Internet Protocols
Internet Protocols
Internet Protocols
A protocol is a set of rules. A letter sent through the postal system also
uses protocols. Part of the protocol specifies where on the envelope the
delivery address needs to be written. If the delivery address is written in the
wrong place, the letter cannot be delivered. Internet protocol works in a
similar way. Internet protocols are sets of rules governing communication
within and between computers on a network. Protocol specifications define
the format of the messages to be exchanged.
Timing is crucial to network operation. Protocols require messages to
arrive within a certain amount of time so that computers do not wait
indefinitely for messages that may have been lost. Therefore, systems
maintain one or more times during transmission of data. Protocols also initiate
alternative actions if the network does not meet the timing rules. Many
protocols consist of a suite of other protocols that are stacked in layers.
These layers depend on the operation of the other layers in the suite to
function properly.
IP Addressing
An IP address is a number that is used to identify a device on the
network. Each device on a network must have a unique IP address to
communicate with other network devices. Network devices are those that
move data across the network, including hubs, switches, and routers. On a
LAN, each host (device that sends or receives information on the network)
and network device must have an IP address within the same network to be
able to communicate with each other.
ical aspect
mailing address, on the other hand, relates to where the person lives or picks
up mail. This address can change. On a host, the Media Access Control
(MAC) address is assigned to the host Network Interface Card (NIC) and is Click Save Settings.
known as the physical address. The physical address remains the same
regardless of where the host is placed on the network in the same way that
fingerprints remain with someone regardless of where he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is
very difficult for humans to read a binary IP address. For this reason, the 32
bits are grouped into four 8-bit bytes called octets. An IP address, even in this
grouped format, is hard for humans to read, write, and remember. Therefore,
each octet is presented as its decimal value, separated by a decimal point or
period. This format is called dotted-decimal notation. When a host is
configured with an IP address, it is entered as a dotted-decimal number, such
as 192.168.1.5.
Unplug the Ethernet patch cable from the rear of the computer.
Table 6. Five Classes of IP Address Choose Start, and then right-click My Network Places. Choose
Properties.
IP Classes Purpose Double-click the wireless adapter, and then select View Wireless
Class A Used for large networks, implemented by large companies and Networks.
some countries Choose CHS, and then click the Connect button.
Class B Used for medium-sized networks, implemented by universities Open Internet Explorer, and then connect to the wireless router.
Class C Used for small networks, implemented by ISPs for customer Log in to the wireless router.
subscriptions Close Internet Explorer.
Class D Used for special use for multicasting
Class E Used for experimental testing
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like
the IP address, the subnet mask is a dotted-decimal number. Usually all hosts
within a LAN use the same subnet mask. Table 3 shows default subnet
masks for usable IP addresses that are mapped to the first three classes of IP
addresses:
255.0.0.0: Class A, which indicates that the first octet of the IP address
is the network portion
255.255.0.0: Class B, which indicates that the first two octets of the IP
address are the network portion
255.255.255.0: Class C, which indicates that the first three octets of
the IP address are the network portion
Figure 66. Connect to 192.168.1.1 Window Table 7. Default Subnet Masks for Usable IP Addresses
IpConfig
CHS
assigned by your instructor.
Task 2
Configure Wireless Router
Directions: Configure and test the wireless settings on the
LinksysWRT300N.
Recommended Equipment
A computer with Windows XP Professional / Windows 7
A Wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Ethernet patch cable
Step 1
Connect the computer to one of the Ethernet ports on the wireless router
with an Ethernet patch cable.
Plug in the power of the wireless router. Boot the computer and log in as
Figure 51. Command Prompt Window an administrator.
Step 2
3) Type ipconfig and press enter. The figure below shows the IP Choose start > Run Return key.
configuration window using the ipconfig command. The information Type ipconfig.
from this window will be useful because it shows the IP address, What is the default gateway for the computer?
subnet mask and default gateway of a network you are connected Step 3
to.
Open your browser
press Return.
Activity Questions:
1.
Type the IP address for your computer. Enter the appropriate IP Click OK.
Address in the IP address section. Restart your computer.
7. Type a subnet mask. The value used on a local network is Step 4
commonly 255.255.255.0, but it can be different, such as Log on to Windows as an administrator.
255.255.255.127. Check the lights at the back of the NIC. These lights will blink when
8. Type the default gateway address. The default gateway is the router, there is network activity.
Figure 54 shows an example of assigning Choose Start > Run.
an IP Address, Subnet mask and default gateway. Type cmd and click OK.
Activity Question:
3. What is the IP address, Subnet mask, and Default gateway
These are the IP address information that a DHCP server can assign to
hosts:
IP address
Subnet mask
Default gateway
Optional values, such as a Domain Name System (DNS) server
address
The DHCP server receives a request from a host. The server then
selects IP address information from a set of predefined addresses that are Figure 60. Local Area Connection Properties
stored in a database. After the IP address information is selected, the DHCP Activity Questions:
server offers these values to the requesting host on the network. If the host 1.
accepts the offer, the DHCP server leases the IP address for a specific period ?
of time. 2.
Using a DHCP server simplifies the administration of a network following item
because the software keeps track of IP addresses. Automatically configuring Step 3
TCP/IP also reduces the possibility of assigning duplicate or invalid IP Choose Internet Protocol (TCP/IP).
addresses. Before a computer on the network can take advantage of the Click Properties.
DHCP server services, the computer must be able to identify the server on
the local network. You can configure a computer to accept an IP address from
a DHCP server by clicking the Obtain an IP address automatically option in
the NIC configuration window, as shown in Figure 56.
If your computer cannot communicate with the DHCP server to obtain
an IP address, the Windows operating system automatically assigns a private
IP address. If your computer is assigned an IP address in the range of
169.254.0.0 to 169.254.255.255, it can communicate with only other
computers in the same range. An example of when these private addresses
would be useful is in a classroom lab where you want to prevent access
outside to your network. This operating system feature is called Automatic
Private IP Addressing (APIPA). APIPA continually requests an IP address
from a DHCP server for your computer.
Legend: Ping
B- Beginner The ping is a Command Prompt command used to test the ability of
D- Developing the source computer to reach a specified destination computer. The ping
AP- Approaching Proficiency command is usually used as a simple way to verify that a computer can
P- Proficient communicate over the network with another computer or network device.
A- Advance The ping command operates by sending Internet Control Message
Protocol (ICMP) Echo Request messages to the destination computer and
Recommended Equipment waiting for a response. How many of those responses are returned, and how
Linksys 300N router long it takes for them to return, are the two major pieces of information that
A computer running Window XP Professional the ping command provides.
Ethernet patch cable
Table 8. Ping Command Syntax
Procedures: Syntax Description
Step 1 -t Using this option will ping the target until you force it to stop
at the back of using Ctrl-C.
the router.
-a - This ping command option will resolve, if possible,
Plug the other end of the Ethernet patch cable into the network port on the hostname of an IP address target.
the NIC in your computer.
Plug in the power cable of the router if it is not already plugged in. -n count This option sets the number of ICMP Echo Request messages
Turn on your computer and log on to Windows as an administrator. to send. If you execute the ping command without this option,
Click Start. four requests will be sent.
Right-click My Network Places, and then choose Properties. -l size Use this option to set the size, in bytes, of the echo request
packet from 32 to 65,527. The ping command will send a 32
byte echo request if you do not use the -l option.
-f Use this ping command option to prevent ICMP Echo Requests
from being fragmented by routers between you and the target.
The -f option is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL This option sets the Time to Live (TTL) value, the maximum of
which is 255.
-v TOS This option allows you to set a Type of Service (TOS) value.
Beginning in Windows 7, this option no longer functions but still
exists for compatibility reasons.
-r count Use this ping command option to specify the number
of hops between the computer and the target computer or
device that you would like to be recorded and displayed. The
maximum value for count is 9 so use the tracert
command instead. If you are interested in viewing all hops
Figure 59. My Network Places between two devices.
-s count Use this option to report the time, in Internet Timestamp
format, that each echo request is received and echo reply is
sent. The maximum value for count is 4 which means that only
the first four hops can be time stamped.
-w timeout Specifying a timeout value when executing the ping command
adjusts the amount of time, in milliseconds, that ping waits for Configure an Ethernet NIC to use DHCP
each reply. If you do not use the -w option, the default timeout Directions: Configure an Ethernet NIC to use DHCP to obtain an IP address.
value is used which is 4000, or 4 seconds.
You need to follow the procedures given below and apply safety precautions
-R This option tells the ping command to trace the round trip path.
in accomplishing this task. While doing the activity, you have to answer
-S srcaddr Use this option to specify the source address.
activity questions written after every step. Write your answer in a clean sheet
-4 This forces the ping command to use IPv4 only but is only
necessary if target is a hostname and not an IP address. of paper. Your performance will be rated based on the performance rubrics.
-6 This forces the ping command to use IPv6 only but as with
Rubrics for Configuration
the -4 option, is only necessary when pinging a hostname.
Criteria B D AP P A Total
target This is the destination you wish to ping, which is either an IP (70-74) (75-79) (80-84) (85-89) (90-100) (=score x %)
address or a hostname.
Proper
/? Use the help switch with the ping command to show detailed
Configuration (30
help about the command's several options.
%)
(The configured
Using the ping Command hardware was
Ping is one of your most important tools in troubleshooting Internet properly configured
problems. It shows you whether the Domain Name Server is working, whether according to job
the computer you are trying to talk to is reachable, and how long it takes to specification.)
get there. It does this at a very low level only the most basic Internet Adherence to the
Procedures (30%)
functions have to be up and running.
(The specified job
was done by
1) Click on Start Button, then type cmd (command prompt) on the following the
search box. procedures. Safety
2) A black screen will appear as shown in the figure below. measures were
3) Type ping followed by the IP address you desire to verify. The observed during the
figure below shows the screen of the ping command and its output. activity.)
Quality of Work
(30%)
(The device was
configured properly.)
Comprehension
(10%)
(Interview / Guide
questions were
answered correctly
according to the job
requirements.)
Grand Total
3. http://www.professormesser.com/n10-005/networkingprotocols/
4. http://www.professormesser.com/n10-005/subnetting/
I. Protocols
Directions: In this worksheet, write the name of the protocol and the default
port(s) for each protocol definition in the table. Do this on your notebook.
To deepen your understanding with regard to the Internet
Be prepared to discuss your answers in front of the class. Protocols, IP Address and subneting, utilize the Internet and the
website www.professormesser.com, watch and learn from the video
Protocol Definition Protocol Default
Port(s) presentations. Use the URLs below:
Provides connections to computers over a
TCP/IP network 1. http://www.professormesser.com/n10-005/binary-math-2/
Sends e-mail over a TCP/IP network
Translates URLs to IP address
Transports Web pages over a TCP/IP network
Automates assignment of IP address on a
network
Securely transports Web pages over a TCP/IP
network
Transports files over a TCP/IP network
2. http://www.professormesser.com/n10-005/ip-classes/