Tài liệu Bài giảng Network+ Certification - Chapter 8, TCP/IP Fundamentals: Chapter 8, TCP/IP Fundamentals
|1| Chapter Overview
A. TCP/IP Protocols
B. IP Addressing
Chapter 8, Lesson 1
TCP/IP Protocols
|2| 1. TCP/IP History
A. Developed in the 1970s
B. Created for use on the ARPANET, progenitor of the Internet
C. Used by UNIX since the inception of the UNIX operating system
D. TCP/IP predates the PC, the Open Systems Interconnection (OSI)
model, and Ethernet.
E. Designed to be platform and operating system independent
|3| F. TCP/IP standards
1. Created with a collaborative development process
2. Published as Requests for Comments (RFCs) by the Internet
Engineering Task Force (IETF)
3. In the public domain
2. TCP/IP Layers
A. TCP/IP has its own system of layers that predates the OSI model.
|4| B. Advantages of a multilayered design, versus a single monolithic
protocol:
1. Platform independence
a. Separate protocols make it easier to support a variety of computing
platforms.
b. Creating or modifying...
11 trang |
Chia sẻ: honghanh66 | Lượt xem: 768 | Lượt tải: 0
Bạn đang xem nội dung tài liệu Bài giảng Network+ Certification - Chapter 8, TCP/IP Fundamentals, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
Chapter 8, TCP/IP Fundamentals
|1| Chapter Overview
A. TCP/IP Protocols
B. IP Addressing
Chapter 8, Lesson 1
TCP/IP Protocols
|2| 1. TCP/IP History
A. Developed in the 1970s
B. Created for use on the ARPANET, progenitor of the Internet
C. Used by UNIX since the inception of the UNIX operating system
D. TCP/IP predates the PC, the Open Systems Interconnection (OSI)
model, and Ethernet.
E. Designed to be platform and operating system independent
|3| F. TCP/IP standards
1. Created with a collaborative development process
2. Published as Requests for Comments (RFCs) by the Internet
Engineering Task Force (IETF)
3. In the public domain
2. TCP/IP Layers
A. TCP/IP has its own system of layers that predates the OSI model.
|4| B. Advantages of a multilayered design, versus a single monolithic
protocol:
1. Platform independence
a. Separate protocols make it easier to support a variety of computing
platforms.
b. Creating or modifying protocols to support new physical layer
standards or networking application programming interfaces (APIs)
does not require modification of the entire protocol stack.
2. Quality of service
a. Having multiple protocols operating at the same layer makes it
possible for applications to select the protocol that provides only the
level of service required.
3. Simultaneous development
a. Because the stack is split into layers, the development of the various
protocols can proceed simultaneously, using personnel who are
uniquely qualified in the operations of the particular layers.
|5| C. The four TCP/IP layers
1. Link
a. Comparable to the data-link layer in the OSI model
b. Most data-link layer protocols used on local area networks (LANs)
(such as Ethernet and Token Ring) are not part of the TCP/IP suite.
2 Outline, Chapter 8
Network+ Certification, Second Edition
c. SLIP and PPP are TCP/IP link layer protocols, used on wide area
networks (WANs).
d. ARP functions partially at the link layer.
2. Internet
a. Equivalent to the network layer in the OSI model
b. Includes IP, ICMP, and Internet Group Membership Protocol
(IGMP), plus some dynamic routing protocols
3. Transport
a. Equivalent to the transport layer in the OSI model
b. Includes TCP and UDP
4. Application
a. Comparable to the session, presentation, and application layers in the
OSI model
b. Includes many protocols, such as Hypertext Transfer Protocol
(HTTP) and File Transfer Protocol (FTP)
|6| Instructor Note Use Slide 6 to compare the four layers of the TCP/IP model to the seven
layers of the OSI model.
|7| 3. SLIP and PPP
A. Link layer protocols used for WAN communications
B. Comparable in basic function to data-link layer protocols such as
Ethernet and Token Ring, but not designed for use on LANs
4. ARP
|8| A. ARP characteristics
1. ARP is the acronym for Address Resolution Protocol.
2. Defined in RFC 826, “Ethernet Address Resolution Protocol”
3. Can be considered a link layer protocol or an internet layer protocol
a. Provides a service to IP, which indicates the link layer
b. ARP messages are carried directly inside data-link layer frames (not
in IP datagrams), which indicates the internet layer.
B. ARP functions
1. At the network layer and above, the TCP/IP protocols use IP addresses
to identify computers.
2. To transmit IP data to a computer on the LAN, IP must supply the
destination computer’s hardware (or Media Access Control [MAC])
address to the link (or data-link) layer protocol.
3. IP generates and broadcasts ARP messages to resolve IP addresses into
hardware addresses.
|9| C. The ARP address resolution process
1. IP packages transport layer information into a datagram by inserting the
IP address of the destination system into the Destination IP Address field
of the IP header.
2. IP compares the network identifier in the destination IP address to its
own network identifier and determines whether to send the datagram
directly to the destination host or to a router on the local network.
Outline, Chapter 8 3
Network+ Certification, Second Edition
3. IP generates an ARP Request packet containing its own hardware
address and IP address in the Sender Hardware Address and Sender
Protocol Address fields.
a. The Target Protocol Address field contains the IP address of the
datagram’s next destination (host or router), as determined in step 2.
b. The Target Hardware Address Field is left blank.
4. The system passes the ARP Request message down to the data-link layer
protocol, which encapsulates it in a frame, and transmits it as a broadcast
to the entire local network.
|10| 5. The systems on the LAN receive the ARP Request message and read the
contents of the Target Protocol Address field.
a. If the Target Protocol Address value does not match the system’s
own IP address, the system silently discards the message and takes no
further action.
6. If the system receiving the ARP Request message recognizes its own
IP address in the Target Protocol Address field, it generates an ARP
Reply message.
a. The system copies the two sender address values from the ARP
Request message into the respective target address values in the ARP
Reply and copies the Target Protocol Address value from the request
into the Sender Protocol Address field in the reply.
b. The system then inserts its own hardware address into the Sender
Hardware Address field.
7. The system transmits the ARP Reply message as a unicast message back
to the computer that generated the request, using the hardware address in
the Target Hardware Address field.
8. The system that originally generated the ARP Request message receives
the ARP Reply and uses the newly supplied value in the Sender
Hardware Address field to
a. Encapsulate the datagram in a data-link layer frame
b. Transmit it to the desired destination as a unicast message
|11| D. The ARP message format
1. Hardware Type (2 bytes). Identifies the type of hardware addresses in
the Sender Hardware Address and Target Hardware Address fields
a. For Ethernet and Token Ring networks, the value is 1.
2. Protocol Type (2 bytes). Identifies the type of addresses in the Sender
Protocol Address and Target Protocol Address fields
a. The hexadecimal value for IP addresses is 0800 (the same as the
Ethertype code for IP).
3. Hardware Size (1 byte). Specifies the size of the addresses in the Sender
Hardware Address and Target Hardware Address fields, in bytes
a. For Ethernet and Token Ring networks, the value is 6.
4. Protocol Size (1 byte). Specifies the size of the addresses in the Sender
Protocol Address and Target Protocol Address fields, in bytes
a. For IP addresses, the value is 4.
4 Outline, Chapter 8
Network+ Certification, Second Edition
5. Opcode (2 bytes). Specifies the function of the packet: ARP Request,
ARP Reply, RARP Request, or RARP Reply
6. Sender Hardware Address (6 bytes). Contains the hardware address of
the system generating the message
7. Sender Protocol Address (4 bytes). Contains the IP address of the system
generating the message
8. Target Hardware Address (6 bytes). Contains the hardware address of
the system for which the message is destined
a. In ARP Request messages, this field is left blank.
9. Target Protocol Address (4 bytes). Contains the IP address of the system
for which the message is intended
E. Reverse Address Resolution Protocol (RARP)
1. Obsolete
2. Performs the opposite function of ARP
3. Resolves hardware addresses into IP addresses
4. Was once used by diskless workstations with no stored TCP/IP
configuration data
F. ARP caching
1. ARP stores its address resolution information in a memory cache.
2. The cache prevents the system from having to resolve the same address
for each datagram.
3. The cache limits the amount of broadcast traffic generated by ARP.
4. Windows includes a program called Arp.exe that you can use to
manipulate the cache.
5. IP
A. Internet layer protocol used to carry traffic generated by most other
TCP/IP protocols
6. ICMP
|12| A. ICMP characteristics
1. ICMP is the acronym for Internet Control Message Protocol.
2. Defined in RFC 792
3. Used to perform network administration tasks
a. Delivers error messages
b. Carries query and response messages
4. ICMP messages are carried in IP datagrams.
|13| B. ICMP message format
1. Type (1 byte). Contains a code that specifies the basic function of the
message
2. Code (1 byte). Contains a code that indicates the specific function of the
message
3. Checksum (2 bytes). Contains a checksum computed on the entire ICMP
message that is used for error detection
4. Data (variable). May contain information related to the specific function
of the message
Outline, Chapter 8 5
Network+ Certification, Second Edition
C. ICMP error messages
1. ICMP returns error messages generated by intermediate or end systems.
2. The error reporting capabilities of IP, TCP, and UDP are limited.
a. Connectionless protocols like IP and UDP cannot return
acknowledgments to the sender.
b. TCP acknowledgments can only be generated by the destination end
system.
c. With TCP, ICMP enables an intermediate system (router) to return
error messages to the source when it has a problem processing a
packet.
d. With IP or UDP, ICMP enables the destination end system to return
an error message to the source.
3. In an ICMP error message, the Data field contains
a. The entire 20-byte IP header of the datagram that caused the problem,
plus
b. The first 8 bytes of the datagram’s own Data field
|14| D. The ICMP error message types are Destination Unreachable, Source
Quench, Redirect, and Time Exceeded.
1. Destination Unreachable messages
a. Used when an intermediate or end system attempts to forward a
packet to an inaccessible resource
b. The various codes for this message type specify the type of resource
that is unreachable.
2. Source Quench messages
a. Provide a rudimentary form of flow control
b. When an intermediate system has a full buffer, it sends Source
Quench messages to the source system, which instructs it to slow
down its transmission rate.
c. The source gradually increases its transmission rate when the Source
Quench messages stop.
3. Redirect messages
a. Routers generate Redirect messages to inform a system that there is a
more efficient route to a particular destination.
|15| (1) If System 1 sends a packet to Router A in an attempt to get it
to System 2, Router A forwards the packet to Router B, but
(2) It also transmits an ICMP Redirect message back to System 1,
informing it that it can send packets destined for System 2
directly to Router B.
b. Includes a 4-byte Gateway Internet Address field that contains the IP
address of the router that the source system should use to reach the
destination
4. Time Exceeded messages
a. Used to inform the source system that the Time To Live value in the
IP header has reached 0 and the packet was discarded
6 Outline, Chapter 8
Network+ Certification, Second Edition
b. Another form of Time Exceeded message informs the source system
that all of the fragments of a datagram have not arrived in a timely
manner.
E. ICMP query message characteristics
1. Not sent in reaction to an outside process, as error messages are
2. Often generated by programs such as Ping
3. Do not carry IP header information in their Data fields
|16| F. ICMP query message types
1. Echo Request and Echo Reply messages
a. Diagnostic messages used to test TCP/IP connectivity
b. Used by Ping and Traceroute
c. Contain 2-byte Identifier and 2-byte Sequence Number subfields in
the Data field, to associate requests with reply messages
d. Request messages contain padding in the data field, which the
destination system duplicates in the reply message.
2. Router Solicitation and Router Advertisement messages
a. Enable a TCP/IP system to discover the address of a default gateway
on the local network
b. Use the following process:
(1) A workstation broadcasts a Router Solicitation message to the
local network.
(2) The routers on the network respond with unicast Router
Advertisement messages containing the router’s IP address.
(3) The workstation uses the information in the replies to
configure the default gateway entry in its routing table.
|17| 7. TCP and UDP
A. Transport layer protocols providing connection-oriented and
connectionless service for application layer processes
8. Application Layer Protocols
A. Provide communications between client and server services on different
computers
1. Not involved in network communication issues
B. Use various combinations of protocols at the lower layers to achieve the
level of service required
|18| C. Commonly used application layer protocols
1. Hypertext Transfer Protocol (HTTP). The protocol used by Web clients
and servers to exchange file requests and files
a. Uses the following process:
(1) A client browser opens a TCP connection to a server and
requests a particular file.
(2) The server replies by sending the requested file, which the
browser displays as a home page.
b. HTTP messages also contain a variety of fields containing
information about the communicating systems.
Outline, Chapter 8 7
Network+ Certification, Second Edition
2. Secure Hypertext Transfer Protocol (S-HTTP or HTTPS). A security
protocol that works with HTTP to provide user authentication and data
encryption services to Web client/server transactions
3. File Transfer Protocol (FTP). A protocol used to transfer files between
TCP/IP systems
a. An FTP client can browse through the directory structure of a
connected server and select files to download or upload.
b. FTP is unique in that it uses two separate ports for its
communications.
(1) When an FTP client connects to a server, it uses TCP port 21
to establish a control connection.
(2) When the user initiates a file download, the program opens a
second connection using port 20 for the data transfer. This data
connection is closed when the file transfer is complete, but the
control connection remains open until the client terminates it.
c. FTP is also unusual because on most TCP/IP systems, it is a self-
contained application rather than a protocol used by other
applications.
4. Trivial File Transfer Protocol (TFTP). A minimalized, low-overhead
version of FTP that can transfer files across a network
a. Uses the UDP protocol instead of TCP
b. Does not include FTP’s authentication and user interface features
c. Originally designed for use on diskless workstations that had to
download an executable system file from a network server to boot
5. Simple Mail Transport Protocol (SMTP). The protocol that e-mail
servers use to transmit messages to each other across a network
6. Post Office Protocol 3 (POP3). One of the protocols that e-mail clients
use to retrieve their messages from an e-mail server
7. Internet Mail Access Protocol 4 (IMAP4). An e-mail protocol that
clients use to access mail messages on a server.
a. Expands on the capabilities of POP3 by adding services such as the
ability to store mail in individual folders created by the user on the
server, rather than downloading it to an e-mail client
8. Network Time Protocol (NTP). A protocol that allows computers to
synchronize their clocks with other computers on the network by
exchanging time signals
9. Domain Name System (DNS). TCP/IP systems use DNS to resolve
Internet host names to IP addresses.
10. Dynamic Host Configuration Protocol (DHCP). A protocol that
workstations use to request TCP/IP configuration parameter settings
from a server
11. Simple Network Management Protocol (SNMP). A network
management protocol used by network administrators to gather
information about various network components.
a. Remote programs called agents use SNMP messages to gather
information and transmit it to a central network management console.
8 Outline, Chapter 8
Network+ Certification, Second Edition
12. Telnet. A command-line terminal emulation program that lets a user log
in to a remote computer on the network and execute commands there
Chapter 8, Lesson 2
IP Addressing
|19| 1. IP Address Characteristics
A. An IP address is a 32-bit value that contains a network identifier and a
host identifier.
B. An IP address is expressed in dotted decimal notation.
1. Each IP address contains four decimal numbers ranging from 0 to 255,
separated by periods.
2. Each decimal number represents 8 binary bits.
3. Each of the four decimal numbers is called an octet, a quad, or a byte.
C. IP addresses are assigned to network interface adapters, not
computers.
1. A system with two network interface adapters (such as a router) has two
IP addresses.
|20| 2. IP Address Assignments
A. Every network interface adapter on a network must have
1. The same network identifier as the others on the network
2. A unique host identifier
B. On the Internet, network identifiers are assigned by the Internet
Assigned Numbers Authority (IANA).
1. Although the IANA has the ultimate responsibility for assigning network
identifiers, you typically obtain network addresses from an Internet
service provider (ISP).
C. Network administrators are responsible for assigning host identifiers to
the network interface adapters on the network.
3. IP Address Classes
A. The division between the network identifier and the host identifier is not
always in the same place.
|21| B. The IANA defines three IP address classes that support networks of
different sizes: Class A, Class B, and Class C.
1. The first bit values for each class are the binary values for the first few
bits of the first octet.
|22, 23| 2. The first bit values determine the possible first byte values.
a. Example: the first byte of a Class A address must have a binary value
in the range 00000001 to 01111111, which in decimal form is the
range 1 to 127.
3. The number of bits allotted to the network and host identifiers
determines
a. How many networks of that class there can be
b. How many hosts can be in a network of each class
Outline, Chapter 8 9
Network+ Certification, Second Edition
|24| C. IP addressing rules
1. All the bits in the network identifier cannot be set to zeros.
2. All the bits in the network identifier cannot be set to ones.
3. All the bits in the host identifier cannot be set to zeros.
4. All the bits in the host identifier cannot be set to ones.
5. These rules explain why there are only 254 hosts in a Class C network,
not 256 (28).
4. Subnet Masking
A. A subnet is a subdivision of a network address that can be used to
represent one LAN on an internetwork or the network of one of an ISP's
clients.
|25| B. What is a subnet mask?
1. A subnet mask is a 32-bit binary number that indicates which bits of an
IP address identify the network and which bits identify the host.
2. The 1 bits are the network identifier bits and the 0 bits are the host
identifier bits.
3. Typically expressed in dotted decimal notation
4. Example: the Class A subnet mask is 255.0.0.0, which in binary form is
11111111 00000000 00000000 00000000.
|26| C. Subnet masks for IP address classes
1. Class A: 255.0.0.0
2. Class B: 255.255.0.0
3. Class C: 255.255.255.0
D. Why are subnet masks needed?
1. Under normal conditions, you can tell the class of an IP address from its
first few bits (in binary) or the value of its first octet (in decimal).
a. If you know the class, you know which bits are the network address
and which are the host address.
2. Subnet masks are needed when you divide a network into multiple
subnets.
|27| E. Creating subnets
1. Creating a subnet is a process of borrowing bits from the host identifier
and using them as a subnet identifier.
|28| a. Example: a Class B address (with a subnet mask of 255.255.0.0) has
16 network bits and 16 host bits.
(1) By borrowing 4 bits from the host address, you change the
mask to 255.255.255.0.
(2) The third octet becomes the subnet identifier, and you can
create up to 254 subnets of 254 hosts each.
b. An IP address of 131.24.67.98 would therefore indicate that
(1) The network is using the Class B address 131.24.0.0, and
(2) The interface is host number 98 on subnet 67.
10 Outline, Chapter 8
Network+ Certification, Second Edition
c. To compute the IP addresses, you begin with the binary value of the
network address, increment the subnet identifier and the host
identifier separately, and then convert the address to a decimal.
2. The boundary between the network identifier and the host identifier does
not have to fall in between two bytes.
a. You can use any number of bits for a subnet identifier.
b. When the boundary does not fall between two bytes, calculating the
subnet mask is more difficult.
c. Example: borrowing 4 bits from the fourth byte of a Class C address
leaves you with a binary subnet mask of 11111111 11111111
11111111 11110000, or in decimal form, 255.255.255.240.
3. The Windows Calculator, in scientific mode, can convert numbers
between binary values and decimal values.
4. The IP Subnet Calculator is a freeware utility available at
www.wildpackets.com/products/ipsubnetcalculator/ that simplifies the
process of calculating subnet masks and IP addresses.
5. Registered and Unregistered Addresses
A. Registered addresses are IP addresses with a network identifier
obtained from the IANA or an ISP.
B. Registered addresses are required for computers that are accessible
from the Internet.
C. Computers on a network behind a firewall use other techniques to
access the Internet and do not need registered addresses.
D. Unregistered addresses
1. The IANA has allotted a range of addresses in each class for use on
private (unregistered) networks.
|29| 2. Private network addresses
a. Class A uses network addresses 10.0.0.0 through 10.255.255.255.
b. Class B uses network addresses 172.16.0.0 through 172.31.255.255.
c. Class C uses network addresses 192.168.0.0 through
192.168.255.255.
3. Private network addresses are not registered to anyone and are
inaccessible from the Internet.
|30| 6. IPv6 Addressing
A. IPv6 is a revised IP addressing system currently in development.
B. Expands the address space from 32 to 128 bits
C. Designed to prevent the depletion of IP addresses
D. An IPv6 address appears as follows: XX:XX:XX:XX:XX:XX:XX:XX,
where each X is a single byte, in hexadecimal form.
E. IPv6 unicast addresses have six sections:
1. Format prefix. Specifies the type of address, such as provider-based
unicast or multicast
a. A new type of address called an anycast causes a message to be sent
to only one of a specified group of interfaces.
Outline, Chapter 8 11
Network+ Certification, Second Edition
2. Registry ID. Identifies the Internet address registry that assigned the
Provider ID
3. Provider ID. Identifies the ISP that assigned this portion of the address
space to a particular subscriber
4. Subscriber ID. Identifies a particular subscriber to the service provided
by the ISP specified in the Provider ID field
5. Subnet ID. Identifies all or part of a specific physical link on the
subscriber’s network
a. Subscribers can create as many subnets as needed.
6. Interface ID. Identifies a particular network interface on the subnet
specified in the Subnet ID field
|31| Chapter Summary
A. TCP/IP protocols
1. The TCP/IP protocols were developed for use on the fledgling Internet
and are designed to support systems that use any computing platform or
operating system.
2. The TCP/IP protocol stack consists of four layers: link, internet,
transport, and application.
3. The ARP protocol is used by IP to resolve IP addresses into the
hardware addresses needed for data-link layer protocol communications.
4. The ICMP protocol performs numerous functions at the internet layer,
including reporting errors and querying systems for information.
5. Application layer protocols are not involved in the data transfer
processes performed by the lower layers, but instead they enable specific
programs and services running on TCP/IP computers to exchange
messages.
|32| B. IP addressing
1. IP addresses are 32 bits long and consist of a network identifier and a
host identifier, expressed as four decimal numbers separated by periods.
2. Every network interface adapter on a TCP/IP network must have a
unique IP address.
3. The IANA assigns IP network addresses in three classes, and network
administrators assign the host addresses to each individual system.
4. The subnet mask specifies which bits of an IP address identify the
network and which bits identify the host.
5. Modifying the subnet mask for an address in a particular class lets you
create subnets by “borrowing” some of the host bits to create a subnet
identifier.
Các file đính kèm theo tài liệu này:
- ch08_9422.pdf