Upload
magdalen-waters
View
227
Download
0
Tags:
Embed Size (px)
Citation preview
Cou
rse
ILT
Introducing Protocols
Unit objectives Discuss access protocols Discuss transport protocols Discuss remote access protocols Discuss security protocols
Cou
rse
ILT
Topic A
Topic A: Introduction to protocols Topic B: Channel access methods Topic C: Transport protocols Topic D: Remote access protocols
Cou
rse
ILT
IEEE 802 series
The 802 series of specifications was named after the date when the IEEE Computer Society “Local Network Standards Committee,” Project 802, held their first meeting, which was in February (2) of 1980(80)
The 802 series of specifications define the physical media for each specification (802.3, 802.4, 802.5, and so on)
Cou
rse
ILT
Protocol compatibility
A computer, by using one protocol, cannot communicate directly with a computer that uses a different protocol
Cou
rse
ILT
Access protocols
The Data Link layer specifies how devices attached to the network can gain access to network resources
The Institute of Electrical and Electronic Engineers (IEEE) modified the OSI reference model by breaking the data link layer into two additional layers– Media Access Control (MAC) layer– Logical Link Control (LLC) layer
Cou
rse
ILT
Topic B
Topic A: Introduction to protocols Topic B: Channel access methods Topic C: Transport protocols Topic D: Remote access protocols Topic E: Security protocols
Cou
rse
ILT
Channel access methods
Determine the physical methodology by which data is sent across the transmitting media
Cou
rse
ILT
Introducing Ethernet
CSMA/CD networks are more popularly known as Ethernet networks
Ethernet and 802.3 are CSMA/CD specifications
CSMA/CA The most common implementation of
contention access– Does not detect collisions as much as it
attempts to avoid collisions (??)
Cou
rse
ILT
Ethernet topologies
Some Ethernet topologies (pg 4-9)– 10Base-T– 10Base-FL– 100Base-TX– 100Base-FX– 1000Base-TX– 1000Base-CX– 1000Base-SX– 1000Base-LX– 10Base-SR– 10Base-LR– 10Base-ER
Cou
rse
ILT
Introducing token passing/Token Ring
A token is passed among the nodes of the network
Whichever node is in possession of the token is permitted to transmit
Cou
rse
ILT
Token Ring and 802.5
Features of Token Ring include– Logical ring usually wired as a physical
star– Transfer rate of 4 to 16 Mbps– Unshielded twisted pair, shielded
twisted pair, or fiber optic cable– Deterministic, it is possible to predict
the passage of the token
Cou
rse
ILT
Beaconing
The beacon frame is used to define a failure domain
The failure domain includes the station reporting the failure, its nearest active upstream neighbor (NAUN), and everything in between
Cou
rse
ILT
FDDI
Uses a double fiber ring The secondary ring is for
redundancy Runs at 100 Mbps It is typically found as the backbone
connecting buildings on a campus or wider area, as nodes can be over 60 miles apart
Cou
rse
ILT
ATM
Topology that can reach throughput of almost 10000 Mbps – (WAN)
Is more commonly implemented at 155 or 622 Mbps
Uses small packets, which are called cells
Equipment is expensive Smaller organizations will probably go
to the cheaper Gigabit Ethernet standard
Cou
rse
ILT
Wireless – 802.11 and 802.11x
IEEE 802.11 is a group of specifications for wireless networks
Among others, specifications include 802.11, 802.11a, 802.11b and 802.11g
Cou
rse
ILT
Wireless
802.11x wireless networks consist of Wireless Access Points (WAPs) and wireless clients
WAPs operate at the Physical and Media Access Control (MAC) layer of the OSI model
WAPs can, on average, communicate with up to 30 clients within a 100 meter radius
Cou
rse
ILT
Frequency Hopping Spread Spectrum
Frequency Hopping Spread Spectrum (FHSS) uses a wide range of frequencies in the 2.4 Ghz band
Data is transmitted on a single frequency at any given time, however, the signal hops from frequency to frequency in a pseudorandom pattern
This transmission technology can be used by 802.11
Cou
rse
ILT
Direct Sequence Spread Spectrum
Direct Sequence Spread Spectrum (DSSS) also operates in the 2.4 Ghz band
It employs a mechanism whereby the data being transmitted is spread over multiple frequencies, allowing for higher throughput rates
DSSS is used by the 802.11b and 802.11g standards
Cou
rse
ILT
Orthogonal frequency division multiplexing
With Orthogonal Frequency Division Multiplexing, the radio signal is split into multiple, smaller signals
These signals are transmitted at the same time, but at different frequencies
OFDM operates in the 5 Ghz band, which makes it more resistant to interference than FHSS and DSSS
OFDM is used by the 802.11a standard
Cou
rse
ILT
Bluetooth
Bluetooth’s aim is to allow the creation of small, short range, wireless networks, usually within a single room
It has a range of 10 meters, speeds of up to 1 Mbps and uses FHSS
Bluetooth and 802.11x devices cannot communicate with one another
Cou
rse
ILT
Infrared
Infrared (IR)allows for wireless connection of devices at very close range
It is line of sight technology Infrared’s range is up to 1 meter and
speeds range from 115 Kbps to 4 Mbps
Cou
rse
ILT
Topic C
Topic A: Introduction to protocols Topic B: Channel access methods Topic C: Transport protocols Topic D: Remote access protocols Topic E: Security protocols
Cou
rse
ILT
Connectionless protocols
Used when sending small packets of data, usually less than 1 KB
Packets are infrequently dropped No need for the increased overhead
of acknowledging each receipt
Cou
rse
ILT
Connection-oriented protocols
Used to send a large amount of information that is divided into multiple packets for transmission
Uses packet sequence numbers to verify packet order and acknowledges the receipt of each packet
The lost or improperly delivered packets, which are not acknowledged as a successful receipt, can be retransmitted
Cou
rse
ILT
Transport protocols
Transport protocols manage network communications and determine how data should be presented to the next layer
The protocols responsible for transporting data– NetBEUI– IPX/SPX– TCP/IP– AppleTalk
Cou
rse
ILT
NetBEUI
NetBEUI (NetBIOS Extended User Interface) is a high-speed protocol first introduced by IBM – Designed for use on small networks
(20-200 nodes – Provides good error protection – Provides tuning parameters to match
network and organizational requirements
continued
Cou
rse
ILT
NetBEUI
– Has limited memory overhead requirements
– Supports both connectionless and connection-oriented traffic
– Is not a routable protocol and so does not perform well on larger networks
Cou
rse
ILT
NetBIOS
NetBIOS (Network Basic Input/Output System) is an application interface operating at the session layer
By using NetBIOS – Applications can communicate with
NetBIOS-compliant protocols– You can manage communication
sessions between computers– You can track computers by the
computer name
continued
Cou
rse
ILT
NetBIOS
NetBIOS is supported over NetBEUI– It can be supported over other
protocols, such as IPX/SPX and TCP/IP
Cou
rse
ILT
IPX/SPX
Is a Novell proprietary protocol Available as monolithic (old) or
ODI-compliant IPX provides connectionless service SPX provides connection-oriented
services Is a routable protocol Is the default NetWare 3.x and 4.x
protocol and supported by NetWare 5.x and 6.x
Cou
rse
ILT
TCP/IP
The protocol for most medium to large-sized networks
Is the current de facto standard for internetwork communications
Provides guaranteed delivery, proper sequencing, and data integrity checks
If errors occur during transmission, TCP is responsible for retransmitting the data
Cou
rse
ILT
TCP/IP Transport layer protocols
TCP/IP Transport layer protocols User Datagram Protocol (UDP)
Cou
rse
ILT
AppleTalk
AppleTalk is a protocol suite developed by Apple Corp. in the 1980’s for networks consisting of Macintosh computers
The original cabling system used in these networks is called LocalTalk
AppleTalk Phase 2 complies with the IEEE 802 standard and provides Ethernet support through EtherTalk
Cou
rse
ILT
AppleTalk network addresses
AppleTalk network addresses are 24 bits in length
16 bits are used for the network portion and 8 bits for the node’s address
The node address is self-assigned Given this setup, there can be 65,000
networks with up to 256 nodes each
Cou
rse
ILT
Gateway
Connect incompatible networks at the fourth through seventh layers of the OSI model by using protocol conversion and routing services
Cou
rse
ILT
Topic D
Topic A: Introduction to protocols Topic B: Channel access methods Topic C: Transport protocols Topic D: Remote access protocols Topic E: Security protocols
Cou
rse
ILT
Remote access protocols
Protocols provide a serial connection to a network device, such as a host and a router
The standard protocols include– Serial Line Internet Protocol (SLIP)– Point-to-Point Protocol (PPP)– Point-to-Point Tunneling Protocol
(PPTP)
Cou
rse
ILT
Serial Line Internet Protocol (SLIP)
SLIP defines a sequence of characters that frame IP packets over a serial line
The protocol was devised to handle communications over fairly slow links (<19.2 Kbps)
Cou
rse
ILT
Serial Line Internet Protocol (SLIP)
Disadvantages include– Inability to provide packet addressing – Inability to provide any packet ID
information – Lack of error detection or error
correction mechanisms – Lack of compression mechanisms
Cou
rse
ILT
Point-to-Point Protocol (PPP)
Is the current methodology for transporting multiprotocol datagrams over point-to-point links
Defined to be a multiprotocol transport over serial links and therefore, can support TCP/IP, IPX, DECNet, CLNP, AppleTalk, and other protocol datagrams
Cou
rse
ILT
Point-to-Point Protocol (PPP)
Advantages include– Ability to employ data compression
techniques – Link quality monitoring – Ability to support security features such
as confirming the identity of users attempting to establish a connection
– Mechanisms for error detection and error correction
– Ability to provide a higher level of security through encryption
Cou
rse
ILT
Point-to-Point Tunneling Protocol
Remote clients can access the corporate network across the Internet securely
You can configure PPTP filtering on a network adapter so that only PPTP packets are permitted
Operates across PPP connections Data is encrypted and encapsulated
inside PPP packets
Cou
rse
ILT
Point-to-Point Protocol over Ethernet
Point-to-Point Protocol over Ethernet (PPPoE) is derived from the PPP protocol
Was designed to provide secure connectivity to the Internet for broadband connections that use an Ethernet rather than a serial connection
PPPoE is defined in RFC 2516
Cou
rse
ILT
Remote Desktop Protocol
Remote Desktop Protocol (RDP) is part of Windows NT Terminal Server and Windows 2000/2003 Terminal Services
RDP enables display of and input into applications running on a remote Windows computer
RDP operates at the Application layer of the OSI model
Cou
rse
ILT
Topic E
Topic A: Introduction to protocols Topic B: Channel access methods Topic C: Transport protocols Topic D: Remote access protocols Topic E: Security protocols
Cou
rse
ILT
Internet Protocol Security
Internet Protocol Security (IPSec) is a suite of protocols
It’s used to encrypt data packets It uses one of two modes of
encryption, transport or tunnel Transport mode is less secure than
tunnel mode
Cou
rse
ILT
Layer 2 Tunneling Protocol
Layer 2 Tunneling Protocol (L2TP) is an extension to the PPP protocol
It’s an enhanced tunneling protocol used in VPN implementations
Supports multiple protocols Is optimized to work with IPv6 and
IPSec Operates at the Data Link layer of the
OSI model Is defined in RFC 2661
Cou
rse
ILT
Secure Sockets Layer
Secure Sockets Layer (SSL) was developed by Netscape
Enables secure, reliable transmissions over the Internet
Is supported by both Internet Explorer and Netscape Navigator
Uses a private and public key system (RSA) to encrypt and decrypt data transmissions
Cou
rse
ILT
Wired Equivalent Privacy
Wired Equivalent Privacy (WEP) is a security protocol for secure data transmission in wireless LANs (WLANs)
It was intended to simulate the physical security of a wired LAN
Uses a single, manually configured, static key for data encryption
WEP is not as secure as originally believed
Cou
rse
ILT
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA) was developed to improve on WEP’s functionality
Provides for user authentication using the Extensible Authentication Protocol (EAP)
Data encryption is more secure through the use of the Temporal Key Integrity Protocol (TKIP)
Cou
rse
ILT
802.1x
801.1x is a standard that uses EAP for user authentication in 802.11 wireless networks
A supplicant (client) requests access to the wireless network from an authenticator (access point)