0% found this document useful (0 votes)
26 views

Ccna Chapter 2 Tcp Ip

Uploaded by

olabelal1995
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Ccna Chapter 2 Tcp Ip

Uploaded by

olabelal1995
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 27

Sybex CCNA 640-802

Chapter 2: Introduction to TCP/IP


Dr. Hany El-Ghaish
Chapter 2 Objectives
• The CCNA Topics Covered in this chapter
include:
• TCP/IP and the DoD Model
– Process/Application Layer
– Host-to-Host Layer
– Internet Layer
– Network Access
• IP Addressing
– Class A
– Class B
– Class C
– Private Addressing
2
TCP/IP and the DoD Model
The figure shows a comparison of the DoD model and the OSI
reference model. As you can see, the two are similar in concept,
but each has a different number of layers with different names.

3
The TCP/IP Protocol Suite
The DoD and OSI models are alike in design and
concept and have similar functions in similar
layers.

4
Protocol Function
Telnet Telnet is a network protocol used to virtually access a
computer and to provide a two-way, collaborative and
text-based communication channel between two
machines. It follows a user command Transmission Control
Protocol/Internet Protocol (TCP/IP) networking protocol for
creating remote session.
Line Printer Daemon The Line Printer Daemon protocol/Line Printer
protocol Remote protocol (or LPD, LPR) is a network
LPD printing protocol for submitting print jobs to a remote printer.

X-Window The X Window System core protocol is the base protocol of


the X Window System, which is a networked
windowing system for bitmap displays used to build
graphical user interfaces on Unix, Unix-like, and other
operating systems. The X Window System is based on a
client–server model: a single server controls the input/output
hardware, such as the screen, the keyboard, and the mouse
; all application programs act as clients, interacting with the
user and with the other clients via the server.
SMTP The Simple Mail Transfer Protocol (SMTP) is an Internet standard
communication protocol for electronic mail transmission. Mail servers
and other message transfer agents use SMTP to send and receive
mail messages.
FTP The File Transfer Protocol (FTP) is a standard communication protocol
used for the transfer of computer files from a server to a client on a
computer network. FTP is built on a client–server model architecture
using separate control and data connections between the client and the
server.[1] FTP users may authenticate themselves with a clear-text sign-in
protocol, normally in the form of a username and password, For secure
transmission that protects the username and password, and encrypts the
content, FTP is often secured with SSL/TLS (FTPS) or replaced with
SSH File Transfer Protocol (SFTP).
TFTP Trivial File Transfer Protocol (TFTP) is a simple lockstep
File Transfer Protocol which allows a client to get a file from or put a file
onto a remote host. One of its primary uses is in the early stages of nodes
booting from a local area network. TFTP has been used for this
application because it is very simple to implement.
NFS Network File System: This distributed file system protocol allows a user
on a client computer to access files over a network in the same way they
would access a local storage file. Because it is an open standard, anyone
can implement the protocol. NFS started in-system as an experiment but
the second version was publicly released after the initial success.
SNMP Simple Network Management Protocol (SNMP) is an Internet Standard
protocol for collecting and organizing information about managed devices
on IP networks and for modifying that information to change device
behaviour. Devices that typically support SNMP include cable modems,
routers, switches, servers, workstations, printers, and more.[1]

DNS The Domain Name System (DNS) is the hierarchical and decentralized
naming system used to identify computers reachable through the Internet
or other Internet Protocol (IP) networks. The resource records contained
in the DNS associate domain names with other forms of information.

DHCP Dynamic Host Configuration Protocol (DHCP) is a client/server protocol


that automatically provides an Internet Protocol (IP) host with its IP
address and other related configuration information such as the subnet
mask and default gateway.
Doom Doom supported networked multiplayer gameplay in addition to its single-
player gameplay. It was one of the first popular games to support
networked play.
POP3 In computing, the Post Office Protocol (POP) is an application-layer
Internet standard protocol used by e-mail clients to retrieve e-mail from a
mail server.[1] POP version 3 (POP3) is the version in common use, and
along with IMAP the most common protocols for email retrieval.
Process/Application Layer
This section describes different applications and services typically
used in IP networks. The following protocols and applications are
discussed:

– Telnet
– FTP
– TFTP
– NFS
– SMTP
– LPD
– X Window
– SNMP
– DNS
– DHCP/BootP
8
Host to Host Layer

The main purpose of the Host-to-Host layer


is to shield the upper-layer applications
from the complexities of the network.
This layer says to the upper layer, “Just give
me your data stream, with any instructions,
and I’ll begin the process of getting your
information ready to send.”
The following sections describe the two
protocols at this layer:
– Transmission Control Protocol (TCP)
– User Datagram Protocol (UDP)

9
TCP
The figure shows the different fields
within the TCP header.

https://networklessons.com/cisco/ccie-routing-switching-written/tcp-header
10
UDP
This figure clearly illustrates UDP’s markedly low
overhead as compared to TCP’s hungry usage.

11
Key concepts of Host to Host
Protocols
TCP UDP
Sequenced Unsequenced
Reliable Unreliable
Connection-oriented Connectionless
Virtual circuit Low overhead
Acknowledgments No
acknowledgment
Windowing flow control No windowing or
flow control

12
Port Numbers
Port number examples for TCP and UDP

13
Key Protocols and Port
Numbers
TCP UDP
Telnet 23 SNMP 161
SMTP 25 TFTP 69
HTTP 80 DNS 53
FTP 21
DNS 53
HTTPS 443

14
Internet Layer
IP Header

15
Internet Layer
Protocol Field in IP Header

16
Internet Layer
Protocol Field in IP Header

Protocol Protocol Number


ICMP 1
IP in IP (tunneling) 4
IGRP 9
EIGRP 88
OSPF 89

IPv6 41
GRE 47
Layer 2 tunnel (L2TP) 115

17
Internet Layer
ICMP
Internet Control Message Protocol (ICMP)
works at the Network layer and is used by IP
for many different services.

•ICMP is a management protocol and


messaging service provider for IP.
•Its messages are carried as IP datagrams.

ICMP packets have the following


characteristics:
• They can provide hosts with information about
network problems.
• They are encapsulated within IP datagrams.
18
Internet Layer
ICMP
E0 of LAB_B goes down. What happens?

19
Internet Layer
ARP

ARP resolves IP addresses to Ethernet (MAC) addresses.

20
Internet Layer
RARP

21
IP Addressing
An IP address is a numeric identifier assigned
to each machine on an IP network.

It designates the specific location of a device


on the network.

IP addressing was designed to allow hosts on


one network to communicate with a host on a
different network regardless of the type of
LANs the hosts are participating in.

22
IP Terminology
BIT: A bit is one digit, either a 1 or a 0.

BYTE: A byte is 7 or 8 bits, depending on whether parity is used.


For the rest of this chapter, always assume a byte is 8 bits.

OCTET: An octet, made up of 8 bits, is just an ordinary 8-bit binary


number. In this chapter, the terms byte and octet are completely
interchangeable.

Network address: This is the designation used in routing to send


packets to a remote network—for example, 10.0.0.0, 172.16.0.0,
and 192.168.10.0.

Broadcast address: The address used by applications and hosts


to send information to all nodes on a network is called the
broadcast address.

23
Network Addressing
Subdividing an IP address into a network and node address is
determined by the class designation of one’s network. This figure
summarizes the three classes of networks

0-127

128 - 191

192-223

224 - 239

240 - 225

24
Private Addressing

Address Class Reserved Address Space


Class A 10.0.0.0 through 10.255.255.255
Class B 172.16.0.0 through 172.31.255.255
Class C 192.168.0.0 through 192.168.255.255

25
Reserved Addressing
Address Function
Network address of all 0s Interpreted to mean “this network or
segment.”
Network address of all 1s Interpreted to mean “all networks.”
Network 127.0.0.1 Reserved for loopback tests.
Node address of all 0s Interpreted to mean “network address” or
any host on specified network.
Node address of all 1s Interpreted to mean “all nodes” on the
specified network
Entire IP address set to all 0s Used by Cisco routers to designate the
default route. Could also mean “any
network.”
Entire IP address set to all 1s (same as Broadcast to all nodes on the
current network; 255.255.255.255)
sometimes called an “all 1s broadcast” or
limited broadcast

26
Written Labs and Review
Questions
– Open your books and go through all the
written labs and the review questions.
– Review the answers in class.

27

You might also like