describe
what
tasks
protocol
suite
Open System
Interconnection (OSI)
Open System Interconnection (OSI) merupakan sebuah
Sebelum
adanya
OSI
yang
merupakan
standard
the
International Standards
Organization's(ISO)
The
International
Standards
Ethernet
has
some
important
similarities;
10
several
different
sets
of
protocols,
even
simultaneously;
11
2.
3.
4.
To design independence for each layer from other layers. This facilitates
the interoperability of products from different manufacturers and
insures that the end-user can substitute one vendors product for
another.
5.
12
2.
3.
13
Application layer
Layer
Description/keyw
ords
Applicati
on
Provides an
interface for a
service to
operate
Communicatio
n partner
identification
Protocols
Devices/
components
HTTP
Telnet
FTP
TFTP
SNMP
Data
encapsulatio
n
User
information
and data
15
Presentation layer
Layer
Description/
keywords
Data
format (file
formats)
Encryption
,
Presentatio
translation
n
, and
compressi
on
Data
format and
exchange
Protocols
Devices/
Data
component encapsulat
s
ion
JPEG,BMP,
TIFF,
PICT, MPEG,
WMV, AVI,
ASCII,
EBCDIC
MIDI, WAV
Data
16
Session layer
Layer
Session
Description/keywor
ds
Keeps data
streams
separate
(session
identification)
Set up,
maintain, and
tear down
communicatio
n sessions
Protocols
Data
Devices/
encapsulatio
components
n
SQL
NFS
ASP
RPC
X
window
Data
17
Transport layer
Layer
Description/keywor
ds
Reliable
(connection
oriented) and
unreliable
(connectionles
s)
communicatio
ns
Transpo
End-to-end
rt
flow control
Port and
socket
numbers
Segmentation,
sequencing,
and
Protocols
Data
Devices/
encapsulati
components
on
TCP
(connectionoriented)
UDP
(connectionle
ss)
Segments
18
Network layer
Layer
Description/key
words
Logical
addresses
Path
Networ
determination
k
(identification
and selection)
Routing packets
Protocols
IP
IPX
AppleTal
k
DECNET
Devices/
Data
component encapsulat
s
ion
Routers
Layer 3
switches
Packets
19
Data
link
Description/keywords
Protocols
Devices/
components
20
Data
encapsulati
on
Frames
Physical layer
Layer
Description/keywords
Physica
l
Protocols
EIA/TIA
232(serial
signaling)
V.35
(modem
signaling)
Cat5
RJ45
Devices/
components
Data
encapsulatio
n
Transmission
media (cable
and wires)
Media
connectors
Transceivers
(including
transceivers
built into NICs)
Modems
Repeaters
Hubs
Multiplexers
CSUs/DSUs
Wireless
Access Points
21
Bits
Questions
1. Name all SEVEN(7) OSI
starting with the lowest.
layers,
Questions
4. Which OSI layer is responsible for
adding a header that includes
routing information?
Network Layer
5. Which OSI layer is considered the
media access control layer?
Data Link Layer
6. TCP functions at what layer of the
OSI model?
Transport Layer
23
Questions
7. Which layer is responsible for converting
data packets from the Data Link layer into
electrical signals ?
8. At which layer is routing implemented,
enabling connections and path selection
between two end systems. ?
9. Which layer defines how data is formatted,
presented, encoded, and converted for use
on the network ?
24
Questions
10.Which layer is responsible for creating,
managing
and
terminating
sessions
between applications ?
11.Which layer provides logical addressing
that
routers
will
use
for
path
determination ?
12.Which layer specifies voltage, wire speed,
and pinout cables and moves bits between
devices ?
25
27
28
29
OSI REFERENCE
MODEL
REAL WORLD
EQUIVALENT TASKS
Application
Program to program
transfer of
information
Presentation
TCP/IP PROTOCOL
Application
Session
Establishing,
maintaining, and
coordinating
communication
Transport
Accurate delivery,
service quality
Transport
Network
Transport routes,
message handling
and transfer
Internet
Data Link
Physical
Coding, addressing,
and transmitting
information
The hardware
connections (the NIC
Network
30
Interface
32
Data Packet
A packet is a basic unit of communication over a
digital network.
35
the
intended
sender's
IP address,
receiver's
IP
the
address,
37
Structure of packets
The structure of a packet depends on the type of
packet it is and on the protocol.
Structure of packets
For example, an IP packet includes:
The source IP address
The destination IP address
The sequence number of the packets
The type of service
Flags
Etc
The payload is the data it carries.
40
Protocol
4
1
Protocol
There are rules governing how data is
Protocol
There are many protocols, each one governing
the way a certain technology works.
43
Protocol
It also defines addressing in IP. Likewise, we have other protocols like:
1.
TCP: Transmission Control Protocol, used for the reliable transmission of data
over a network.
2.
3.
FTP: File Transfer Protocol, used for file transfer (uploading and downloading)
over the Internet
4.
5.
6.
2.1.5
RELATE
TWO
TYPES
OF
ADDRESSING COVERED BY THE OSI
MODEL.
2. Physical address
46
2.2.1 Explain the MAC address of a Host using ipconfig /all command.
2.2.2 Relate a standard IEEE 802.3 Ethernet Frame based on a given
source and destination devices.
2.2.3 Give logical address of a computer.
2.2.4 Give IP address of a computer.
Ipconfig:
Is used to find out your current TCP/IP settings.
With IPCONFIG you can find out your IP
Address, find your Default Gateway and find
your Subnet Mask.
This is a very handy network tool for finding
your local IP address.
ipconfig command
ipconfig /all:
To display all your IP information for all
adapters.
With ipconfig /all you can also find out your
DNS Server and MAC Address.
This will show your full TCP/IP configuration for
all adapters on your Windows machine.
ipconfig/all command
Parts of an IP address:
Network same for all hosts connected to the LAN
Host unique to each host on the network
Celcom Broadband
Broadband services by Celcom, based on HSDPA
2.
iZZi
Wireless broadband
3.
Jaring
Pioneer Internet Service Provider
4.
Maxis Broadband
Broadband services by Maxis, based on HSDPA
5.
P1
Wi-Fi and WiMax Broadband, by Green Packet
59
(IP)
software
to
70
72
1. Ping process
The two general replies from a ping are
The
exclamation
points
indicate
IP
2. Traceroute
The second ICMP tool you should be
familiar with is traceroute.
Traceroute
Traceroute works by sending out ICMP
packets with a Time To Live (TTL) of one to
find the first step to the final destination.
Traceroute
When that happens, the entire path will be
displayed on your console.
If the final destination cannot be found, asterisks
will start to appear on your screen.
This is a sort of error message it means the TTL
has been exceeded.
To abort a ping or traceroute in progress, press
<CTRL-SHIFT-6> twice in rapid succession.
76
Traceroute
A
great
1-2-3
method
to
troubleshoot
routing problems:
1. Ping the destination.
2. If the pings dont come back, run show ip route
to make sure your local device has a route to the
destination.
3. If a route exists, use traceroute to determine
which downstream router cant route the packet.
77
Question
1. Which definition describes the term
Internet?
A. a group of PCs connected together on
a LAN
B. a group of PCs connected together by
an ISP
C. a network of networks that connects
countries around the world
D. a worldwide collection of networks
controlled by a single organization
78
Question
2. What type of connection point is a
point of presence (POP)?
A.
B.
C.
D.
between
between
between
between
79
Question
5. Which THREE(3) elements are
required to successfully connect to
the Internet? (Choose three.)
A.
B.
C.
D.
E.
F.
an IP address
file sharing enabled
a network connection
server services enabled
access to an Internet service provider
an address obtained directly from the RIR
80
Answer
1.
2.
3.
4.
5.
C
D
A, B, and E
C
A, C, and E
81
2.4 UNDERSTAND
NETWORK SERVICES
example,
when
Web
site
85
Overview
SMTP, POP3 and IMAP are TCP/IP protocols
used for mail delivery.
If you plan to set up an email server such
as Mail Server, you must know what they
are used for.
Each protocol is just a specific set of
communication rules between computers.
99
100
The POP3 protocol is simple and does not offer many features except for
download.
Its design assumes that the email client downloads all available email from
the server, deletes them from the server and then disconnects.
101
104
IP Addresses
Each computer must have an IP address before it can
connect to the Internet.
This
This
is
might
an
IP
be
address:
the
same
192.68.20.50
IP
www.w3schools.com
105
address:
An IP Address Contains 4
Numbers
Each computer must have a unique IP address.
This is your IP address: 203.82.87.102
TCP/IP uses four numbers to address a computer.
The numbers are always between 0 and 255.
IP addresses are normally written as four
numbers separated by a period, like this:
192.168.1.50.
106
32 Bits = 4 Bytes
In computer terms, TCP/IP uses 32 bits
addressing. One byte is 8 bits. TCP/IP uses
4 bytes.
One byte can contain 256 different values:
00000000, 00000001, 00000010, 00000011,
00000100, 00000101, 00000110, 00000111,
00001000 .......and all the way up to 11111111.
Network Classes
Internet addresses are allocated by the InterNIC (
http://www.internic.net ), the organization that
administers the Internet.
These IP addresses are divided into classes.
The most common of these are classes A, B, and
C.
Classes D and E exist, but are not generally used
by end users.
108
Network Classes
Each of the address classes has a
different default subnet mask.
You can identify the class of an IP
address by looking at its first octet.
109
Class A
networks use a default subnet mask of
255.0.0.0 and have 0-127 as their first
octet.
The address 10.52.36.11 is a class A
address.
Its first octet is 10, which is between 1
and 126, inclusive.
110
Class B
networks use a default subnet mask of
255.255.0.0 and have 128-191 as their
first octet.
The address 172.16.52.63 is a class B
address.
Its first octet is 172, which is between
128 and 191, inclusive.
111
Class C
networks use a default subnet mask of
255.255.255.0 and have 192-223 as
their first octet.
The address 192.168.123.132 is a class
C address.
Its first octet is 192, which is between
192 and 223, inclusive.
112
113
Byte 1
range
Byte 2
range
Byte 3
range
Byte 4
range
0 - 127
1 - 254
1 - 254
1 254
128 - 191
Preassigned
by internet
1 - 254
1 254
192 - 223
Preassigned
by internet
Preassigned
by internet
1 - 254
114
number
110000000101000111101110000100.
116
IP Addressing Scheme
An IP address has TWO(2) parts.
IP Addressing Scheme
If you take the example
192.168.123.132 and divide it into
these two parts you get the
following:
119
Increments of an IP Address:
0.0.0.0
0.0.0.1
increment 252 hosts
0.0.0.254
0.0.0.255
0.0.1.0
0.0.1.1
increment 252 hosts
0.0.1.254
0.0.1.255
0.0.2.0
0.0.2.1
increment 4+ billion hosts
255.255.255.255
120
Subnet Mask
The second item, which is required for
TCP/IP to work, is the subnet mask.
The subnet mask is used by the
TCP/IP protocol to determine whether
a host is on the local subnet or on a
remote network.
121
Subnet Mask
In TCP/IP, the parts of the IP address
that are used as the network and
host addresses are not fixed, so the
network and host addresses above
cannot be determined unless you
have more information.
This information is supplied in
another 32-bit number called a
subnet mask.
122
Subnet Mask
In this example, the subnet mask is
255.255.255.0.
It is not obvious what this number
means unless you know that 255 in
binary notation equals 11111111; so,
the subnet mask is:
123
Subnet Mask
Lining up the IP address and the
subnet mask together, the network
and host portions of the address can
be separated:
124
Subnet Mask
The first 24 bits (the number of ones
in the subnet mask) are identified as
the network address, with the last 8
bits (the number of remaining zeros
in the subnet mask) identified as the
host address. This gives you the
following:
125
Subnet Mask
So now you know, for this example using a
255.255.255.0 subnet mask, that the
network ID is 192.168.123.0, and the host
address is 0.0.0.132.
When a packet arrives on the 192.168.123.0
subnet (from the local subnet or a remote
network), and it has a destination address of
192.168.123.132, your computer will receive
it from the network and process it.
126
Subnet Mask
Almost all decimal subnet masks
convert to binary numbers that are
all ones on the left and all zeros on
the right.
Some other common subnet masks
are:
127
128
ANY QUESTION/COMMENT?
129
Questions
1. Internet Protocol (IP) addresses are how many
bits long?
2. The address 68.56.189.17 belongs to which IP
class?
3. What is the range of the first octet on a Class A
TCP/IP address?
4. What is the subnet mask for a Class C TCP/IP
address?
130
Questions
5. What
is
the
binary
10101011 in base 10?
number
Class A
10.0.0.0 through 10.255.255.255
Class B
172.16.0.0 through 172.31.255.255
Class C
192.168.0.0 through 192.168.255.255
135
Unicast
A unicast IP address is an IP address
uniquely identifying a host in a network.
The datagram with a unicast IP address
is received and processed by only a
single host.
For
example,
the
IP
address
192.9.205.21 is a unicast IP address.
137
Broadcast address
The datagram with a broadcast IP
address is received and processed by
all the hosts in the local network.
For example, the IP addresses
255.255.255.255,192.9.205.255,180.
10.255.255,10.255.255.255
are
broadcast IP addresses.
138
Multicast
A multicast address is an IP address
identifying a particular group of hosts
in network.
This group of hosts is called a
multicast group.
For
example,
the
IP
address
225.2.100.1 is a multicast IP address.
139
of
computers
are
Dynamic IP Addresses
The biggest advantages of Dynamic IP
Addressing are
i.
ii.
the
computer
is
assigned
new
IP
Dynamic IP Addresses
In contrast, Dynamic IP addressing should
not be used for VOIP, VPN, playing online
games or game hosting because Dynamic
IP addressing is less reliable(trusted) then
Static IP addressing and could cause the
service to disconnect while you are on a
VOIP, VPN or gaming.
146
2.6.7
Dynamic Host Configuration Protocol (DHCP)
server
of
numbers
(i.e.,
147
scope)
DHCP Server
Normally the DHCP server provides
the client with at least this basic
information:
i. IP Address
ii. Subnet Mask
iii. Default Gateway
149
DHCP Server
Other information can be provided as
well, such as Domain Name Service
(DNS) server addresses and Windows
Internet Name Service (WINS) server
addresses.
The system administrator configures
the DHCP server with the options
that are parsed out to the client.
150