- Start with Networking Basics
- Media types : What moves the data
- Layers: Seperate parts within the network
- Important Concepts
- Networking QA: Hard Questions, clear answers
- Using RFCs: Standard Documentation
- Sepcific Protocols: How the data is moved
- Internet Tutorial
Data Link Level Functions
Circuit switching is a connection-oriented, dedicated communication that reserves and holds a physical or logical path for the duration of transmission. No one may use the connection or path until it has been terminated. Packet switching is a connectionless, packet based communication which uses shared paths. The internet in general is set up this way as are x25 networks.Sliding Window
A method of flow control used in TCP that places a buffer between the application and the data flow. Data is stored in the buffer and the application pulls it at its own pace. As the data is read, more space is freed in the buffer. The “window” is the amount of data that can be read ahead, i.e. stored in the buffer. “window announcements” are used to inform the remote host of the current window size. If the application cant process data at the rate being sent, the window size drops to zero and the remote host stops transmission. More Slidding Window.Multiplexing
Sending multiple signals or streams of information on a carrier at the same time in the form of a single, complex single and then recovering the separate signals at the receiving end. Analog signals are done with FDM, bandwidth is divided into sub-channels Digital signals are done with TDM, bandwidth is accessed at alternating time slotsEthernet Frame Headers
Preamble | Destination | Source | Type | Data | Pad | Checksum |
A collection of user submitted “notes” on various subject. There are multiple topics and groups. NNTP is used to submit and post notes.New TLD’s
A program to expand the domain types by adding .info, .biz, .museum, .coop, .name, .pro, and .areo. At present these are the only new ones proposed by ICANNTPC
Basic Data transfer; Connections; Reliability; Flow Control; Multiplexing; Precedence and SecurityTCP/IP protocol stack
In this model the work is broken into many layers that have a virtual connection with a similar layer on the receiving end but are really being passed through various complex layers.IP Services
Connectionless datagram service; No delivery acks; Used with t-layer connection oriented TCP; T-layer makes up for deficiencies
The MTA has five main functions:
In a frame relay network each station has a connection known as a port which has a designated unique address. Data is organized in frames that have two parts: the Data and the Control Block. The frames are sent over virtual connections. Each access port is connected to the “frame cloud.” Inside the cloud are a series of Frame Switches. The switches determine the routes which the frames are moved through. The network establishes “virtual connections” and each connection is designated by a Data Link Connection Identifier(DCLI). Unlike Static Connections, a single frame relay port may have multiple virtual connections without increasing physical links. Frame relay lies on the Data Level of connections between routers.
Frame relay frame
| Flag | DLCI(high order) | C/R | EA | DLCI | FECN | BECN | DE | EA | Payload | FCS | Flag |
DLCI within frame relay: A 10-bit field which identifies the data link and its service parameters, including frame size and CIR
Frame relay & error handling: Frame relay uses Cyclical Redundancy Check. This is detection rather than checking since it is assumed the underlying network is reliable. Error correction is left up to TCP at the upper layers.
CIR: A frame relay bandwidth associated with a PVC.
FECN/BECN: Used in frame relay for congestion control. Notifications are sent to slow down traffic.
LMI: Frame Relay management protocol, an added extension to provide maintenance for complex networks.
PVC: A software defined logical connection with a committed bandwidth
Tariff: Pricing based on the parameters of a frame relay set upMIME types
The MIME header is placed at the beginning of a web transmission to associate an attached file type. These are used to indicate text, audio, video, and image attachmentsSynchronization and Framing
Insert checkpoints in a data stream to pick up where errors left off rather than from the beginning again. Since data stream is not error free, schemes are used to detect and handle errors. Using checksums to calculate the headers.ARP caches
Instead of broadcasting, recently acquired IP-to-Physical address bindings are maintained so ARP is not used repeatedly. PCs look in ARP cache before sending an ARP request.Data Transparency
Handling data transfer in a way that makes the user oblivious to the underlying complexity of the network.Router Forwarding Table
Routers have a list of networks(prefixes) and “next hop” addressesError Control
Ability of a protocol to handle errors or loss of data. Allows data that is being read or transmitted to be checked for errors, and when possible, corrected on the fly.Flow Control
The management of data flow between computers or devices or between nodes in a network so the data can be handled at an efficient pace. More Flow Control.Fragmentation and Reassembly
A data file over a certain size is stored in several chunks or fragments rather than in a single contiguous sequence of bits in one place. The pieces are put back together with sequence numbers placed in the headers.OSPF
A method for finding the best route for delivery by sending table updatesCERT
Started by DARPA after the internet worm incident to handle network emergenciesIANA
Handles the management and issuing of IP addresses on the InternetHubs, routers, switches, repeaters
Hub – where data arrives from one or more directions and is forwarded out in one or more other directions. Typically includes a switch. Switch – A network device that selects a path or circuit for sending a unit of data to its next destination. Router – device or in some cases software in a computer that determines the next network point to which a packet should be forwarded. Repeater – a device that receives a signal on an electric or optical media, amplifies the signal and then retransmits to the next media.Sequencing
When data is broken up, sequence numbers are applied to the packets so the data can be reassembled in the correct order at the destination.OSI
Layer responsible for data transfer across a single physical connector or a series of bridged connections. Provide reliable data transmission from one node to another and shield higher layers from any concerns about the physical transmission medium. Concerned with error free transmission of frames data. Divided into two sub-layers: LLC – allows above layers to access LAN resources regardless of how the network is implemented, MAC – determines how the physical medium is accessed. Principle service is transferring data from the network layer on the sender side to the network layer on the receiver side. Breaks data into frames and computes a checksum. Error control and flow control.Network Prefixes
Digit that follows a “/” after an IP addressGeneric Router Functionality
Routers exchange path information to maintain levels of delivery service Routers use either Vector-Distance or SFP to achieve QoS
Planning and net management required for routers. Runs at Layer 3. Specific protocols supported. Multiple collision and broadcast domains. Services requested explicitly. Supports fragmentation and other protocol specific net layer functionality. Access lists and other security features. Supports complex net topology. Forwards packets based on “next best hop”. Trades with other routers to update tables. Implement management and control functions.A B
A communications protocol with less service that TCP, but works with the IP protocol in a similar way. Unlike TCP, UDP does not break transmissions into packets. UDP can be used in situations where the messages are known to be small and resources do not need to be spent using TCP. Provides port numbers to help distinguish between different user requests. Computers may have multiple programs running at once. UDP will distinguish between the various processes via port numbers. UDP lies in the Transport Layer.
You may view your UDP settings by openning a DOS prompt and typing "NETSTAT -A" at the command line.
UDP Packet format:
| Source Port | Destination Port | Message Length | Checksum | Data |
Simple t-layer protocol; Datagram delivery service; Multiplexing via abstract destination Checksum violates strict protocol layering concept; Port assignment mechanism uses well-known ports and dynamic binding
These are two seperate protocols that are used together to form the basis of most
network and Internet data. The term TCP/IP is also used to generically refer to the 100
or more protocols available for networking.
Information passed over the Internet is broken up into packets. This helps data move more quickly as the lines are shared by many users rather than dominated by a few users moving large files.The TCP protocol devides your e-mail, web pages and downloads into packets and inserts error control to make sure the packets arrive intact.
The IP protocol actually does the heavy lifting. IP moves the data from place to place.
A good analogy is a package delivery company. The loading dock worker sorts the packages and places them on the the truck. The truck driver moves the packages from place to place. TCP is the loading dock worker, IP is the truck driver. TCP provides reliable stream delivery. Provides full-duplex connection. Uses Sliding window for flow control.
What is your IP address?
Open a DOS prompt and type
What open TCP connections do you have?
Open a DOS prompt and type
Controls packet delivery, connection-oriented, exists on “layer 4” the Transport layer of the OSI model. Works with IP and UDP. TCP/IP connectionless, unreliable, best effort packet delivery. TCP connection establishment: Uses the three-way handshake. Initiated by one TCP and responded to by another.
TCP/IP provides three sets of services:
TCP code bits
URG - Urgent
SYN – Synchronize sequence numbers
FIN – End of data from sender
PSH - Push
RST – Reset
ACK – Acknowledgement for flow control
IP formally specifies the format of internet packets and data areas. Fragmentation control and checksum
IP’s Three definitions:
IP routing is a decision of where to send a datagram based on its destination IP address. When IP software looks up a route the algorithm provides the IP address of the next machine that the datagram should be sent to. Internet routing algorithm is table driven and and uses only IP addresses.
Two forms of routing:
Extending & Conserving IP addresses by:
ICMP - Message control and error reporting between a host and gateway using IP datagrams and invisible to the user. ICMP is used to report communication problems between routers and hosts. ICMP is part of IP.
Regional IP addresses: 194 – Europe, 198 - N. America, 200 - Ct. & S. America, 201 – Asia & Pacific
Private IP addresses: A range of addresses typically used inside networks
Special IP addresses: 0 – this host, 127 – loop-back, 255 - Broadcast
IP addresses are assigned independent of a machine’s physical address
Classiful Addressing: Division of internet addresses into classes
Subnet Addressing: Extension of IP scheme that allows a site to use a single network address for multiple physical networks.
The system that turns domain names into machine readable IP addresses and the computers that make up this system. This is DNS address resolution.
Every website, host and machine on a network has a TCP/IP address. This is a four-part code number that is the "address" of the machine. No one would be able to remember all of those code numbers, so websites and machines are given "human" names that can be remembered. For example, the TCP/IP address of amazon.com is 126.96.36.199. To see this, open a DOS prompt(while connected to the Internet) and type: PING AMAZON.COM. The response should reveal the IP address in number form. To see the address of your own machine open a DOS prompt and type PING LOCALHOST. Also, if you are running Windows 95, you may also type WINIPCFG, IPCONFIG in NT.Mapping between host names and IP numbers:
PCs request the addresses of other hosts, the DNS is queried and will in turn query other DNS until the information is found and returned to the machine that sent the query
“database” that contains the needed information for turning names into IP addresses and vice-versa
Root servers are master DNS servers that have data on all TLDs. Root servers are queried when the local DNS does not have the information.
Mail exchange query used specifically for mail handling. A DNS system must have at least one MX record in order for mail to be handled. The MX query will produce the domain based name of the mail server. Example: Query: host.com, MX reply mail.host.com
Application layer protocol for sending and receiving text messages, “email”SMTP headers
HELO - Greet the mail server. Used once per session - at the
beginning of the session
MAIL FROM: - Announce who the sender is. Used once per mail, before specifying any recipients for each mail, or after a RSET
RCPT TO: - Announce who the mail is to. Multiple recipients are allowed, each must have its own RCPT TO: entered immediately after a MAIL FROM:
DATA - Starts mail entry mode. Everything entered on the line following DATA is treated as the body of the message and is sent to the recipients. The DATA terminates with a . (period) on a line by itself. A mail may be queued or sent immediately when the . is entered. It cannot however be reset at this stage.
RSET - Reset the state of the current transaction. The MAIL FROM: and RCPT TO: for the current transaction are cleared.
QUIT - End the session. No commits happen here.
SMTP reply codes
200 Range – ok, transmission free of errors, delivery success, etc..
300 Range - ?
400 Range – Errors or problems at remote host
500 Range – data, transaction and process errors
ARP performs dynamic address resolution using only the lowest level network communication system. Machine uses ARP to find the hardware address to another machine by broadcasting an ARP request. The request has the IP of the machine for which it needs the MAC address. ARP has low overhead.
Useful for connectiong to computers through serial ports, when a network server is unavailable or impractical. When you dial-up an ISP you are using a kind of PPP even though it getting you access to a larger network. PPP is "full-duplex" and can be used with various media. Infared, microwave and fiber optic can all use PPP to pass data.
Used for communication between two machines using a serial interface. Typically a
personal computer with a telephone modem. PPP works at the data link layer, has
error detection, can handle synchronous and asynchronous communication, full-duplex
and can be used on various media.
All about modems.
Broadband ISDN, or B-ISDN, or simply "Broadband." This technology promises a variety of services on media intended for only one type of service, namely telephone wires. The analog public-switched telephone system, using copper wires, was/is insufficent for the transmition of digital data, video and other modern technologies. As the telephone system was developed and installed years before digital computers ans television there was no need forseen for a system that could handle high speed data transmission. At the moment the telephone system is part analog and part digital. Much of the long ditance lines and switching have been replaced by digital lines, but the local lines and local "trunks" are often still analog. The general plan is to replace the entire telephone system with an fully digital service capable of handling multiple types of transmisions.
The present phone system is often called POTS, for "Plain-Old Telephone Service," meaning voice transmission only. Now many parts of the global communication system are fiber optic, satelite, microwave and celular. Since the old telephone switching was done through the direction of a master clock, a new method of transmission had to be created to handle the different types. The underlying technology of B-ISDN is ATM, Asynchronus Transfer Mode. This has nothing to do with bank ATMs(Automated Teller Machines). ATM is not tied to a master clock. ATM transmits data in small cells. These cells may be transmitted by themselves or "wrapped" in another media. The idea being flexabilty, the ability to be carried over any type of transmition method. The beauty of this method is that it may also be applied to private internal networks, allowing hosts and clients to communicate over various types of transmission media.
Part of the idea for ISDN came from a very basic need. The telephone company was running out of copper wire(copper is very expensive) and places to put the wires in large urban areas. Someone came up with the idea of finding a way to put more than one telephone call on a single wire. The solution was to send the calls at different frequencies or wavelengths.
IGP exchanges routing information. IGP either uses vector distance or SFP
For managing router information within a self contained network/LAN. RIP is an interior routing protocol and a distance vector protocol. RIP uses a hop count as its metric. RIP is widely used in the global Internet as an IGP. RIP sends routing messages at regular intervals and when the network topology changes. RIP maintains only the best route.RIP packets
Wide-area information servers (WAIS) is an Internet system in which specialized subject databases are created at multiple server locations, kept track of by a directory of servers at one location, and made accessible for searching by users with WAIS client programs. The user of WAIS is provided with or obtains a list of distributed databases. The user enters a search argument for a selected database and the client then accesses all the servers on which the database is distributed. The results provide a description of each text that meets the search requirements. The user can then retrieve the full text.
WAIS (pronounced "ways") uses its own Internet protocol, an extension of the Z39.50 standard (Information Retrieval Service Definition and Protocol Specification for Library Applications) of the National Information Standards Organization. Web users can use WAIS by either downloading a WAIS client and a "gateway" to the Web browser or by using Telnet to connect to a public WAIS client.
Most Web users will find that the abundance of server files and search engines already available on the Web will make WAIS superfluous. However, librarians, medical researchers, and others may find some specialized information available through WAIS that is not currently available on the Web.
For background, download a paper by Brewster Kahle of the Thinking Machines Corporation, a company that helped originate WAIS. Try download.com (http://www.download.com) to obtain a WAIS client and WWWAIS (http://www.eit.com/software/wwwwais/) for a gateway program to the WAIS client.
Digial Subscriber Line.
Fast Guide to DSL
AT&T DSL Guide.
Maps internal IP addresses to external IP addresses when communication extends beyond the network and into the Internet. NAT table lists of local(or private) addresses and the global(public) addresses.
Application layer protocol for transferring files
Rules for exchanging files via the web. HTTP methods: GET – Request for a resource, POST – Send data to a server, HEAD – Search header for a resource
RIP is a distance vector protocol. IETF standard for multi-media data formats. Runs at the Application Layer and requests can be made through TCP and UDP.
Provide a procedure for application programs to send messages to other programs with
minimum protocol mechanism. Transaction oriented, delivery and duplication checks
The DoD standard for IP. IP is designed for use in interconnected systems of packet switched networks. Provides for transmitting blocks of data called datagrams between hosts designated by fixed length addresses. Provides for fragmentation and reassembly. Two basic functions: Addressing and Fragmentation. Uses header fields to fragment and reassemble. Each datagram is treated as an independent entity. No connections or logical circuits.
Four Key Mechanisms:
Highly reliable host-to-host protocol between hosts in a packet switched network.
Primary purpose of TCP is to provide reliable securable logical circuit or
connection service between pairs of processes. To provide services on top of less
reliable internet communication layers by providing:
Domain names, three major components:
Hierarchy of names: EDU, COM, MIL, ORG, NET, GOV, INT.
IETF is a loosely organized international collaboration of autonomous, interconnected networks, supports host-to-host communications through voluntary adherence to open protocols and procedures defined by Internet standards. Concerned with protocols, procedures and conventions An Internet standard is a specification that is stable and well understood, is technologically competent, has multiple independent implementations and enjoys public support.
Specifications undergo periods of development, several iterations of review and are adopted as standards and published.Goals of the process are:
Specifications have two categories: Technical Specification and Applicability Statement
DNS requires redundant secondary servers to exist for each domain. Helps spread name
IETF working groups. IEFT has responsibility for developing and reviewing
specifications. WGs are the primary mechanism for development of IETF
IEFT policy on wiretapping, IEFT is not considering wiretapping as a part of the
process for maintaining IETF standards.
12 or so servers run by volunteers to manage the “.” Zone. Must not provide any
other services but the root service. RFC 2870
Frame relay signaling. Important functions:
Access Rate(AR) – Data rate of the user access channel
BECN – Set by a congested network to slow transmission
Burst Excess(BE) – Maximum amount of uncommitted data
Burst Size(BC) – Maximum bits network can transmit under normal conditions
CIR – Transport speed maintained when data is presented
CRC – Computational that ensures the accuracy of frames
DLCI – A unique number assigned to a PVC end point
FECN – Set by congested network to slow requests for frames
FCS – Frame checks only bits between flags, not whole header
S-HTTP is a secure web protocol that uses either encryption, digital signatures or both
SSH uses RSA public key for securing terminal emulation connections and logins
SSL sits between the application layer and transport layer for securing web traffic
SSH Secure Socket Shell. Unix-based interface for accessing remote hosts, like telnet.
A secure method for authenticating a request for service in a computer network. Used multiple, encrypted “ticket” exchanges to verify a user requesting access.IPSec
Applies security at the network/packet level rather than the application level using Authentication Headers or Encapsulating Security Payload. AH allows the sender to be authenticated, ESP uses authentication and encryption.Firewalls
A system of programs and servers that protect resources and users on a private network from dangerous transmissions on other networks. Examines each packet and compares it to a set of rules or conditions before passing it on.Public & Private keys
Uses password based RSA encryption. A public key is issued by an authority as an encryption method. The private key is kept by the sender and the public key is used by authorized receivers to decrypt. The public key cannot be used to encrypt or vise versa. This is known as asymmetric cryptography.Hashing
A method of extracting a coded string from a word string to create a digital signature or some other kind of verificationDigital Signatures
A method of verifying the source of a document. Using an encrypted hash code, a DS can be placed on an encrypted or plain text document.Denial of service
A type of hack or attack that prevents normal network connectivityCryptography & Data Encryption
A method of turning text or data into an unreadable format for security and privacy purposes.Backdoor Programs