Differentiating Among Protocols


You might find yourself working with a number of protocols in today's networked environments. The primary function of these protocols is to facilitate communication between network devices. This section reviews the main characteristics of the most widely used protocols.

Connectionless and Connection-oriented Protocols

Before getting into the characteristics of the various network protocols and protocol suites, it's important to first identify the difference between connection-oriented and connectionless protocols.

In a connection-oriented communication, there is guaranteed delivery of the data. Any packet that is not received by the destination system is resent by the sending device. Communication between the sending and receiving devices continues until the transmission has been verified. Because of this, connection-oriented protocols have a higher overhead and place greater demands on bandwidth.

Connection-oriented protocols such as TCP (Transmission Control Protocol) are capable of accommodating lost or dropped packets by asking the sending device to retransmit them. They are capable of doing this because they wait for all the packets in an entire message to be received before considering the transmission complete. On the sending end, connection-oriented protocols also assume that a lack of acknowledgment is sufficient reason to retransmit.


In contrast to connection-oriented communication, connectionless protocols offer only a best-effort delivery mechanism. Basically, the information is sentthere is no confirmation that the data has been received. If there is an error in the transmission, there is no mechanism to resend the data, so transmissions made with connectionless protocols are not guaranteed. Connectionless communication requires far less overhead than connection-oriented communication, so it is popular in applications such as streaming audio and video where a small number of dropped packets might not represent a significant problem.

As you work through the various protocols, keep an eye out for the protocols that are connectionless and those that are connection-oriented.


Internetwork Packet Exchange/Sequenced Packet Exchange

Like TCP/IP and AppleTalk that are also discussed in this chapter, IPX/SPX is not a single protocol but rather a protocol suite. IPX/SPX was created by Novell for use on Novell networks. When Novell had a larger presence in the network arena, so too did the IPX/SPX protocol suite. Today, the popularity of IPX/SPX has yielded to TCP/IP although it is still used in some network environmentsenough at least to include it in the CompTIA exam objectives. TCP/IP's suitability for large multisite networks and its general acceptance has now even led Novell to adopt TCP/IP as the protocol of choice. Table 4.3 shows some of the protocols that comprise the IPX/SPX suite and their functions.

Table 4.3. IPX/SPX Protocols and Their Functions

Protocol

Function

Related OSI Layer(s)

Internetwork Packet Exchange (IPX)

A connectionless transport protocol that is primarily responsible for logical network addressing, route selections, and connection services.

Network, Transport

NetWare Link State Protocol (NLSP)

NLSP uses a link-state route discovery method to build routing tables.

Network

NetWare Core Protocol (NCP)

NCP is a connection-oriented protocol that provides the connection between clients and services.

Application, Presentation, Session

Routing Information Protocol (RIP)

Similar to the routing protocol used with TCP/IP, RIP is responsible for the routing of packets on an IPX/SPX network.

Network

Service Advertising Protocol (SAP)

SAP allows systems providing services to the network, such as file and print services, to announce their services and addresses to the network.

Application, Presentation, Session

Sequenced Packet Exchange (SPX)

SPX is a connection-based protocol used when guaranteed message delivery is required on the network.

Transport


IPX Addressing

An example of an IPX address is 0BAD33CE:0003FE7C06EC. The 0BAD33CE portion represents the IPX address for the network, which is also sometimes referred to as the network number. The part 0003FE7C06EC is the MAC address of the node, which is used for the second part of the address. The node MAC address is derived directly from the MAC address burned on to each network card, but in IPX addressing, it is expressed without the colons (:). In addition to this format, IPX addresses can also be written with each group of four hexadecimal characters separated by colonsfor example, 0000:0007:003C:7F53:04CF. In some cases, any leading 0s on the network address portion are dropped. For example, 00000007 can be expressed simply as 7. The address would then be 7:003C:7F53:04CF.

Because IPX addresses are expressed in hexadecimal, they can only contain the letters A through F and the numbers 0 through 9. There can be a maximum of 8 characters in the segment portion and 12 characters in the MAC address portion. You should be prepared to identify how IPX addressing works for the Network+ exam.


IPX Interoperability

As you might expect, the IPX/SPX protocol suite is fully supported by Novell NetWare, but it can also be used in a Microsoft Windows environment. Microsoft includes its own version of the IPX/SPX protocol, NWLink, which provides this interoperability. Using the NWLink protocol and the Microsoft Client for NetWare, Windows systems can connect to a NetWare server using IPX/SPX.

Because of the prevalence of TCP/IP, interoperability with the IPX/SPX protocol has become less important. For some time now, TCP/IP has been used as the default protocol on Novell networks. As far as Linux is concerned, there is a way to use the IPX/SPX protocol on a Linux system, but TCP/IP is the protocol of choice there too.

IPX/SPX Naming

Unlike TCP/IP, which is discussed later, there are few issues with IPX/SPX naming because servers are normally the only parts of a network that are assigned names. These names, which are sometimes referred to as addresses, can be up to 47 characters (in current versions of NetWare). Workstations do not need such names and instead just use IPX addresses.

NetBEUI Protocol

NetBEUI was once a popular protocol for smaller networks. It is fast and easy to configure but has one significant drawback in that it is not routable. This one fact limits NetBEUI to a single network segment far too restrictive for the majority of today's networking environments.

NetBEUI Addressing

In terms of addressing, NetBEUI is perhaps the simplest of all the protocols discussed here. For this reason, it is still sometimes used on very small simple networks such as those found in a home or on very small business networks. Computers on a NetBEUI network are identified by NetBIOS names. The NetBIOS name can be no longer than 15 characters and must be unique to the network. Using the 15 characters, you can assign the computers descriptive names such as workstation, student1, or secretary2.

Interoperability with NetBEUI

The discussion on interoperability with NetBEUI is a short one; it is used on Windows platforms exclusively.


AppleTalk

AppleTalk is a protocol associated with Apple networks. The AppleTalk protocol is an established protocol, having been introduced in the early 1980s, and continued development toward the end of the 1980s enabled it to become a viable internet-working protocol.

Like the IPX/SPX and TCP/IP protocol suites, the AppleTalk protocol suite is composed of several protocols. Table 4.4 lists the protocols within the AppleTalk protocol suite and their functions.

Table 4.4. AppleTalk Protocols and Their Functions

Protocol

Function

OSI Layer

AppleShare

AppleShare provides application layer services, including file and print sharing.

Application (Layer 7)

AppleTalk Address Resolution Protocol (AARP)

AARP is used to map AppleTalk addresses to Ethernet and Token Ring physical addresses.

Network (Layer 3)

AppleTalk Data Stream Protocol (ADSP)

ADSP is a session layer protocol used to establish connections between network devices. It also functions at the transport layer and manages flow control.

Session (Layer 5)

AppleTalk Filing Protocol (AFP)

The AFP protocol manages file sharing for the network.

Presentation (Layer6)/ Application (Layer 7)

AppleTalk Session Protocol (ASP)

Similar to the ADSP protocol, ASP works at the session layer of the OSI model and establishes and releases connections between networked devices.

Session (Layer 5)

AppleTalk Transaction Protocol (ATP)

ATP establishes a connectionless session between networked systems. ATP functions at the transport layer.

Transport (Layer 4)

Datagram Delivery Protocol (DDP)

Performs datagram delivery and also handles routing functions.

Network (Layer 3)

EtherTalk Link Access Protocol (ELAP)

ELAP is a variation of the AppleTalk protocol that is compatible with the Ethernet protocol.

Data-Link (Layer 2)

Name Binding Protocol (NBP)

The NBP protocol is used to map computer hostnames to network layer addresses.

Transport (Layer 4)

Printer Access Protocol (PAP)

PAP is a session layer protocol used to provide printing services on an AppleTalk network.

Session (Layer 5)

Routing Table Maintenance Protocol (RTMP)

RTMP is the protocol on AppleTalk networks that maintains the routing tables for the network.

Transport (Layer 4)

TokenTalk Link Access Protocol (TLAP)

TLAP is a variation on the AppleTalk protocol that is compatible with the Token Ring protocol.

Data-Link (Layer 2)

Zone Information Protocol (ZIP)

ZIP is used to divide network devices into logical groups called zones.

Session (Layer 5)


Be prepared to identify the protocols found within the AppleTalk protocols suite for the Network+ exam.


The CompTIA objective for this topic cites AppleTalk over IP under the same heading as AppleTalk. In reality, AppleTalk over IP is just the use of the AppleTalk Filing Protocol (AFP) over a TCP/IP connection.


AppleTalk Addressing

Like the other protocols discussed, the AppleTalk protocol uses a two-part addressing schemea node and a network section. The node portion of the address is assigned automatically when the system is first brought up onto the network. It is a randomly generated number and then broadcast to the entire network. If a duplicate node address is assigned, another will be assigned and rebroadcast to the network. The network portion of the address is assigned by the network administrator.

The actual AppleTalk address is 24 bits long with 16 bits used for the network address and 8 bits for the node address. AppleTalk addresses are expressed in decimal format, with the network and node addresses separated by a period. An example of an AppleTalk address might be 4.67. The 4 represents the network number, and 67 is the node number.

When working with AppleTalk networks, you will work with zones. Zones are a method used to group devices and systems together into logical units. Zones are similar in function to workgroups on Windows systems, and make it easier for users and administrators alike to locate resources.


AppleTalk Interoperability

AppleTalk was designed for the purpose of being used on Apple networks and, as such, is not natively supported by most of the other major operating systems. Because of this, today, other protocols such as TCP/IP are a more common choice, even for Apple-based networks. In fact, Macintosh systems themselves support the use of TCP/IP. AppleTalk can be configured to work with other platforms, but, given the proliferation of TCP/IP, this is not widely done.

AppleTalk Routing

The earliest implementations of AppleTalk were not routable, but later versions were. Routing functionality for AppleTalk is provided by the RTMP protocol. RTMP provides similar functionality to the RIP protocol used with IPX/SPX and TCP/IP networks.

AppleTalk Naming

AppleTalk networks use logical hostnames, making systems readily recognizable on the network. The network address-to-hostname resolution is handled by the NBP protocol in the AppleTalk protocol suite. It performs a similar function to that provided by DNS on a TCP/IP network.

The TCP/IP Protocol Suite

Quite often, TCP/IP is referred to as a network protocol, although that's not entirely accurate. Like IPX/SPX and AppleTalk, TCP/IP is actually a protocol suite comprised of many separate protocolseach of which has its own purpose and function. Combined, they all provide the TCP/IP functionality. The following list contains some of the more well-known protocols found within the TCP/IP protocol suite:

  • Address Resolution Protocol (ARP)

  • File Transfer Protocol (FTP)

  • Internet Control Message Protocol (ICMP)

  • Internet Protocol (IP)

  • Reverse Address Resolution Protocol (RARP)

  • Simple Mail Transfer Protocol (SMTP)

  • Transmission Control Protocol (TCP)

This is just an introduction to the protocols found within the TCP/IP protocol suite. Chapter 5, "TCP/IP (Transmission Control Protocol/Internet Protocol)," as well as objectives 2.5 through 2.12, discuss TCP/IP in much more detail.

TCP/IP Standards

One of the strengths of the TCP/IP protocol suite is that it is not owned by any one party and is not licensed. This is in contrast to protocols such as AppleTalk and IPX/SPX, which are owned by Apple and Novell, respectively. Because of its non-proprietary nature, TCP/IP has an open development model with its standards published in documents known as Requests for Comments (RFCs). RFCs are maintained by the Internet Engineering Task Force (IETF). You can find RFCs pertaining to TCP/IP on IETF's website at www.ietf.org.

TCP/IP Addressing

Anyone who has worked with TCP/IP knows that TCP/IP addressing can be a complex topic. This section provides an overview of TCP/IP addressing to compare how other protocols handle addressing. However, Chapter 5 provides a detailed look at the TCP/IP protocol including addressing.

In the most commonly deployed version of TCP/IP, version 4, (IPv4) addresses are composed of four sets of 8 bits referred to as octets. These are expressed in numbers and separated by periods. An example of a TCP/IP address is 192.168.3.2. This format is often referred to as a 32-bit dotted decimal.

A single TCP/IP address represents both the IP address of an individual system and the network to which the system is attached. Determining which part of the IP address belongs to the network and which belongs to the node is the responsibility of the subnet mask. If part of the address refers to the network, it is assigned a binary value of 1 within the subnet mask. If it is the node address, it's assigned a binary value of 0 within the subnet mask.

For example, if you had a subnet mask of 255.255.255.0, the first two octets refer to the network and the second refer to the node address. So using the previous IP address as an example, the 192.168.3 portion of the address represents the network ID, and the .2 portion of the address represents the node ID. Table 4.5 shows default subnet masks and addressing examples.

Table 4.5. Determining Network and Node Addresses

Subnet Mask

IP Address

Network Address

Node Address

255.0.0.0

192.168.10.100

192

168.10.100

255.255.0.0

192.168.10.100

192.168

10.100

255.255.255.0

192.168.10.100

192.168.10

100


You can expect to have to identify the parts of an IP address for the exam.


As previously mentioned, more information on TCP/IP addressing is provided in Chapter 5.

TCP/IP Interoperability

Of all the protocols used on today's networks, TCP/IP is by far the most versatile and interoperable. All of the popular operating systems today not only support TCP/IP, but the vast majority also use it as the default protocol. This means that in any network environment, you can have Linux, Windows, and NetWare servers and clients all communicating using TCP/IP.

TCP/IP Naming

Systems on a TCP/IP network can be accessed from the network either by their IP address or by a hostname. Hostnames are the names assigned to the system to make them easier to remember. For instance, the secretary's computer might have the address of 192.168.4.23, but you can access it using its hostname of secretary1 or whatever name you assign it.

The name-resolution process from IP address to hostname is often performed dynamically through a Domain Name Server (DNS). It can also be done statically using a text file called 'Hosts,' which is stored on each system. More information on name resolution is provided in Chapter 5.

TCP/IP Routing

TCP/IP is a fully routable protocol, making it a natural choice for large networks and those that span multiple locations. As mentioned previously, TCP/IP is a protocol suite; there are two primary protocols within TCP/IP that provide the routing functionalityRouting Information Protocol (RIP) and Open Shortest Path First (OSPF).

Protocol Summary

To help you in your exam preparations, the most pertinent information from this section is listed in Table 4.6.

Table 4.6. Comparison of the Various Protocols Discussed in This Chapter

Protocol

Overview

Routable

Addressing

IPX/SPX

Used to be the default protocol for NetWare, but now TCP/IP is preferred. Still supported by Netware, Windows, and Linux. Simplest addressing scheme of routable protocols discussed here.

Yes

Uses the MAC address to identify the node, and an eight character (4-byte) hexadecimal address to identify the network.

NetBEUI

Used by Windows.

No

Uses NetBIOS names to identify systems on the network.

AppleTalk

Used by Macintosh withsome support on other platforms.

Yes

Uses a two-part addressing scheme. The first is a randomly generated number for the node address, and the second an administrator assigned number for the network address.

TCP/IP

Used by default with UNIX, Linux, NetWare and Windows systems. Also supported by Macintosh systems and practically every other computing platform. The most inter-operable of all protocols.

Yes

Uses four sets of 8 bits referred to as octets. A subnet mask is used to define what parts of the address refer to the network, and what parts refer to the node.




    Network+ Exam Cram 2
    Network+ Exam Cram 2
    ISBN: 078974905X
    EAN: N/A
    Year: 2003
    Pages: 194

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net