2 - The OSI Model Net Protcls
2 - The OSI Model Net Protcls
2 - The OSI Model Net Protcls
CHAPTER 2
Upon completion of this topic, students should be able to:-
Protocol Description
Network protocols define Type
a common set of rules. Network enable two or more devices to
•Can be implemented on Communicatio communicate over one or more networks
devices in: ns
Software Network secure data to provide authentication, data
Hardware Security integrity, and data encryption
Both
Routing enable routers to exchange route
•Protocols have their own:
information, compare path information, and
Function select best path
Format
Service used for the automatic detection of devices
Rules
Discovery or services
PROTOCOLS
2 Types of Address
1. Internet Protocol (IP) Address
2. Media ccess Control (MAC) Address
Internet Protocol (IP) Address
IP addresses follow a hierarchical addressing
scheme and can be assigned through operating
system software.
Also called network layer addresses, logical
addresses, or virtual addresses.
Assigned to each host by a network
administrator based on the local network
IP addresses contain two parts:
1. local network.
2. individual host
Media Access Control (MAC) Address
The MAC sublayer, the lower sublayer of the Data
Link layer, manages access to the physical medium.
Also known as a Physical address or a Data Link
layer address. Sometimes, it’s also called a
hardware address
On a host, the MAC address does not change; it is
physically assigned at the factory and stored in the
host NIC. The physical address remains the same
regardless of where the host is placed on the
network.
•MAC addresses/ physical addresses like
00-30-48-82-11-BD
– Block ID
• 00-30-48
• Identifies the vendor
– Device ID
• 82-11-BD
• Different for each NIC from the same vendor
NAT64
6RD
6RD is a tunneling technique in
which
the IPv4 and IPv6 addresses
come from the Internet Service
Provider (ISP). Some ISPs offering
DSL or cable services are
implementing 6RD to connect
their customers over IPv6
QUESTION
ANS : A.
QUESTION
Describe Layer 3 and layer 4 in OSI model.
Tafsirkan lapisan 3 dan lapisan 4 dalam mode OSI; (CLO1, C3) (5 marks)
ANS.
Layer 3 – Network Layer (1m)
Establishes network connections; translates network address into their
physical counterarts and determines routing(1m)
and determines routing(0.5m)
Step 1
1)Open the Windows Command Prompt.
2)Click the Start menu. Type Command
Prompt in the search box and press Enter.
3)Click on the Command Prompt, displayed in
the search results.
Step 2:
1)Enter the ipconfig /all command at the command
prompt.
2)Press Enter. (Typical results are shown in the
following figure, but your computer will display
different information.
Upon completion of this topic, students should be able to:-
• Domain
– Group of computers belonging to same organization
– Share common part of IP address
• Domain name
– Identifies domain (loc.gov)
– Associated with company, university, government organization •
Fully qualified host name (jasmine.loc.gov)
– Local host name plus domain name
DNS (cont..)
• Label (character string)
– Separated by dots
– Represents level in domain naming hierarchy
• Example: www.google.com
– Top-level domain (TLD): com
– Second-level domain: google
– Third level domain: www
• ICANN approved over 240 country codes
• Host and domain names restrictions
– Any alphanumeric combination up to 63 characters
– Include hyphens, underscores, periods in name
– No other special characters
Name servers (DNS servers)
• Servers that contain databases of associated names, IP addresses
• Provide information on request
– To convert names like www.ccsf.edu into IP addresses like
147.144.1.212
• This process is called name resolution
• Large organizations
– Often maintain two name servers
• Primary and secondary
– Ensures Internet connectivity
• Each device must know how to find server
– Automatically by DHCP
Nslookup
– Query DNS database from any network computer
• Find the device host name by specifying its IP address
– Verify host configured correctly; troubleshoot DNS
resolution problems
PING (Packet Internet Groper)
• Provides verification
– TCP/IP installed, bound to NIC, configured correctly,
communicating with network
– Host responding
• Uses ICMP services
– Send echo request and echo reply messages
• Determine IP address validity
• Ping IP address or host name
• Ping loopback address: 127.0.0.1
– Determine if workstation’s TCP/IP services running
Browser
Registered Ports
Ports 1024 through 49151 can be used as either source or
destination ports. These can be used by organizations to
register specific applications such as IM applications.
Private Ports
Ports 49152 through 65535, often used as source ports.
These ports can be used by any application.
QUESTION
4. Name the TCP/IP protocol that is used for transferring
electronic mail messages from one machine to another
Namakan protokol TCP/IP yang digunakan untuk
memindahkan pesanan mel elektronik daripada satu
mesin ke mesin yang lain (CLO2, C1)
ANS.
A. FTP
B. SMTP
C. SNMP
D. UDP
ANS : B.
Addressing Schemes
Upon completion of this topic, students should be able to:-
EQUALS
192 ● 5 ● 34 ● 11
IP Address (cont.)
The maximum decimal value of each octet is
255.
Those bits, from left to right, have decimal
values of 128, 64, 32, 16, 8, 4, 2, 1. Added, they
total 255.
The largest 8-bit binary number is 11111111.
An IP address has a network number and a host
number, and uses dotted-decimal notation.
Class A
Support extremely large networks
First octet of Class A IP address recognize with
range 1 to 127. (127.0.0.0
( network, is reserved for
loop back addresses.)
Class A IP addresses use only the first 8 bits (1
octet) to identify the network part of the address.
The remaining three octets (24 bit) can be used for
the host portion of the address.
Example of Class A IP address : 124.95.44.15
Class B
Support the needs of moderate to large sized
networks.
Class B IP network addresses always have
values ranging from 128 to 191.
Class B IP addresses use the first 16 bits (2
octets) to identify the network part of the
address.
The two remaining octets of the IP address can
be used for the host portion of the address.
Example of Class B IP address: 151.10.13.28
Class C
This address space was intended to support a small
network.
Class C IP network addresses always have values
ranging from 192 to 223.
Class C IP addresses use the first 24 bits (3 octets)
to identify the network part of the address.
Only the last octet of a Class C IP address can be
used for the host portion of the address.
Example of a Class C IP address : 201.110.213.28
Class D
- Multicast
Class E
- Experimental use / used for research / Reserved for future
127.0.0.0 to 127.255.255.255:
Public IP Address
Allhosts that connect directly to the Internet require a
unique public IP address.
Public IP addresses obtained from an Internet service
provider (ISP) or a registry at some expense
A private IP Address
ANS.
Class A : 10.56.1.2 (1m)
Class B : 128.16.0.2 (1m)
Class C : 192.168.1.2 (1m)
QUESTION
Nrtwork class Beginning Octet
A
B
C
QUESTION
Internet Protocol(IP) address is an address of a computer or other network
device on a network using TCP/IP. There are FIVE(5) classes of available IP
ranges. Complete Table 1 below with suitable answers. (CLO2, C3) (7 marks)
QUESTION
What is the class of the following addresses?(CLO2, C3)(2m)
IP address Method
10011101.10001111.11111100. 11001111
QUESTION
Refer to figure below, complete the table with suitable answers. (CLO2, C3)(7m)
ANS.
PC 1
PC 2
Router - 192. 168. 1. 1
QUESTION
manage your own IP address to make sure all the connection is successful. (CLO2, C3)(7m)
ANS.
BROADCAST MULTICAST
Static
Manually configure the network
information for a host.
Its includes the host IP address, subnet
mask and default gateway.
Useful for printers, servers and other
networking devices that need to be
accessible to clients on the network.
Modify client workstation TCP/IP
properties
Dynamic
IP addresses assigned automatically and it is
done using a protocol known as Dynamic Host
Configuration Protocol (DHCP).
Assigned to device upon request Changeable
DHCP automatic assignment of addressing
information such as IP address, subnet mask,
default gateway, and other configuration
information.
Requires DHCP service on DHCP server
DHCP advantages :
Saves time spent assigning IP addresses
Prevents accidental duplicate IP addresses
Allows users to move devices (like laptops)
without having to change their TCP/IP
DHCP is generally the preferred method of
assigning IP addresses to hosts on large networks
since it reduces the burden on network support
staff and virtually eliminates entry errors.
Another benefit of DHCP is that an address is
not permanently assigned to a host but is only
leased for a period of time. If the host is powered
down or taken off the network, the address is
returned to the pool for reuse. Reasons to Use
DHCP configuration