76
CHAPTER 2 – NETWORK CHAPTER 2 – NETWORK ADRESSING ADRESSING

CHAPTER 2 – NETWORK ADRESSING

  • Upload
    vienna

  • View
    26

  • Download
    1

Embed Size (px)

DESCRIPTION

CHAPTER 2 – NETWORK ADRESSING. Objectives. Understand Open System Interconnect (OSI) Model. Understand the protocol use in network communication. The OSI Model. ISO is the International Organization for Standardization. - PowerPoint PPT Presentation

Citation preview

Page 1: CHAPTER 2 – NETWORK ADRESSING

CHAPTER 2 – NETWORK CHAPTER 2 – NETWORK ADRESSINGADRESSING

Page 2: CHAPTER 2 – NETWORK ADRESSING

Objectives Objectives Understand Open System

Interconnect (OSI) Model.Understand the protocol use in

network communication.

Page 3: CHAPTER 2 – NETWORK ADRESSING

The OSI ModelThe OSI Model• ISO is the International Organization

for Standardization. • ISO developed a standard model for

communications, called the OSI (Open Systems Interconnection) Model.

• Enable computer platforms across the world to communicate openly.

• This model, divides network communication into seven layers:

Page 4: CHAPTER 2 – NETWORK ADRESSING
Page 5: CHAPTER 2 – NETWORK ADRESSING
Page 6: CHAPTER 2 – NETWORK ADRESSING

The OSI Model The OSI Model (continued)(continued)

Page 7: CHAPTER 2 – NETWORK ADRESSING

The OSI Model The OSI Model (continued)(continued)

Application Layer• Does not include software applications, such

as Microsoft Word or Netscape

• Services communicate between software programs and lower-layer network services

• File, print, message, database, and application services

• Application Program : Browser, Search Engines, Email Program etc.

• TCP/IP Protocol : Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), File Transfer Protocol (FTP), Telnet etc.

Page 8: CHAPTER 2 – NETWORK ADRESSING

The OSI Model The OSI Model (continued)(continued)

Presentation Layer• Protocols at the Presentation layer accept

Application layer data and format it

• Serves as a translator and are the standards which are involved in multimedia

• Presentation layer protocols perform the coding, compression and also manage data encryption and decryption

• Example : Text encoding methods ASCII and BCD, Compression methods like JPEG and MP3

• TCP/IP Protocol : Multipurpose Internet Mail Extensions (MIME), Secure Socket Layer (SSL), Transport Layer Security (TLS).

Page 9: CHAPTER 2 – NETWORK ADRESSING

The OSI Model The OSI Model (continued)(continued)

Session Layer

• Protocols in the Session layer coordinate and maintain communications between two nodes

• Session refers to a connection for ongoing data exchange between two parties

• Example : Video and audio streams for a video session, Upload or download file session.

• TCP/IP Protocol : Transmission Control Protocol (TCP), Session Initiation Protocol (SIP), Real-time Transport Protocol (RTP).

Page 10: CHAPTER 2 – NETWORK ADRESSING

The OSI Model The OSI Model (continued)(continued)

Session Layer (continued)

• Session layer’s functions are establishing and keeping alive the communications link for the duration of the session Keep the communication secure Synchronizing the dialog between the two nodes Determining whether communications have been

cut off, and, if so, figuring out where to restart transmission and terminating communications

Page 11: CHAPTER 2 – NETWORK ADRESSING

The OSI Model The OSI Model (continued)(continued)

Transport Layer• Protocols in the Transport layer accept data from

the Session layer and manage end to-end delivery

• Ensures that the data is transferred from point A to point B reliably, in the correct sequence, and without errors

• Breaking large data units received from Session layer into multiple smaller units called segments

• Segment ( Source and Destination Port Number)

• TCP/IP Protocol : Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)

Page 12: CHAPTER 2 – NETWORK ADRESSING

The OSI Model The OSI Model (continued)(continued)Transport Layer (continued)•Without Transport layer services, data could not be

verified or interpreted by its recipient

• Handles flow control

• Some Transport layer protocols take steps to ensure that data arrives exactly as it was sent.• TCP is one example of a connection-oriented

protocol Three Step Process•Request (Client sends)•Acknowledgment (ACK)•Client Acknowledgement (ACK)

• Sequencing Identifying segments that belong to the same group

o Checksum: method of error checking

Page 13: CHAPTER 2 – NETWORK ADRESSING

The OSI Model The OSI Model (continued)(continued)

Page 14: CHAPTER 2 – NETWORK ADRESSING

Layer 3 – Network Layer 3 – Network

Function :Routes packets according to unique network device addresses.(IP Address or Logical Address)

Packet ( Source and Destination IP Address)

Page 15: CHAPTER 2 – NETWORK ADRESSING

The OSI Model The OSI Model (continued)(continued)

Network Layer

• Primary function of protocols at the Network layer Translate network addresses Decide how to route data• Network layer addresses Also called logical addresses or virtual addresses

• Routers belong in the Network layer

• Perform Fragmentation

• Network Devices : Router

• TCP/IP Protocol - Internet Protocol (IP), Internet Protocol Security (IPsec), etc.

Page 16: CHAPTER 2 – NETWORK ADRESSING

The OSI Model The OSI Model (continued)(continued)

Data Link LayerPrimary function of protocols is to divide

data into distinct frames that can then be transmitted by the Physical layer

Network Devices : Switch and Bridge.TCP/IP Protocol : Point-to-Point Protocol

(PPP), Serial Line Internet Protocol (SLIP), etc IEEE has divided the Data Link layer into two

sublayers Logical Link Control (LLC) Media Access Control (MAC)

Page 17: CHAPTER 2 – NETWORK ADRESSING

The OSI Model The OSI Model (continued)(continued)

Page 18: CHAPTER 2 – NETWORK ADRESSING

The OSI Model The OSI Model (continued)(continued)

Physical LayerLowest, or first, layer of the OSI ModelExample : Twisted pair, coaxial cable, optical

fiber, wireless, or other transmission media.Network Device : Hub and RepeaterProtocols at the Physical layer

Accept frames from the Data Link layer Generate voltage so as to transmit signals Receiving data detect voltage and accept

signals Pass on to the Data Link layer

Page 19: CHAPTER 2 – NETWORK ADRESSING

Applying The OSI ModelApplying The OSI Model

Page 20: CHAPTER 2 – NETWORK ADRESSING

Applying The OSI ModelApplying The OSI ModelC o m m unication between two

syste m• At each layer of the OSI Model, some

information is added to the original data

Page 21: CHAPTER 2 – NETWORK ADRESSING

Applying The OSI Model Applying The OSI Model (continued)(continued)

Frame Specifications

• Two major categories of frame types

Ethernet

•developed at X erox in the early 1 970s

Token Ring

•developed by IBM in the 1980s

Page 22: CHAPTER 2 – NETWORK ADRESSING

TCP/IP ModelTCP/IP Model• TCP/IP is based on a four-layer reference

model. All protocols that belong to the TCP/IP protocol suite are located in the top three layers of this model.

• As shown in the following illustration, each layer of the TCP/IP model corresponds to one or more layers of the seven-layer.Open Systems Interconnection (OSI) reference model proposed by the International Standards Organization (ISO).

Page 23: CHAPTER 2 – NETWORK ADRESSING
Page 24: CHAPTER 2 – NETWORK ADRESSING

Encapsulation ProcessEncapsulation Process When sending messages on a network, the protocol stack

on a host operates from top to bottom. In the web server example, a browser on the client

requests a web page from a web server on destination port 80. This starts the process of sending the web page to the client.

As the web page is sent down the web server protocol stack, the application data is broken into TCP segments. Each TCP segment is given a header containing a source and destination port.

The TCP segment encapsulates HTTP protocol and web page HTML user data and sends it down to the next protocol layer, which is IP. Here the TCP segment is encapsulated within an IP packet, which adds an IP header. The IP header contains source and destination IP addresses.

Next, the IP packet is sent to the Ethernet protocol where it is encapsulated in a frame header and trailer. Each Ethernet frame header contains a source and destination MAC address. The trailer contains error checking information. Finally the bits are encoded onto the Ethernet media (copper or fiber optic cable) by the server NIC.

Page 25: CHAPTER 2 – NETWORK ADRESSING
Page 26: CHAPTER 2 – NETWORK ADRESSING

De-Encapsulation ProcessDe-Encapsulation Process• When messages are received from the network, the protocol stack

on a host operates from bottom to top. The process of receiving the web page starts the de-encapsulation of the message by the client.

• As the bits are received by the Client NIC, they are decoded and the destination MAC address is recognized by the client as its own.

• The frame is sent up the web client protocol stack where the Ethernet header (source and destination MAC addresses) and trailer are removed (de-encapsulated). The remaining IP packet and contents are passed up to the IP layer.

• At the IP layer the IP header (source and destination IP addresses) is removed and the contents passed up to the TCP layer.

• At the TCP layer the TCP header (source and destination ports) is removed and the web page user data contents are passed up to the Browser application using HTTP. As TCP segments are received they are reassembled to create the web page.

Page 27: CHAPTER 2 – NETWORK ADRESSING

Exchange IExchange IPX/SPXPX/SPX IPX/SPX is a routable protocol and can be used for small and large

networks. It was created by Novell primarily for Novell NetWare networks, but is popular enough that it is used on products that are not from Novell.

NCP - NetWare Core Protocol provides for client/server interactions such as file and print sharing. It works at the application, presentation, and session levels.

SAP - Service Advertising Protocol packets are used by file and print servers to periodically advertise the address of the server and the services available. It works at the application, presentation, and session levels.

SPX - Sequenced Packet Exchange operates at the transport layer providing connection oriented communication on top of IPX.

IPX - Internetwork Packet Exchange supports the transport and network layers of the OSI network model. Provides for network addressing and routing. It provides fast, unreliable, communication with network nodes using a connection less datagram service.

Page 28: CHAPTER 2 – NETWORK ADRESSING

NetBIOSNetBIOS Microsoft developed a suite of protocols around

NetBIOS using NetBEUI for transport. The primary advantage of this protocol is that it is easy to configure and Microsoft claims that it runs faster.

NetBIOS

◘ Network Basic Input/Output allows browsing of network resources and handles basic functions of a Windows network.

◘ Two way acknowledged data transfer is used.

◘ It is a Microsoft protocol used to support Microsoft Networking.

◘ Works at the session layer.

◘ Controls the sessions between computers and maintains connections.

Page 29: CHAPTER 2 – NETWORK ADRESSING

NetBEUINetBEUI NetBEUI

◘ NetBIOS Extended User Interface.

◘ Microsoft Protocol used to support Microsoft Networking.

◘ Provides data transportation.

◘ It is not a routable transport protocol which is why NBT exists on large networks to use routable TCP protocol on large networks. ◘ This protocol may sometimes be called the NetBIOS frame (NBF) protocol. Works at the Transport and Network layers.

◘ NetBEUI - The main protocol used for networking in the windows environment.

◘ NetBIOS Extended User Interface works at the transport layer and provides data transportation.

◘ It is not a routable transport protocol.

Page 30: CHAPTER 2 – NETWORK ADRESSING

Apple TalkApple TalkApple Computers have had their own set of protocols for many years. More and more

operating systems today now can communicate with Apple systems using Apple

networking protocols. ADSP - AppleTalk Data Stream Protocol is used to provide data stream service for

sockets. The data stream is full duplex meaning communication may be sent both directions at the same time. Works at the OSI network model session layer.

AEP - AppleTalk echo protocol uses echoes to tell if a computer, or node, is available. It also measures the time it takes for eches to travel from the source computer (node) to the destination and back. Works at the OSI network model transport layer.

AFP - AppleTalk Filing protocol makes network files appear local by managing file sharing at the presentation layer. This protocol is build to top of ASP. AFP supports communication between different types of computers. Works at the OSI network model application and presentation layers.

AppleShare - Works at the application layer to provide services. ARUP - AppleTalk update routing is a newer version of RTMP. ASP - AppleTalk Session Protocol opens, maintains, and closes transactions during

a session, while ADSP provides a full-duplex, byte-stream service between any two sockets on an AppleTalk Internet. Works at the OSI network model session layer.

Page 31: CHAPTER 2 – NETWORK ADRESSING

Apple Talk(cont.)Apple Talk(cont.) ATP - AppleTalk Transaction Protocol provides a Transport Layer connection between

computers. This protocol guarantees reliability by directing the transaction process and binding the request and response. Works at the OSI network model transport layer.

DDP - Datagram Delivery Protocol is a routable protocol that provides for data packet (datagram) transportation. It operates at the network layer of the OSI network model which is the same level the IP protocol in TCP/IP operates at. Works at the OSI network model network layer.

LAP - Link-Access Protocol is a set of data link layer protocols that support LocalTalk (LLAP), EtherTalk (ELAP), TokenTalk (TLAP), and FDDITalk. The LAP manager determines which LAP to connect for the correct upper level protocol.

NBP - Name-binding protocol translates addresses into user friently three part names. Works at the OSI network model transport layer.

PAP - Printer Access Protocol is a connection oriented service for managing information between workstations and printers. It is used to send print requests to printers.

RTMP - Routing Table Maintenance Protocol is used to update routers with information about network status and address tables. The whole address table is sent across the network. This protocol sends its information as broadcasts across the network every 10 seconds. Works at the OSI network model transport layer.

ZIP - Zone Information Protocol is used by AppleTalk routers co create a Zone Information Table (ZIT). The ZIT has a list of zone names which are associated with network numbers. This list is displayed in the Apple System's file Chooser. Works at the OSI network model session layer

Page 32: CHAPTER 2 – NETWORK ADRESSING

Network ProtocolNetwork ProtocolA network protocol defines rules

and conventions for communication between network devices.

Various types of network protocol:◦Application Protocol◦Transport Protocol◦Internetwork Protocol◦Access Protocol

Page 33: CHAPTER 2 – NETWORK ADRESSING

Application Protocol• Hypertext Transfer Protocol (HTTP) governs the

way that a web server and a web client interact. HTTP defines the format of the requests and responses exchanged between the client and server. HTTP relies on other protocols to govern how the messages are transported between client and server.

Transport Protocol• Transmission Control Protocol (TCP) is the

transport protocol that manages the individual conversations between web servers and web clients. TCP formats the HTTP messages into segments to be sent to the destination host. It also provides flow control and acknowledgement of packets exchanged between hosts.

Page 34: CHAPTER 2 – NETWORK ADRESSING

Internetwork ProtocolThe most common internetwork

protocol is Internet Protocol (IP). IP is responsible for taking the formatted segments from TCP, assigning the logical addressing, and encapsulating them into packets for routing to the destination host.

Page 35: CHAPTER 2 – NETWORK ADRESSING

Network Access Protocols

• Ethernet is the most commonly used protocol for local networks. Network access protocols perform two primary functions, data link management and physical network transmissions.

• Data link management protocols take the packets from IP and encapsulate them into the appropriate frame format for the local network. These protocols assign the physical addresses to the frames and prepare them to be transmitted over the network.

• The standards and protocols for the physical media govern how the bits are represented on the media, how the signals are sent over the media, and how they are interpreted by the receiving hosts. Network interface cards implement the appropriate protocols for the media that is being used.

Page 36: CHAPTER 2 – NETWORK ADRESSING

Internet Protocol (IP)Internet Protocol (IP)• The importance of Internet Protocol is to

address and route messages between source and destination hosts.

• IP is concerned only with the structure, addressing and routing of packets. IP does specify how the delivery or transportation of the packets takes place. Transport protocols specify how to transfer messages between hosts.

• The two most common transport protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

• The IP protocol uses these transport protocols to enable hosts to communicate and transfer data.

Page 37: CHAPTER 2 – NETWORK ADRESSING

TCP (Connection-Oriented)TCP (Connection-Oriented)Required acknowledgement to ensure the message is

delivered. TCP breaks up a message into small pieces known as

segments. The segments are numbered in sequence and passed to IP process for assembly into packets.

TCP keeps track of the number of segments that have been sent to a specific host from a specific application.

If the sender does not receive an acknowledgement within a certain period of time, it assumes that the segments were lost and retransmits them. Only the portion of the message that is lost is resent, not the entire message.

On the receiving host, TCP is responsible for reassembling the message segments and passing them to the application.

FTP and HTTP are examples of applications that use TCP to ensure delivery of data.

Page 38: CHAPTER 2 – NETWORK ADRESSING

UDP (Connectionless)UDP (Connectionless)No acknowledgment required.UDP is a 'best effort' delivery system that does not

require acknowledgment of receipt. UDP is preferable with applications such as

streaming audio, video and voice over IP (VoIP). Acknowledgments would slow down delivery and retransmissions are undesirable.

An example of an application that uses UDP is Internet radio. If some of the message is lost during its journey over the network, it is not retransmitted. If a few packets are missed, the listener might hear a slight break in the sound.

Page 39: CHAPTER 2 – NETWORK ADRESSING

Identify the source and destination Identify the source and destination address information to the correct address information to the correct locations in the frame.locations in the frame.

Page 40: CHAPTER 2 – NETWORK ADRESSING

Addressing SchemesAddressing Schemes

Page 41: CHAPTER 2 – NETWORK ADRESSING

IP AddressIP Address

An An IP addressIP address (Internet Protocol (Internet Protocol address) is a unique number, used by address) is a unique number, used by computers to refer to each other when computers to refer to each other when sending information through the Internet. sending information through the Internet.

Represented by a 32-bit binary number Represented by a 32-bit binary number written as four octets.written as four octets.

Octet (8 bits) ● Octet (8 bits) ● Octet (8 bits) ● Octet (8 bits)2726252423222120 ● 2726252423222120 ● 2726252423222120 ● 2726252423222120

11000000 ● 00000101 ● 00100010 ● 00001011

EQUALS

192 ● 5 ● 34 ● 11

Page 42: CHAPTER 2 – NETWORK ADRESSING

IP Address (cont.)IP Address (cont.)The maximum decimal value of each The maximum decimal value of each

octet is 255.octet is 255.Those bits, from left to right, have Those bits, from left to right, have

decimal values of 128, 64, 32, 16, 8, decimal values of 128, 64, 32, 16, 8, 4, 2, 1. Added, they total 255.4, 2, 1. Added, they total 255.

The largest 8-bit binary number is The largest 8-bit binary number is 11111111.11111111.

An IP address has a network number An IP address has a network number and a host number, and uses dotted-and a host number, and uses dotted-decimal notation.decimal notation.

Page 43: CHAPTER 2 – NETWORK ADRESSING
Page 44: CHAPTER 2 – NETWORK ADRESSING

Class AClass ASupport extremely large networksSupport extremely large networksFirst octet of Class A IP address recognize First octet of Class A IP address recognize

with range 1 to 127. (with range 1 to 127. (127.0.0.0 network, is reserved for loop back addresses.)

Class A IP addresses use only the first 8 Class A IP addresses use only the first 8 bits (1 octet) to identify the network part bits (1 octet) to identify the network part of the address.of the address.

The remaining three octets (24 bit) can be The remaining three octets (24 bit) can be used for the host portion of the address.used for the host portion of the address.

Example of Class A IP address : Example of Class A IP address : 124.95.44.15124.95.44.15

Page 45: CHAPTER 2 – NETWORK ADRESSING

Class BClass BSupport the needs of moderate to Support the needs of moderate to

large sized networks. large sized networks. Class B IP network addresses always Class B IP network addresses always

have values ranging from 128 to 191.have values ranging from 128 to 191.Class B IP addresses use the first 16 Class B IP addresses use the first 16

bits (2 octets) to identify the network bits (2 octets) to identify the network part of the address.part of the address.

The two remaining octets of the IP The two remaining octets of the IP address can be used for the host address can be used for the host portion of the address.portion of the address.

Example of Class B IP address: Example of Class B IP address: 151.10.13.28151.10.13.28

Page 46: CHAPTER 2 – NETWORK ADRESSING

Class CClass CThis address space was intended to This address space was intended to

support a small network.support a small network.Class C IP network addresses always Class C IP network addresses always

have values ranging from 192 to 223.have values ranging from 192 to 223.Class C IP addresses use the first 24 Class C IP addresses use the first 24

bits (3 octets) to identify the network bits (3 octets) to identify the network part of the address.part of the address.

Only the last octet of a Class C IP Only the last octet of a Class C IP address can be used for the host address can be used for the host portion of the address.portion of the address.

Example of a Class C IP address : Example of a Class C IP address : 201.110.213.28201.110.213.28

Page 47: CHAPTER 2 – NETWORK ADRESSING

Public and Private IP AddressPublic and Private IP Address

A private IP Address Is a network where only authorized users

have access to the data. IP address are assigned by the administratorUse the addresses reserved

Page 48: CHAPTER 2 – NETWORK ADRESSING

Public and Private IP AddressPublic and Private IP Address

Public IP AddressAll hosts that connect directly to

the Internet require a unique public IP address.

Page 49: CHAPTER 2 – NETWORK ADRESSING

Unicast, Multicast and Unicast, Multicast and Broadcast AddressesBroadcast Addresses

Page 50: CHAPTER 2 – NETWORK ADRESSING

Unicast AddressUnicast Address

Page 51: CHAPTER 2 – NETWORK ADRESSING

A packet with a unicast destination address is intended for a specific host.

The IP address and MAC address combine to deliver data to one specific destination host.

Page 52: CHAPTER 2 – NETWORK ADRESSING

Broadcast AddressBroadcast Address

Page 53: CHAPTER 2 – NETWORK ADRESSING

The packet contains a destination IP address with all ones (1s) in the host portion.

This means that all hosts on that local network (broadcast domain) will receive and look at the packet.

A Class B network of 172.16.0.0, with a default mask of 255.255.0.0, has a broadcast of 172.16.255.255.

On Ethernet networks, the broadcast MAC address is 48 ones displayed as Hexadecimal FF-FF-FF-FF-FF-FF.

Many network protocols, such as ARP and DHCP use broadcasts.

Page 54: CHAPTER 2 – NETWORK ADRESSING

Multicast AddressMulticast Address

Page 55: CHAPTER 2 – NETWORK ADRESSING

Multicast addresses allow a source device to send a packet to a group of devices.

Devices that belong to a multicast group are assigned a multicast group IP address. The range of multicast addresses is from 224.0.0.0 to 239.255.255.255.

Since multicast addresses represent a group of addresses (sometimes called a host group), they can only be used as the destination of a packet. The source will always have a unicast address.

The multicast MAC address is a special value that begins with 01-00-5E in hexadecimal.

Examples of where multicast addresses would be used are in remote gaming, where many players are connected remotely but playing the same game. Another example would be distance learning through video conferencing, where many students are connected to the same class.

Page 56: CHAPTER 2 – NETWORK ADRESSING

H ow IP Addresses are O b tained :

Static and Dynamic Address Assi g nment

Page 57: CHAPTER 2 – NETWORK ADRESSING

StaticStatic

Manually configure the network information for a host.

Its includes the host IP address, subnet mask and default gateway.

Useful for printers, servers and other networking devices that need to be accessible to clients on the network.

Page 58: CHAPTER 2 – NETWORK ADRESSING

DynamicDynamic IP addresses assigned automatically and it is done

using a protocol known as Dynamic Host Configuration Protocol (DHCP).

DHCP automatic assignment of addressing information such as IP address, subnet mask, default gateway, and other configuration information.

DHCP advantages : DHCP is generally the preferred method of

assigning IP addresses to hosts on large networks since it reduces the burden on network support staff and virtually eliminates entry errors.

Another benefit of DHCP is that an address is not permanently assigned to a host but is only leased for a period of time. If the host is powered down or taken off the network, the address is returned to the pool for reuse.

Page 59: CHAPTER 2 – NETWORK ADRESSING

NETWOR K SERVICES

Page 60: CHAPTER 2 – NETWORK ADRESSING

ObjectivesUnderstand Domain Name

Service (DNS). Learn the relationship between

Web Clients and Web Server.Learn the relationship between

FTP clients and server.Understand email protocols in

clients and server : SMTP, POP3 and IMAP4.

Page 61: CHAPTER 2 – NETWORK ADRESSING

DNS

The Domain Name System (DNS) provides a way for hosts to use this name to request the IP address of a specific server.

DNS names are registered and organized on the Internet within specific high level groups, or domains.

Some of the most common high level domains on the Internet are .com, .edu, and .net.

Page 62: CHAPTER 2 – NETWORK ADRESSING

A DNS server contains a table that associates hostnames in a domain with corresponding IP addresses.

When a client has the name of server, such as a web server, but needs to find the IP address, it sends a request to the DNS server on port 53. The client uses the IP address of the DNS server configured in the DNS settings of the host's IP configuration.

When the DNS server receives the request, it checks its table to determine the IP address associated with that web server. If the local DNS server does not have an entry for the requested name, it queries another DNS server within the domain.

When the DNS server learns the IP address, that information is sent back to the client. If the DNS server cannot determine the IP address, the request will time out and the client will not be able to communicate with the web server.

Page 63: CHAPTER 2 – NETWORK ADRESSING

Web Clients and Web ServersWhen a web client receives the IP address of a

web server, the client browser uses that IP address and

port 80 to request web services. This request is sent to the server using the Hypertext Transfer Protocol (HTTP).

When the server receives a port 80 request, the server responds to the client request and sends the web page to the client.

Page 64: CHAPTER 2 – NETWORK ADRESSING

FTP Clients and ServersThe File Transfer Protocol (FTP) provides an easy

method to transfer files from one computer to another.

A host running FTP client software can access an FTP server to perform various file management functions including file uploads and downloads.

The FTP server enables a client to exchange files between devices.

To accomplish this, the FTP service uses two different ports to communicate between client and server.

Requests to begin an FTP session are sent to the server using destination port 21. Once the session is opened, the server will change to port 20 to transfer the data files.

FTP client software is built into computer operating systems and into most web browsers.

FTP animation (Chapter 6)

Page 65: CHAPTER 2 – NETWORK ADRESSING

Email Clients and ServersEmail is one of the most popular client/server

applications on the Internet. Email servers run server software that enables them to interact with clients and with other email servers over the network.

Each mail server receives and stores mail for users who have mailboxes configured on the mail server. Each user with a mailbox must then use an email client to access the mail server and read these messages.

Various application protocols used in processing email include SMTP, POP3, IMAP4.

Page 66: CHAPTER 2 – NETWORK ADRESSING

Email Clients and Servers (cont.)

Simple Mail Transfer Protocol (SMTP)

SMTP is used by an email client to send messages to its local email server. The local server then decides if the message is destined for a local mailbox or if the message is addressed to a mailbox on another server.

If the server has to send the message to a different server, SMTP is used between the two servers as well.

SMTP requests are sent to port 25.

Page 67: CHAPTER 2 – NETWORK ADRESSING

Email Clients and Servers (cont.)

Post Office Protocol (POP3)

A server that supports POP clients receives and stores messages addressed to its users.

When the client connects to the email server, the messages are downloaded to the client. By default, messages are not kept on the server after they have been accessed by the client.

Clients contact POP3 servers on port 110.

Page 68: CHAPTER 2 – NETWORK ADRESSING
Page 69: CHAPTER 2 – NETWORK ADRESSING

Internet Message Access Protocol (IMAP4)

A server that supports IMAP clients also receives and stores messages addressed to its users. However, it keeps the messages in the mailboxes on the server, unless they are deleted by the user.

The most current version of IMAP is IMAP4 which listens for client requests on port 143.

Email Clients and Servers (cont.)

Page 70: CHAPTER 2 – NETWORK ADRESSING
Page 71: CHAPTER 2 – NETWORK ADRESSING
Page 72: CHAPTER 2 – NETWORK ADRESSING

Instant MessagingInstant Messaging Instant Messaging (IM) is one of the most popular

communication tools in use today. IM software is run locally on each computer and

allows users to communicate or chat over the Internet in real-time.

Many different IM applications are available from various companies. Each instant messaging service can use a different protocol and destination port, so two hosts must have compatible IM software installed for them to communicate.

IM applications require minimal configuration to operate. Once the client is downloaded all that is required is to enter username and password information. This allows the IM client to authenticate to the IM network.

Once logged into the server, clients can send messages to other clients in real-time.

Page 73: CHAPTER 2 – NETWORK ADRESSING
Page 74: CHAPTER 2 – NETWORK ADRESSING

Port NumbersPort Numbers Ports are broken into three categories and range in number

from 1 to 65,535. Ports are assigned and managed by an organization known as the Internet Corporation for Assigned Names and Numbers (ICANN).

Well- K nown Ports Destination ports that are associated with common network

applications are identified as well-known ports. These ports are in the range of 1 to 1023.

Registered Ports Ports 1024 through 49151 can be used as either source or

destination ports. These can be used by organizations to register specific applications such as IM applications.

Private Ports Ports 49152 through 65535, often used as source ports.

These ports can be used by any application.

Page 75: CHAPTER 2 – NETWORK ADRESSING
Page 76: CHAPTER 2 – NETWORK ADRESSING

ENDCHAPTER 2