IP NETWORKS
Section 1 TCP/IP Architecture and Implementati
Section 2 Link Layer Protocols
Section 3 Network Layer Protocols Section 4 Transport layer protocols Section 5 IP Routing
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
OSI Reference Model
Application
Representation
Application programs
Data format and representation
Session
Transport Network Data link Physical
Confidential Information of Huawei. No Spreading without Permission.
Interhost communication
End-to-End connections
Addresses and best path
Access to media
Binary transmission
Security Level: Internal
OSI Layer Interaction
The Physical Layer (Layer 1) ensures bit synchronization and places the received binary pattern into a buffer. It notifies the Data Link Layer (Layer 2) that a frame has been received after decoding the incoming signal into a bit stream. Thus, Layer 1 provides delivery of a stream of bits across the medium.
The Data Link Layer (Layer 2) examines the frame check sequence (FCS) in the trailer to determine whether errors occurred in transmission, providing error detection. If an error has occurred, the frame is discarded. The current host examines the data link address to determine if the data is addressed to it or whether to process the data further. If the data is addressed to the host, the data between the Layer 2 header and trailer is handed over to the Network Layer (Layer 3) software. Thus, the data link layer delivers data across the link.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
The Network Layer (Layer 3) examines the destination address. If the address is the current host's address, processing continues and the data after the Layer 3 header is handed over to the Transport Layer
(Layer 4) software. Thus, Layer 3 provides end-to-end delivery.
Layer 4 Transport Layer provides error recovery. After error recovery and reordering of the incoming data, the data is given to the Session Layer (Layer 5). The Session Layer (Layer 5) ensures that a series of messages is completed.. After the session layer ensures that all flows are completed, it passes the data
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
after the Layer 5 header to the Presentation Layer (Layer 6) software.
The Presentation Layer (Layer 6) defines and manipulates the data format of the data transmission. It converts the data to the proper format specified in the Layer 6 header. After the data formats have
been converted, the data after the Layer 6 header is passed to the Application Layer (Layer 7) software. The Application Layer (Layer 7) processes the final header and examines and delivers the end-user data..
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
TCP/IP Transmission Mode
Application Layer
Application Layer
Transport layer
Transport layer
Network
layer Link layer Physical layer Terminal system
Network
layer Link layer Physical layer Router
Network
layer Link layer Physical layer Router
Security Level: Internal
Network layer Link layer Physical layer Bridge Link layer Physical layer Terminal system
Confidential Information of Huawei. No Spreading without Permission.
TCP Source Ports
Port Protocol UDP port 15 NETSTAT TCP port 21 FTP TCP port 23 Telnet TCP port 25 SMTP UDP port 53 DNS UDP port 69 TFTP TCP port 70 Gopher TCP port 79 Finger TCP/UDP port 80 HTTP TCP port 110 POP3 UDP port 111 RPC TCP port 119 NNTP (Network News Transfer Protocol) TCP port 123 NTP UDP port 137 NetBIOS name service UDP port 161 SNMP network monitor UDP port 2049 NFS
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal
About this Session
Section 1 TCP/IP Architecture and Implementati
Section 2 Link Layer Protocols
Section 3 Network Layer Protocols Section 4 Transport layer protocols Section 5 IP Routing
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Link Layer Protocols
PPP
LAN and WAN
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
LAN and WAN
Different coverage ranges
LAN: Applicable to limited geographical areas
WAN: Applicable to remote connection
Different rates
LAN: 10Mbps, 100Mbps and 1000Mbps WAN: 64Kbps, 128Kbps, 384Kbps and 2Mbps
Different technologies are used
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
LAN Types
Ethernet
Switching Ethernet (mainstream of LAN currently)
Token ring network FDDI (Fiber distributed digital interface)
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
What is Ethernet?
Ethernet is a LAN implementation technology defined by IEEE Std 802.3 as part of the LAN/MAN standards
802.X protocol suite specifies the access mode of network, and the technologies of the switching Ethernet and fast Ethernet are all named 802.X protocol
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Ethernet Standard
802.1 802.2
LAN/MAN Management (and MAC Control Bridges) Logical Link Control CSMA/CD
802.3
802.4
802.5 802.6
Token Bus
Token Ring Distributed Queue Dual Bus (DQDB)
Metropolitan Area Network (MAN)
802.7
802.8 802.9
Broadband Local Area Networks
Fiber-Optic LANs and MANs Integrated Services (IS) LAN Interface
802.10 LAN/MAN Security 802.11b Wireless LAN
802.12 Demand Priority Access Method
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal
Ethernet Physical Structure Bus type (10BASE2 and 10BASE5 at early stage)
A B C
Relay
Star type (other Ethernet types after 10BASE-T)
Hub/ Bridge
Hub/ Bridge
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Ethernet Work Principle CSMA/CD
CSMA/CD: Carrier Sense Multi Access with Collision Detection
Carrier sense: Detection before transmission Collision detection: Detection during transmission Backoff: Handling after a collision is detected
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Commonly Used Devices in LAN
HUB LAN SWITCH ROUTER Twisted pair Optical fiber Network card
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
HUB
It works in the physical layer and copies binary bits one by one among cables
It is a kind of shared network device connecting together network cables that are connected to different computers. and the
communication can be connected only between two ports at a certain
time
Gradually washed out in network applications
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
LAN SWITCH
It works in the link layer and stores and forwards frames between LANs
It connects many hubs through network cables to constitute a
larger network It connects computer terminals to constitute a LAN
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Twisted Pair
10BASE-T
10:the transmission rate is 10Mbps; BASE: using base band signal; T: twisted pair; Transmission distance: a maximum of 100m for Category 3/4/5 unshielded twisted pair cable and Category 5 shielded twisted pair cable
100BASE-TX
100:the transmission rate is 100Mbps; Transmission distance: a maximum of 100m for Category 5 unshielded twisted pair cable and Category 5 shielded
twisted pair cable
10BASE2
2: thin coaxial cable. The maximum transmission distance is 185m
10BASE5
5: thick coaxial cable. The maximum transmission distance is 500m
Security Level: Internal
Confidential Information of Huawei. No Spreading without Permission.
Optical fiber
100BASE-FX
The maximum transmission distance of the single-mode optical fiber is
15km and the maximum transmission distance of the multi-mode optical
fiber is 2km for the 100Mbps Ethernet
1000BASE-SX
Short wavelength optical fiber, 1000Mbps Ethernet, the maximum transmission distance of the multi-mode optical fiber is 220m
1000BASE-LX
Long wavelength optical fiber, 1000Mbps Ethernet, the maximum
transmission distance of a multi-mode optical fiber is 550m, the maximum transmission distance of a single-mode optical fiber is 10km
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Shared Ethernet
HUB
When any port receives a packet, this packet will be broadcast to all
the
ports
directly,
logically
constituting a shared medium
If two or more ports receive
Collision Collision Collision Collision
packets simultaneously, collision
will occur, and DTE will implement the CSMA/CD algorithm
Only one DTE can implement valid transmission at a certain moment
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Switched Ethernet
Bridge (LAN SWITCH)
It
implements
address
learning
according to SA (Source Address) of
the received packet to establish the corresponding address and port
relation
between
After receiving a packet, it checks the
table according to DA (Destination Address) of the packet and forwards the packet to the specific port
Multiple DTEs can implement valid transmission at a certain moment, and no mutual interference will occur
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Ethernet Cables
There are 3 main types of Ethernet Cables used for different purposes, namely
Straight through- Cable : A straight-through cable is used to connect Host (PC) Switch or Hub Router ---> Switch or Hub
Crossover Cable: A crossover cable an be used to connect Switch --> Switch Hub Hub
Host Host Hub Switch
Router Host
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Rolled or Rolled-Over Cable: Used to connect a host to a
router console serial communication (com) port. This cable is
usually used when configuring one of these devices for the first time. A rolled cable connects the PCs serial port (using a DB9 to RJ45 adaptor) to the router or switchs console port. A rolled Cable pin out is giving below
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Shared Ethernet vs. Switched Ethernet Shared Ethernet Vs Switched Ethernet
Topology Structure Work mode Bandwidth Equipment Equipment processing layer Bus or star Half Duplex shared medium Star Full Duplex exclusive medium
Hub, relay
Physical layer CSMA/CD
Bridge, Switch
MAC layer Address learning
Technology
and switching
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
WAN Types
Packet-switched network X25 : X.25 protocol is the interface procedure between DTE and DCE Frame Relay: FR is the second layer network, and it is the simplified X.25 .FR can be used at the Gb interface
Lines are not exclusively occupied, thus, the utilization rate is high
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
About this Session
Section 1 TCP/IP Architecture and Implementati
Section 2 Link Layer Protocols
Section 3 Network Layer Protocols Section 4 Transport layer protocols Section 5 IP Routing
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Network Protocols
IP
ARP
RARP ICMP
Protocol application
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
IP
IPInternet Protocol.
As a network layer protocol of the TCP/IP protocol suite, IP is
used to transmit datagrams of the transport layer and the application layer. IP identifies the source and destination through IP address.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
IP Address
An IP address is a unique 32-bit address assigned to each host connected to Internet.
01234 Class A Class B 0 10 net-id net-id 8 16 host-id host-id 24 31
Class C
110
net-id
host-id
Class D
1110
Multicast address
Class E
11110
Reserved for future use
Security Level: Internal
Confidential Information of Huawei. No Spreading without Permission.
Network Address Range: Class A The designers of the IP address scheme decided the first bit of the first byte in a Class A network address must always be off, or 0. This means a Class A address must be between 0 and 127, inclusive. Consider the following network address: 0xxxxxxx
If we turn the other 7 bits all off and then turn them all on, well find the Class A range of network addresses:
00000000 = 0 01111111 = 127 So, a Class A network is defined in the first octet between 0 and 127, and it cant be less or more. (yes, I know 0 and 127 are not valid in a class A networkIll talk about illegal addresses in a minute.)
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal
Class A Addresses
1st byte used for Network Address, remaining 3 are used for Host Class A address format is network.node.node.node For example, in the IP address 49.22.102.70, the 49 is the network address, and 22.102.70 is the node address..
Class A network addresses are one byte long, with the first bit of that byte reserved and the 7 remaining bits available for manipulation (addressing). Thus class A can have maximum of 2^7 Networks= 128 The network address of all 0s (0000 0000) is reserved to designate the default route and 127 ,reserved for loopback cant be used. Thus only 1 to 126 can be used to designate class A network address.
Each Class A address has three bytes (24-bit positions) for the node address of a machine. This means there are 2^24or 16,777,216 .As above addresses of all 0s and all 1s are reserved. So a whooping 2^24-2 usable host addresses on a network segment
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal
Class B Address
network.network.node.node
For example, in the IP address 172.16.30.56, the network address is 172.16, and the node address is 30.56 2^16 unique combinations. Class B network addresses should start with the binary digit 1, then 0. This leaves 14 bit positions to manipulate, therefore 16,384 (that is, 2^14) unique Class B network addresses
We have 2^16 minus the two reserved patterns (all 0s and all 1s), for a total of 65,534 possible node addresses for each Class B network.
Class B Valid Host IDs Heres an example of how to find the valid hosts in a Class B network: All host bits turned off is the network address: 172.16.0.0. All host bits turned on is the broadcast address: 172.16.255.255. The valid hosts would be the numbers in between the network address and the broadcast address: 172.16.0.1 through 172.16.255.254.
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal
Network Address Range: Class B
In a Class B network, the RFCs state that the first bit of the first byte must always be turned on, but the second bit must always be turned off. If you turn the other 6 bits all off and then all on, you will find the range for a Class B network: 10000000 = 128 10111111 = 191 As you can see, a Class B network is defined when the first byte is configured from 128 to 191. Network Address Range: Class C
For Class C networks, the RFCs define the first 2 bits of the first octet as always turned on, but
the third bit can never be on. Following the same process as the previous classes, convert from binary to decimal to find the range. Heres the range for a Class C network: 11000000 = 192 11011111 = 223
So, if you see an IP address that starts at 192 and goes to 223, youll know it is a Class C
IP address. Network Address Ranges: Classes D and E The addresses between 224 and 255 are reserved for Class D and E networks. Class D (224239) is used for multicast addresses and Class E (240255) for scientific purposes,
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Class C Addresses
network.network.network.node
Using the example IP address 192.168.100.102, the network address is 192.168.100, and the node address is 102.
In a Class C network address, the first three bit positions are always the binary 110. The calculation is: 3 bytes, or 24 bits, minus 3 reserved positions, leaves 21 positions. Hence, there are 2^21, or 2,097,152, possible Class C networks.
Each unique Class C network has one byte to use for node addresses. This leads to 2^8 or 256, minus the two reserved patterns of all 0s and all 1s, for a total of 254 node addresses for each Class C network.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Some IP addresses are reserved for special purposes, so network administrators cant ever assign these addresses to nodes. The table below lists the members of this exclusive little club and the reasons why they re included in it.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Private IP Addresses
Private IP Addresses
These can be used on a private network, but theyre not routable through the Internet also for the purpose of creating a measure of well-needed security and conveniently saves valuable IP address space.
A small no of routable IP addresses is used by a corporate organization and with the use of NAT many host can use the address(es) to reach the internet
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Subnet and Mask
The introduction of subnet increases the number of networks, which is realized by reducing the number of hosts. A mask is a 32-bit numeral consisting of consecutive 1s and consecutive 0s. It implements bit by bit and operation with the IP address, acting as a screen. Bits of 1 in the mask will not be screened off and will remain unchanged; For bits of 0,
the difference of the host address will be screened off, thus the same
network address will be obtained in a network.
For example, a class A address can be changed to a class C address by the following means. Such class C addresses constitute a subnet:: IP address: 120. 118. 100. 86 Subnet mask: 255. 255. 255. 0
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Subnet and Mask
As described above, we can conclude that there the number
of the host addresses that can be distributed in a network is more than 16,000,000 for class A addresses. While in the actual networks, this mode is not reasonable as no network is so big to hold so many hosts. This case also exists in class B addresses and class C addresses. A network, therefore, must be fractionalized to improve effectiveness of IP addresses and ease the management of them. Subnets are the actual embodiment of this idea. They are the small networks in a big network. The concepts of Subnet and Subnet Mask can help us plan IP addresses of a network.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Troubleshooting Address
IP
Troubleshooting IP addressing is obviously important as trouble occurs in IP Networks and you must be able to determine and fix a problem on an IP network whether youre at work or at home.. Assume one of the network nodes cannot communicate with say Network Management server or another nodes which just happens to be on a remote network or perhaps your Laptop could not connect to the internet. Here are 4 steps you should employ
1. Open a DOS window and ping 127.0.0.1. This is the diagnostic or loopback address, and if you get a successful ping, your IP stack is then considered to be initialized. If it fails, then you have an IP stack failure and need to reinstall TCP/IP on Confidential the Information host. of Huawei. Security Level: Internal
No Spreading without Permission.
2. From the DOS window, ping the IP address of the local host. If thats successful, then your Network Interface Card (NIC) card is functioning. If it fails, then there is a problem with the NIC card. This doesnt mean that a cable is plugged into the NIC, only that the IP protocol stack on the host can communicate to the NIC. 3. From the DOS window, ping the default gateway (router). If the ping works, it means that the NIC is plugged into the network and can communicate on the local network. If it fails, then you have a local physical network problem that could be happening anywhere from the NIC to the router. 4. If steps 1 through 3 were successful, try to ping the remote server. If that works, then you know that you have IP communication between the local host and the remote server. You also know that the remote physical network is working.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Network Protocols
IP
ARP
RARP ICMP
Protocol application
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
ARP Protocol
ARPAddress Resolution Protocol, ARP implements the
conversion from IP addresses to MAC addresses (Medium
Access Control).
MAC address A 48-bit binary address, usually appears as a 12-digit hexadecimal number, like 00e0fc012345. Each network device has a globally unique MAC address. Applicable to LANs. The communications among hosts within a LAN must be implemented through the MAC address.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
ARP Protocol
The process for the host 189.110.67.56 to search the host 189.110.58.69 to obtain the MAC address is as follows:
MAC header FF. FF .FF. FF. FF. FF 08. 02. 80. 65. 63. 09 IP header 189.110.58.69 189.110. 67. 56
ARP request message: What is your MAC address?
The host 189.110.67.56 sends a broadcast message MAC header 08. 02. 80. 65. 63. 09 05 23. 88. 57. 03. 44 IP header 189.110. 67. 56 1891105869
ARP reply message: This is my MAC address
The host 189.110.58.69 responses to the message
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal
Network Protocols
IP
ARP
RARP ICMP
Protocol application
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
RARP
RARP - Reverse Address Resolution Protocol
Compared with ARP, RARP works just in the opposite way:
RARP obtains an IP address through the MAC address. In communications, many hosts do not have an IP address during initialization, and, in this case, the RARP protocol must be used to obtain the IP address. For example: No-disk workstation; when the computer is configured to obtain IP address automatically.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Network Protocols
IP
ARP
RARP ICMP
Protocol application
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
ICMP
ICPM - Internet Control Message Protocol
It allows hosts or routers to report errors and exceptions.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
ICMP Protocol
Relation between ICMP message and IP packet
ICMP message
IP packet header
IP packet data
IP packet
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
ICMP
ICMP application:
Error messages--messages mainly used to carry changed
routes information Inquiry messages :
ICMP Echo request message ICMP Echo reply message
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Network Protocols
IP
ARP
RARP ICMP
Protocol application
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Network Layer Protocol Application
The PING command uses ICMP to know whether the
communication with the peer host is normal.
Under DOS mode, ARP A is used to obtain the corresponding relation between an IP address and a MAC address.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
TCP / IP Utilities
Ping: Ping gives echo response which could be successful, unreachable..
Traceroute: Shows the path to a target network displaying the hops. Ping can reveal there is a network problem but cant help to resolve it,traceroute can be used to identify where the problem is Ipconfig: used to assign TCP/IP configuration parameters to certain network interfaces. Address Resolution Protocol (ARP):ARP allows a TCP/IP system to change IP addresses to the MAC addresses, which the data-link protocol uses. Netstat: Shows the info about a TCP/IP system's network connection
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
TCP/IP Utilities
Nbtstat : Shows the information about the NetBIOS over
the TCP/IP connections the Windows use to communicate
over the LAN.
For the above Utilities, they all have associated options like ping {ip address t }. Find out on the dos prompt how to see their associated list of options
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
TELECOMMUNICATIONS NETWORK PROTOCOL (TELNET)
Telnet command line gives control capabilities for systems on a network. A user that is running a Telnet client program is able to connect to another Telnet system. Telnet was actually programmed for a UNIX system. You will only get a Telnet server on a Windows 2000 system. Telnet is used to remotely log on to a server say for configuration or troubleshooting purposes. Telnet operates on TCP port 23. Telnet connection is not secured. Thus Secure shell (ssh) was developed. Putty is a typical ssh client.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
About this Session
Section 1 TCP/IP Architecture and Implementati
Section 2 Link Layer Protocols
Section 3 Network Layer Protocols Section 4 Transport layer protocols Section 5 IP Routing
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Transport Layer Protocols
Functions of transport layer protocols:
The link layer is responsible for encapsulation and transmission
of data, and the network layer implements IP packet routing, etc. However, for data communications mainly based on computers, some problems, like flow control and reliability, must be solved before the communications can be realized. These functions are implemented in the transport layer.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Transport Layer Protocols
TCP
UDP
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
TCP
TCPTransfer Control Protocol.
TCP has the following three functions:
Flow control: It implements flow control via slide window; Reliability: It realizes reliability through sequence number and acknowledgement mechanism; It indicates the upper layer application by port number so as to hand the data to the corresponding application program to process.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
TCP
Source/Destination port numbers :
Port numbers are used to identify upper layer protocols. Different applications have different port numbers, so that the request and received data can be processed by corresponding applications. Port numbers are divided into source port number and destination port number, which are not necessarily the same in communications. By means of combining port numbers with IP addresses, different
applications at different places can be uniquely identified within the
whole network; in a host, it is determined through the port numbers of TCP (or UDP) to which application program a message should be submitted.
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal
TCP
TCP and UDP port numbers are divided into the following three
classes:
The port numbers with the values smaller than 255 are used for common applications, for example, FTP, Telnet, SMTP and HTTP use ports 21, 23, 25 and 80 respectively. 255~1023 are allocated to companies. 1024 and its larger values are not defined yet.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Transport Layer Protocols
TCP
UDP
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
UDP
UDPUser Datagram Protocol .
UDP does not require data buffering during transmission and
does not involve connection management. Under the UDP mode, Valid arrival of messages can be ensured by timeout retry mechanism of application program.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
UDP Protocol
Bit 0 15 31
Source port number UDP Message length
Destination port number
Checksum
Data of variable lengths
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
UDP
Comparison between TCP and UDP:
TCP is a connection-oriented reliable transport protocol
UDP is connectionless unreliable transport protocol TCP is complicated while UDP is simple
UDP is applicable to the communication transmission with
high real-time requirement (for example, voice communication), while the real-time feature of TCP is not as good as that of UDP due to large overhead
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Application of TCP and UDP
TCP and UDP are designed for application programs of
different characteristics. Among common programs, SMTP,
FTP and Telnet adopt TCP, while DNS, SNMP and multicast adopt UDP.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
About this Session
Section 1 TCP/IP Architecture and Implementati
Section 2 Link Layer Protocols
Section 3 Network Layer Protocols Section 4 Transport layer protocols Section 5 IP Routing
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
IP routing
The important role of the network layer is searching path, that is, forwarding a data packet to the destination host according to the destination IP address
The equipment to implement this is a router
? Which channel?
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Characteristics and Roles of a Router
A router must meet the following requirements:
It must have two or more network layer interfaces, used for
connection of different networks; The protocol must be realized to the network layer.
A router has the following two function:
Generating routing tables Forwarding data packets to other networks
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Examples of Router Connection
Interface address 61.1.1.1 Interface address 129.6.0.1
Subnet 61.1.1.1/8
Router A
Subnet 129.6.0.0/16
Router B
Subnet 202.6.6.0/24
Interface address 129.6.69.107
Interface address 202.6.6.1
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Routing Table in Router A
Destination network address 202.6.6.0 129.6.0.0 61.0.0.0 Destination network mask 255.255.255.0 Egress interface 129.6.69.107
Next Hop 129.6.0.1
255.255.0.0 129.6.69.107 129.6.69.107 255.0.0.0 61.1.1.1 61.1.1.1
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Routing Table in Router B
Destination network address Destination network mask
Next Hop
Egress interface
202.6.6.0
129.6.0.0 61.0.0.0
255.255.255.0
255.255.0.0 255.0.0.0
202.6. 6.1
129.6. 0.1 129. 6. 69.1 07
202.6. 6.1
129.6. 0.1 129. 6. 0.1
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Generating Modes of Routing Tables
Supporting static routing
The routing information is inputted by operation personnel entry
by entry
Dynamic routing
Routing table items are generated by routing protocols The common routing protocols include OSPF protocol and Routing Information Protocol (RIP).
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Working Flow of a Router
Route selection protocol conversion
Router
Router
IP
Protocol decapsulation
IP
PPP
Protocol encapsulation
ETH
PPP
ETH
Ethernet Serial interface interface
Serial Ethernet interface interface
LAN1
Sending
WAN
Transmission
LAN2
Receiving
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Summary
Corresponding to the standard 7-layer model of OSI, the TCP/IP suite includes four layers: Link layer, network layer, transport layer and application layer.
The role of the link layer is to ensure reliable and correct
transmission of message information. The network layer and the transport layer are the key points of
this lesson. The classification method of IP addresses and the
segmentation method of subnets, the roles of TCP and UDP and the application method of ports must be mastered.
A router is used to determine the path for packet transmission. Routing protocols are complicated, and trainees are just required to understand their functions.
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Router Configuration Practice with reference to Cisco Router
will be done using an Open source Cisco Router Emulating
Software Dynamips/Dynagen
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal
Confidential Information of Huawei. No Spreading without Permission.
Security Level: Internal