Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Networking

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 28

Internet Protocols

Internet Protocols
• A protocol is a set of rules. A letter sent through the postal system
also uses protocols. Part of the protocol specifies where on the
envelope the delivery address needs to be written. If the delivery
address is written in the wrong place, the letter cannot be delivered.
Internet protocol works in a similar way. Internet protocols are sets of
rules governing communication within and between computers on a
network. Protocol specifications define the format of the messages to
be exchanged.
The main functions of protocols are:

• Identifying errors
• Compressing the data
• Deciding how the data should be sent
• Addressing the data
• Deciding how to announce sent and received data
The commonly used protocols
• These protocols are used to browse the web, send and receive e-mail,
and transfer data files.
TCP/IP: The Transmission Control Protocol
/Internet Protocol (TCP/IP)
• suite of protocols has become the dominant standard for
internetworking. TCP/IP represents a set of public standards that
specify how packets of information are exchanged between
computers over one or more networks.
IPX/SPX: Internetwork Packet
Exchange/Sequenced Packet Exchange
• is the protocol suite originally employed by Novell Corporation’s
network operating system, NetWare. It delivers functions similar to
those included in TCP/IP. Novell in its current releases supports the
TCP/IP suite. A large installed base of NetWare networks continues to
use IPX/SPX.
NetBEUI: NetBIOS Extended User Interface
• is a protocol used primarily on small Windows NT networks. NetBEUI
cannot be routed or used by routers to talk to each other on a large
network. NetBEUI is suitable for small peer-to-peer networks,
involving a few computers directly connected to each other. It can be
used in conjunction with another routable protocol such as TCP/IP.
This gives the network administrator the advantages of the high
performance of NetBEUI within the local network and the ability to
communicate beyond the LAN over TCP/IP.
AppleTalk:

• AppleTalk is a protocol suite used to network Macintosh computers. It


is composed of a comprehensive set of protocols that span the seven
layers of the Open Systems Interconnection (OSI) reference model.
The AppleTalk protocol was designed to run over LocalTalk, which is
the Apple LAN physical topology. This protocol is also designed to run
over major LAN types, notably Ethernet and Token Ring.
HTTP: Hypertext Transfer Protocol

• governs how files such as text, graphics, sound, and video are
exchanged on the World Wide Web (WWW). The Internet Engineering
Task Force (IETF) developed the standards for HTTP.
FTP: File Transfer Protocol

• provides services for file transfer and manipulation. FTP allows


multiple simultaneous connections to remote file systems.
SSH: Secure Shell

• is used to securely connect to a remote computer


Telnet:

• It is an application used to connect to a remote computer that lacks


security features.
POP3: Post Office Protocol

• is used to download e-mail from a remote mail server.


IMAP: Internet Message Access Protocol

• is also used to download e-mail from a remote mail server.


SMTP: Simple Mail Transfer Protocol
• is used to send e-mail to a remote e-mail server.
The Commonly used INTERNET PROTOCOL
IP Addressing
IP address
• is a number that is used to identify a device on the network. Each
device on a network must have a unique IP address to communicate
with other network devices. Network devices are those that move
data across the network, including hubs, switches, and routers. On a
LAN, each host (device that sends or receives information on the
network) and network device must have an IP address within the
same network to be able to communicate with each other.
Media Access Control (MAC)Address
• is assigned to the host Network Interface Card (NIC) and is known as
the physical address. The physical address remains the same
regardless of where the host is placed on the network in the same
way that fingerprints remain with someone regardless of where he or
she goes.
IP address
• An IP address consists of a series of 32 binary bits (1s and 0s). It is
very difficult for humans to read a binary IP address. For this reason,
the 32 bits are grouped into four 8-bit bytes called octets. An IP
address, even in this grouped format, is hard for humans to read,
write, and remember. Therefore, each octet is presented as its
decimal value, separated by a decimal point or period. This format is
called dotted-decimal notation. When a host is configured with an IP
address, it is entered as a dotted-decimal number, such as
192.168.1.5.
Five Classes of IP Address
IP Classes Purpose

Class A Used for large networks, implemented by large companies and some countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like
the IP address, the subnet mask is a dotted-decimal number. Usually all
hosts within a LAN use the same subnet mask. Table 3 shows default
subnet masks for usable IP addresses that are mapped to the first three
classes of IP addresses:
• 255.0.0.0: Class A, which indicates that the first octet of the IP
address is the network portion
• 255.255.0.0: Class B, which indicates that the first two octets of the
IP address are the network portion
• 255.255.255.0: Class C, which indicates that the first three octets of
the IP address are the network portion
Default Subnet Masks for Usable IP Addresses
Subnet Mask
• Class D addresses are used for multicast groups. There is no need to
allocate octet or bits to separate network and host addresses. Class E
addresses are reserved for research use only.
IpConfig
• Ipconfig is a command used to find out the IP address of a certain network you
are connected to.
• How to use the ipconfig command?
• 1) Click on Start Button, then type cmd (command prompt) on the search box.
• 2) A black screen will appear as shown in the figure below.
• 103

• 3) Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window will be
useful because it shows the IP address, subnet mask and default gateway of a
network you are connected to.
IP Configuration in CMD Window
Assigning a static IP Address
• In a home network with several computers and devices, it is ideal to
assign each of them a specific address. This is for the purpose of
avoiding problems when you do troubleshooting which requires
figuring out the IP address of each of them. It is also a means to
prevent address conflicts between the devices. You can also manage
them with ease if you have assigned their own addresses.
Here are the procedures in assigning an IP Address
on a windows base computer system:

• 1.Open the Control Panel’s Network Connections icon.


• 2. Open the icon representing your computer’s network connection.
• 3. Click the Properties button in the Status dialog box.
• 4. From the list of items, choose Internet Protocol (TCP/IP).

You might also like