24
Sun Microsystems, Inc. UBRM05-104 500 Eldorado Blvd. Broomfield, CO 80021 U.S.A.     D   o    n   o   t    d   u   p    l    i   c   a   t   e    o   r    r   e   d    i   s   t   r    i    b   u   t   e    w    i   t    h   o   u   t    p   e   r   m    i   s   s    i   o   n    f   r   o   m     S   u   n     M    i   c   r   o   s   y   s   t   e   m   s ,     I   n   c  .  Revision A.1 WS-3990 Module 1: Self-Study Guide for Introducing the TCP/IP Model

Network Admin Solaris 9

  • Upload
    lou97

  • View
    220

  • Download
    0

Embed Size (px)

DESCRIPTION

Configuring the Network Interface Layer

Citation preview

Page 1: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 1/24

Sun Microsystems, Inc.UBRM05-104

500 Eldorado Blvd.Broomfield, CO 80021

U.S.A.

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

 Revision A.1

WS-3990

Module 1: Self-Study Guide for

Introducing the TCP/IP Model

Page 2: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 2/24

April 11, 2003 11:23 am

Page 3: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 3/24

 

Please

Recycle

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Copyright 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved.

This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, anddecompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of 

Sun and its licensors, if any.

Third-party software, including font technology, is copyrighted and licensed from Sun suppliers.

Sun, Sun Microsystems, the Sun logo, JumpStart, OpenBoot, Solaris, Solstice DiskSuite, Sun Blade, Sun BluePrints, Sun Enterprise, Sun Fire,Sun Quad FastEthernet, Sun StorEdge, Sun Trunking, and Ultra are trademarks or registered trademarks of Sun Microsystems, Inc. in theU.S. and other countries.

All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and

other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc.

UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd.

The OPEN LOOK and Sun Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledgesthe pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry.

Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees whoimplement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.

U.S. Government approval might be required when exporting the product.

RESTRICTED RIGHTS: Use, duplication, or disclosure by the U.S. Government is subject to restrictions of FAR 52.227-14(g)(2)(6/87) and

FAR 52.227-19(6/87), or DFAR 252.227-7015 (b)(6/95) and DFAR 227.7202-3(a).

DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS, ANDWARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ORNON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLYINVALID.

THIS MANUAL IS DESIGNED TO SUPPORT AN INSTRUCTOR-LED TRAINING(ILT) COURSE AND IS INTENDED TO BE USED FOR REFERENCE PURPOSES INCONJUNCTION WITH THE ILT COURSE. THE MANUAL IS NOT A STANDALONETRAINING TOOL. USE OF THE MANUAL FOR SELF-STUDY WITHOUT CLASS

ATTENDANCE IS NOT RECOMMENDED.Export Control Classification Number (ECCN) assigned: 12 December 2001

Page 4: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 4/24

 

Please

Recycle

 

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Copyright 2003 Sun Microsystems Inc., 4150 Network Circle, Santa Clara, California 95054, Etats-Unis. Tous droits réservés.

Ce produit ou document est protégé par un copyright et distribué avec des licences qui en restreignent l’utilisation, la copie, la distribution,et la décompilation. Aucune partie de ce produit ou document ne peut être reproduite sous aucune forme, par quelque moyen que ce soit,

sans l’autorisation préalable et écrite de Sun et de ses bailleurs de licence, s’il y en a.

Le logiciel détenu par des tiers, et qui comprend la technologie relative aux polices de caractères, est protégé par un copyright et licenciépar des fournisseurs de Sun.

Sun, Sun Microsystems, the Sun logo, JumpStart, OpenBoot, Solaris, Solstice DiskSuite, Sun Blade, Sun BluePrints, Sun Enterprise, Sun Fire,Sun Quad FastEthernet, Sun StorEdge, Sun Trunking, et Ultra sont des marques de fabrique ou des marques déposées de SunMicrosystems, Inc. aux Etats-Unis et dans d’autres pays.

Toutes les marques SPARC sont utilisées sous licence sont des marques de fabrique ou des marques déposées de SPARC International, Inc.aux Etats-Unis et dans d’autres pays. Les produits portant les marques SPARC sont basés sur une architecture développée par SunMicrosystems, Inc.

UNIX est une marques déposée aux Etats-Unis et dans d’autres pays et licenciée exclusivement par X/Open Company, Ltd.

L’interfaces d’utilisation graphique OPEN LOOK et Sun™ a été développée par Sun Microsystems, Inc. pour ses utilisateurs et licenciés.Sun reconnaît les efforts de pionniers de Xerox pour larecherche et le développement du concept des interfaces d’utilisation visuelle ougraphique pour l’industrie de l’informatique. Sun détient une licence non exclusive de Xerox sur l’interface d’utilisation graphique Xerox,cette licence couvrant également les licenciés de Sun qui mettent en place l’interface d’utilisation graphique OPEN LOOK et qui en outre

se conforment aux licences écrites de Sun.

L’accord du gouvernement américain est requis avant l’exportation du produit.

LA DOCUMENTATION EST FOURNIE “EN L’ETAT” ET TOUTES AUTRESCONDITIONS, DECLARATIONS ET GARANTIES EXPRESSES OU TACITES SONTFORMELLEMENT EXCLUES, DANS LA MESURE AUTORISEE PAR LA LOIAPPLICABLE, Y COMPRIS NOTAMMENT TOUTE GARANTIE IMPLICITE RELATIVEA LA QUALITE MARCHANDE, A L’APTITUDE A UNE UTILISATION PARTICULIEREOU A L’ABSENCE DE CONTREFAÇON.

Page 5: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 5/24

 

1-1Copyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Module 1: Introducing the TCP/IP Model

Objectives

This module describes the fundamentals of the Transmission ControlProtocol/Internet Protocol (TCP/IP) model, including network protocolsand concepts. This module also describes the layers of the TCP/IP model,including the Network Interface, Internet, Transport, and Applicationlayers. This module also describes basic peer-to-peer communication andsome common TCP/IP protocols.

Upon completion of this module, you should be able to:

● Describe network model fundamentals

● Describe the layers of the TCP/IP model

● Describe basic peer-to-peer communication and related protocols

The following course map shows how this module fits into the currentinstructional goal.

Figure 1-1 Course Map

Introducing the

TCP/IP

Model

Introducing

LANs and

Their Components

Describing

Ethernet

Interfaces

Describing

 ARP and

RARP

Configuring the Network Interface Layer 

Page 6: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 6/24

Introducing Network Model Fundamentals

 

1-2 Self-Study Guide for Introducing the TCP/IP ModelCopyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Introducing Network Model Fundamentals

The fundamentals required to understand computer networking are thenetwork model, the functions of the layers, and the protocols that governdata transfer between two or more systems.

Network Protocols

Computer networks use protocols to communicate. Protocols define theprocedures to be followed by the systems involved in the communicationprocess. A data communication protocol is a set of rules that must befollowed for two electronic devices to communicate with each other.These rules describe:

● Syntax – Data format and coding

● Semantics – Control information and error handling

● Timing – Speed matching and sequencing

Functions of Protocols

A protocol defines how systems can communicate and facilitatescommunication between software, firmware, and other devices in datatransfer.

Each protocol provides a function essential for data communication. Eachsoftware module that implements a protocol can be developed andupdated independently of other modules, as long as the interface betweenthe modules remains constant.

Many protocols provide and support data communication. Manyprotocols are used so that communication can be broken into smaller,manageable processes. They form a communication architecture, alsoknown as a protocol stack. The TCP/IP model is a protocol stack used bythe Solaris™ Operating Environment (Solaris OE) for datacommunication.

Page 7: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 7/24

Introducing Network Model Fundamentals

 

Introducing the TCP/IP Model 1-3Copyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1  

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

The features of a protocol stack are:

● Each layer has a specific purpose and exists on both the sourceand destination hosts.

● Each layer communicates with a peer layer on another host in a

given process of communication.● Each layer on a host acts independently of other layers on the

same machine but is synchronous with the same layer on otherhosts.

Network Model Concepts

A networking model refers to a common structure that enablescommunication between two or more systems.

Networking models consist of layers. You can think of layers as a series ofsteps or functions that must be sequentially completed for communicationto occur between two systems.

The following mapping helps you better understand the network model:

● Model = structure

● Layer = functions

● Protocol = rules

Advantages of Using a Layered Model

Some of the advantages of a layered model are that it:

● Divides the complexity of networking into many functions or layers

● Enables you to introduce changes or new features in one layerwithout having to change the other layers

● Provides a standard to follow, allowing inter-operability betweensoftware and hardware vendors

● Simplifies troubleshooting

Page 8: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 8/24

Introducing the Layers of the TCP/IP Model

 

1-4 Self-Study Guide for Introducing the TCP/IP ModelCopyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Introducing the Layers of the TCP/IP Model

Table 1-1 shows that the TCP/IP model is a four-layered structure restingon a common hardware platform. The TCP/IP model was developed bythe Department of Defense (DOD) in 1979. It has standards that aredefined and described in Request for Comment (RFC) documents.

RFCs are a frame of reference for describing the protocol architecture andfunctions specific to the TCP/IP protocol stack. For a complete listing ofRFCs, visit http://www.ietf.org/rfc.html.

Table 1-1 TCP/IP Network Model

TCP/IP Layer Description

Application ● Consists of user-accessed application programsand network services

● Defines how cooperating networks representdata

Transport   ● Manages the transfer of data by usingacknowledged and unacknowledged transportprotocols

● Manages the connections between cooperatingapplications

Internet   ● Manages data addressing and delivery betweennetworks

● Fragments data for the Network Interface layer

NetworkInterface

● Manages the delivery of data across the physicalnetwork

● Provides error detection and packet framing

Page 9: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 9/24

Introducing the Layers of the TCP/IP Model

 

Introducing the TCP/IP Model 1-5Copyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1  

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Network Interface 

Layer

Figure 1-2 shows the Network Interface layer. The primary functions ofthis layer are:

Managing the delivery of data across the physical network● Detecting errors

● Framing packets

Figure 1-2 TCP/IP Network Interface Layer

The Network Interface layer services the Internet layer by providingcommunication between nodes on the same network. This layer defineshow bits are assembled into manageable units of data. A packet data unit(PDU) is a series of bits with a well-defined beginning and a well-definedend. Figure 1-3 shows a specific type of PDU known as an Ethernet frame,where the bits are divided into fields containing information labels, suchas preamble, destination and source hardware address, frame length ortype, data, and cyclic redundancy check (CRC).

Figure 1-3 Structure of a Frame

Hardware Layer 

TCP/IP Layers

 Application Layer 

Transport Layer 

Internet Layer 

Network Interface Layer Packet

data unit

Preamble  Destination

 Address

Source

 Address   CRCDataType

Page 10: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 10/24

Introducing the Layers of the TCP/IP Model

 

1-6 Self-Study Guide for Introducing the TCP/IP ModelCopyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Examples of Network Interface layer protocols are:

● Institute of Electrical and Electronics Engineers (IEEE) 802.3 –Ethernet standards

● IEEE 802.4 – Token bus standards

● IEEE 802.5 – Token ring standards

Internet Layer

The Internet layer attempts to ensure that messages reach theirdestination system using the most efficient route. Figure 1-4 shows thelocation of this layer. The primary functions of the Internet layer are:

● Fragmenting and reassembly of data

Routing data

Figure 1-4 TCP/IP Internet Layer

Using a routing table, the Internet layer determines the next directlyaccessible node in route to the packet’s destination. This node is either the

destination itself or the most immediate gateway to the destination. TheInternet layer uses the Internet Protocol (IP) and Internet Control MessageProtocol (ICMP). The IP is responsible for fragmenting and routing data,while ICMP assists routing, and performs error detection and othernetwork management tasks. IP encapsulates data into datagrams, whichin turn are encapsulated inside Network Interface layer PDUs.

Hardware Layer 

TCP/IP Layers

 Application Layer 

Transport Layer 

Internet Layer 

Network Interface Layer 

Datagram

Page 11: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 11/24

Introducing the Layers of the TCP/IP Model

 

Introducing the TCP/IP Model 1-7Copyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1  

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Transport Layer

The Transport layer manages the transfer of application data betweencommunication hosts. It also controls the flow of data and defines thetransport quality of the data transmission. Figure 1-5 shows the location of

the Transport layer.

Figure 1-5 TCP/IP Transport Layer

The mechanisms used by the Transport layer to determine whether data

has been correctly delivered are:● Acknowledgement responses

● Sequencing

● Flow control

The Transport layer facilitates end-to-end data transfer. It supportsmultiple operations simultaneously. The layer is implemented by twoprotocols: the Transmission Control Protocol (TCP) and the UserDatagram Protocol (UDP). TCP uses packets called segments, while UDPuses packets called datagrams. Both TCP and UDP are encapsulated

inside Internet layer datagrams for transmission to the next node.

Hardware Layer 

TCP/IP Layers

 Application Layer 

Transport Layer 

Internet Layer 

Network Interface Layer 

Segment

or 

datagram

Page 12: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 12/24

Introducing the Layers of the TCP/IP Model

 

1-8 Self-Study Guide for Introducing the TCP/IP ModelCopyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

The Transport layer facilitates two types of communication:

● Connection-oriented (TCP) – A connection must be established at theTransport layer of both systems before the application can transmitany data.

Connectionless (UDP) – All systems do not need to establish aconnection with the recipient prior to data exchange.

TCP is a more reliable form of data exchange than UDP.

Application Layer

The top layer of TCP/IP is the Application layer. Figure 1-6 shows thelocation of this layer.

Figure 1-6 TCP/IP Application Layer

The Application layer includes all the processes that use Transport layerprotocols to deliver data to the Internet layer. There are many applicationprotocols, and new protocols are frequently added.

Some common TCP/IP applications include:

● Telnet Protocol

● File Transfer Protocol (FTP)

● Simple Network Management Protocol (SNMP)

● Simple Mail Transfer Protocol (SMTP)

Stream

or 

message

Hardware Layer 

TCP/IP Layers

Application Layer 

Transport Layer 

Internet Layer 

Network Interface Layer 

Page 13: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 13/24

Introducing the Layers of the TCP/IP Model

 

Introducing the TCP/IP Model 1-9Copyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1  

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

● Dynamic Host Configuration Protocol (DHCP)

● Domain Name System (DNS)

● Network Information Service (NIS)

● Network File System (NFS)

● Secure shell (SSH)

● Secure copy (SCP)

The Application layer handles the details of the particular application.The primary functions of this layer are:

● Formatting data – Data is formatted based on a computer’sarchitecture. For example, text formatting is done in AmericanStandard Code for Information Interchange (ASCII) on a UNIX® host, and Extended Binary Coded Decimal Interchange Code

(EBCDIC) on an IBM mainframe computer. Protocols operating atthis layer of the model encapsulate packets into streams or messages.

● Presenting data – If end users specify how they want their datapresented to them, the Application layer makes sure that it reachesthe end users in this format. A common syntax ensures compatibility between various end-user applications and machines. TheApplication layer also provides translations between locallyrepresented data and data used for transfer between end systems.

● Transporting data – The Application layer stipulates a transfersyntax, which represents a coding agreement for the data to be

formatted and transferred. remote procedure call (RPC) librariesallow high-level language programs to make procedure decisions onother machines on the network to organize the flow of data.Protocols, such as NIS and NFS, use RPC for session management between clients and servers.

Page 14: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 14/24

Describing Basic Peer-to-Peer Communication and Related Protocols

 

1-10 Self-Study Guide for Introducing the TCP/IP ModelCopyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Describing Basic Peer-to-Peer Communication andRelated Protocols

In the TCP/IP model, peer-to-peer communication occurs when one layer

of a system communicates with a corresponding layer of another system.

Peer-to-Peer Communication

Each layer on the sender encapsulates the data and adds headerinformation about the corresponding protocol layer. The headerinformation helps the receiving host decapsulate the data and direct themessage to the appropriate application. Figure 1-7 shows how header (H)and trailer (T) information is added or removed as the PDUs traverse eachlayer.

Figure 1-7 Peer-to-Peer Communication

Source System

 Application X

Destination System

 Application Y

 Application

Layer 

Transport Layer 

Internet Layer 

NetworkInterface Layer 

Hardware Layer 

Communication Path

Physical 

Transmission 

Medium

 Application

Layer 

Transport Layer 

Internet Layer 

NetworkInterface Layer 

Hardware Layer 

Frame

Signal

Message or Stream

Segment or 

Datagram

Datagram

Frame

Encapsulation   Decapsulation

Message or Stream

Segment or 

Datagram

Datagram

NH NTI-PDU

IH T-PDU

TH

User  

Data

A-PDU

NH NTI-PDU

IH T-PDU

TH

User  

Data

A-PDU

Page 15: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 15/24

Describing Basic Peer-to-Peer Communication and Related Protocols

 

Introducing the TCP/IP Model 1-11Copyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1  

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Data encapsulation occurs when:

● Data travels down through layers at the source system’s end

● Headers and trailers are added before the data is passed down to thenext successive layer

Data decapsulation occurs when:

● Data travels up through layers at the destination system’s end

● Headers and trailers are removed before the data is passed up to thenext layer

TCP/IP Protocols

The following tables briefly describe the common TCP/IP protocols.

Table 1-2 shows a list of the Network Interface layer protocols, theircorresponding RFCs, and a short description of each protocol.

Table 1-2 TCP/IP Network Interface Layer Protocols Descriptions

RFC Protocol Description

1055 SLIP Serial Line Internet Protocol compresses IP datagrams on seriallines.

1661 PPP Point-to-Point Protocol transmits datagrams over serialpoint-to-point links.

Page 16: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 16/24

Describing Basic Peer-to-Peer Communication and Related Protocols

 

1-12 Self-Study Guide for Introducing the TCP/IP ModelCopyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Table 1-3 shows a list of the Internet layer protocols, their correspondingRFCs, and a short description of each protocol.

Table 1-3 TCP/IP Internet Layer Protocol Descriptions

RFC Protocol Description

826 ARP Address Resolution Protocol defines the method that maps a 32-bitIP address to a 48-bit Ethernet address.

903 RARP Reverse Address Resolution Protocol defines the method used tomap a 48-bit Ethernet address to a 32-bit IP address.

791, 950,919, 922

IP Internet Protocol determines the path a datagram must take, basedon the destination host’s IP address.

792 ICMP Internet Control Message Protocol communicates error messagesand other controls within IP datagrams.

2401,2406,2402,2407,

2408

IPSec-relatedRFCs

• Internet Protocol Security Architecture

• Encapsulating Security Payload (ESP)

• IP authentication header

• Internet IP security domain of interpretation for the InternetSecurity Association and Key Management Protocol (ISAKMP)

• ISAKMP

Page 17: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 17/24

Describing Basic Peer-to-Peer Communication and Related Protocols

 

Introducing the TCP/IP Model 1-13Copyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1  

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Table 1-4 shows a list of the Transport layer protocols, their correspondingRFCs, and a short description of each protocol.

Table 1-5 shows a list of the Application layer protocols, theircorresponding RFCs, and a short description of each protocol.

Table 1-4 TCP/IP Transport Layer Protocol Descriptions

RFC Protocol Description

793 TCP Transmission Control Protocol is aconnection-oriented protocol thatprovides the full-duplex, stream serviceon which many application protocolsdepend.

768 UDP User Datagram Protocol is aconnectionless protocol that providesnon-acknowledged datagrams deliveredover reliable networks.

Table 1-5 TCP/IP Application Layer Protocol Descriptions

RFC Protocol Description

1034, 1035 DNS Domain Name System is a text-based,distributed IP address database. Domainnames index a hierarchical tree of names

and ultimately identify hosts anddomains.

959 FTP File Transfer Protocol transfers a file bycopying a complete file from one systemto another system.

854, 855 Telnet Telnet enables terminals andterminal-oriented processes tocommunicate on a network by usingTCP/IP.

1258, 1280 Remote login The rlogin utility enables users to log into remote server locations anywhere onthe Internet.

2131 DHCP Dynamic Host Configuration Protocol isresponsible for automatically assigning IPaddresses in an organization’s network.

Page 18: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 18/24

Describing Basic Peer-to-Peer Communication and Related Protocols

 

1-14 Self-Study Guide for Introducing the TCP/IP ModelCopyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

2821 SMTP Simple Mail Transfer Protocol transferselectronic mail (email) messages from one

machine to another.

1157 SNMP Simple Network Management Protocolenables remote system administrators tomonitor and control network devices.

1939 POP3 Post Office Protocol, version 3, enablesusers to access their email box across awide area network (WAN) or local areanetwork (LAN) from a POP3 server.

2060 IMAP4 Internet Message Access Protocol,

version 4, enables users to access theiremail box across the network from anIMAP4 server. IMAP4 is suited to mobileusers because the mail remains on theserver. IMAP4 is server-centric, whereasPOP3 is client-centric.

1945, 2068 HTTP Hypertext Transfer Protocol is used onthe World Wide Web to transfer text,pictures, audio, and other multimediainformation accessible through a web

 browser.None SSH Secure shell is based on an RFC draft by

T. Ylonen written November 15, 1995,expired May 15, 1996. SSH securely logsin to a system across a network.

None SCP Secure copy securely copies files betweensystems on a network.

Table 1-5 TCP/IP Application Layer Protocol Descriptions (Continued)

RFC Protocol Description

Page 19: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 19/24

Exercise: Reviewing the TCP/IP Model

 

Introducing the TCP/IP Model 1-15Copyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1  

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Exercise: Reviewing the TCP/IP Model

In this exercise, you review the TCP/IP model.

Tasks

Perform the following steps:

1. List the layers of the TCP/IP network model by their name andfunction.

Name:_______________________________________________________

Function: ____________________________________________________

Name:_______________________________________________________

Function: ____________________________________________________

Name:_______________________________________________________

Function: ____________________________________________________

Name:_______________________________________________________

Function: ____________________________________________________2. In your own words, define the term peer-to-peer.

_____________________________________________________________

_____________________________________________________________

3. In your own words, define the term protocol.

_____________________________________________________________

_____________________________________________________________

_____________________________________________________________

_____________________________________________________________

_____________________________________________________________

Page 20: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 20/24

Exercise: Reviewing the TCP/IP Model

 

1-16 Self-Study Guide for Introducing the TCP/IP ModelCopyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

4. Which of the following protocols are part of the TCP/IP suite?

a. ARP

 b. IP

c. TCIP

d. ICMP

5. Which of the following describes data encapsulation?

a. Data travels up through layers at the destination system’s end.

 b. Data travels down through layers at the source system’s end.

c. Headers and trailers are removed before the data is passed upto the next layer.

d. Headers and trailers are added before the data is passed downto the next successive layer.

Page 21: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 21/24

Exercise Summary

 

Introducing the TCP/IP Model 1-17Copyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1  

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Exercise Summary

?

!

  Discussion – Take a few minutes to discuss what experiences, issues, ordiscoveries you had during the lab exercise.

Manage the discussion based on the time allowed for this module, which was provided in the “About ThisCourse” module. If you do not have time to spend on discussion, highlight just the key concepts studentsshould have learned from the lab exercise.

● Experiences

Ask students what their overall experiences with this exercise have been. Go over any trouble spots orespecially confusing areas at this time.

● Interpretations

Ask students to interpret what they observed during any aspect of this exercise.

● Conclusions

Have students articulate any conclusions they reached as a result of this exercise experience.

● Applications

Explore with students how they might apply what they learned in this exercise to situations at their workplace.

Page 22: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 22/24

Exercise Solutions

 

1-18 Self-Study Guide for Introducing the TCP/IP ModelCopyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Exercise Solutions

1. List the layers of the TCP/IP network model by their name andfunction.

Name: ApplicationFunction: Consists of user-accessed application programs and networkservices. This layer is also responsible for defining the way in whichcooperating networks represent data.

Name: Transport

Function: Manages the transfer of data using connection-oriented andconnectionless transport protocols.

Name: Internet

Function: Manages data addressing and delivery between networks, as well

as fragmenting data for the Network Interface layer.

Name: Network Interface

Function: Manages the delivery of data across the physical network. Thislayer provides error detection and packet framing.

2. In your own words, define the term peer-to-peer.

Peer-to-peer communication is the ability of a specific layer to communicatewith a corresponding layer on another host.

3. In your own words, define the term protocol.

 A protocol is set of rules governing the exchange of data between twoentities. These rules describe:

● Syntax – Data format and coding

● Semantics – Control information and error handling

● Timing – Speed matching and sequencing

4. Which of the following protocols are part of the TCP/IP suite?

a. ARP

d. ICMP

5. Which of the following describes data encapsulation?

b. Data travels down through layers at the source system’s end.

d. Headers and trailers are added before the data is passed down to thenext successive layer.

Page 23: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 23/24

Exercise Solutions

 

Introducing the TCP/IP Model 1-19Copyright 2003 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision A.1  

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .

Page 24: Network Admin Solaris 9

7/17/2019 Network Admin Solaris 9

http://slidepdf.com/reader/full/network-admin-solaris-9 24/24

Exercise Solutions

   D  o   n  o  t 

  d  u  p   l   i

  c  a  t  e 

  o  r   r  e  d   i  s

  t  r   i   b  u

  t  e   w   i

  t   h  o  u  t   p

  e  r  m   i  s  s

   i  o  n   f  r  o  m

   S  u  n    M   i  c

  r  o  s  y  s  t  e  m

  s,    I  n  c .