0% found this document useful (0 votes)
10 views

Compiled Lesson-3 Using Network Communication Protocols (Week-5)

This document provides an overview of network communication protocols. It discusses how protocols like IPX/SPX, NetBEUI, AppleTalk, and TCP/IP enable communication on local area networks and their various strengths and weaknesses. It also examines properties of LAN protocols in general and how protocols like TCP/IP, IPX/SPX, NetBEUI and AppleTalk specifically work and are used. The history and role of TCP/IP in networks is also summarized.

Uploaded by

margieboadilla
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Compiled Lesson-3 Using Network Communication Protocols (Week-5)

This document provides an overview of network communication protocols. It discusses how protocols like IPX/SPX, NetBEUI, AppleTalk, and TCP/IP enable communication on local area networks and their various strengths and weaknesses. It also examines properties of LAN protocols in general and how protocols like TCP/IP, IPX/SPX, NetBEUI and AppleTalk specifically work and are used. The history and role of TCP/IP in networks is also summarized.

Uploaded by

margieboadilla
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Networking 1

Lesson 3 – Using Network Communication Protocols

LEARNING Overview of Network


OBJECTIVES Protocols
At the end of the module, the students will be able to:
 Protocols enable effortless interchange
a) Explain network protocols  Analogize protocols to dialects
b) Discuss how IP addressing works – Computer communication requires
c) Explain and use application protocols in the common protocol
TCP/IP suite – Human communication requires
d) Discuss how to design a network to use TCP/IP common dialect
and application protocols  LANs may transport multiple protocols
– Network device (such as router) makes
distinctions
TOPIC – Example: Ethernet hosts TCP/IP for
OUTLINE Windows server, AppleTalk for
Macintosh computer
1. Overview of Network Protocols  Pros and cons of hosting multiple protocols
2. Understanding TCP/IP – Pro: networks perform many different
3. How the User Datagram Protocol (UDP) Works. functions on LAN
4. How IP Addressing works – Con: volume of network traffic
increases

OVERVIEW
Protocols turn the potential chaos of electronic
signals on a network into meaningful patterns of
communication, so that when someone sends you
and e-mail, you can receive and read it.

This module explores common protocols used on


networks. You learn the advantages and
disadvantages of each protocol so that you have a
clearer idea of how to employ it. You particularly Properties of a LAN Protocol
learn about TCP/IP and how to take advantage of  Capabilities included in properties of LAN
protocols and applications in the TCP/IP suite. protocol
– Enable reliable network links
– Communicate at relatively high speeds
– Handle source and destination node
addressing
– Follow standards, particularly the IEEE
802 standards
 Protocols have different strengths and
drawbacks
– Example 1: some (not all) protocols are
routable

Module 3 – Network Communication Protocols | Page 1 of 11


– Example 2: some protocols have poor Supports NetWare file servers,
error checking mainframes, minicomputers, Internet
 Protocols typically used on LANs  ODI adaptable to network clients running
– IPX/SPX, NetBEUI, AppleTalk, and Windows
TCP/IP  Windows option for connecting to NetWare
– TCP is most widely used due to relation server
to Internet – Configure Microsoft NetWare Link
(NWLink) IPX/SPX and MS Network
Understanding IPX/SPX Driver Interface Specification (NDIS)
 NDIS and Novell's ODI run at Data Link LLC
 Internetwork Packet Exchange (IPX)
sublayer
– Developed by Novell for NetWare
operating system
Understanding NetBEUI
 NetWare used with Ethernet bus,
 NetBEUI (NetBIOS Extended User Interface)
token ring, ARCnet
– Developed for LAN Manager and
– Modeled after Xerox Network System
LAN Server
(XNS) protocol
– Predates Windows NT
 Sequenced Packet Exchange (SPX)
 NetBEUI used in early versions of Windows
– Companion protocol to IPX
NT
– Developed for use with applications,
 NetBEUI not supported in Windows XP or
such as databases
Windows Server 2003 (or higher)
 IPX/SPX used on NetWare servers through
 Disadvantages of NetBEUI
version 4
– Cannot be routed
 TCP/IP is preferred protocol for NetWare 6
– Causes unnecessary traffic
and above
 New NetWare versions can still implement
Understanding Apple Talk
IPX/SPX
• AppleTalk protocol networks Macintosh
 Advantage of IPX: routable over multiple
computers
networks
• AppleTalk is a peer-to-peer network
 Disadvantage: "chatty" protocol increasing
protocol
traffic
– Enables Macs to communicate without
 Open Datalink Interface (ODI) driver
server
– Manages multiple protocols used on
• Windows Server 2003 and Novell use
NetWare network
AppleTalk
– Enables communication with Mac
computers

• AppleTalk Phase II
– Handles more networked computers
than Phase I
– Interoperable with heterogeneous
networks hosting multiple protocols

Module 3 – Network Communication Protocols | Page 2 of 11


 Typical deployments for Mac OS X Server
– Desktop publishing environments and
school labs
 Windows and NetWare Servers can support
Macs
– ApplTalk Phase II must be used by
servers

The History and Role of TCP/IP

• Advanced Research Projects Agency


(ARPA)
• Three advantages of AppleTalk Phase II
• Three advantages of AppleTalk Phase II – Networking goal: enable university,
 As many as 253 nodes may comprise research, and Defense Department to
one logical network communicate
 Disadvantage of AppleTalk Phase II  ARPANET WAN: prototype for modern
– Not as effective as TCP/IP for linking networks
non-Macs  An early protocol: Network Control Protocol
 Networks use Ethernet or token ring access (NCP)
methods – Enabled DEC, IBM, and other hosts to
 EtherTalk Link Access Protocol (ELAP) communicate
– Operates at OSI Physical and Data Link – Did not provide wholly reliable
layers communication
– Uses CSMA/CD on bus or star-bus  TCP/IP combination: an improvement over
hybrid topology NCP
 TokenTalk Link Access Protocol (TLAP) – TCP (Transmission Control Protocol)
– Also operates at the Physical and Data – IP (Internet Protocol)
Link layers  TCP/IP has become most widely used
– Uses token passing and the star-ring protocol suite
hybrid topology  Five advantages of TCP/IP
 AppleTalk Address Resolution Protocol – Used worldwide on most networks and
(AARP) the Internet
– Addressing method used with ELAP and – Influences design of wide range of
TLAP network devices
 AARP detects physical (MAC) sublayer – Main protocol of most computer
address of NICs operating systems
– Enables MAC address to be – Subject to many troubleshooting and
incorporated in AppleTalk frames network analysis tools
 AARP can also detect IP addresses (if Mac – Understood by large body of network
properly configured) professionals
 Mac OS X Server built on Mac OSX  TCP/IP associated with a suite of protocols
operating system and applications
– Both support either AppleTalk or TCP/IP
 Mac OS X Server support features
– File and printer sharing
– Managing network users and groups
– Providing Web services

Module 3 – Network Communication Protocols | Page 3 of 11


 Associations enable TCP/IP to underlie vast – Establishes sessions between network
range of communications capabilities nodes
– Sequences and acknowledges frames
 Provides for reliable end-to-end
delivery
 Sequence number placed in TCP frame
header
– Shows frame sequence in stream of
frames
– Indicates amount of data in frames
 Sequence number checked for frame
correctness
 Sliding window: number of data bytes in
frame
– May be dynamically adjusted if two
nodes agree
 Main TCP functions (similar in OSI
Understanding TCP/IP Transport layer)
– Monitor for session requests
– Establish sessions with other TCP
nodes
is used everywhere, and understanding how TCP – Transmit and receive data
– Close transmission sessions
operates enables network and systems
 TCP ports: used to form virtual circuit
administrators to properly troubleshoot network between nodes
communication issues. – Enable multiple processes to
communicate in session
TCP is wonderfully complex, but don't worry: We  TCP segment: header and data payload in
aren't going to tell you to go read RFC 793. This is a TCP frame
 TCP header contains 11 fields
gentle introduction, or demystification, if you will. In – Minimum length is 20 bytes
this article we'll cover the TCP protocol, in only as
much detail necessary to understand the basics of
TCP, the protocol.
 TCP specified in RFC 793
– Designed for point-to-point
communications
 IP specified in RFC 791
– Developed to link nodes in different
networks or WANs
 TCP and IP first combined for use with UNIX
 TCP/IP layers may be roughly mapped to
OSI layers
 Core components of TCP/IP protocol suite
– Transmission Control Protocol (TCP)
– User Datagram Protocol (UDP)
– Internet Protocol (IP)

How Transmission Control Protocol Works

• TCP is a transport protocol (Layer 4 in OSI How the User Datagram


model)
Protocol (UDP) Works

Module 3 – Network Communication Protocols | Page 4 of 11


– 32-bit network node address used with
 User Datagram Protocol (UDP) 48-bit MAC address
– Connectionless protocol  Connectionless protocol
– Operates at OSI Layer 4 (like TCP) – Provides network-to-network
– Alternative to TCP when high reliability addressing and routing information
not required – Changes packet size when size varies
 Frame has four-field header and data with network
 Relies only on checksum to ensure  Datagram: TCP segment formatted with IP
reliability header
 Connectionless protocol  IP packet header consists of thirteen fields
– No flow control, sequencing, or
acknowledgment
 Advantages: adds little overhead onto IP
– Used with transaction processing
applications
– Carries important network status
messages

How IP Addressing Works


 IP addressing used to identify two entities
– Specific node
How the Internet Protocol (IP) Works
– Network on which node resides
 A LAN may be composed of series of  Unique IP address enables accurate packet
subnetworks delivery
 A WAN may comprise series of autonomous  Two nodes with same IP address create
networks error
– Examples: DSL, SONET, X.25, and ISDN  IP addressing concepts fundamental in
 Communications enabled by Internet networking
Protocol (IP)
– Between different subnetworks on a Basic IP Addressing
LAN
– Between different networks on a WAN  Dotted decimal notation: IP address format
 Network transport options should be – Four fields totaling 32 bits
compatible with TCP/IP  Fields are decimal values
 Transport options include: Ethernet, token representing 8-bit binary octets
ring, X.25, FDDI, ISDN, DSL, frame relay, – Part of address is network ID, part is
ATM host ID
 Basic IP Functions: data transfer, packet – Example in decimal format:
addressing, packet routing, fragmentation, 129.5.10.100
detection of errors  Five IP address classes, Class A through
 Addressing essential for data transfer and Class E
routing – Address reflects network size and
transmission type

Module 3 – Network Communication Protocols | Page 5 of 11


 Three types of transmission  Number after slash represents bits
– Unicast: packet sent to each requesting in network ID
client – Example (decimal): 165.100.18.44/18
– Multicast: packet sent to group of  18 bits needed for network ID, 14
requesting clients for host ID (32 -18)
– Broadcast: communication sent to all
network nodes IP Address Rules

 Network number 127.0.0.0 cannot be


assigned
– Address used for diagnostic purposes
 Certain IP network numbers reserved as
private
 No one can use private addresses on
Internet
The Role of the Subnet Mask – Designed for use behind NAT device;
e.g., firewall
 TCP/IP requires configured subnet mask – May be used on private network with
 Subnet mask used for two purposes NAT device
– Show class of addressing used  Network number cannot be assigned
– Divide networks into subnetworks to  Highest number on a network cannot be
control traffic assigned
 Example of a subnet mask: – Address interpreted as broadcast
– 11111111.00000000.00000000.000000 message for subnet
00 (255.0.0.0) – Example: cannot assign 198.92.4.255
– Indicates Class A network
– Ones represent network/subnet The Promise of IPv6
identification bits
– Zeroes represent host identification bits  IPv6 developed through IETF initiative
 IPv6 overcomes limitations of IPv4
Creating Subnetworks  Networks are beginning to transition to IPv6
 Five prominent features of IPv6
 Subnet mask contains subnet ID – 128-bit address capability
– Subnet ID contained within network and – Single address associated with multiple
host IDs interfaces
– Subnet ID determined by network – Address autoconfiguration and CIDR
administrator addressing
– Ex: – 40-byte header instead of IPv4’s 20-
11111111.11111111.11111111.000000 byte header
00 (255.255.255.0) – New IP extension headers for special
 Third octet in Class B address needs
indicates subnet ID  Three IPv6 packet types: unicast, anycast,
 Subnet mask overrides four-octet length multicast
limitation  DES (Data Encryption Standard)
 Classless Interdomain Routing (CIDR) – Network symmetric-key encryption
addressing standard
– Puts a slash ( / ) after the dotted  IPv6 supports DES compatible encryption
decimal notation techniques
 Benefits of IPv6 encryption capability

Module 3 – Network Communication Protocols | Page 6 of 11


– Security over Internet • Secure Shell (SSH)
– Security over other types of LANs and – Provides authentication security for
WANs TCP/IP applications
 Disadvantage of IPv6 encryption capability – Used on many UNIX/Linux systems and
– Increases latency of network in MAC OS X
communications  Circumstances for using SSH (if available)
 Latency: travel time from sending – Remotely accessing a computer
node to receiving node – Uploading and downloading files
 How to start SSH application
TCP/IP Application Protocols – Enter ssh at the UNIX/Linux command
line
 Useful protocols and applications in TCP/IP
 Learning about system dependent
suite
implementation
– Telnet
– Use the man ssh command in Linux and
– Secure Shell (SSH)
Mac OS X
– FileTransfer Protocol (FTP), Trivial
FileTransfer Protocol (TFTP), and File Transfer Protocol (FTP), Trivial File Transfer
Network File System (NFS) Protocol (TFTP), and Network File System (NFS)
– Simple Mail Transfer Protocol (SMTP)
– Domain Name System (DNS)  FTP: allows transfer of data between
– Dynamic Host Configuration Protocol remote devices
(DHCP) – Transmissions may be binary or ASCII
– Address Resolution Protocol (ARP) formatted files
– Simple Network Management Protocol – Transmissions ensured by connection-
(SNMP) oriented service
– Hypertext Transfer Protocol (HTTP),  Limitation of FTP: cannot transfer portion of
Secure Hypertext Transfer Protocol (S- file
HTTP), HTTP Secure (HTTPS)
 TFTP: intended for transfer of small files
Telnet – Use for non-critical and non-secure
transmissions
 Telnet: application protocol for terminal – Connectionless protocol running UDP
emulation instead of TCP
 Terminal: device with a monitor and  NFS: Sun Microsystem's alternative to FTP
keyboard – Uses connection-oriented protocol
– Examples: IBM 3270 or DEC VT220 running in TCP
 Terminal emulation: Computer behaving like
Simple Mail Transfer Protocol (SMTP)
terminal
– User access resources in a remote host  Designed for exchange of electronic mail
– Example: Telnet with 3270 emulator
 Two implementations
connects to IBM mainframe like
– For e-mail exchange between
terminal
networked systems
 Important Telnet features
– In local e-mail systems for Internet
– Comes with nearly all implementations
transport
of TCP/IP
 Provides alternative to FTP for file transfer
– Open standard
– Limited to sending text files
– A number of communications options
– Requires e-mail address on receiving
SSH end

Module 3 – Network Communication Protocols | Page 7 of 11


– Does not require logon ID and password – Secondary DNS server: backup servers
 Two part message: address header and – Root servers: find TLDs on the Internet
message text  Two DNS standards
 Supported in TCP by connection-oriented – Service resource record (SRV RR)
service – DNS dynamic update protocol

Domain Name System (DNS) Dynamic Host Configuration Protocol


(DHCP)
 Domain: logical grouping of network
resources • Enables automatic assignment of IP
 Domains given unique names; e.g., address
Microsoft.com • Process of assigning address by DHCP
 DNS resolves domain names server
– Resolution: converts domain name to IP – Newly configured computer contacts
address DHCP server
 Internet host domain names have two to – DHCP server leases an IP address to
three parts new computer
– Top-level domain name (TLD): – Lease length set on DHCP server by
organization or country network admin
– Optional subdomain name: – Server or host may be given lease that
university/business name does not
– Host name: name of computer  IP address will never change with
– Example: permanent lease
[email protected]
Address Resolution Protocol (ARP)
 ICANN coordinates and registers root
domain names  Enables sender to retrieve MAC address
 Process of obtaining MAC address
– Sending node sends ARP broadcast
frame
 Frame has MAC address, IP address
of recipient
– Receiving node sends back its MAC
address
 Reverse Address Resolution Protocol
(RARP)
– Used by network node to determine its
IP address
 Namespace: logical area with list of named
– Used by applications to determine IP
objects
address of workstation or server
 Zones: partitions in DNS server with
resource records Simple Network Management Protocol (SNMP)
– Forward lookup zone links computer
name to IP address  Enables steady monitoring of network
– Reverse lookup zone links IP address to activity
computer name  Advantages
 Three servers related to DNS – Operates independently on the network
– Primary DNS server: authoritative server – Management functions carried out on
for zone special node

Module 3 – Network Communication Protocols | Page 8 of 11


– Has low memory overhead
 Node types: network management station
(NMS) and network agents
 SNMPv2 offers better security, error
handling, multiprotocol support,
transmissions
 SNMP and SNMPv2 monitor LANs and
WANS

HTTP, S-HTTP, and HTTPS


• Hypertext Transfer Protocol (HTTP)
– Enables establishment of a Web Transporting LAN Protocols Over WANs
connection
 WAN protocols enable transport from LANs
– Provides for exchange of resources
to WANs
 Example: displaying Web page in
 Serial Line Internet Protocol (SLIP)
browser
– Encapsulates TCP/IP during connection
 Secure Hypertext Transfer Protocol (S-
session
HTTP)
– TCP/IP removed from SLIP after data
– Used primarily in native HTTP
payload received
communications
 Compressed Serial Line Internet Protocol
– Does not encrypt data in IP-level
communications (CSLIP)
– Newly developed extension of SLIP
 Hypertext Transfer Protocol Secure
– Compresses header in each packet sent
(HTTPS)
across link
– Uses Secure Sockets Layer to
 SLIP and CSLIP do not support
implement security
– More common than S-HTTP – Network connection authentication
– Setup of connections at multiple layers
TCP and the OSI Reference Model Compared – Synchronous connections

 Portions of TCP moving closer to OSI model


– Physical layer: TCP supports coaxial,
Transporting LAN Protocols Over WANs (continued)
twisted-pair, fiber-optic, wireless
communication  Point-to-Point Protocol (PPP)
– Data Link layer: TCP compatible with
– Supports more network protocols than
IEEE 802.2 LLC and MAC addressing
SLIP
– Network layer: TCP/IP equivalent is IP
– Automatically sets up connections with
– Transport layer: both TCP and UDP
several layers
operate here
– Supports connection authentication
– Upper layers of OSI correspond to
and encryption
TCP/IP applications
 Point-to-Point Tunneling Protocol (PPTP)
– Supplements PPP
– Enables remote communications via the
Internet
 PPTP and PPP support synchronous
communication
 PPTP and PPP support Password
Authentication Protocol (PAP)

Module 3 – Network Communication Protocols | Page 9 of 11


 Layer Two Tunneling Protocol (L2TP)  Automatic (DHCP-based) IP
– Similar to PPTP, and like PPTP used on addressing used
VPNs – DHCP used to lease IP addresses to
– Like PPTP, L2TP encapsulates PPP workstations
– Creates special tunnels over public  All servers given permanent IP
network (Internet) addresses
– Uses Layer Two Forwarding (based on – SNMP used in certain stations for
MAC addresses) network monitoring
 Signaling System 7 (SS7) – Network browsers set up to use PPP for
– For fast communications between Internet links
different type WANS – Workstations set up to use FTP/HTTP
– Supports call roaming, voicemail, through firewalls
redirection of 800 calls – E-mail system configured to employ
– Adapted for T-carrier and other WAN SMTP
communications – Primary DNS server and secondary DNS
server set up
Designing A Network To Use TCP/IP And
Application Protocols

 Scenario: network personnel in medical LEARNING


office
ACTIVITY 1
 Seven major components in network design
– Workstations and servers configured for Choosing a Network Protocol
TCP/IP
 Automatic (DHCP-based) IP Objectives: Determining the recommended network
addressing used protocol in an organization
– DHCP used to lease IP addresses to
Task: Prototype making of the network protocol and
workstations differentiate the advantages of network protocol
 All servers given permanent IP
addresses
– SNMP used in certain stations for Tools: laptop, mobile devices
network monitoring
– Network browsers set up to use PPP for
Internet links SUMMARY
– Workstations set up to use FTP/HTTP
through firewalls Let us see if you can remember the main points
– E-mail system configured to employ raised in this lesson. Below is a summary of these
SMTP points:
– Primary DNS server and secondary DNS
• Protocols are the language of networks
server set up
• IPX/SPX and NetBEUI used on some older
Designing A Network To Use TCP/IP And networks
Application Protocols • AppleTalk used by Macintosh systems
• ARPANET WAN was a network prototype
 Scenario: network personnel in medical
office • TCP establishes links and ensures reliability
 Seven major components in network design • IP enables data transfer and routing with
– Workstations and servers configured for packet addressing
TCP/IP

Module 3 – Network Communication Protocols | Page 10 of 11


• TCP/IP combination universal used on
networks and Internet
• UDP used with IP in certain non-critical
situations
• Dotted decimal notation address: IP
address format
• Five IP address classes (A through E)
• Networks subdivided using subnet mask or
CIDR
• IPv6 is newest version of IP
• TCP/IP steadily aligning with layers of OSI
model
• Supported by TCP/IP : Telnet, SSH, FTP,
SMTP, DNS, DHCP, ARP, SNMP, and HTTP
• Basic WAN protocols: SLIP, PPP, PPTP,
L2TP

REFERENCES
Palmer, Michael. (2008). Hands-on Networking
Fundamentals

Anfinson, D. & Quamme, P. (n.d). IT Essentials: PC


Hardware & Software Companion Guide 3rd
Edition

Beal, Vangie (September 6, 2015). Network


Fundamentals Study Guide
https://bit.ly/3hTWkMU

Compiled by:

(Signed)
DIONNEL M. CAGUIN
Faculty, College of Information and Technology
Education

(Signed)
JOEMARK M. LOPEZ
Faculty, College of Information and Technology
Education

Module 3 – Network Communication Protocols | Page 11 of 11

You might also like