Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

TCP IP Fundamentals

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Advanced Operating Systems – ITE 5210

TCP/IP

Introduction

After completing this module, you will be able to:

• Describe TCP/IP protocol.

• Explain the important of a subnet mask.

• Discuss the difference between public IP addresses and private IP addresses.

• Explain the network subnetting process.

• Discuss different troubleshooting tools for network-related problems.


Advanced Operating Systems – ITE 5210

Introduction

• Stands for “Transmission Control Protocol/Internet Protocol” (TCP/IP).

• Defined as a suite of network protocols used to transfer data between computers within the network.

• Used as the primary protocol for the Internet (it is the most popular networking protocol in the world).

• Supported on almost all computers and network devices.

• Developed by the U.S. Department of Defense.

• Consists of the following two protocols:

o TCP:
▪ Defines rules for establishing and maintaining network communication between two
computers. ▪
▪ Works in collaboration with IP to ensure that data is delivered to the correct destination.
▪ Breaks data into smaller packets, send the packets in sequence and then reassembles them
at the destination.
▪ Maintains data integrity.
▪ Establishes an end-to-end connection between the sending and receiving computers before
transmitting data.
▪ Considered to be reliable because it ensures that data is sent by retransmitting lost data.

o IP:
▪ Identifies each computer and network device on a network.
▪ Allows users to differentiate one computer from another computer on the network.
▪ Consists of four blocks of numbers, ranging from 0 to 255, separated with a single dot (note
that each block of numbers represents one octet and the entire IP address is four octets long).
▪ Reads as 172.16.10.20.
▪ Required for network communication.
Advanced Operating Systems – ITE 5210

Subnet Mask

• Looks like an IP address and is written using the same dotted-decimal notation, such as 255.255.255.0.

• Associated with an IP address in order to define what network a computer belongs to.

• Determines the network portion and the host portion in an IP address (note that the network portion
determines the computer’s network and the host portion identifies the computer within the network).

• Depends on the IP address and cannot be configured on its own.

• Configures on a computer in the following way with the following information:


o IP address: 172.16.10.20
o Subnet mask: 255.255.255.0
o Network portion: 172.16.10
o Host portion: 20
Advanced Operating Systems – ITE 5210

IP Addressing for Public and Private Networks

• Public IP Address:

o Used over the Internet.

o Leased by Internet service providers at an additional cost on top of their Internet plans.

o Assigned to only one subscriber in the world (but, depending on the size and needs of the
organization, a subscriber may lease more than one public IP address).

• Private IP Address:

o Configured and maintained by a local administrator.

o Leasing IP addresses from the ISP is not required.

o Assigned to an organization network and must be unique within that network.

o Contains configured network address translation (NAT) protocol to enable internal computers to
connect to the Internet (but is not compatible for Internet communication).

Classes of IP Addresses

• Created and arranged by the Internet Assigned Numbers Authority (IANA).

• Define the possible number of networks and the number of hosts per network.

• Consist of five classes of IP addresses by default (A, B, C, D and E — note that IP addresses from class
E are reserved for experimental and research purposes).

• Distinguished by the first octet of the IP address.

• Configure computer IP addresses using classes A, B and C.

• Network between special services or protocols using class D.

• Reserve the address range between 127.0.0.0 to 127.255.255.255 for loopback and diagnostic
functions.
Advanced Operating Systems – ITE 5210

Class Address Range Supports


Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127
networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000
networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of two million
networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Reserved for future use or research and
Class E 240.0.0.0 to 254.255.255.254
development purposes.

IP Address Subnetting

• Defined originally as five address classes with a fixed number of hosts per network by the IANA.

• Using a fixed size of addresses per network often leads to having many unused IP addresses
(implementing subnetting tackles this issue).

• Allows users to allocate IP addresses based on available computers.

• Divides or segments a large network into multiple networks.

• Offers the following advantages when configured (in addition to the efficient use of an IP address):
o Reduces network congestion.
o Avoids traffic collision.
o Improves network performance.
o Increases network security.
Advanced Operating Systems – ITE 5210

Subnetting Calculation

• Calculates an IP address as four octets long or 32 bits (one octet is equal to eight bits).

• Allows users to convert a decimal number to a binary number (each bit can be either zero or one).

• Allows assigned IP addresses to have value ranges from 0 to 255 (00000000 to 11111111 in binary).

• Designates all the bits set to one to represent the network portion and the bits set to zero to represent
the host portion.

• Converts 255.255.255.0 in binary as equal to 11111111 11111111 11111111 | 00000000


Network Host

• Uses the calculations in the table below to convert an IP address or subnet mask (places ones until
the decimal value is attained and then places zeros in the remaining empty columns). During the
subnet calculation, some bits will be taken from the host portion.

27 26 25 24 23 22 21 20

128 64 32 16 8 4 2 1

Below steps to create networks with no of computers in each network.


• Uses 2n-2 to determine the number of usable hosts per subnet (the two addresses represent the
network and broadcast addresses). For example, to divide a large network to support 90 computers
per network:
• Number of hosts required = 90.
• 26-2 = 62 hosts (not enough).
• 27-2 = 126 hosts.
This means seven bits are required in the host portion.
So subnet mask will be like below, which means now out of 32 bits we only need last 7 bits for our
hosts, rest 25 bits will refer to the Network portion
11111111 11111111 11111111 10000000

Network

IP Configuration Methodology
Advanced Operating Systems – ITE 5210

• Static:

o Describes an IP address that is manually configured on the hosts.


o Consumes a lot of time to configure and is convenient for small networks.

o Recommends configuration on all servers on the network.

• DHCP Dynamic:

o Describes IP addresses that are assigned to computers automatically from a single server or
device.
o Recommends use for a large network because it is fast and efficient and eliminates typographical
errors.
o Reduces administrative efforts for maintaining network connectivity.

• DHCP Reservation:

o Ensures consistent use of the same IP address on a specific computer.


o Keeps the same network address on computers that perform special tasks.

• Automatic Private IP Addresses (APIPAs):

o Function as a built-in service that allows computers to auto-configure IP addresses when there
are no static or dynamic IP addresses configured.

o Assign IP addresses on computers, even when they are not exchanging data on the network.

o Push computers to assign themselves an address when no IP address is configured.

o Assign IP addresses ranging from 169.254.0.1 to 169.254.255.254.


Advanced Operating Systems – ITE 5210

Kindly take snapshots for below commands and notice the results

Ping
• Used to test the connectivity between two hosts.
• Allows users to determine issues with the network connection.
Advanced Operating Systems – ITE 5210

Tracert:

• Used to track the path taken from the source to the destination host.
• Displays the time taken to transmit to the destination.

Route
Advanced Operating Systems – ITE 5210

• Used to view the local routing table.

• Allows users to add and modify the routes in the routing table.
Advanced Operating Systems – ITE 5210

Netstat
• Used to view network connections and statistics.
• Displays routing tables and the number of network interfaces.

You might also like