions
of Windows operating systems up to Windows 2000 and Windows ME.

AppleTalk – developed by Apple – is a type of protocol that supports


peer to peer networking between MAC computer devices. It can
communicate with other MACINTOSH computers even with a server.
What is TCP/IP?

TCP/IP is a “layered protocol” that is similar


to, but not entirely identical to the “OSI
reference model”. There are nearly a hundred
of protocols supported by
The 3 Core components of TCP/IP?

1. Internet Protocol (IP)


2. Transmission Control Protocol (TCP)
3. User Datagram Protocol (UDP).
TCP or transmission control protocol.

was a “hailed as a transport protocol” (equivalent to


the Transport layer in OSI reference model). Its
duties include establishing of sessions between
network nodes and sequencing and
acknowledgement of data frames. It also keeps tabs
on end to end delivery of data.
TCP Frame.
What is UDP and IP?

User Datagram Protocol (UDP) is also known as a


“connection-less protocol”. The data does not undergo the
same process as the TCP for it can’t be controlled, sequenced
or even acknowledge. It operates with Layer 4 like the TCP
protocol. If the TCP is not available UDP can be a substitute.

Internet Protocol IP’s main functions are: “data


transmission, packet addressing, packet routing,
fragmentation, detection of errors”.
The Two versions of Internet Protocol.

IPv4: has a 32-bit node address


IPv6: has a 128-bit node address
The IPv4 and IPv4 Subnetting and Addressing
Rules

IP address must be unique to enable “accurate


packet delivery”. A workgroup with an identical IP
address will not function well and create an error. To
avoid such mistakes its important to have an
understanding with IP addressing concepts.
The Basic IPv4 Addressing Rules.

 An IPv4 supports four fields equivalent to 32 bits.


It also uses a dotted decimal notation for its IP
address format. It was developed in the 1970s.
 AN IPv4 has two parts the network ID and the
Host ID example: 129.6.17.0
 IPv4 addresses are classified according to their
network transfer type and size, classified as Class
A up to Class E.
The Three Different Types of Data Transmission
Process.

1. Unicast: “packet sent to each requesting client”


2. Multicast: “packet sent to group of requesting
clients”
3. Broadcast: “communication sent to all network
nodes” (M.Palmer, 2013)
The Different Class Addresses of IP.

“Class A addresses”: the IP address under this class type can only have a beginning
value of 1 and maximum of 126 for its first octet. Example: 1.12.100.0 ; 126.201.0.0.
Location of Network ID: first octet
Location of Host ID: last three octets

“Class B addresses”: the IP address under this class type can only have a beginning
value of 128 and maximum of 191 for its first octet.
Location of Network ID: first two octet
Location of Host ID: the last two octets
”Class C addresses”: the IP address under this class type can only have a beginning value of 192
and maximum of 233 for its first octet.
Location of Network ID: first three octets
Location of Host ID: the last octet

“Class D addresses”: are exclusively used for multicasting, and the IP address under this class type
can only have a beginning value of 224 and maximum of 239 for its first octet.

“Class E addresses”: are solely used for experimentation, and the IP address under this class type
can only have a beginning value of 240 and maximum of 254 for its first octet.
Special purpose IP addresses

“255.255.255.255” – is not a valid address and even if you type it in any browser it
will not yield any results, that’s because this IP address is a type of broadcast address
use for sending messages to all workstations connected to a specific network.

“127” is a “loopback address” and is not used for common sub netting process. There
are around 375 possible loopback address combinations, but 127 is the universally
acknowledged loopback address. Its main purpose is help network expert with testing
and debugging.
Summary description of each IPv4 class
types
What is Subnet Mask or Subnetting?

TCP/IP request for “configured subnet mask” two purposes: for classification the
type of addressing used and be able to proportion networks into subnet works and to
control traffic.
Example: An IP address must first be converted into binary like the example given
below:
The given IP address falls under a Class A IP address type.
11111111.00000000.00000000.00000000 (“255.0.0.0”) The “ones” in the binary
represents the network/subnet identification bits The “zeroes” represents the host
identification bits.
Subnet mask contains two subnet IDs categorized between
Network ID and Host IDs, which is then determined by a
network administrator. Subnet mask often “overrides” its
length limits
Example: IP address: 255.255.255.0 , the 3rd octet in this IP
address serves as an indicator of its Subnet ID
Equivalent Binary value:
11111111.11111111.11111111.00000000
What is CIDR method?

“Classless Inter domain Routing” addressing – is a method used in subnetting. It is


a slash with numeral and is located after the IP address. The slash pertains to network
ids.
Example: 165.100.18.44 /18
the /18 means it needs to have18 bits of the network ID
14 (32 bits minus 18 bits = 14 bits) for the host ID and should not exceed over 32
bits
Some key points to remember in IPv4 Addressing
What is IPv6?

IPv6 was developed in the year 1994, through initiative


of IETF organization due to limitations of IPv4, as
IPv4 are running out of IP addresses. it has provisions
for network security and advance routing options that
Ipv4 does not possess IPv6 has a “128-bit address
capability” and can provide a single address to its
associated multiple interfaces. Ipv6 has a 40 bytes
header and it uses a “IPsec or IP security”. It is also
has 16 bits of hexadecimal fields.
Example:
1042:0071:0000:0000:07ac:0522:210c:425b
“Leading zeros can be removed & contiguous fields
containing only zeros can be represented by :: “ (M.
Palmer, 2013)
1042:71:0:0:7ac:522:210c:425b or
1042:71::7ac:522:210c:425b
What is IP Security?

IPsec – set of IP-based secure


communications and encryption
standards created through the IETF. It
also supports authentication
certificates and data encryption for
added security.
Three Types of IPv6 Packets.

1. Unicast – identified by its single address for a single NIC (transmitted point-to-
point)
2. Anycast – contains a destination address that is associated with multiple
interfaces (goes only to the closest interface)
3. Multicast – has a destination address that is associated with multiple interfaces
(directed to each of the interfaces with that address
TCP/IP Application Protocols that are
most common and useful.
1. Telnet
2. Secure Shell (SSH)
3. File Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP), and Network File System
(NFS)
4. Simple Mail Transfer Protocol (SMTP)
5. Domain Name System (DNS)
6. Dynamic Host Configuration Protocol (DHCP)
7. Address Resolution Protocol (ARP)
8. Neighbor Discovery Protocol (ND)
9. Simple Network Management Protocol (SNMP)
10. Hypertext Transfer Protocol (HTTP), Secure Hypertext Transfer Protocol (S-HTTP), HTTP Secure
(HTTPS)
11. Internet Control Message Protocol (ICMP)
What is Telnet and SSH?

Telnet: is a type of application protocol for terminal emulation. It has


nearly all the implementations of TCP/IP . though it supports TCP/IP
telnet is pretty much an open standard. It also has a lot of options for
communications.
Secure Shell (SSH) - enables authentication security for TCP/IP
applications and is mostly used on UNIX/LINUS and MAC operating
systems. SSH promotes remote access to a computer and supports the
upload and download of files. SSH can be found in UNIX and LINUX
by entering SSH at its command line.
What is FTP, TFTP and NFS?

 FTP: is a type of technology allows transfer of data between remote devices. It


supports binary and ASCII formatted files and ensures a connectionoriented
service. The only limitation of FTP is that it cannot transfer portion of a file, so if
you fail to upload the whole file using FTP you have to start from scratch. FTP
acts like a torrent downloader except thatit uploads and downloads website files
from your computer to a server on web.
 NFS: is Sun Microsystem's alternative to FTP. This is used by default in UNIX
and LINUX OS.
What is SMTP and DNS?

Simple Mail Transfer Protocol - Designed for exchange of electronic


mail, it also provides as an alternative to FTP for file transfer.
Domain Name System - Domain: logical grouping of network
resources. Domains are given unique names; e.g., Facebook.com. DNS
resolves domain names and makes it easier to understand rather than
having to have an IP address as the only way to navigate a particular
website.
What is DHCP, ARP, ND, SNMP?

Dynamic Host Configuration Protocol (DHCP)- enables automatic


assignment of IP address and process of assigning address t through
DHCP server.
Address Resolution Protocol (ARP) - ARP allows the sender to
obtain MAC addresses
Neighbor Discovery (ND) Protocol - ND uses messages and other
means to discover the physical addresses and more information about
computers and routers on a network (M. Palmer, 2013)
Simple Network Management Protocol (SNMP) - Provides a secure
way to monitor network activity
What is HTTP, S-HTTP, and HTTPS?

Hypertext Transfer Protocol (HTTP) establishes a Web connection


and provides exchange of resources.
Secure Hypertext Transfer Protocol (S-HTTP) – does the same as
HTTP but with more security – Used primarily in native HTTP
communications – Does not encrypt data in IP-level communications.
Hypertext Transfer Protocol Secure (HTTPS) – another secure
version of HTTP with slight alterations.
What is ICMP, VoIP?

Internet Control Message Protocol (ICMP) - ICMP – helps IP track


error conditions and supports the Ping utility function to check
connectivity. This is commonly used when you want to test if your peer
to peer networking works.

VoIP - Voice over IP (VoIP) – network technology that enables


telephony communications over an IP network.
TCP/IP and the OSI Reference Model
Compared.
END OF SLIDES
THANK YOU!

You might also like