Upload
samuel-hodge
View
231
Download
2
Embed Size (px)
Citation preview
Chapter 3
Chapter 3: Planning Network Protocols
and Compatibility
Chapter 3: Planning Network Protocols
and Compatibility
Chapter 3
Learning ObjectivesLearning Objectives
Explain basic network concepts, including Explain basic network concepts, including network terms, types of networks, and network terms, types of networks, and network cardsnetwork cards
Explain the NDIS and ODI network driver Explain the NDIS and ODI network driver specificationsspecifications
Explain the communications protocols used Explain the communications protocols used in Windows 2000 Server, including TCP/IP, in Windows 2000 Server, including TCP/IP, NWLink, NetBEUI, DLC, and AppleTalk NWLink, NetBEUI, DLC, and AppleTalk
Chapter 3
Learning Objectives (continued)Learning Objectives (continued)
Plan network binding order, change the Plan network binding order, change the binding order, and bind and unbind binding order, and bind and unbind protocolsprotocols
Plan how to implement protocols on Plan how to implement protocols on different types of networksdifferent types of networks
Chapter 3
ProtocolProtocol
A protocol consists of guidelines for:A protocol consists of guidelines for: How data is formatted into discrete units How data is formatted into discrete units
called packets and framescalled packets and frames How packets and frames are transmitted How packets and frames are transmitted
across one or more networksacross one or more networks How packets and frames are interpreted at How packets and frames are interpreted at
the receiving endthe receiving end
Chapter 3
Packets and FramesPackets and Frames
Packets and frames are units of data Packets and frames are units of data transmitted from one networked transmitted from one networked computer or device to another.computer or device to another.
Although packets and frames are often Although packets and frames are often used to have the same meaning, there used to have the same meaning, there is a difference. Packets operate at a is a difference. Packets operate at a higher communication layer and contain higher communication layer and contain routing information.routing information.
Chapter 3
General Sections in Packets and Frames
General Sections in Packets and Frames
HeaderHeader DataData Trailer or footerTrailer or footer
Chapter 3
Packet and Frame FormatPacket and Frame Format
Header with source,destination, and routing
information
Variable-length data Footer witherror data
Figure 3-1 Basic packet and frame formatFigure 3-1 Basic packet and frame format
Chapter 3
Network DesignNetwork Design
The basic design of a network is its The basic design of a network is its topologytopology
Topology: The physical layout of the Topology: The physical layout of the cable and the logical path followed by cable and the logical path followed by network packets and frames sent on the network packets and frames sent on the cablecable
Chapter 3
Local Area NetworkLocal Area Network
Local area network (LAN): Joins Local area network (LAN): Joins computers, printers, and other computer computers, printers, and other computer equipment within a limited service area equipment within a limited service area and generally employs only one and generally employs only one topology topology
Chapter 3
Example of a LANExample of a LAN
LAN
Figure 3-2 A LAN in a buildingFigure 3-2 A LAN in a building
Chapter 3
Metropolitan Area Network Metropolitan Area Network
Metropolitan area network (MAN): A network that links multiple LANs within a large city or metropolitan area
Chapter 3
Example of a MANExample of a MAN
LAN
LANLAN
Research hospital
University chemistry building
Pharmaceutical company
MAN connecting buildings in a cityMAN connecting buildings in a city
Chapter 3
Enterprise NetworkEnterprise Network
Enterprise Network: A network that often Enterprise Network: A network that often reaches throughout a large area, such as a reaches throughout a large area, such as a college campus, a city, or across several college campus, a city, or across several states. A distinguishing factor of an states. A distinguishing factor of an enterprise network is that it brings together enterprise network is that it brings together an array of network resources such as an array of network resources such as many kinds of servers, mainframes, many kinds of servers, mainframes, printers, network devices, intranets, and printers, network devices, intranets, and the Internetthe Internet
Chapter 3
Typical Resources in an Enterprise Network
Typical Resources in an Enterprise Network
Figure 3-3Figure 3-3Resources in anResources in an
enterprise networkenterprise network
Chapter 3
Wide Area NetworkWide Area Network
Wide Area Network (WAN): A far-Wide Area Network (WAN): A far-reaching system of networks that can reaching system of networks that can extend across state lines and across extend across state lines and across continentscontinents
Chapter 3
Example of a WANExample of a WAN
New YorkLos Angeles
WAN across a continentWAN across a continent
Chapter 3
Network Interface Card Communication Medium Options
Network Interface Card Communication Medium Options
Coaxial cable (thick and thinnet)Coaxial cable (thick and thinnet) Twisted-pair (shielded and unshielded)Twisted-pair (shielded and unshielded) Fiber-opticFiber-optic Wireless (infrared, radio wave, Wireless (infrared, radio wave,
microwave, satellite)microwave, satellite)
Chapter 3
Connecting a Medium to a NICConnecting a Medium to a NIC
Figure 3-4 Connecting cable to a NICFigure 3-4 Connecting cable to a NIC
Chapter 3
Device AddressDevice Address
Each NIC has a physical or device Each NIC has a physical or device address that is burned into a PROM on address that is burned into a PROM on the card the card
Media access control (MAC) address is Media access control (MAC) address is another way of describing the device another way of describing the device addressaddress
Chapter 3
Ethernet and Token RingEthernet and Token Ring
Ethernet: A network transport system Ethernet: A network transport system that uses a carrier sensing and collision that uses a carrier sensing and collision detection method to regulate data detection method to regulate data transmissionstransmissions
Token ring: A network transport method Token ring: A network transport method that uses a token, which is passed from that uses a token, which is passed from node to node, to coordinate data node to node, to coordinate data transmissionstransmissions
Chapter 3
NDISNDIS
Network Driver Interface Specification (NDIS): Network Driver Interface Specification (NDIS): A set of standards developed by Microsoft A set of standards developed by Microsoft and 3COM for network drivers that enables and 3COM for network drivers that enables communication between a NIC and a communication between a NIC and a protocol, and that enables the use of multiple protocol, and that enables the use of multiple protocols on the same networkprotocols on the same network
Chapter 3
NDIS ArchitectureNDIS Architecture
N e t w o r k i n t e r f a c e c a r d
N e t w o r k p r o t o c o l ( s u c h a s T C P / I P )
W i n d o w s 2 0 0 0 w i t h N D I Sd r i v e r i n s t a l l e d b i n d i n g t h e
p r o t o c o l w i t h t h e N I C
Figure 3-5 Binding a protocol to a NIC
Chapter 3
ODIODI
Open Datalink Interface (ODI) driver: A Open Datalink Interface (ODI) driver: A driver that is used by Novell NetWare driver that is used by Novell NetWare networks to transport multiple protocols networks to transport multiple protocols on the same networkon the same network
Chapter 3
Microsoft-Supported Communication Protocols
Microsoft-Supported Communication Protocols
Protocol Function
TCP/IP (Transmission Control
Protocol/Internet Protocol)
Software drivers for TCP/IP communications with
servers, workstations, mainframes, UNIX computers,
and Internet and intranet servers
NWLink (NetWare Link) Microsoft developed drivers for communications with
Novell NetWare networks
NetBIOS (Network Basic Input/Output
System)
A link to programs that use the NetBIOS interface
Chapter 3
Microsoft-Supported Protocols (continued)Microsoft-Supported Protocols (continued)
Protocol Function
NetBEUI (NetBIOS Extended User Interface) Software drivers for a data transport protocol used on
small Microsoft-based networks
DLC (Data Link Control protocol) Software drivers for communications with IBM
mainframe and minicomputers and with specific
peripherals such as some types of printers
AppleTalk Software drivers for communications with Apple
Macintosh computers
Chapter 3
TCP/IPTCP/IP
Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) portion performs extensive error portion performs extensive error checking to ensure that data is checking to ensure that data is delivered successfullydelivered successfully
Internet Protocol (IP) portion consists of Internet Protocol (IP) portion consists of rules for packaging data and ensuring rules for packaging data and ensuring that it reaches the correct destination that it reaches the correct destination addressaddress
Chapter 3
Dotted Decimal NotationDotted Decimal Notation
Dotted Decimal NotationDotted Decimal Notation: An addressing technique that uses four octets, such as 100000110.11011110.1100101.00000101, converted to decimal (e.g., 134.22.101.005), to differentiate individual servers, workstations, and other network devices.
Chapter 3
Unicasting and MulticastingUnicasting and Multicasting
In a unicast, a transmission is sent to In a unicast, a transmission is sent to each client that requests a file or each client that requests a file or application, such as a multimedia application, such as a multimedia presentationpresentation
In a multicast, a transmission is sent to In a multicast, a transmission is sent to all requesting clients as a group all requesting clients as a group (reducing the total network traffic) (reducing the total network traffic)
Chapter 3
Unicasting and Multicasting Compared
Unicasting and Multicasting Compared
M ultimedia server
Unicasting to five clients
Five separatetransm issionsto reach fiv eseparateworkstations
M ultimedia server
M ulticasting to reach fiveclients as a group
Receiving group
Onetram sm issionto thereceiv inggroup(s) only
Figure 3-6 Unicasting compared to multicastingFigure 3-6 Unicasting compared to multicasting
Chapter 3
Subnet MaskSubnet Mask
Subnet mask: A designated portion of Subnet mask: A designated portion of an IP address that is used to indicate an IP address that is used to indicate the class of addressing on a network the class of addressing on a network and to divide a network into and to divide a network into subnetworks as a way to control traffic subnetworks as a way to control traffic and enforce securityand enforce security
Chapter 3
Configuring the IP Address and Subnet Mask in Windows 2000Configuring the IP Address and Subnet Mask in Windows 2000
Figure 3-7 IP address and subnet mask setupFigure 3-7 IP address and subnet mask setup
Chapter 3
Static and Dynamic AddressingStatic and Dynamic Addressing
Dynamic addressing: Involves Dynamic addressing: Involves automatically assigning an IP address automatically assigning an IP address to a network hostto a network host
Static addressing: Involves manually Static addressing: Involves manually assigning an IP address to a network assigning an IP address to a network hosthost
Chapter 3
TCP/IP AdvantagesTCP/IP Advantages
Well-suited for medium and large networksWell-suited for medium and large networks Designed for routing; has high degree of Designed for routing; has high degree of
reliabilityreliability Used worldwide for directly connecting to the Used worldwide for directly connecting to the
Internet and by Web serversInternet and by Web servers Enables lower TCO on Microsoft networksEnables lower TCO on Microsoft networks
Chapter 3
TCP/IP AdvantagesTCP/IP Advantages
Compatible with standard tools for analyzing Compatible with standard tools for analyzing network performancenetwork performance
Parallel ability to use DHCP and WINS Parallel ability to use DHCP and WINS through a Windows 2000 serverthrough a Windows 2000 server
Ability for diverse networks and operating Ability for diverse networks and operating systems to communicatesystems to communicate
Compatible with Microsoft Windows SocketsCompatible with Microsoft Windows Sockets
Chapter 3
TCP/IP DisadvantagesTCP/IP Disadvantages
More difficult to set up and maintain More difficult to set up and maintain than other protocolsthan other protocols
Somewhat slower than IPX/SPX and Somewhat slower than IPX/SPX and NetBEUI on networks with light to NetBEUI on networks with light to medium trafficmedium traffic
Chapter 3
Routing via TCP/IPRouting via TCP/IP
Ethernet
Ethernet
Ethernet
Ethernet
Ethernet
TCP/IP-basedintranet server
Transmittedframe
Frameforwardedto the rightnetwork bythe router
F ramereaches thedesignatedworkstation
Router
Figure 3-8Figure 3-8Router forwardingRouter forwarding
packets to a packets to a designated networkdesignated network
Chapter 3
Planning TipPlanning Tip
For medium and large sized networks, For medium and large sized networks, plan to use TCP/IP because it enables plan to use TCP/IP because it enables you to manage and secure network you to manage and secure network traffic through creating subnetstraffic through creating subnets
Chapter 3
Protocols and Applications in the TCP/IP Suite
Protocols and Applications in the TCP/IP Suite
Protocol or Application Function
TCP A connection-oriented protocol that is used with IP
for reliable end-to-end communications
UDP Used with IP as an alternative to TCP in situations
requiring low overhead and in which connectionless
communications are appropriate
IP Used with TCP or UP, a connectionless protocol
that handles addressing and routing
Telnet Provides terminal emulation
File Transfer Protocol (FTP) Used to transfer files
Chapter 3
Protocols and Applications in the TCP/IP Suite (continued)
Protocols and Applications in the TCP/IP Suite (continued)
Protocol or Application Function
Simple Mail Transfer Protocol (SMTP) Provides electronic mail services
Domain Name Service (DNS) Resolves computer names to IP addresses and IP
addresses to computer names
Address Resolution Protocol (ARP) Enables the sending node to determine the MAC or
physical address of another node
Simple Network Management Protocol
(SNMP)
Enables computers and network devices to gather
network performance information so that a network
administrator can analyze performance and locate
problem areas
Chapter 3
Protocols and Applications in the TCP/IP Suite (continued)
Protocols and Applications in the TCP/IP Suite (continued)
Protocol or Application Function
Internet Group Management Protocol
(IGMP)
Enables multicast packets to reach their recipients, and
routers to determine which workstations belong to a
multicast group
Internet Control Message Protocol
(ICMP)
Used for network error reporting, particularly via routing
devices
Routing Information Protocol (RIP) Used by routing devices to communicate the contents of
routing tables with one another
Chapter 3
Protocols and Applications in the TCP/IP Suite (continued)
Protocols and Applications in the TCP/IP Suite (continued)
Protocol or Application Function
Open Shortest Path First (OSPF) Used by routing devices to share routing table
information and to evaluate network paths to match a
type of transmission to the appropriate path
Hypertext Transfer Protocol (HTTP) Used to transport HTML documents over the Internet or
via an intranet
Chapter 3
Protocols and Applications in the TCP/IP Suite (continued)
Protocols and Applications in the TCP/IP Suite (continued)
Protocol or Application Function
Resource Reservation Protocol (RSVP) Used to enable a network application to reserve the
resources it needs such as bandwidth, service class, and
priority
Quality of Service (QoS) Provides mechanisms to measure and allocate network
resources on the basis of transmission speed, quality,
priority, and reliability
Chapter 3
IPX/SPXIPX/SPX
IPX: A protocol developed by Novell for IPX: A protocol developed by Novell for use with its NetWare server operating use with its NetWare server operating system (particularly for NetWare versions system (particularly for NetWare versions before version 5)before version 5)
SPX: A Novell connection-oriented SPX: A Novell connection-oriented protocol used for network transport when protocol used for network transport when there is a particular need for data there is a particular need for data reliabilityreliability
Chapter 3
NWLinkNWLink
A network protocol that simulates the A network protocol that simulates the IPX/SPX protocol for Microsoft Windows IPX/SPX protocol for Microsoft Windows 95, 98, NT, and 2000 communications 95, 98, NT, and 2000 communications with Novell NetWare file servers and with Novell NetWare file servers and compatible devicescompatible devices
Chapter 3
Client Service for NetWare (CSNW) Components
Client Service for NetWare (CSNW) Components
Client Service for NetWareClient Service for NetWare NWLink IPX/SPXNWLink IPX/SPX NWLink NetBIOSNWLink NetBIOS
Chapter 3
CSNW Installed in Windows 2000
CSNW Installed in Windows 2000
Figure 3-9 Windows 2000 with CSNW components installedFigure 3-9 Windows 2000 with CSNW components installed
Chapter 3
Configuring NWLinkConfiguring NWLink
Configure three elements:Configure three elements: Frame typeFrame type Network numberNetwork number Internal network numberInternal network number
Chapter 3
When to Configure the Internal Network NumberWhen to Configure the
Internal Network Number
When the NetWare server that is When the NetWare server that is accessed uses two or more frame typesaccessed uses two or more frame types
When the Windows 2000 host has two When the Windows 2000 host has two or more NICs and NWLink is bound to or more NICs and NWLink is bound to more than one of the NICsmore than one of the NICs
When an application uses NetWare’s When an application uses NetWare’s Service Advertising Protocol (SAP)Service Advertising Protocol (SAP)
Chapter 3
When to Use NWLinkWhen to Use NWLink
To enable a computer running Windows To enable a computer running Windows 2000 to access a NetWare server (pre-2000 to access a NetWare server (pre-version 5)version 5)
To set up Windows 2000 as a gateway To set up Windows 2000 as a gateway to a NetWare serverto a NetWare server
To enable NetWare clients to access a To enable NetWare clients to access a Windows 2000 serverWindows 2000 server
Chapter 3
Planning TipPlanning Tip
If you upgrade NetWare servers to If you upgrade NetWare servers to version 5.x or higher, convert from version 5.x or higher, convert from IPX/SPX to TCP/IP for better network IPX/SPX to TCP/IP for better network communication options and better communication options and better compatibility with Windows 2000 compatibility with Windows 2000 serversservers
Chapter 3
NetBIOSNetBIOS
A combination software interface and A combination software interface and network naming conventionnetwork naming convention
Available in Windows 2000 through the Available in Windows 2000 through the files Netbt.sys, NetBIOS.sys, and files Netbt.sys, NetBIOS.sys, and NetBIOS.dllNetBIOS.dll
Chapter 3
NetBEUINetBEUI
NetBIOS Extended User Interface (NetBEUI): NetBIOS Extended User Interface (NetBEUI): A non-routable communications protocol A non-routable communications protocol native to early Microsoft network native to early Microsoft network communications communications
Chapter 3
NetBEUI and NetBIOS Communication
NetBEUI and NetBIOS Communication
Started NetB IO S-compatib le application
NetBIO S softwareinterface
NetBEUI protoco l
Sent onto the network
(T ransport driver)
Figure 3-10Figure 3-10NetBIOS/NetBEUINetBIOS/NetBEUI
communicationcommunication
Chapter 3
Planning TipPlanning Tip
When you upgrade from Windows NT Server When you upgrade from Windows NT Server to Windows 2000 Server, plan to retire to Windows 2000 Server, plan to retire NetBEUI implementations (if possible) and NetBEUI implementations (if possible) and convert upgraded servers and clients to convert upgraded servers and clients to TCP/IP for more functionalityTCP/IP for more functionality
Chapter 3
When to Use NetBEUIWhen to Use NetBEUI
For temporary backward compatibility when For temporary backward compatibility when converting from Windows NT Server to converting from Windows NT Server to Windows 2000 ServerWindows 2000 Server
For small networks that do not have Internet For small networks that do not have Internet access, that do not use the Active Directory, access, that do not use the Active Directory, that do not use routing, and that require only that do not use routing, and that require only a basic installationa basic installation
For backward compatibility with particular For backward compatibility with particular applicationsapplications
Chapter 3
DLCDLC
Data Link Control (DLC) protocol: Data Link Control (DLC) protocol: Enables communication with older IBM Enables communication with older IBM mainframes and minicomputers, and mainframes and minicomputers, and with some older HP print server cardswith some older HP print server cards
Chapter 3
When to Use DLCWhen to Use DLC
To connect to IBM and other computers To connect to IBM and other computers that use Systems Network Architecture that use Systems Network Architecture (SNA) communications(SNA) communications
To connect to older peripheral devices, To connect to older peripheral devices, such as printers that use DLCsuch as printers that use DLC
Chapter 3
AppleTalkAppleTalk
AppleTalk: A peer-to-peer protocol used AppleTalk: A peer-to-peer protocol used in network communication between in network communication between Macintosh computersMacintosh computers
Windows 2000 Server Services for Windows 2000 Server Services for Macintosh include:Macintosh include: File Server for Macintosh (MacFile)File Server for Macintosh (MacFile) Print Server for Macintosh (MacPrint)Print Server for Macintosh (MacPrint) AppleTalk protocolAppleTalk protocol
Chapter 3
When to Use AppleTalkWhen to Use AppleTalk
Use AppleTalk to enable Macintosh Use AppleTalk to enable Macintosh clients to connect to Windows 2000 clients to connect to Windows 2000 ServerServer
Chapter 3
Binding OrderBinding Order
Windows NT and Windows 2000 enable Windows NT and Windows 2000 enable you to set a binding order which you to set a binding order which establishes the protocol that will be tried establishes the protocol that will be tried first in a network communication (or a first in a network communication (or a communication with a network printer)communication with a network printer)
Chapter 3
Troubleshooting TipTroubleshooting Tip
If network performance is slow and your If network performance is slow and your network uses a combination of network uses a combination of protocols, tune the binding order on protocols, tune the binding order on Windows NT and Windows 2000 clients Windows NT and Windows 2000 clients which can be an inexpensive way to which can be an inexpensive way to immediately relieve network congestionimmediately relieve network congestion
Chapter 3
Network Planning ConsiderationsNetwork Planning Considerations
Size and purpose of the organizationSize and purpose of the organization Potential growthPotential growth Proportion of mission-critical applicationsProportion of mission-critical applications Role of the network to the mission of the Role of the network to the mission of the
organizationorganization Security needsSecurity needs BudgetBudget Internet and intranet requirementsInternet and intranet requirements Interconnectivity requirementsInterconnectivity requirements
Chapter 3
Planning TipPlanning Tip
Begin network planning by Begin network planning by understanding: understanding: User needsUser needs Important business processesImportant business processes Current resourcesCurrent resources Potential growthPotential growth
Chapter 3
Considerations in Selecting the Right Protocol(s)
Considerations in Selecting the Right Protocol(s)
Routing needsRouting needs Size of the network in terms of connectionsSize of the network in terms of connections Presence of Windows 2000 serversPresence of Windows 2000 servers Presence of mainframes and other computers Presence of mainframes and other computers
that use SNAthat use SNA Presence of NetWare serversPresence of NetWare servers Access to the Internet or intranetsAccess to the Internet or intranets Presence of mission-critical and multimedia Presence of mission-critical and multimedia
applicationsapplications
Chapter 3
Chapter SummaryChapter Summary
Protocols are the life blood of a network, Protocols are the life blood of a network, thus plan their use carefully.thus plan their use carefully.
The Microsoft NDIS driver enables The Microsoft NDIS driver enables using one or more protocols such as using one or more protocols such as TCP/IP, IPX/SPX, NetBEUI, DLC, and TCP/IP, IPX/SPX, NetBEUI, DLC, and AppleTalk. AppleTalk.
For modern networking TCP/IP For modern networking TCP/IP implementations are preferred.implementations are preferred.
Chapter 3
Chapter SummaryChapter Summary
Plan to use only the protocols Plan to use only the protocols necessary.necessary.
Tune network binding order in Windows Tune network binding order in Windows NT and Windows 2000 operating NT and Windows 2000 operating systems to enhance network systems to enhance network performance.performance.