CCNA学习指南英文第七版第三章.docx

上传人:b****6 文档编号:9098407 上传时间:2023-02-03 格式:DOCX 页数:63 大小:766.84KB
下载 相关 举报
CCNA学习指南英文第七版第三章.docx_第1页
第1页 / 共63页
CCNA学习指南英文第七版第三章.docx_第2页
第2页 / 共63页
CCNA学习指南英文第七版第三章.docx_第3页
第3页 / 共63页
CCNA学习指南英文第七版第三章.docx_第4页
第4页 / 共63页
CCNA学习指南英文第七版第三章.docx_第5页
第5页 / 共63页
点击查看更多>>
下载资源
资源描述

CCNA学习指南英文第七版第三章.docx

《CCNA学习指南英文第七版第三章.docx》由会员分享,可在线阅读,更多相关《CCNA学习指南英文第七版第三章.docx(63页珍藏版)》请在冰豆网上搜索。

CCNA学习指南英文第七版第三章.docx

CCNA学习指南英文第七版第三章

Chapter3

IntroductiontoTCP/IP

TheCCNAexamtopicscoveredinthischapterincludethefollowing:

∙Describehowanetworkworks

oDescribethepurposeandbasicoperationoftheprotocolsintheOSIandTCPmodels.

oIdentifyandcorrectcommonnetworkproblemsatlayers1,2,3,and7usingalayeredmodelapproach.

∙ImplementanIPaddressingschemeandIPServicestomeetnetworkrequirementsinamedium-sizeEnterprisebranchofficenetwork.

oDescribetheoperationandbenefitsofusingprivateandpublicIPaddressing.

The TransmissionControlProtocol/InternetProtocol(TCP/IP) suitewascreatedbytheDepartmentofDefense(DoD)toensureandpreservedataintegrityaswellasmaintaincommunicationsintheeventofcatastrophicwar.Soitfollowsthatifdesignedandimplementedcorrectly,aTCP/IPnetworkcanbeatrulydependableandresilientone.Inthischapter,I’llcovertheprotocolsofTCP/IP,andthroughoutthisbook,you’lllearnhowtocreateamarvelousTCP/IPnetwork—usingCiscorouters,ofcourse.

We’llbeginbytakingalookattheDoD’sversionofTCP/IPandthencomparethisversionanditsprotocolswiththeOSIreferencemodeldiscussedinChapter1,“Internetworking.”

OnceyouunderstandtheprotocolsusedatthevariouslevelsoftheDoDmodel,I’llcoverIPaddressingandthedifferentclassesofIPaddressesusedinnetworkstoday.

SubnettingwillbecoveredinChapter4,“EasySubnetting.”

Last,becauseIPv4addresstypesaresoimportanttounderstandingIPaddressing,aswellassubnettingandVariableLengthSubnetMasks(VLSMs),anunderstandingofthevariousflavorsofIPv4addressesiscritical.I’llfinishthechapterwithvarioustypesofIPv4addressesthatyoujustmustknow.

InternetProtocolversion6willnotbediscussedinthischapter;thischapterwillfocussolelyonIPv4.IPv6willbecoveredinChapter15,“InternetProtocolVersion6(IPv6).”Also,whenIdiscussInternetProtocolVersion4,you’llseeitwrittenasjustIP,nottypicallyIPv4.

IntroducingTCP/IP

BecauseTCP/IPissocentraltoworkingwiththeInternetandintranets,it’sessentialforyoutounderstanditindetail.I’llbeginbygivingyousomebackgroundonTCP/IPandhowitcameaboutandthenmoveontodescribingtheimportanttechnicalgoalsdefinedbytheoriginaldesigners.Afterthat,you’llfindouthowTCP/IPcomparestoatheoreticalmodel—theOpenSystemsInterconnection(OSI)model.

ABriefHistoryofTCP/IP

TCP/IPfirstcameonthescenein1973.Later,in1978,itwasdividedintotwodistinctprotocols:

TCPandIP.Then,in1983,TCP/IPreplacedtheNetworkControlProtocol(NCP)andwasauthorizedastheofficialmeansofdatatransportforanythingconnectingtoARPAnet,theInternet’sancestorthatwascreatedbyARPA,theDoD’sAdvancedResearchProjectsAgency,waybackin1957inreactiontotheSoviet’slaunchingofSputnik.ARPAwassoonredubbedDARPA,anditwasdividedintoARPAnetandMILNET(alsoin1983);bothwerefinallydissolvedin1990.

Butcontrarytowhatyoumightthink,mostofthedevelopmentworkonTCP/IPhappenedatUCBerkeleyinNorthernCalifornia,whereagroupofscientistsweresimultaneouslyworkingontheBerkeleyversionofUNIX,whichsoonbecameknownastheBSD,orBerkeleySoftwareDistribution,seriesofUNIXversions.Ofcourse,becauseTCP/IPworkedsowell,itwaspackagedintosubsequentreleasesofBSDUNIXandofferedtootheruniversitiesandinstitutionsiftheyboughtthedistributiontape.Sobasically,BSDUnixbundledwithTCP/IPbeganassharewareintheworldofacademiaand,asaresult,becamethebasisofthehugesuccessandexponentialgrowthoftoday’sInternetaswellassmaller,privateandcorporateintranets.

Asusual,whatmayhavestartedasasmallgroupofTCP/IPaficionadosevolved,andasitdid,theU.S.governmentcreatedaprogramtotestanynewpublishedstandardsandmakesuretheypassedcertaincriteria.ThiswastoprotectTCP/IP’sintegrityandtoensurethatnodeveloperchangedanythingtoodramaticallyoraddedanyproprietaryfeatures.It’sthisveryquality—thisopen-systemsapproachtotheTCP/IPfamilyofprotocols—thatprettymuchsealeditspopularitybecauseitguaranteesasolidconnectionbetweenmyriadhardwareandsoftwareplatformswithnostringsattached.

TCP/IPandtheDoDModel

TheDoDmodelisbasicallyacondensedversionoftheOSImodel—it’scomposedoffour,insteadofseven,layers:

∙Process/Applicationlayer

∙Host-to-Hostlayer

∙Internetlayer

∙NetworkAccesslayer

Figure3-1 showsacomparisonoftheDoDmodelandtheOSIreferencemodel.Asyoucansee,thetwoaresimilarinconcept,buteachhasadifferentnumberoflayerswithdifferentnames.

WhenthedifferentprotocolsintheIPstackarediscussed,thelayersoftheOSIandDoDmodelsareinterchangeable.Inotherwords,theInternetlayerandtheNetworklayerdescribethesamething,asdotheHost-to-HostlayerandtheTransportlayer.

Figure3-1:

 TheDoDandOSImodels

AvastarrayofprotocolscombineattheDoDmodel’s Process/Applicationlayer tointegratethevariousactivitiesanddutiesspanningthefocusoftheOSI’scorrespondingtopthreelayers(Application,Presentation,andSession).We’llbelookingcloselyatthoseprotocolsinthenextpartofthischapter.TheProcess/Applicationlayerdefinesprotocolsfornode-to-nodeapplicationcommunicationandalsocontrolsuser-interfacespecifications.

The Host-to-Hostlayer parallelsthefunctionsoftheOSI’sTransportlayer,definingprotocolsforsettinguptheleveloftransmissionserviceforapplications.Ittacklesissuessuchascreatingreliableend-to-endcommunicationandensuringtheerror-freedeliveryofdata.Ithandlespacketsequencingandmaintainsdataintegrity.

The Internetlayer correspondstotheOSI’sNetworklayer,designatingtheprotocolsrelatingtothelogicaltransmissionofpacketsovertheentirenetwork.IttakescareoftheaddressingofhostsbygivingthemanIP(InternetProtocol)address,andithandlestheroutingofpacketsamongmultiplenetworks.

AtthebottomoftheDoDmodel,the NetworkAccesslayer implementsthedataexchangebetweenthehostandthenetwork.TheequivalentoftheDataLinkandPhysicallayersoftheOSImodel,theNetworkAccesslayeroverseeshardwareaddressinganddefinesprotocolsforthephysicaltransmissionofdata.

TheDoDandOSImodelsarealikeindesignandconceptandhavesimilarfunctionsinsimilarlayers. Figure3-2 showstheTCP/IPprotocolsuiteandhowitsprotocolsrelatetotheDoDmodellayers.

Inthefollowingsections,wewilllookatthedifferentprotocolsinmoredetail,startingwiththeProcess/Applicationlayerprotocols.

TheProcess/ApplicationLayerProtocols

Inthefollowingsections,I’lldescribethedifferentapplicationsandservicestypicallyusedinIPnetworks.Thefollowingprotocolsandapplicationsarecovered:

∙Telnet

∙FTP

∙TFTP

∙NFS

∙SMTP

∙POP

∙IMAP4

∙TLS

∙SIP(VoIP)

∙RTP(VoIP)

∙LPD

∙XWindow

∙SNMP

∙SSH

∙HTTP

∙HTTPS

∙NTP

∙NNTP

∙SCP

∙LDAP

∙IGMP

∙LPR

∙DNS

∙DHCP/BootP

Figure3-2:

 TheTCP/IPprotocolsuite

Telnet

Telnet isthechameleonofprotocols—itsspecialtyisterminalemulation.Itallowsauseronaremoteclientmachine,calledtheTelnetclient,toaccesstheresourcesofanothermachine,theTelnetserver.TelnetachievesthisbypullingafastoneontheTelnetserverandmakingtheclientmachineappearasthoughitwereaterminaldirectlyattachedtothelocalnetwork.Thisprojectionisactuallyasoftwareimage—avirtualterminalthatcaninteractwiththechosenremotehost.

Theseemulatedterminalsareofthetext-modetypeandcanexecutedefinedproceduressuchasdisplayingmenusthatgiveuserstheopportunitytochooseoptionsandaccesstheapplicationsonthedupedserver.UsersbeginaTelnetsessionbyrunningtheTelnetclientsoftwareandthenloggingintotheTelnetserver.

FileTransferProtocol(FTP)

FileTransferProtocol(FTP) istheprotocolthatactuallyletsustransferfiles,anditcanaccomplishthisbetweenanytwomachinesusingit.ButFTPisn’tjustaprotocol;it’salsoaprogram.Operatingasaprotocol,FTPisusedbyapplications.Asaprogram,it’semployedbyuserstoperformfiletasksbyhand.FTPalsoallowsforaccesstobothdirectoriesandfilesandcanaccomplishcertaintypesofdirectoryoperations,suchasrelocatingintodifferentones.

AccessingahostthroughFTPisonlythefirststep,though.Usersmustthenbesubjectedtoanauthenticationloginthat’sprobablysecuredwithpasswordsandusernamesimplementedbysystemadministratorstorestrictaccess.Youcangetaroundthissomewhatbyadoptingtheusername anonymous—thoughwhatyou’llgainaccesstowillbelimited.

Evenwhenemployedbyusersmanuallyasaprogram,FTP’sfunctionsarelimitedtolistingandmanipulatingdirectories,typingfilecontents,andcopyingfilesbetweenhosts.Itcan’texecuteremotefilesasprograms.

TrivialFileTransferProtocol(TFTP)

TrivialFileTransferProtocol(TFTP) isthestripped-down,stockversionofFTP,butit’stheprotocolofchoiceifyouknowexactlywhatyouwantandwheretofindit,plusit’ssoeasytouseandit’sfasttoo!

Itdoesn’tgiveyoutheabundanceoffunctionsthatFTPdoes,though.TFTPhasnodirectory-browsingabilities;itcandonothingbutsendandreceivefiles.Thiscompactlittleprotocolalsoskimpsinthedatadepartment,sendingmuchsmallerblocksofdatathanFTP,andthere’snoauthenticationaswithFTP,soit’sevenmoreinsecure.Fewsitessupportitbecauseoftheinherentsecurityrisks.

NetworkFileSystem(NFS)

NetworkFileSystem(NFS) isajewelofaprotocolspecializinginfilesharing.Itallowstwodi

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > PPT模板 > 动态背景

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1