109.05 Presentation File
Download
Report
Transcript 109.05 Presentation File
Explain network protocols and services.
Objective 109.05 Course Weight 3%
© ExplorNet’s Centers for Quality Teaching and Learning
1
What are Protocols and Services?
Protocol is a set of conventions governing the
treatment and especially the formatting of data in an
electronic communications system – in this case, a
network.
Put simply, protocols are the rules and standards of
how the Internet works.
Services are also standardized on networks, but
these differ in that they are applications running
behind the scenes, usually in client-server
configurations, that help the networks function.
© ExplorNet’s Centers for Quality Teaching and Learning
2
Keeping Track of It All
There are a large number of protocols and services in
existence. To organize and understand them we use
two predominant models:
Open Systems Interconnect (OSI)
A theoretical model used to explain protocol
interactions.
Transmission Control Protocol/Internet Protocol
(TCP/IP)
A practical model that is actively maintained by
the Internet Engineering Task Force (IETF)
through the use of Request For Comment (RFC)
documentation.
© ExplorNet’s Centers for Quality Teaching and Learning
3
The OSI Model
7 Layers
Detailed for
ease of
explanation
Shows how
data gets from
the user to a
transmitted bit
Encapsulation
© ExplorNet’s Centers for Quality Teaching and Learning
4
The OSI Model
When data is
encapsulated using
this model it is
packaged in different
Protocol Data Units
(PDUs).
The names of the
PDUs are shown here
Segment
Packet
Frame
Bit
© ExplorNet’s Centers for Quality Teaching and Learning
5
Comparing to the TCP/IP Model
In practice, computer
networks are not so
easy to segment like
the OSI model.
The TCP/IP model
groups functions that
are closely
interrelated.
This makes
development and
documentation more
feasible.
© ExplorNet’s Centers for Quality Teaching and Learning
6
IPv4 and IPv6
These both reside in the network/internet layer of
the models.
They govern how devices locate one another in all
the world’s networks.
The system works similarly to the way telephone
numbers do.
“What happened to IPv5?”
Version number was used for a protocol that
never really gained much popularity called
Internet Stream Protocol.
© ExplorNet’s Centers for Quality Teaching and Learning
7
IPv4 Basics
Format
x.x.x.x
where x can be any value from 0-255
This format is referred to as Dotted Decimal Notation
because it’s a decimal representation of an actual
binary number.
Length – each “octet” (one of the x’s) is made up of 8
bits resulting in a 32 bit address.
© ExplorNet’s Centers for Quality Teaching and Learning
8
IPv4 Subnetting
IP networks can communicate using three types of
messaging:
Unicast – from one device to a single other device.
Multicast – from one device to a select group of other
devices.
Broadcast – from one to device to all other devices on a
network.
When broadcast communication occurs it causes a
lot of traffic on the network.
As more devices join a network, broadcast messages
become larger and larger.
© ExplorNet’s Centers for Quality Teaching and Learning
9
IPv4 Subnetting
To avoid huge messages to ridiculously large numbers of
devices, networks are subdivided or “subnetted”.
IPv4 has two types of subnetting.
Classless Addressing
The old – Classful subnetting – left too many unused IPs
© ExplorNet’s Centers for Quality Teaching and Learning
10
IPv4 Subnetting: Transition
As we began to have more and more devices on the
public Internet, we began to run out of IPv4
addresses.
To reclaim unused addresses in existing class A and B
networks, the IETF created a new system of
addressing.
Current – Classless Inter Domain Routing (CIDR) with
Variable Length Subnet Masks (VLSMs)
© ExplorNet’s Centers for Quality Teaching and Learning
11
CIDR w/ VLSM
Using VLSM there are no set subnet sizes.
Subnet sizes are determined by the number of
subnets needed or the number of host IP addresses
needed, and then a subnet mask is determined.
A subnet that could support 254 hosts would look
like this:
192.168.1.0/24
The subnet portion of the address is 24 bits long
as indicated by the /24
The host portions are 8 bits long (32-24=8)
• Anything from 192.168.1.1-192.168.1.254
© ExplorNet’s Centers for Quality Teaching and Learning
12
Reserved IPv4 Addresses and APIPA
Loopback Address: 127.0.0.1
Also referred to as localhost or home
Any address from 127.0.0.1 to 127.255.255.255 works as
a loopback address.
Private Addresses
Class A: 10.x.x.x
Class B: 172.16.0.0 – 172.31.255.255
Class C: 192.168.0.0 – 192.168.255.255
Automatic Private IP Addressing
169.154.x.x
Occurs when clients are set to use DHCP, but no DHCP
server is found on the network.
© ExplorNet’s Centers for Quality Teaching and Learning
13
IPv4 Limitations
As of January 3, 2011, the last top-level public IP
address was handed out by the Internet Assigned
Numbers Authority (IANA).
This problem was anticipated in the late 1980’s.
Two things were done to solve it:
A stop gap was created called NAT.
IPv6 was developed.
Network Address Translation (NAT) is a scheme that
allows one public address to be shared by many
private addresses within a LAN.
© ExplorNet’s Centers for Quality Teaching and Learning
14
Move on to Bigger and Better: IPv6
Instead of the 4.3 Billion addresses IPv4 uses, it has
340 undecillion addresses….that’s right,
undecillion…look that up!
Security is built in to the system
IP Security (IPSec) was added to IPv4, but is not
mandatory.
IPSec is built in to IPv6.
Subnetting is significantly easier.
© ExplorNet’s Centers for Quality Teaching and Learning
15
IPv6 Format
Format
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx
where x is a hexadecimal number.
Block – a set of four hexadecimal numbers
separated by a colon.
Length
Each hex number is made up of 4 bits.
There are 4 hex numbers in each block resulting
in 16 bit blocks.
There are 8 blocks of 16 bits resulting in a 128
bit address.
© ExplorNet’s Centers for Quality Teaching and Learning
16
IPv6 Breakdown
0000:aaaa:1111:bbbb:2222:cccc:3333:dddd
The three parts of an IPv6 address are:
Global Routing Prefix – the first three blocks –
0000:aaaa:1111 above
Subnet ID – the fourth block – bbbb above
Interface ID – the last four blocks –
2222:cccc:3333:dddd above
Subnetting is significantly easier than IPv4 because it
is built in to the address.
© ExplorNet’s Centers for Quality Teaching and Learning
17
IPv6 Representation
Addresses are compressed for easy representation by
eliminating unnecessary 0’s.
Leading 0’s are removed
002b = 2b however 2b00 =/= 2b
A set of 0’s become one 0 or a ::
Only one :: is allowed
1abc:0000:0000:0000:0000:0000:0000:0000:2365
= 1abc::2365
1abc:0000:0000:ffff:0000:0000:0000:0000:2365
= 1abc:0:0:ffff::2365
= 1abc::ffff:0:0:0:0:2365
© ExplorNet’s Centers for Quality Teaching and Learning
18
Reserved IPv6 Addresses
Loopback Address: 0:0:0:0:0:0:0:1 or ::1/128
Teredo Tunneled: 2001::/32
Reserved for Documentation about IPv6 Addressing:
2001:DB8::/32
Unique Local: FC00::/7
Link Local Unicast (like IPv4 APIPA): FE80::/10
Multicast: FF00::/8
© ExplorNet’s Centers for Quality Teaching and Learning
19
Making the Switch from IPv4 to IPv6
Dual Stack Architecture network
The network provides communication between the two
standards.
Packets can travel as IPv4 or IPv6.
How packets travel is determined by the application
sending them.
Tunneling (Teredo, ISATAP, 6to4)
IPv6 packets are encapsulated inside IPv4 packets and
transported across the network.
Teredo or ISATAP virtual network adapters transparently
handle IPv6 to IPv4 translation.
© ExplorNet’s Centers for Quality Teaching and Learning
20
Assigning IP Addresses (IPv4 or IPv6)
Usually addresses are assigned to devices
automatically by a protocol called Dynamic Host
Configuration Protocol (DHCP) (more on this later).
No user intervention is required.
These addresses are subject to change per the DHCP
server’s settings.
Automatically assigned addresses are called
dynamic.
© ExplorNet’s Centers for Quality Teaching and Learning
21
Assigning IP Addresses (IPv4 or IPv6)
Not all IP addresses can be dynamic.
Some must never change.
Imagine if we wanted to go to Google.com but the
name changed every day.
If an address needs to be permanent, we must
manually assign the address.
Manual assignment is referred to as static IP
addressing.
Static IP assignment is configured according to
device manufacturer’s instructions.
© ExplorNet’s Centers for Quality Teaching and Learning
22
TCP vs. UDP
Once IP network type is determined, traffic is
transmitted using the rules of two major protocols.
Transmission Control Protocol
Connection oriented
Checks to see if PDUs arrived as intended
Like a webpage.
User Datagram Protocol
Connectionless
Does not care if the PDUs arrived safely, just
sends
Like a live video call or live voice call.
© ExplorNet’s Centers for Quality Teaching and Learning
23
Support Services: DHCP, DNS, IPSec
IP addressing and the rules of TCP or UDP help to get
information where it needs to go.
To help IP, TCP, and UDP function there are many
background services.
Three heavily used services:
Dynamic Host Configuration Protocol (DHCP)
Domain Name System (DNS)
Internet Protocol Security (IPSec)
© ExplorNet’s Centers for Quality Teaching and Learning
24
DHCP
Assigns IP addresses to
hosts on a network.
Uses a client-server
approach.
Different options
available for IPv4 and
IPv6.
© ExplorNet’s Centers for Quality Teaching and Learning
25
DNS
Converts Domain Names
(website names) to IP
addresses and vice versa.
Client-Server, hierarchical
lookup system.
Tries to find the info
locally, if info is
unavailable requests help
from higher authorities.
© ExplorNet’s Centers for Quality Teaching and Learning
26
DNS
DNS Servers store information
in tables.
Tables contain different record
types.
Common DNS record types.
© ExplorNet’s Centers for Quality Teaching and Learning
27
IPSec
Can secure any application traffic (upper layer data)
because it resides in the network/internet layer
(lower layer).
Uses one or all of a set of three protocols to secure
information:
Security Association (SA) – provides keys for the
other two protocols.
Authentication Header (AH) – provides data
origin authenticatioN.
Encapsulating Security Payload (ESP) – like AH
but also provides confidentiality.
© ExplorNet’s Centers for Quality Teaching and Learning
28
Other Protocols
In addition to the Internet Protocol, TCP, UDP, and
the supporting services of DHCP, DNS, and IPSec
there are many other common protocols.
Knowing what these protocols are and the ports on
which they operate can make navigating networks
easier.
These ports can be especially helpful in configuring a
firewall and/or port forwarding (see sections 207.04
and 207.05).
© ExplorNet’s Centers for Quality Teaching and Learning
29
Other Protocols
© ExplorNet’s Centers for Quality Teaching and Learning
30