Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Network Protocols & Standards, Thesis of Computer Network Management and Protocols

An overview of the protocols and the standards that are used in the Networking

Typology: Thesis

2016/2017

Uploaded on 02/14/2017

bahati_luckybaha
bahati_luckybaha 🇬🇧

3.5

(2)

2 documents

1 / 55

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Network Protocols &
Standards
Lecturer:
Protus Goodluck Bahati
St. Paul’s University
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37

Partial preview of the text

Download Network Protocols & Standards and more Thesis Computer Network Management and Protocols in PDF only on Docsity!

Network Protocols &

Standards

Lecturer:

Protus Goodluck Bahati

St. Paul’s University

 Network Protocols

 The OSI Model

 802 Standards

Objectives

 A network protocol is a language that is used by systems that wish to communicate with one another.  (^) If two systems wish to communicate (or talk) with one another, they need to speak the same language (or protocol).  (^) The first step to networking is making sure that the two systems that are trying to talk have the same protocol installed. Four of the major protocols found in networking environments today are;  NetBEUI  (^) IPX/SPX  AppleTalk  (^) TCP/IP

Network Protocols

NetBIOS Extended User Interface (NetBEUI)  (^) is a transport protocol developed by IBM but adopted by Microsoft for use in earlier versions of Windows and DOS.  NetBEUI commonly was found in smaller networks due to the fact that it is a non-routable protocol.  A non-routable protocol is a protocol that sends data, but the data is unable to cross a router to reach other networks; communication is limited to the local LAN only.  The fact that NetBEUI is a non-routable protocol has limited the use of NetBEUI on networks today dramatically.  (^) it is extremely simple to install and configure.  (^) There is minimal configuration required to allow the protocol to work—you install it, specify a unique computer name, and it works!

NetBEUI

NetBIOS has two communication modes: Session mode  Is used for connection-oriented communication in which NetBIOS would be responsible for establishing a session with the target system,  monitoring the session to detect any errors in transmission.  (^) then recovering from those errors by retransmitting any data that went missing or was corrupt. Datagram mode  Is used for connectionless communication in which a session is not needed.  Datagram mode also is used for any broadcast by NetBIOS.  (^) Datagram mode does not support error detection and correction services, which are therefore the responsibility of the application using NetBIOS. NetBEUI What Is NetBIOS?

 (^) NetBIOS is a session protocol, whereas NetBEUI is a transport protocol  NetBIOS is used by other protocols as well, such as TCP/IP.  Since NetBIOS is not a transport protocol, it does not directly support routing but depends on one of three transport protocols—TCP/IP, IPX/SPX, or NetBEUI.  (^) NetBIOS uses NetBIOS names as a method of identifying systems on the network.  (^) A NetBIOS name, also known as a computer name , can be a maximum of 16 bytes long—15 bytes for the name and 1 byte for the NetBIOS name suffix (a code at the end of the name representing the service running).  (^) The NetBIOS computer name must be unique on the LAN.

NetBEUI vs. NetBIOS

 (^) IPX/SPX is a routable protocol, so its addressing scheme must be able to identify each system on the network and the network it exists on.  The network administrator assigns each network a network ID.  (^) An IPX network ID is an eight-character hexadecimal value—for example, 0BADBEEF.  (^) A complete IPX address is made up of the network ID , a period (.), and then the six-byte MAC address of the network card (a unique address burned into the network card) in the system.

IPX/SPX

For example, a computer with;

 MAC address of 00-90-4B-4C-C1-59.

 connected to network ID 0BADBEEF

 IPX network address would be 0BADBEEF.00904B4CC159.

 IPX/SPX is not as easy to configure as NetBEUI.

 When doing an IPX installation, you will need to be familiar with

configuration issues such as the network number and frame

type

IPX/SPX

NOTE:

 If you are working on a network where there

are multiple frame types configured, such as

802.2 and 802.3, the clients that are

configured to auto-detect the frame type will

configure themselves for 802.2, because it is

the default frame type.

IPX/SPX

 While IPX is responsible for the routing of packets, it is also a connectionless, unreliable transport.  Unreliable means IPX packets are sent to a destination without requiring the destination to acknowledge receiving those packets.  (^) Connectionless means that no session is established between sender and receiver before transmitting data.  (^) SPX is the protocol in the IPX/SPX protocol suite that is responsible for reliable delivery.  (^) SPX is a connection-oriented protocol that will ensure that packets that are not received at the destination are retransmitted on the wire.

IPX/SPX

Phase 1  (^) Was designed for small workgroup environments and therefore supports a much smaller number of nodes on the network.  (^) Phase 1 supports non-extended networks; each network segment is allowed to be assigned only a single network number, and only one zone is allowed in a non-extended network.  (^) A zone is a logical grouping of nodes—the network administrator will assign nodes to a particular zone.

AppleTalk

Phase 2  (^) Was designed for larger networks and supports more than 200 hosts on the network.  (^) Phase 2 supports extended networks, thereby allowing one network segment to be assigned multiple network numbers and allowing for multiple zones on that network segment.  (^) Each node is part of a single zone on an extended network.

AppleTalk

TCP/IP has two major drawbacks: Configuration  (^) TCP/IP is a protocol that requires configuration, and to administer it.  you need to be familiar with IP addresses, subnet masks, and default Security  (^) Because of the open design of TCP/IP, it has become a very insecure protocol.  (^) If security is of concern, you need to make certain that you implement additional technologies to secure the network traffic or systems running TCP/IP.

TCP/IP

 NetBEUI is a non-routable protocol, whereas IPX/SPX, AppleTalk, and TCP/IP are routable protocols. What exactly is a routable protocol?  (^) A routable protocol is a protocol whose packets may leave your network, pass through your router, and be delivered to a remote network.  A non-routable protocol is a protocol that does not have the capability to cross a router to be sent from one network to another network.  (^) This is due to the fact that the protocol is designed as a simple protocol and does not accommodate addressing patterns in the packets that give knowledge of multiple networks. Routable vs. Non-routable Protocols