Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Computer Network Protocols and IPaddress

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 44

Computer Systems Servicing

Internet Protocol
The Internet Protocol (IP) is the method or
protocol by which data is sent from one computer
to another on the internet. Each computer on the
Internet has at least one ip address that uniquely
identifies it from all other computers on the
Internet.
The Internet Protocol (IP) is a protocol, or set of
rules, for routing and addressing packets of data so
that they can travel across networks and arrive at the
correct destination.
The main functions of
protocols are:
 Identifying errors
Compressing the data
Deciding how the data should be sent
 Addressing the data
Deciding how to announce sent and received
data
When you send or receive data (for example, an e-
mail note or a Web page), the message gets divided
into little chunks called packets. Each of these
packets contains both the sender's Internet
address and the receiver's address. Any packet is sent
first to a gateway computer that understands a
small part of the Internet
IP is a connectionless protocol, which means that
there is no continuing connection between the end
points that are communicating
IP has the task of delivering packets from the
source host to the destination host solely based on
the IP address in the packet headers
The Internet Protocol is the principal
communications protocol in the Internet protocol
suite for relaying datagrams across network
boundaries. Its routing function enables
internetworking, and essentially establishes the
Internet
Internet Protocol is very crucial because the
entire web keeps running over it.
Types of internet protocol
Several protocols are used on the Internet,
including Electronic Mail (e-mail), File
Transfer Protocol (FTP), HTTP (World
Wide Web), News (or Usenet), Gopher and
Telnet. Each of these has its own standard
and usage.
To understand how networks
and the Internet work, you must
be familiar with the commonly
used protocols. These protocols
are used to browse the web,
send and receive e-mail, and
transfer data files.
TCP/IP: The Transmission Control
Protocol /Internet Protocol

The Transmission Control Protocol /Internet


Protocol (TCP/IP) suite of protocols has
become the dominant standard for
internetworking. TCP/IP represents a set of
public standards that specify how packets of
information are exchanged between
computers over one or more networks.
IPX/SPX: Internetwork Packet
Exchange/Sequenced Packet
Exchange
• IPX/SPX: Internetwork Packet
Exchange/Sequenced Packet Exchange is the
protocol suite originally employed by Novell
Corporation’s network operating system,
NetWare. It delivers functions similar to those
included in TCP/IP. Novell in its current releases
supports the TCP/IP suite. A large installed base
of NetWare networks continues to use IPX/SPX.
NetBEUI: NetBIOS Extended User
Interface
• NetBEUI: NetBIOS Extended User Interface is a
protocol used primarily on small Windows NT
networks. NetBEUI cannot be routed or used by
routers to talk to each other on a large network.
NetBEUI is suitable for small peer-to-peer
networks, involving a few computers directly
connected to each other. It can be used in
conjunction with another routable protocol such as
TCP/IP. This gives the network administrator the
advantages of the high performance of NetBEUI
within the local network and the ability to
communicate beyond the LAN over TCP/IP.
AppleTalk
• AppleTalk is a protocol suite used to network
Macintosh computers. It is composed of a
comprehensive set of protocols that span
the seven layers of the Open Systems
Interconnection (OSI) reference model. The
AppleTalk protocol was designed to run over
LocalTalk, which is the Apple LAN physical
topology. This protocol is also designed to
run over major LAN types, notably Ethernet
and Token Ring
File Transfer Protocol
File Transfer Protocol, or FTP, is a means of
transferring a file from one computer to another. FTP
is commonly used for uploading a web page to a web
server so that it may be seen on the World Wide Web.
A special program, called a client, is usually needed to
use FTP.
The File Transfer Protocol (FTP) is a standard
network protocol used for the transfer of computer
files between a client and server on a computer
network. FTP is built on a client-server model
architecture using separate control and data
connections between the client and the server
FTP Clients
FTP client is a program that implements a file transfer
protocol which allows you to transfer files between two
hosts on the internet.
It allows a user to connect to a remote host and
upload
or download the files.
It has a set of commands that we can use to connect to
a host, transfer the files between you and your host
and close the connection.
The FTP program is also available as a built-in
component in a Web browser. This GUI based FTP
client makes the file transfer very easy and also does
not require to remember the FTP commands.
HTTP
HTTPS stands for Hyper Text Transfer Protocol
Secure. It is a protocol for securing the
communication between two systems e.g. the
browser and the web server.
Hypertext transfer protocol secure (HTTPS) is the
secure version of http, which is the primary
protocol used to send data between a web browser
and a website. HTTPS is encrypted in order to
increase security of data transfer.
"https://example.com"
SSH: Secure Shell

• SSH: Secure Shell is used to securely


connect to a remote computer.
•POP3: Post Office Protocol is
used to download e-mail from a
remote mail server.
• IMAP: Internet Message Access
Protocol is also used to download
e-mail from a remote mail serve
SMTP: Simple Mail Transfer
Protocol

• SMTP: Simple Mail Transfer


Protocol is used to send e-mail to
a remote e-mail server.
Secure Socket Layer (SSL)
SSL is the standard security technology for
establishing an encrypted link between the two
systems. These can be browser to server, server to
server or client to server. Basically, SSL ensures
that the data transfer between the two systems
remains encrypted and private.
The https is essentially http over SSL. SSL
establishes an encrypted link using an SSL
certificate which is also known as a digital
certificate.
Advantage of http
Secure Communication: https makes a secure
connection by establishing an encrypted link
between the browser and the server or any two
systems.
Data Integrity: https provides data integrity by
encrypting the data and so, even if hackers
manage to trap the data, they cannot read or
modify it.
Privacy and Security: https protects the privacy
and security of website users by preventing
hackers to passively listen to communication
between the browser and the server.
Faster Performance: https increases the
speed of data transfer compared to http by
encrypting and reducing the size of the
data.
SEO: Use of https increases SEO ranking.
In Google Chrome, Google shows the Not
Secure label in the browser if users' data is
collected over http.
Future: https represents the future of the
web by making internet safe for users and
website owners.
Telnet
Telnet lets you log in to a remote computer just
as you would if you were there. So any commands
that you would be able to run from the remote
computer if you were sitting in front of it, you
would be able to run from the computer you
logged in from.
Telnet provides a connection to the remote
computer in such a way that a local terminal
appears to be at the remote side
Telnet

• Telnet: It is an application used to


connect to a remote computer that
lacks security features.
Local Login
When a user logs into a local computer, then it is
known as local login.
When the workstation running terminal emulator, the
keystrokes entered by the user are accepted by the
terminal driver. The terminal driver then passes these
characters to the operating system which in turn,
invokes the desired application program
Remote login
When the user wants to access an application
program on a remote computer, then the user must
perform remote login.
Gopher
Another tool of the Internet is Gopher, a
menu-based program that enables you to
browse for information without knowing
where the material is located. It lets you
search a list of resources and then sends the
material to you.
A Gopher system consists of a series of
hierarchical hyperlinkable menus. The
choice of menu items and titles is controlled
by the administrator of the server
IP Addressing
• An IP address is a number that is used to identify
a device on the network. Each device on a
network must have a unique IP address to
communicate with other network devices.
Network devices are those that move data across
the network, including hubs, switches, and
routers. On a LAN, each host (device that sends
or receives information on the network) and
network device must have an IP address within
the same network to be able to communicate
with each other.
• An IP address consists of a series of 32 binary
bits (1s and 0s). It is very difficult for humans
to read a binary IP address. For this reason,
the 32 bits are grouped into four 8-bit bytes
called octets. An IP address, even in this
grouped format, is hard for humans to read,
write, and remember. Therefore, each octet is
presented as its decimal value, separated by a
decimal point or period. This format is called
dotted-decimal notation. When a host is
configured with an IP address, it is entered as
a dotted-decimal number, such as
192.168.1.5.
• Imagine if you had to enter the 32-bit binary equivalent of
this: 11000000101010000000000100000101. If you
mistyped just 1 bit, the address would be different, and
the host may not be able to communicate on the
network. The logical 32-bit IP address is hierarchical and is
composed of two parts. The first part identifies the
network, and the second part identifies a host on that
network. Both parts are required in an IP address. For
example, if a host has an IP address of 192.168.18.57, the
first three octets, 192.168.18, identify the network
portion of the address, and the last octet, 57, identifies
the host. This is called hierarchical addressing, because
the network portion indicates the network on which each
unique host address is located. Routers only need to
know how to reach each network, not the location of
each individual host
• IP Classes Purpose Class A - Used for large
networks, implemented by large
companies and some countries
• Class B - Used for medium-sized
networks, implemented by universities
• Class C - Used for small networks,
implemented by ISPs for customer
subscriptions
• Class D - Used for special use for
multicasting Class E Used for experimental
testing.
Subnet Mask

• The subnet mask indicates the network portion of an


IP address. Like the IP address, the subnet mask is a
dotted-decimal number. Usually all hosts within a
LAN use the same subnet mask. Table 3 shows
default subnet masks for usable IP addresses that are
mapped to the first three classes of IP addresses:
• 255.0.0.0: Class A, which indicates that the
first octet of the IP address is the network
portion.
• 255.255.0.0: Class B, which indicates that
the first two octets of the IP address are
the network portion.
• 255.255.255.0: Class C, which indicates that
the first three octets of the IP address are
the network portion.
EXAMPLE

You might also like