SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
3
                        Network
○   ○   ○   ○   ○   ○
                        Protocols
                        ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○    ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○




                                                        Terms you’ll need to understand:
                                                                OSI Reference Model
                                                                Application layer
                                                                Presentation layer
                                                                Session layer
                                                                Transport layer
                                                                Network layer
                                                                Data Link layer
                                                                Physical layer
                                                                IEEE 802 specifications
                                                                Redirectors
                                                                Protocols: NetBEUI, TCP/IP, XNS, AppleTalk, APPC, X.25,
                                                                and HDLC

                                                        Techniques you’ll need to master:
                                                                Interpreting the OSI Reference Model and how it relates
                                                                to protocol suites
                                                                Exploring the IEEE’s 802 network specifications
                                                                Understanding and using redirectors
                                                                Comprehending and implementing protocols




                                                                                                        29
30   ○   ○
             Chapter 3
             ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○




     To enable networked communications, computers must be able to transmit
     data among one another. Protocols, agreed-upon methods of communica-
     tion, make this possible. In this chapter, we discuss the various network
     protocols and how they enable networked communications.
     In addition, we introduce you to the standards upon which network proto-
     cols are based: the Open Systems Interconnection (OSI) Reference Model
     and the IEEE 802 standards. The OSI Reference Model was developed by
     the International Standards Organization (ISO) to provide a standardized
     method for computers to communicate; the Institute of Electrical and Elec-
     tronic Engineers (IEEE) 802 standards further expanded this model. As
     always, we provide pointers along the way that will assist you in preparation
     for the Networking Essentials exam, and give you additional resources should
     you need more details on the topics we discuss in this chapter.

     The OSI Reference Model
     As the concept of networking became more widespread in the business
     world, the idea of being able to connect networks and disparate systems
     became a necessity. For this type of communication to take place, however,
     there needed to be a standard method. The solution came in 1978 when
     the ISO released an architecture that would allow achieve this goal. These
     specifications were revised in 1984 and became international standards for
     networked communication. It is important for network administrators to
     know the history and understand the function of this specification, which
     is called the OSI Reference Model.
     The OSI model presents a layered approach to networking. Each layer of
     the model handles a different portion of the communications process. By
     separating such communications into layers, the OSI model simplified how
     network hardware and software work together, as well as eased trouble-
     shooting woes by providing a specific method for how components should
     function. Now that we know why the model was implemented, let’s move
     on to explore just how it works.

                             Keep in mind that the OSI model is a completely conceptual refer-
                             ence. Later in the chapter, we’ll discuss how protocol suites map
                             to the model to provide network communications.
○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○    ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                             Network Protocols
                                                                                                             ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                                                                                     31


Learning The Layers
The OSI Reference Model divides networking into seven layers, as shown
in Figure 3.1. These layers are described as follows:
®       Application layer Provides a set of interfaces for applications to use
        to gain access to networked services.
®       Presentation layer Converts data into a generic format for network
        transmission; for incoming messages, it converts data from this format
        into a format that the receiving application can understand.
®       Session layer Enables two parties to hold ongoing communica-
        tions—called sessions—across a network.
®       Transport layer Manages the transmission of data across a network.
®       Network layer Handles addressing messages for delivery, as well as
        translates logical network addresses and names into their physical
        counterparts.



                                                            7. Application Layer

                                                        6. Presentation Layer

                                                                5. Session Layer

                                                            4. Transport Layer

                                                                3. Network Layer

                                                            2. Data Link Layer

                                                                1. Physical Layer


Figure 3.1 The OSI model separates networking functions into
           seven layers.
32   ○   ○
             Chapter 3
             ○   ○    ○   ○   ○    ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○




     ®       Data Link layer Sends special data frames from the Network layer to
             the Physical layer.
     ®       Physical layer Converts bits into signals for outgoing messages, and
             signals into bits for incoming messages.

             EXAM                 It is essential that you know the layers of the OSI model when
         M
                     EX




                                  you take the Networking Essentials exam. A great instructor once
     MEXA


                       AME




         XA                       provided the following mnemonic, which helps you remember
           MEXA
                                  the order of these layers: From the bottom up, take the first letter
                                  of each layer (PDNTSPA) and assign a more approachable phrase
                                  such as “Please Do Not Throw Sausage Pizza Away.”
     In the following sections, we’ll examine each layer of the OSI Reference
     Model in more detail.

     Layer 7: The Application Layer
     The Application layer is referred to as the top layer of the OSI Reference
     Model. This layer allows access to network services—such as networked
     file transfer, message handling, and database query processing—that sup-
     port applications directly. This layer also controls general network access,
     the transmission of data from sender to receiver (called flow control), and
     error recovery for applications when appropriate.

     Layer 6: The Presentation Layer
     The Presentation layer manages data-format information for networked
     communications. Also called the network’s translator, it converts outgoing
     messages into a generic format that can be transmitted across a network;
     then, it converts incoming messages from that generic format into one
     that makes sense to the receiving application. This layer is also responsible
     for protocol conversion, data encryption and decryption, and graphics
     commands.
     Information sent by the Presentation layer may sometimes be compressed
     to reduce the amount of data to be transferred (this also requires decom-
     pression on the receiving end). It is at this layer that a special software
     facility known as a redirector operates. The redirector intercepts requests
     for service and redirects requests that cannot be resolved locally to the net-
     worked resource that can handle them.
○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                            Network Protocols
                                                                                                            ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                                                                                    33

Layer 5: The Session Layer
The Session layer allows two networked resources to hold ongoing com-
munications, called a session, across a network. In other words, applica-
tions on each end of the session are able to exchange data for the duration
of the session. This layer manages session setup, information or message
exchanges, and tear-down when the session ends. It is also responsible for
identification so that only designated parties can participate in the session,
and handles security services for controlling access to session information.
The Session layer furnishes synchronization services between tasks at each
end of the session. This layer places checkpoints in the data stream so if
communications fail, only data after the most recent checkpoint need be
retransmitted. The Session layer also manages issues such as who may trans-
mit data at a certain time and for how long, and maintains a connection
through transmission of messages that keep the connection active; these
messages are designed to keep the connection to be closed down due to
inactivity.

Layer 4: The Transport Layer
The Transport layer manages the flow control of data between parties across
a network. It does this by segmenting long streams of data into chunks that
adhere to the maximum packet size for the networking medium in use.
The layer also provides error checks to guarantee error-free data delivery,
and resequences chunks back into the original data when it is received. In
addition, the Transport layer provides acknowledgment of successful trans-
missions and is responsible for requesting retransmission if some packets
do not arrive error-free.

Layer 3: The Network Layer
The Network layer addresses messages for delivery, and translates logical
network addresses and names into their physical equivalents. This layer
also decides how to route transmissions between computers. To decide how
to get data from one point to the next, the Network layer considers other
factors, such as quality of service information, alternative routes, and deliv-
ery priorities. This layer also handles packet switching, data routing, and
network congestion control.

Layer 2: The Data Link Layer
The Data Link layer handles special data frames between the Network and
Physical layers. At the receiving end, this layer packages raw data from the
34   ○   ○
             Chapter 3
             ○   ○    ○   ○   ○    ○   ○    ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○




     Physical layer into data frames for delivery to the Network layer. A data
     frame is the basic unit for network traffic as data is sent across the network
     medium; the data frame is a highly structured format in which data from
     upper layers is placed for sending, and from which data from upper layers is
     taken on receipt.

     Layer 1: The Physical Layer
     The Physical layer converts bits into signals for outgoing messages, and
     signals into bits for incoming ones. This layer arranges the transmission of
     a data frame’s bits when they are dispatched across the network. The Physical
     layer manages the interface between a computer and the network medium,
     and instructs the driver software and the network interface as to what needs
     to be sent across the medium.
     That concludes the layer-by-layer discussion of the OSI Reference Model.
     Now, let’s take a look at how the IEEE 802 specifications further standard-
     ized network communication.

     IEEE 802 Specifications
     At roughly the same time the OSI model came to be, the IEEE published
     the 802 specifications, which defined standards for the physical compo-
     nents of a network. These components, namely Network Interface Cards
     (NICs) and network media, are also accounted for in the Physical and Data
     Link layers of the OSI model. The 802 specs defined how network adapt-
     ers access and transmit information over the network cable.

             EXAM                 The 802 specifications fall into 12 distinct categories, each of
         M                        which has its own number, as described in the following:
                     EX
     MEXA


                       AME




         XA
           MEXA                   ® 802.1 Internetworking

                                  ® 802.2 Logical Link Control (LLC)

                                  ® 802.3 Carrier-Sense Multiple Access with Collision Detection
                                           (CSMA/CD) LANs (Ethernet)
                                  ® 802.4 Token Bus LAN

                                  ® 802.5 Token Ring LAN

                                  ® 802.6 Metropolitan Area Network (MAN)

                                  ® 802.7 Broadband Technical Advisory Group

                                  ® 802.8 Fiber Optic Technical Advisory Group
○   ○   ○   ○   ○   ○   ○    ○    ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                              Network Protocols
                                                                                                              ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                                                                                      35

                            ® 802.9 Integrated Voice and Data Networks

                            ® 802.10 Network Security

                            ® 802.11 Wireless Networks

                            ® 802.12 Demand Priority Access LAN, 100BaseVG-AnyLAN

As previously mentioned, the 802 spec actually expanded the OSI Refer-
ence Model. This expansion is at the Physical and Data Link layers, which
define how more than one computer can access the network without caus-
ing interference with other computers on the network. The 802 standards
provide more detail at these layers by breaking the Data Link layer into the
following sublayers (see Figure 3.2):
®       Logical Link Control (LLC) For error correction and flow control


                            7. Application Layer

                        6. Presentation Layer

                                 5. Session Layer                                                             Logical Link Control
                                                                                                              802.1 OSO Model and
                                                                                                              Network Management
                            4. Transport Layer                                                                802.2 Logical Link
                                                                                                              Control

                                 3. Network Layer

                             2. Data Link Layer

                                 1. Physical Layer
                                                                                                              Media Access Control
                                                                                                              802.3 CSMA/CD
                                                                                                              802.4 Token Bus
                                                                                                              802.5 Token Ring
                                                                                                              802.12 Demand Priority



Figure 3.2 The 802 specs within the OSI model.
36   ○   ○
             Chapter 3
             ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○




     ®       Media Access Control (MAC) For access controlThe Logical Link
             sublayer (as defined by 802.2) controls data-link communication, and
             defines the use of logical interface points, called Service Access Points
             (SAPs), that other computers can use to transfer information from
             the LLC sublayer to the upper OSI layers.
     The Media Access Control sublayer provides shared access for multiple
     NICs with the Physical layer. The MAC has direct communication with a
     computer’s NIC and is responsible for ensuring error-free data transmis-
     sion between computers on a network.
     This concludes the theoretical discussion of network models. In the fol-
     lowing section, we’ll discuss how protocol suites are mapped to this model
     to provide networked communications.

     Up And Down The Protocol Stack
     In general, most protocols follow the guidelines established by the OSI
     model. A protocol suite, also called a stack, is a combination of protocols
     that work together to achieve network communication. These protocol suites
     are generally broken up into three sections that map to the OSI model:
     network, transport, and application. Because each layer performs a specific
     function and has its own rules, a protocol stack often has a different proto-
     col for each of these layers.

     Network Protocols
     Network protocols provide the following services: addressing and routing
     information, error checking, requesting retransmissions, and establishing
     rules for communicating in a particular networking environment. These
     services are also called link services. Some popular network protocols are:
     ®       DDP (Delivery Datagram Protocol) Apple’s data transport protocol
             that is used in AppleTalk
     ®       IP (Internet Protocol) Part of the TCP/IP protocol suite that
             provides addressing and routing information
     ®       IPX (Internetwork Packet Exchange) and NWLink Novell’s
             NetWare protocol (and Microsoft’s implementation of this protocol,
             respectively) used for packet routing and forwarding
     ®       NetBEUI Developed by IBM and Microsoft, it provides transport
             services for NetBIOS
○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                            Network Protocols
                                                                                                            ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                                                                                    37

Transport Protocols
In addition, protocol suites also contain transport protocols, which are
responsible for ensuring reliable data delivery between computers. Some
popular transport protocols are:
®       ATP (AppleTalk Transaction Protocol) and NBP (Name Binding
        Protocol) AppleTalk’s session and data transport protocols
®       NetBIOS/NetBEUI NetBIOS establishes and manages communi-
        cations between computers; NetBEUI provides data transport services
        for that communication
®       SPX (Sequenced Packet Exchange) and NWLink Novell’s connec-
        tion-oriented protocol that is used to guarantee data delivery (and
        Microsoft’s implementation of this protocol)
®       TCP (Transmission Control Protocol) The portion of the TCP/IP
        protocol suite that is responsible for reliable delivery of data

Application Protocols
Finally, there are application protocols, which are responsible for applica-
tion-to-application services. Some popular application protocols are:
®       AFP (AppleTalk File Protocol) Apple’s remote file management
        protocol
®       FTP (File Transfer Protocol) Another member of the TCP/IP
        protocol suite that is used to provide file transfer services
®       NCP (NetWare Core Protocol) Novell’s client shells and redirectors
®       SMTP (Simple Mail Transport Protocol) A member of the TCP/IP
        protocol suite that is responsible for transferring email
®       SNMP (Simple Network Management Protocol) A TCP/IP proto-
        col that is used to manage and monitor network devices
That’s it for our discussion of how protocol suites map to the established
network standards. We now provide a more detailed look at the protocol
suites.

Protocols
As already mentioned, computers must agree on a protocol to be used for
any type of communication to take place. The following sections provide
more detail on the more common protocols in use today.
38   ○   ○
             Chapter 3
             ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○




     NetBEUI
     NetBEUI is a simple network layer transport protocol that was developed
     to support NetBIOS networks. Like NetBIOS, NetBEUI is not routable,
     so it really has no place on an enterprise network. NetBEUI is the fastest
     transport protocol available to NT. It’s great for fast transmission, but is not
     usable across routed networks. Benefits of NetBEUI include: speed, good
     error protection, ease of implementation, and low memory overhead. Some
     disadvantages are: it’s not routable, it has very little support for cross-
     platform applications, and it has very few troubleshooting tools available.

     TCP/IP
     TCP/IP is the most widely used protocol suite in networking today. This is
     due in part to the vast growth of the global Internet. TCP/IP is able to span
     wide areas and is very flexible. In addition, it provides cross-platform sup-
     port, routing capabilities, as well as support for the Simple Network Man-
     agement Protocol (SNMP), the Dynamic Host Configuration Protocol
     (DHCP), the Windows Internet Name Service (WINS), the Domain Name
     Service (DNS), and a host of other useful protocols. However, TCP/IP’s
     rich set of features are provided at the expense of additional overhead, which
     may make it too cumbersome for some networks or applications.

     AppleTalk
     It should come as no surprise that the AppleTalk protocol is used for com-
     munication with Macintosh computers. By enabling AppleTalk, you allow
     Mac clients to store and access files located on an NT Server, print to NT
     printers, and vice versa. An item of note: You must first install the NT
     Services For Macintosh before you can install AppleTalk. Also, Mac sup-
     port is only available from an NTFS partition.

     APPC
     The Advanced Program-to-Program Communication (APPC) protocol,
     developed by IBM, is a peer-to-peer protocol used in IBM’s Systems Net-
     work Architecture (SNA) for use on AS/400-series computers.

     X.25
     X.25 is a set of wide-area protocols that are used in packet-switching net-
     works. It was created to connect remote terminals to mainframes. Although
     many other wide-area communications types are available in the United
     States, X.25 is still widely used in Europe.
○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                            Network Protocols
                                                                                                            ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                                                                                    39


HDLC
High-level Data Link Control (HDLC) is a flexible, bit-oriented data link
protocol that is based on IBM’s Synchronous Data Link Control (SDLC).
It has been standardized by the ISO. HDLC can support half- or full-
duplex transmission, circuit- or packet-switched networks, peer-to-peer or
client/server network topologies and transmission over cable or wireless
media.

XNS
The Xerox Network System (XNS) was created by Xerox for use in Ethernet
networks. XNS is the basis for Novell’s IPX/SPX, but it is seldom found in
today’s networks.
40   ○   ○
             Chapter 3
             ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○




     Exam Prep Questions
     Question 1

                 Which of the following IEEE 802 specifications provides details
                 on network security?
                 r       a. 802.8
                 r       b. 802.9
                 r       c. 802.10
                 r       d. 802.11


     The 802.8 spec details fiber optic networks. Therefore, answer a is incor-
     rect. Answer b is incorrect because 802.9 details integrated voice and
     data networks. The 802.10 provides information on network security.
     Therefore, answer c is the correct choice. The 802.11 specification details
     wireless networks. Therefore, answer d is incorrect.

     Question 2

                 Which layer of the OSI model converts data into a generic format
                 for network transmission?
                 r       a. Transport layer
                 r       b. Session layer
                 r       c. Presentation layer
                 r       d. Application layer



     Answer a is incorrect because the Transport layer manages the transmis-
     sion of data across a network. The Session layer maintains a session
     between computers Therefore, answer b is also incorrect. Answer c is the
     correct choice; the Presentation layer is responsible for data conversion.
     The Application layer provides an interface for applications to use to gain
     access to networked services, so answer d is incorrect.
○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                            Network Protocols
                                                                                                            ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                                                                                    41


Question 3

            Which layer of the OSI model manages flow control and error
            correction?
            r       a. Transport layer
            r       b. Session layer
            r       c. Network layer
            r       d. Physical layer


Answer a is the correct choice. The Transport layer is responsible for
error-handling information and flow control. The Session layer maintains
a session between computers. Therefore, answer b is also incorrect. The
Network layer handles packet addressing and sequencing. Therefore,
answer c is incorrect. The Physical layer is responsible for communication
with the network media. Therefore, answer d is incorrect.

Question 4

            Which layer of the ODI model establishes the route between the
            sending and receiving computer?
            r       a. Transport layer
            r       b. Session layer
            r       c. Network layer
            r       d. Physical layer



The Transport layer is responsible for error-handling information and flow
control. Therefore, answer a is incorrect. The Session layer maintains a
session between computers. Therefore, answer b is also incorrect. The Net-
work layer is responsible for determining the route from the source to des-
tination computer. Therefore, answer c is the correct choice. The Physical
layer is responsible for communication with the network media Therefore,
answer d is incorrect.
42   ○   ○
             Chapter 3
             ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○




     Question 5

                 In which OSI model layer does the Media Access Control sublayer
                 reside?
                 r       a. Transport layer
                 r       b. Network layer
                 r       c. Data Link layer
                 r       d. Physical layer



     Only the Data Link layer was given sublayers by the IEEE 802 specifica-
     tions, which defined the Media Access Control and Logical Link Control
     sublayers. Therefore, the only correct answer to this question is answer c.
     None of the other choices were given sublayers. Therefore, a, b, and d are
     incorrect.

     Question 6

                 Which of the following protocols is considered a network protocol?
                 r       a. IPX
                 r       b. Telnet
                 r       c. FTP
                 r       d. SPX


     IPX is a network protocol. Therefore, answer a is the correct choice.
     Telnet and FTP are both application protocols. Therefore answers b
     and c are incorrect. SPX is a transport protocol. Therefore, answer d. is
     also incorrect.

     Question 7

                 Which of the following protocols is considered a transport protocol?
                 r       a. SNMP
                 r       b. SMTP
                 r       c. FTP
                 r       d. IPX
                 r       e. TCP
○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                            Network Protocols
                                                                                                            ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○
                                                                                                                                                                    43

SNMP, SMTP, and FTP are application protocols. Therefore, answers a, b,
and c are incorrect. IPX is a network protocol. Therefore, answer d is also
incorrect. TCP is a transport protocol. Therefore answer e is correct.

Question 8

            Which of the following protocols are considered application pro-
            tocols? [Check all correct answers]
            u       a. TCP
            u       b. SNMP
            u       c. FTP
            u       d. SPX
            u       e. NetBEUI


TCP and SPX are transport protocols. Therefore answers a and d are
incorrect. SNMP and FTP are both application protocols, so both answers
b and c correct. NetBEUI is a transport protocol. Therefore, answer e
is incorrect.

Question 9

            Which of the following 802 specifications provide details on how
            an Ethernet network operates?
            r       a. 802.2
            r       b. 802.3
            r       c. 802.4
            r       d. 802.5



802.2 defines Logical Link Control.; Therefore, answer a is incorrect. The
802.3 specification defines standards for Ethernet networks. Therefore,
answer b is correct. 802.4 defines Token Bus LANs Therefore, answer c
is incorrect. 802.5 defines Token Ring LANs; therefore, answer d is also
incorrect.
44   ○   ○
             Chapter 3
             ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○   ○




     Need To Know More?
                         Chellis, James, Charles Perkins, and Matthew Strebe: MCSE:
                         Networking Essentials Study Guide. Sybex Network Press, San
                         Francisco, CA, 1994. ISBN 0-7821-1971-9. Chapter 3, “The
                         Theoretical Network,” discusses the OSI Reference Model
                         at length.
                         Microsoft Press: Networking Essentials. Redmond, Washing-
                         ton, 1996. ISBN 1-55615-806-8. Unit 3, Lesson 7, “The OSI
                         and 802 Networking Models,” and Unit 3, Lesson 10 “Pro-
                         tocols,” both discuss the topics covered in this chapter in great
                         detail.

Mais conteúdo relacionado

Mais procurados

Ether Channel High Speed Data Transmission
Ether Channel  High Speed Data TransmissionEther Channel  High Speed Data Transmission
Ether Channel High Speed Data TransmissionNetwax Lab
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesDheryta Jaisinghani
 
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemCCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemVuz Dở Hơi
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
Equipements d'interconnexion
Equipements d'interconnexionEquipements d'interconnexion
Equipements d'interconnexionInes Kechiche
 
Atelier Reseaux informatiques
Atelier Reseaux informatiquesAtelier Reseaux informatiques
Atelier Reseaux informatiquesfulgence
 
Sécurité des Systèmes Répartis- Partie2 - non interférence
Sécurité des Systèmes Répartis- Partie2 - non interférenceSécurité des Systèmes Répartis- Partie2 - non interférence
Sécurité des Systèmes Répartis- Partie2 - non interférenceLilia Sfaxi
 
Proper spanning tree.pptx
Proper spanning tree.pptxProper spanning tree.pptx
Proper spanning tree.pptxEoin Irwin
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerNetwax Lab
 
Vlsm and supernetting
Vlsm and supernettingVlsm and supernetting
Vlsm and supernettingNahian Ahmed
 
Mesh network ‫‬
Mesh network ‫‬Mesh network ‫‬
Mesh network ‫‬Fatima Radi
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...FFRI, Inc.
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer Dheeraj Giri
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelShreyash Agarwal
 

Mais procurados (20)

Ether Channel High Speed Data Transmission
Ether Channel  High Speed Data TransmissionEther Channel  High Speed Data Transmission
Ether Channel High Speed Data Transmission
 
TinyOS 2.1 Tutorial: TOSSIM
TinyOS 2.1 Tutorial: TOSSIMTinyOS 2.1 Tutorial: TOSSIM
TinyOS 2.1 Tutorial: TOSSIM
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and Frames
 
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemCCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Ethernet
EthernetEthernet
Ethernet
 
Equipements d'interconnexion
Equipements d'interconnexionEquipements d'interconnexion
Equipements d'interconnexion
 
Atelier Reseaux informatiques
Atelier Reseaux informatiquesAtelier Reseaux informatiques
Atelier Reseaux informatiques
 
Sécurité des Systèmes Répartis- Partie2 - non interférence
Sécurité des Systèmes Répartis- Partie2 - non interférenceSécurité des Systèmes Répartis- Partie2 - non interférence
Sécurité des Systèmes Répartis- Partie2 - non interférence
 
Proper spanning tree.pptx
Proper spanning tree.pptxProper spanning tree.pptx
Proper spanning tree.pptx
 
Difference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP LayerDifference between OSI Layer & TCP/IP Layer
Difference between OSI Layer & TCP/IP Layer
 
Vlsm and supernetting
Vlsm and supernettingVlsm and supernetting
Vlsm and supernetting
 
Mesh network ‫‬
Mesh network ‫‬Mesh network ‫‬
Mesh network ‫‬
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
 
CCNA
CCNACCNA
CCNA
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer
 
Computer Networks - Layers in OSI Model
Computer Networks - Layers in OSI ModelComputer Networks - Layers in OSI Model
Computer Networks - Layers in OSI Model
 
Ipv4
Ipv4Ipv4
Ipv4
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Interrupts
InterruptsInterrupts
Interrupts
 

Semelhante a Network protocols

Mode of Data Flow in the OSI Model
Mode of Data Flow in the OSI ModelMode of Data Flow in the OSI Model
Mode of Data Flow in the OSI Modelijiert bestjournal
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcpAgrippa Mungazi
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.Kanishk Raj
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 
Topic 2.1 network communication using osi model
Topic 2.1 network communication using osi modelTopic 2.1 network communication using osi model
Topic 2.1 network communication using osi modelDoLce MiEra
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)ateeq85905
 
Ncsweek2 osi model
Ncsweek2 osi modelNcsweek2 osi model
Ncsweek2 osi modeljayvelu
 
Layer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptLayer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptBeniamTekeste
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]Avijit Nath
 
Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocolsJaleel James
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2Sohail Gohir
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 

Semelhante a Network protocols (20)

VOICE
VOICEVOICE
VOICE
 
Mode of Data Flow in the OSI Model
Mode of Data Flow in the OSI ModelMode of Data Flow in the OSI Model
Mode of Data Flow in the OSI Model
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.7 Layers OSI model description with 3 unofficial Layers.
7 Layers OSI model description with 3 unofficial Layers.
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
Topic 2.1 network communication using osi model
Topic 2.1 network communication using osi modelTopic 2.1 network communication using osi model
Topic 2.1 network communication using osi model
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
 
ccna presentation
ccna presentationccna presentation
ccna presentation
 
Ncsweek2 osi model
Ncsweek2 osi modelNcsweek2 osi model
Ncsweek2 osi model
 
Layer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptLayer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.ppt
 
CCNA Training
CCNA Training CCNA Training
CCNA Training
 
Ccna presentation
Ccna presentationCcna presentation
Ccna presentation
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
 
Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocols
 
Osi31
Osi31Osi31
Osi31
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 

Mais de Hemnath R.

RHEL-7 Administrator Guide for RedHat 7
RHEL-7  Administrator Guide for RedHat 7RHEL-7  Administrator Guide for RedHat 7
RHEL-7 Administrator Guide for RedHat 7Hemnath R.
 
Managing USER GROUPS & PERMISSION
Managing USER GROUPS & PERMISSIONManaging USER GROUPS & PERMISSION
Managing USER GROUPS & PERMISSIONHemnath R.
 
Using Find operation in LINUX
Using Find operation in LINUXUsing Find operation in LINUX
Using Find operation in LINUXHemnath R.
 
HP-UX - Patch Installation
HP-UX  - Patch InstallationHP-UX  - Patch Installation
HP-UX - Patch InstallationHemnath R.
 
Basic config in Cisco router
Basic config in Cisco routerBasic config in Cisco router
Basic config in Cisco routerHemnath R.
 
HP Unix administration
HP Unix administrationHP Unix administration
HP Unix administrationHemnath R.
 
Networking concepts and terms
Networking concepts and termsNetworking concepts and terms
Networking concepts and termsHemnath R.
 

Mais de Hemnath R. (7)

RHEL-7 Administrator Guide for RedHat 7
RHEL-7  Administrator Guide for RedHat 7RHEL-7  Administrator Guide for RedHat 7
RHEL-7 Administrator Guide for RedHat 7
 
Managing USER GROUPS & PERMISSION
Managing USER GROUPS & PERMISSIONManaging USER GROUPS & PERMISSION
Managing USER GROUPS & PERMISSION
 
Using Find operation in LINUX
Using Find operation in LINUXUsing Find operation in LINUX
Using Find operation in LINUX
 
HP-UX - Patch Installation
HP-UX  - Patch InstallationHP-UX  - Patch Installation
HP-UX - Patch Installation
 
Basic config in Cisco router
Basic config in Cisco routerBasic config in Cisco router
Basic config in Cisco router
 
HP Unix administration
HP Unix administrationHP Unix administration
HP Unix administration
 
Networking concepts and terms
Networking concepts and termsNetworking concepts and terms
Networking concepts and terms
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Network protocols

  • 1. 3 Network ○ ○ ○ ○ ○ ○ Protocols ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Terms you’ll need to understand: OSI Reference Model Application layer Presentation layer Session layer Transport layer Network layer Data Link layer Physical layer IEEE 802 specifications Redirectors Protocols: NetBEUI, TCP/IP, XNS, AppleTalk, APPC, X.25, and HDLC Techniques you’ll need to master: Interpreting the OSI Reference Model and how it relates to protocol suites Exploring the IEEE’s 802 network specifications Understanding and using redirectors Comprehending and implementing protocols 29
  • 2. 30 ○ ○ Chapter 3 ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ To enable networked communications, computers must be able to transmit data among one another. Protocols, agreed-upon methods of communica- tion, make this possible. In this chapter, we discuss the various network protocols and how they enable networked communications. In addition, we introduce you to the standards upon which network proto- cols are based: the Open Systems Interconnection (OSI) Reference Model and the IEEE 802 standards. The OSI Reference Model was developed by the International Standards Organization (ISO) to provide a standardized method for computers to communicate; the Institute of Electrical and Elec- tronic Engineers (IEEE) 802 standards further expanded this model. As always, we provide pointers along the way that will assist you in preparation for the Networking Essentials exam, and give you additional resources should you need more details on the topics we discuss in this chapter. The OSI Reference Model As the concept of networking became more widespread in the business world, the idea of being able to connect networks and disparate systems became a necessity. For this type of communication to take place, however, there needed to be a standard method. The solution came in 1978 when the ISO released an architecture that would allow achieve this goal. These specifications were revised in 1984 and became international standards for networked communication. It is important for network administrators to know the history and understand the function of this specification, which is called the OSI Reference Model. The OSI model presents a layered approach to networking. Each layer of the model handles a different portion of the communications process. By separating such communications into layers, the OSI model simplified how network hardware and software work together, as well as eased trouble- shooting woes by providing a specific method for how components should function. Now that we know why the model was implemented, let’s move on to explore just how it works. Keep in mind that the OSI model is a completely conceptual refer- ence. Later in the chapter, we’ll discuss how protocol suites map to the model to provide network communications.
  • 3. ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Network Protocols ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ 31 Learning The Layers The OSI Reference Model divides networking into seven layers, as shown in Figure 3.1. These layers are described as follows: ® Application layer Provides a set of interfaces for applications to use to gain access to networked services. ® Presentation layer Converts data into a generic format for network transmission; for incoming messages, it converts data from this format into a format that the receiving application can understand. ® Session layer Enables two parties to hold ongoing communica- tions—called sessions—across a network. ® Transport layer Manages the transmission of data across a network. ® Network layer Handles addressing messages for delivery, as well as translates logical network addresses and names into their physical counterparts. 7. Application Layer 6. Presentation Layer 5. Session Layer 4. Transport Layer 3. Network Layer 2. Data Link Layer 1. Physical Layer Figure 3.1 The OSI model separates networking functions into seven layers.
  • 4. 32 ○ ○ Chapter 3 ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ® Data Link layer Sends special data frames from the Network layer to the Physical layer. ® Physical layer Converts bits into signals for outgoing messages, and signals into bits for incoming messages. EXAM It is essential that you know the layers of the OSI model when M EX you take the Networking Essentials exam. A great instructor once MEXA AME XA provided the following mnemonic, which helps you remember MEXA the order of these layers: From the bottom up, take the first letter of each layer (PDNTSPA) and assign a more approachable phrase such as “Please Do Not Throw Sausage Pizza Away.” In the following sections, we’ll examine each layer of the OSI Reference Model in more detail. Layer 7: The Application Layer The Application layer is referred to as the top layer of the OSI Reference Model. This layer allows access to network services—such as networked file transfer, message handling, and database query processing—that sup- port applications directly. This layer also controls general network access, the transmission of data from sender to receiver (called flow control), and error recovery for applications when appropriate. Layer 6: The Presentation Layer The Presentation layer manages data-format information for networked communications. Also called the network’s translator, it converts outgoing messages into a generic format that can be transmitted across a network; then, it converts incoming messages from that generic format into one that makes sense to the receiving application. This layer is also responsible for protocol conversion, data encryption and decryption, and graphics commands. Information sent by the Presentation layer may sometimes be compressed to reduce the amount of data to be transferred (this also requires decom- pression on the receiving end). It is at this layer that a special software facility known as a redirector operates. The redirector intercepts requests for service and redirects requests that cannot be resolved locally to the net- worked resource that can handle them.
  • 5. ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Network Protocols ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ 33 Layer 5: The Session Layer The Session layer allows two networked resources to hold ongoing com- munications, called a session, across a network. In other words, applica- tions on each end of the session are able to exchange data for the duration of the session. This layer manages session setup, information or message exchanges, and tear-down when the session ends. It is also responsible for identification so that only designated parties can participate in the session, and handles security services for controlling access to session information. The Session layer furnishes synchronization services between tasks at each end of the session. This layer places checkpoints in the data stream so if communications fail, only data after the most recent checkpoint need be retransmitted. The Session layer also manages issues such as who may trans- mit data at a certain time and for how long, and maintains a connection through transmission of messages that keep the connection active; these messages are designed to keep the connection to be closed down due to inactivity. Layer 4: The Transport Layer The Transport layer manages the flow control of data between parties across a network. It does this by segmenting long streams of data into chunks that adhere to the maximum packet size for the networking medium in use. The layer also provides error checks to guarantee error-free data delivery, and resequences chunks back into the original data when it is received. In addition, the Transport layer provides acknowledgment of successful trans- missions and is responsible for requesting retransmission if some packets do not arrive error-free. Layer 3: The Network Layer The Network layer addresses messages for delivery, and translates logical network addresses and names into their physical equivalents. This layer also decides how to route transmissions between computers. To decide how to get data from one point to the next, the Network layer considers other factors, such as quality of service information, alternative routes, and deliv- ery priorities. This layer also handles packet switching, data routing, and network congestion control. Layer 2: The Data Link Layer The Data Link layer handles special data frames between the Network and Physical layers. At the receiving end, this layer packages raw data from the
  • 6. 34 ○ ○ Chapter 3 ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Physical layer into data frames for delivery to the Network layer. A data frame is the basic unit for network traffic as data is sent across the network medium; the data frame is a highly structured format in which data from upper layers is placed for sending, and from which data from upper layers is taken on receipt. Layer 1: The Physical Layer The Physical layer converts bits into signals for outgoing messages, and signals into bits for incoming ones. This layer arranges the transmission of a data frame’s bits when they are dispatched across the network. The Physical layer manages the interface between a computer and the network medium, and instructs the driver software and the network interface as to what needs to be sent across the medium. That concludes the layer-by-layer discussion of the OSI Reference Model. Now, let’s take a look at how the IEEE 802 specifications further standard- ized network communication. IEEE 802 Specifications At roughly the same time the OSI model came to be, the IEEE published the 802 specifications, which defined standards for the physical compo- nents of a network. These components, namely Network Interface Cards (NICs) and network media, are also accounted for in the Physical and Data Link layers of the OSI model. The 802 specs defined how network adapt- ers access and transmit information over the network cable. EXAM The 802 specifications fall into 12 distinct categories, each of M which has its own number, as described in the following: EX MEXA AME XA MEXA ® 802.1 Internetworking ® 802.2 Logical Link Control (LLC) ® 802.3 Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) LANs (Ethernet) ® 802.4 Token Bus LAN ® 802.5 Token Ring LAN ® 802.6 Metropolitan Area Network (MAN) ® 802.7 Broadband Technical Advisory Group ® 802.8 Fiber Optic Technical Advisory Group
  • 7. ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Network Protocols ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ 35 ® 802.9 Integrated Voice and Data Networks ® 802.10 Network Security ® 802.11 Wireless Networks ® 802.12 Demand Priority Access LAN, 100BaseVG-AnyLAN As previously mentioned, the 802 spec actually expanded the OSI Refer- ence Model. This expansion is at the Physical and Data Link layers, which define how more than one computer can access the network without caus- ing interference with other computers on the network. The 802 standards provide more detail at these layers by breaking the Data Link layer into the following sublayers (see Figure 3.2): ® Logical Link Control (LLC) For error correction and flow control 7. Application Layer 6. Presentation Layer 5. Session Layer Logical Link Control 802.1 OSO Model and Network Management 4. Transport Layer 802.2 Logical Link Control 3. Network Layer 2. Data Link Layer 1. Physical Layer Media Access Control 802.3 CSMA/CD 802.4 Token Bus 802.5 Token Ring 802.12 Demand Priority Figure 3.2 The 802 specs within the OSI model.
  • 8. 36 ○ ○ Chapter 3 ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ® Media Access Control (MAC) For access controlThe Logical Link sublayer (as defined by 802.2) controls data-link communication, and defines the use of logical interface points, called Service Access Points (SAPs), that other computers can use to transfer information from the LLC sublayer to the upper OSI layers. The Media Access Control sublayer provides shared access for multiple NICs with the Physical layer. The MAC has direct communication with a computer’s NIC and is responsible for ensuring error-free data transmis- sion between computers on a network. This concludes the theoretical discussion of network models. In the fol- lowing section, we’ll discuss how protocol suites are mapped to this model to provide networked communications. Up And Down The Protocol Stack In general, most protocols follow the guidelines established by the OSI model. A protocol suite, also called a stack, is a combination of protocols that work together to achieve network communication. These protocol suites are generally broken up into three sections that map to the OSI model: network, transport, and application. Because each layer performs a specific function and has its own rules, a protocol stack often has a different proto- col for each of these layers. Network Protocols Network protocols provide the following services: addressing and routing information, error checking, requesting retransmissions, and establishing rules for communicating in a particular networking environment. These services are also called link services. Some popular network protocols are: ® DDP (Delivery Datagram Protocol) Apple’s data transport protocol that is used in AppleTalk ® IP (Internet Protocol) Part of the TCP/IP protocol suite that provides addressing and routing information ® IPX (Internetwork Packet Exchange) and NWLink Novell’s NetWare protocol (and Microsoft’s implementation of this protocol, respectively) used for packet routing and forwarding ® NetBEUI Developed by IBM and Microsoft, it provides transport services for NetBIOS
  • 9. ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Network Protocols ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ 37 Transport Protocols In addition, protocol suites also contain transport protocols, which are responsible for ensuring reliable data delivery between computers. Some popular transport protocols are: ® ATP (AppleTalk Transaction Protocol) and NBP (Name Binding Protocol) AppleTalk’s session and data transport protocols ® NetBIOS/NetBEUI NetBIOS establishes and manages communi- cations between computers; NetBEUI provides data transport services for that communication ® SPX (Sequenced Packet Exchange) and NWLink Novell’s connec- tion-oriented protocol that is used to guarantee data delivery (and Microsoft’s implementation of this protocol) ® TCP (Transmission Control Protocol) The portion of the TCP/IP protocol suite that is responsible for reliable delivery of data Application Protocols Finally, there are application protocols, which are responsible for applica- tion-to-application services. Some popular application protocols are: ® AFP (AppleTalk File Protocol) Apple’s remote file management protocol ® FTP (File Transfer Protocol) Another member of the TCP/IP protocol suite that is used to provide file transfer services ® NCP (NetWare Core Protocol) Novell’s client shells and redirectors ® SMTP (Simple Mail Transport Protocol) A member of the TCP/IP protocol suite that is responsible for transferring email ® SNMP (Simple Network Management Protocol) A TCP/IP proto- col that is used to manage and monitor network devices That’s it for our discussion of how protocol suites map to the established network standards. We now provide a more detailed look at the protocol suites. Protocols As already mentioned, computers must agree on a protocol to be used for any type of communication to take place. The following sections provide more detail on the more common protocols in use today.
  • 10. 38 ○ ○ Chapter 3 ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ NetBEUI NetBEUI is a simple network layer transport protocol that was developed to support NetBIOS networks. Like NetBIOS, NetBEUI is not routable, so it really has no place on an enterprise network. NetBEUI is the fastest transport protocol available to NT. It’s great for fast transmission, but is not usable across routed networks. Benefits of NetBEUI include: speed, good error protection, ease of implementation, and low memory overhead. Some disadvantages are: it’s not routable, it has very little support for cross- platform applications, and it has very few troubleshooting tools available. TCP/IP TCP/IP is the most widely used protocol suite in networking today. This is due in part to the vast growth of the global Internet. TCP/IP is able to span wide areas and is very flexible. In addition, it provides cross-platform sup- port, routing capabilities, as well as support for the Simple Network Man- agement Protocol (SNMP), the Dynamic Host Configuration Protocol (DHCP), the Windows Internet Name Service (WINS), the Domain Name Service (DNS), and a host of other useful protocols. However, TCP/IP’s rich set of features are provided at the expense of additional overhead, which may make it too cumbersome for some networks or applications. AppleTalk It should come as no surprise that the AppleTalk protocol is used for com- munication with Macintosh computers. By enabling AppleTalk, you allow Mac clients to store and access files located on an NT Server, print to NT printers, and vice versa. An item of note: You must first install the NT Services For Macintosh before you can install AppleTalk. Also, Mac sup- port is only available from an NTFS partition. APPC The Advanced Program-to-Program Communication (APPC) protocol, developed by IBM, is a peer-to-peer protocol used in IBM’s Systems Net- work Architecture (SNA) for use on AS/400-series computers. X.25 X.25 is a set of wide-area protocols that are used in packet-switching net- works. It was created to connect remote terminals to mainframes. Although many other wide-area communications types are available in the United States, X.25 is still widely used in Europe.
  • 11. ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Network Protocols ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ 39 HDLC High-level Data Link Control (HDLC) is a flexible, bit-oriented data link protocol that is based on IBM’s Synchronous Data Link Control (SDLC). It has been standardized by the ISO. HDLC can support half- or full- duplex transmission, circuit- or packet-switched networks, peer-to-peer or client/server network topologies and transmission over cable or wireless media. XNS The Xerox Network System (XNS) was created by Xerox for use in Ethernet networks. XNS is the basis for Novell’s IPX/SPX, but it is seldom found in today’s networks.
  • 12. 40 ○ ○ Chapter 3 ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Exam Prep Questions Question 1 Which of the following IEEE 802 specifications provides details on network security? r a. 802.8 r b. 802.9 r c. 802.10 r d. 802.11 The 802.8 spec details fiber optic networks. Therefore, answer a is incor- rect. Answer b is incorrect because 802.9 details integrated voice and data networks. The 802.10 provides information on network security. Therefore, answer c is the correct choice. The 802.11 specification details wireless networks. Therefore, answer d is incorrect. Question 2 Which layer of the OSI model converts data into a generic format for network transmission? r a. Transport layer r b. Session layer r c. Presentation layer r d. Application layer Answer a is incorrect because the Transport layer manages the transmis- sion of data across a network. The Session layer maintains a session between computers Therefore, answer b is also incorrect. Answer c is the correct choice; the Presentation layer is responsible for data conversion. The Application layer provides an interface for applications to use to gain access to networked services, so answer d is incorrect.
  • 13. ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Network Protocols ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ 41 Question 3 Which layer of the OSI model manages flow control and error correction? r a. Transport layer r b. Session layer r c. Network layer r d. Physical layer Answer a is the correct choice. The Transport layer is responsible for error-handling information and flow control. The Session layer maintains a session between computers. Therefore, answer b is also incorrect. The Network layer handles packet addressing and sequencing. Therefore, answer c is incorrect. The Physical layer is responsible for communication with the network media. Therefore, answer d is incorrect. Question 4 Which layer of the ODI model establishes the route between the sending and receiving computer? r a. Transport layer r b. Session layer r c. Network layer r d. Physical layer The Transport layer is responsible for error-handling information and flow control. Therefore, answer a is incorrect. The Session layer maintains a session between computers. Therefore, answer b is also incorrect. The Net- work layer is responsible for determining the route from the source to des- tination computer. Therefore, answer c is the correct choice. The Physical layer is responsible for communication with the network media Therefore, answer d is incorrect.
  • 14. 42 ○ ○ Chapter 3 ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Question 5 In which OSI model layer does the Media Access Control sublayer reside? r a. Transport layer r b. Network layer r c. Data Link layer r d. Physical layer Only the Data Link layer was given sublayers by the IEEE 802 specifica- tions, which defined the Media Access Control and Logical Link Control sublayers. Therefore, the only correct answer to this question is answer c. None of the other choices were given sublayers. Therefore, a, b, and d are incorrect. Question 6 Which of the following protocols is considered a network protocol? r a. IPX r b. Telnet r c. FTP r d. SPX IPX is a network protocol. Therefore, answer a is the correct choice. Telnet and FTP are both application protocols. Therefore answers b and c are incorrect. SPX is a transport protocol. Therefore, answer d. is also incorrect. Question 7 Which of the following protocols is considered a transport protocol? r a. SNMP r b. SMTP r c. FTP r d. IPX r e. TCP
  • 15. ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Network Protocols ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ 43 SNMP, SMTP, and FTP are application protocols. Therefore, answers a, b, and c are incorrect. IPX is a network protocol. Therefore, answer d is also incorrect. TCP is a transport protocol. Therefore answer e is correct. Question 8 Which of the following protocols are considered application pro- tocols? [Check all correct answers] u a. TCP u b. SNMP u c. FTP u d. SPX u e. NetBEUI TCP and SPX are transport protocols. Therefore answers a and d are incorrect. SNMP and FTP are both application protocols, so both answers b and c correct. NetBEUI is a transport protocol. Therefore, answer e is incorrect. Question 9 Which of the following 802 specifications provide details on how an Ethernet network operates? r a. 802.2 r b. 802.3 r c. 802.4 r d. 802.5 802.2 defines Logical Link Control.; Therefore, answer a is incorrect. The 802.3 specification defines standards for Ethernet networks. Therefore, answer b is correct. 802.4 defines Token Bus LANs Therefore, answer c is incorrect. 802.5 defines Token Ring LANs; therefore, answer d is also incorrect.
  • 16. 44 ○ ○ Chapter 3 ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Need To Know More? Chellis, James, Charles Perkins, and Matthew Strebe: MCSE: Networking Essentials Study Guide. Sybex Network Press, San Francisco, CA, 1994. ISBN 0-7821-1971-9. Chapter 3, “The Theoretical Network,” discusses the OSI Reference Model at length. Microsoft Press: Networking Essentials. Redmond, Washing- ton, 1996. ISBN 1-55615-806-8. Unit 3, Lesson 7, “The OSI and 802 Networking Models,” and Unit 3, Lesson 10 “Pro- tocols,” both discuss the topics covered in this chapter in great detail.