Skip to main content

Summary of Module 9

Summary
This page summarizes the topics discussed in this module.


The U.S. Department of Defense (DoD) TCP/IP reference model has four layers: the application layer, transport layer, Internet layer, and the network access layer. The application layer handles high-level protocols, issues of representation, encoding, and dialog control. The transport layer provides transport services from the source host to the destination host. The purpose of the Internet layer is to select the best path through the network for packet transmissions. The network access layer is concerned with the physical link to the network media.

Although some layers of the TCP/IP reference model correspond to the seven layers of the OSI model, there are differences. The TCP/IP model combines the presentation and session layer into its application layer. The TCP/IP model combines the OSI data link and physical layers into its network access layer.

Routers use the IP address to move data packets between networks. IP addresses are thirty-two bits long according to the current version IPv4 and are divided into four octets of eight bits each. They operate at the network layer, Layer 3, of the OSI model, which is the Internet layer of the TCP/IP model.

The IP address of a host is a logical address and can be changed. The Media Access Control (MAC) address of the workstation is a 48-bit physical address. This address is usually burned into the network interface card (NIC) and cannot change unless the NIC is replaced. TCP/IP communications within a LAN segment require both a destination IP address and a destination MAC address for delivery. While IP address are unique and routable throughout the Internet, when a packet arrives at the destination network there needs to be a way to automatically map the IP address to a MAC address. The TCP/IP suite has a protocol, called Address Resolution Protocol (ARP), which can automatically obtain MAC addresses for local transmission. A variation on ARP called Proxy ARP will provide the MAC address of an intermediate device for transmission to another network segment.

There are five classes of IP addresses, A through E. Only the first three classes are used commercially. Depending on the class, the network and host part of the address will use a different number of bits. The Class D address is used for multicast groups. Class E addresses are reserved for research use only.

An IP address that has binary zeros in all host bit positions is used to identify the network itself. An address in which all of the host bits are set to one is the broadcast address and is used for broadcasting packets to all the devices on a network.

Public IP addresses are unique. No two machines that connect to a public network can have the same IP address because public IP addresses are global and standardized. Private networks that are not connected to the Internet may use any host addresses, as long as each host within the private network is unique. Three blocks of IP addresses are reserved for private, internal use. These three blocks consist of one Class A, a range of Class B addresses, and a range of Class C addresses. Addresses that fall within these ranges are discarded by routers and not routed on the Internet backbone.

Subnetting is another means of dividing and identifying separate networks throughout the LAN. Subnetting a network means to use the subnet mask to divide the network and break a large network up into smaller, more efficient and manageable segments, or subnets. Subnet addresses include the network portion, plus a subnet field and a host field. The subnet field and the host field are created from the original host portion for the entire network.

A more extendible and scalable version of IP, IP Version 6 (IPv6), has been defined and developed. IPv6 uses 128 bits rather than the 32 bits currently used in IPv4. IPv6 uses hexadecimal numbers to represent the 128 bits. IPv6 is being implemented in select networks and may eventually replace IPv4 as the dominant Internet protocol.

IP addresses are assigned to hosts in the following ways:

• Statically – manually, by a network administrator

• Dynamically – automatically, using reverse address resolution protocol, bootstrap protocol (BOOTP), or Dynamic Host Configuration Protocol (DHCP)

Comments

Popular posts from this blog

OSI layers / Peer-to-peer communications / TCP/IP model

OSI layers 2.3.4 This page discusses the seven layers of the OSI model. The OSI reference model is a framework that is used to understand how information travels throughout a network. The OSI reference model explains how packets travel through the various layers to another device on a network, even if the sender and destination have different types of network media. In the OSI reference model, there are seven numbered layers, each of which illustrates a particular network function. - Dividing the network into seven layers provides the following advantages: • It breaks network communication into smaller, more manageable parts. • It standardizes network components to allow multiple vendor development and support. • It allows different types of network hardware and software to communicate with each other. • It prevents changes in one layer from affecting other layers. • It divides network communication into smaller parts to make learning it easier to understand. In the foll...

Advantages and disadvantages of link-state routing

Advantages and disadvantages of link-state routing 2.1.5  This page lists the advantages and disadvantages of link-state routing protocols. The following are advantages of link-state routing protocols:  Link-state protocols use cost metrics to choose paths through the network. The cost metric reflects the capacity of the links on those paths. Link-state protocols use triggered updates and LSA floods to immediately report changes in the network topology to all routers in the network. This leads to fast convergence times. Each router has a complete and synchronized picture of the network. Therefore, it is very difficult for routing loops to occur. Routers use the latest information to make the best routing decisions. The link-state database sizes can be minimized with careful network design. This leads to smaller Dijkstra calculations and faster convergence. Every router, at the very least, maps the topology of it...

Ports for services

Ports for services 10.2.2  Services running on hosts must have a port number assigned to them so communication can occur. A remote host attempting to connect to a service expects that service to use specific transport layer protocols and ports. Some ports, which are defined in RFC 1700, are known as the well-known ports. These ports are reserved in both TCP and UDP.  These well-known ports define applications that run above the transport layer protocols. For example, a server that runs FTP will use ports 20 and 21 to forward TCP connections from clients to its FTP application. This allows the server to determine which service a client requests. TCP and UDP use port numbers to determine the correct service to which requests are forwarded. The next page will discuss ports in greater detail.