TCP IP Tutorial
TCP IP Tutorial
TCP IP Tutorial
Understanding TCP/IP is easier than you think. Find out all you need to know in this
free 5 part tutorial fromPC Network Advisor
This is a plain html version of the original TCP/IP tutorial. For the original version in PDF format
complete with diagrams,click here.
Everyone knows that TCP/ IP is a network protocol used on LANs, WANs and the
Internet, but not everyone who uses it understands how it works. Its possible to use
TCP/ IP with little more than a knowledge of how to configure the protocol stack, but a
better understanding will give you a clearer picture of what is going on in your network
and why the protocol needs to be set up in a particular way.
The aim of this multi- part TCP/IP tutorial is to explain the key concepts behind TCP/
IP.
TCP/ IP stands for Transmission Control Protocol/ Internet Protocol. If this leads you to
think that it is not just one protocol, youre right. In fact, it is not just two protocols,
either. TCP/ IP is a suite of protocols. Well cover the most important ones in the
course of this article.
Layered Protocol
Like most network protocols, TCP/ IP is a layered protocol. Each layer builds upon the
layer below it, adding new functionality. The lowest level protocol is concerned purely
with the business of sending and receiving data - any data - using specific network
hardware. At the top are protocols designed specifically for tasks like transferring files
or delivering email. In between are levels concerned with things like routing and
reliability. The benefit that the layered protocol stack gives you is that, if you invent a
new network application or a new type of hardware, you only need to create a protocol
for that application or that hardware: you dont have to rewrite the whole stack.
Link Layer
TCP/ IP is a four- layer protocol. The lowest level, the link layer, is implemented within
the network adapter and its device driver. Like all the TCP/ IP protocols, it is defined by
standards. The standards for generic Ethernet- type networks are defined by the IEEE
802 Committee: for example, IEEE 802.3 for Ethernet networks, or IEEE 802.5 for
Token Ring networks.
Other link layer protocols that could be used include Serial Line IP (SLIP) or Point- to-
Point Protocol (PPP), which are used when connecting to a network over an
asynchronous dial- up link.
TCP/IP Tutorial
http://www.itp-journals.com/TCP_IP_tutorial_page1.htm (1 of 2) [2/4/2002 7:13:43 PM]
Since Ethernet is the most common type of network, we will look at it in a bit more
detail. The Ethernet protocol is designed for carrying blocks of data called frames. A
frame consists of a header containing 48- bit hardware destination and source
addresses (which identify specific network adapters), a 2- byte length field, and some
control fields. There follows the data, and then a trailer which is simply a 32- bit cyclic
redundancy check (CRC) field. The data portion of an Ethernet frame must be at least
38 bytes long, so filler bytes are inserted if necessary.
All this means that frames are at least 64 bytes long, even if they carry only one byte of
user data: a significant overhead in some types of application.
Frames also have a maximum size. Less headers, the maximum size for an Ethernet
frame is 1492 bytes, which is the maximum transmission unit (MTU) for Ethernet. All
link layer protocols have an MTU. It is one hardware characteristic that the higher- level
protocol needs to be aware of, because larger blocks of data must be fragmented into
chunks that fit within the MTU and then reassembled on arrival at their destination.
TCP/IP Tutorial: page 2
Related Articles
TCP/IP Tutorial Parts 2-4 G
Understanding DHCP G
Network Address Translation G
OSI Reference Model Tutorial G
IPv6 Tutorial G
Copyright 2000 International Technology Publishing
TCP/IP Tutorial
http://www.itp-journals.com/TCP_IP_tutorial_page1.htm (2 of 2) [2/4/2002 7:13:43 PM]
TCP/IP Tutorial Page 2
Understanding TCP/IP is easier than you think. Find out all you need to know in this
free 5 part tutorial fromPC Network Advisor
This is a plain html version of the original TCP/IP tutorial. For the original version in PDF format
complete with diagrams,click here.
(continued from TCP/IP Tutorial Page 1)
Network Layer
The next layer up from the link layer is called the network layer. The most important
protocol at this level is IP, the Internet Protocol. Its job is to send packets or datagrams
- a term which basically means blocks of data - from one point to another. It uses the
link layer protocol to achieve this.
Both the network layer and the link layer are concerned with getting data from point A
to point B. However, whilst the network layer works in the world of TCP/ IP, the link
layer has to deal with the real world. Everything it does is geared towards the network
hardware it uses.
An IP address is a soft address. It is a bit like calling your office block Pan- Galactic
House instead of its real address, 2326 Western Boulevard. The former is no use to
the postman who has to deliver the letters, unless he can use it to find out the latter.
The link- layer Ethernet protocol needs to know the unique hardware address of the
specific network adapter it has to deliver the message to and, in case of an error, the
address of the one it came from.
To make this possible, the TCP/ IP protocol suite includes link- layer protocols which
convert between IP and hardware addresses. The Address Resolution Protocol (ARP)
finds out the physical address corresponding to an IP address. It does this by
broadcasting an ARP request on the network. When a host recognises an ARP request
containing its own IP address, it sends an ARP reply containing its hardware address.
There is also a Reverse ARP (RARP) protocol. This is used by a host to find out its
own IP address if it has no way of doing this except via the network.
Internet Protocol
IP is the bedrock protocol of TCP/ IP. Every message and every piece of data sent
over any TCP/ IP network is sent as an IP packet.
IPs job is to enable data to be transmitted across and between networks. Hence the
name: inter- net protocol. In a small LAN, it adds little to what could be achieved if the
TCP/IP Tutorial - P2
http://www.itp-journals.com/TCP_IP_tutorial_page2.htm (1 of 6) [9/16/2002 11:29:08 AM]
network applications talked directly to Ethernet. If every computer is connected to the
same Ethernet cable, every message could be sent directly to the destination
computer.
Once you start connecting networks together, however, direct Ethernet communication
becomes impractical. At the application level you may address a message to a
computer on the far side of the world, but your Ethernet card cant communicate with
the Ethernet card on that computer. Physical Ethernet limitations would prevent it,
for a start. It would, in any case, be undesirable for every computer in the world to be
connected to one big network. Every message sent would have to be heard by every
computer, which would be bedlam.
Instead, inter- net communications take place using one or more hops. Your Ethernet
card will communicate with another Ethernet device on the route to the final
destination. Routing is the important capability that IP adds to a hardware network
protocol. Before we come to it, we will look at some other features of IP.
Features Of IP
IP is a connectionless protocol. This means that it has no concept of a job or a session.
Each packet is treated as an entity in itself. IP is rather like a postal worker sorting
letters. He is not concerned with whether a packet is one of a batch. He simply routes
packets, one at a time, to the next location on the delivery route.
IP is also unconcerned with whether a packet reaches its eventual destination, or
whether packets arrive in the original order. There is no information in a packet to
identify it as part of a sequence or as belonging to a particular job. Consequently, IP
cannot tell if packets were lost or whether they were received out of order. IP is an
unreliable protocol. Any mechanisms for ensuring that data sent arrives correct and
intact are provided by the higher- level protocols in the suite.
Packets
An IP packet consists of the IP header and data. The header includes a 4- bit protocol
version number, a header length, a 16- bit total length, somecontrol fields, a header
checksum and the 32- bit source and destination IP addresses. This totals 20 bytes in
all.
We wont go into the detail of all the IP control fields. For a more detailed description
check out our TCP/IP Tutorial addendum.
However, the protocol field is important. It identifies which higher- level TCP/ IP
protocol sent the data. When data arrives at its destination (either the packets
destination address equals the hosts own IP address, or it is a broadcast address) this
field tells IP which protocol module to pass it on to.
TCP/IP Tutorial - P2
http://www.itp-journals.com/TCP_IP_tutorial_page2.htm (2 of 6) [9/16/2002 11:29:08 AM]
One control field, the time-to-live (TTL) field, is interesting. It is initialised by the sender
to a particular value, usually 64, and decremented by one (or the number of seconds it
is held on to) by every router that the packet passes through. When it reaches zero the
packet is discarded and the sender notified using the Internet Control Message
Protocol (ICMP), a network layer protocol for sending network- related messages.
The TTL field is a safety mechanism which prevents packets from travelling the
Internet forever in routing loops. It is exploited in a novel way by the Traceroute
diagnostic tool.
Although the total field length in the IP protocol header is 16 bits, IP packets are
usually much smaller than the 64 KB maximum this implies. For one thing, the link
layer will have to split this into smaller chunks anyway, so most of the efficiency
advantages of sending data in large blocks is lost. For another, IP standards did not
historically require a host to accept a packet of more than 576 bytes in length. Many
TCP/ IP applications limit themselves to using 512- byte blocks for this reason, though
today most implementations of the protocol arent so restricted.
Internet Addressing
Internet protocol addresses, or IP addresses, uniquely identify every network or host
on the Internet. To make sure they are unique, one body, called InterNIC, is
responsible for issuing them.
If your network is connected to the Internet and the computers need to be addressable
from the Internet you must use IP addresses issued by InterNIC. If you dont use
InterNIC- issued addresses, you must set up the gateway between your network and
the Internet so that packets containing the made- up addresses will never pass through
it in either direction.
Internet addresses are 32 bits long, written as four bytes separated by periods
(full stops). They can range from 1.0. 0.1 to 223. 255. 255. 255. Its worth noting that IP
addresses are stored in big-endian format, with the most significant byte first, read left
to right. This contrasts with the little-endian format used on Intel- based systems for
storing 32- bit numbers. This minor point can cause a lot of trouble for PC
programmers and others working with raw IP data if they forget.
IP addresses comprise two parts, the network ID and the host ID. An IP address can
identify a network (if the host part is all zero) or an individual host. The dividing line
between the network ID and the host ID is not constant. Instead, IP addresses are split
into three classes which allow for a small number of very large networks, a medium
number of medium- sized networks and a large number of small networks.
Class A addresses have a first byte in the range 1 to 126. The remaining three bytes
can be used for unique host addresses. This allows for 126 networks each with up to
TCP/IP Tutorial - P2
http://www.itp-journals.com/TCP_IP_tutorial_page2.htm (3 of 6) [9/16/2002 11:29:08 AM]
16m hosts.
Class B addresses can be distinguished by first byte values in the range 128. 0. x. x to
191. 255. x. x. In these addresses, the first two bytes are used for the net ID, and the
last two for the host ID, giving addresses for 16,000 networks, each with up to 16,000
hosts.
Class C addresses are in the range 224.0. 0.x to 239. 255. 255. x. Here, the first three
bytes identify the network, leaving just one byte for the individual hosts. This provides
for 2 million networks of up to 254 hosts each.
Although these addresses make it possible to uniquely identify quite a lot of networks
and hosts, the number is not that large in relation to the current rate of expansion of
the Internet. Consequently, a new addressing system has been devised which is part
of Internet Protocol version 6 (IPv6). IPv6 wont come into use for a couple of years,
and understanding it isnt essential to understanding how IP works in general, so we
wont cover it here. For more details see IPv6 Tutorial
IP addresses can be further divided to obtain a subnet ID. The main net ID identifies a
network of networks. The subnet ID lets you address a specific network within that
network. This system of addressing more accurately reflects how real- world large
networks are connected together.
You decide how the subnet ID is arrived at by defining a 32- bit value called the subnet
mask. This is logically ANDed with the IP address to obtain the subnet address. For
example, if a subnet mask was 255.255. 255.0 and an IP address was 128. 124. 14.5,
128. 124 would identify the Class B network, 128. 124. 14 would identify the
subnetwork, and 5 would identify the host on that subnetwork.
Special Meanings
A few IP addresses have special meanings. A network ID of 0 in an address means
this network, so for local communication only the host ID need be specified. A host
ID of 0 means this host.
A network ID of 127 denotes the loopback interface, which is another way of specifying
this host. The host ID part of the address can be anything in this case, though the
address 127. 0.0. 1 is normally used. Packets sent to the loopback address will never
appear on the network. It can be used by TCP/ IP applications that run on the same
machine and want to communicate with one another.
Addresses in the range 224. x. x. x to 239. x. x. x are Class D addresses, which are
used for multi- casting. Addresses 240.x. x. x to 247. x. x. x are reserved for
experimental purposes.
TCP/IP Tutorial - P2
http://www.itp-journals.com/TCP_IP_tutorial_page2.htm (4 of 6) [9/16/2002 11:29:08 AM]
Net, subnet and host IDs of all binary ones (byte value 255) are used when an IP
packet is to be broadcast. Mercifully, an address of 255. 255. 255.255 does not result
in a broadcast to the entire Internet.
Three sets of addresses are reserved for private address space - networks of
computers that do not need to be addressed from the Internet. There is one class A
address (10.x. x. x), sixteen class B addresses (172. 16. x. x to 172. 31. x. x), and 256
class C addresses (192. 168. 0. x to 192.168. 255. x). If you have equipment which
uses IP addresses that have not been allocated by InterNIC then the addresses used
should be within one of these ranges, as an extra precaution in case router
misconfiguration allows packets to leak onto the Internet.
IP Routing
So how does an IP packet addressed to a computer on the other side of the world find
its way to its destination? The basic mechanism is very simple.
On a LAN, every host sees every packet that is sent by every other host on that LAN.
Normally, it will only do something with that packet if it is addressed to itself, or if the
destination is a broadcast address.
A router is different. A router examines every packet, and compares the destination
address with a table of addresses that it holds in memory. If it finds an exact match, it
forwards the packet to an address associated with that entry in the table. This
associated address may be the address of another network in a point- to- point link, or
it may be the address of the next-hop router.
If the router doesnt find a match, it runs through the table again, this time looking for a
match on just the network ID part of the address. Again, if a match is found, the packet
is sent on to the address associated with that entry.
If a match still isnt found, the router looks to see if a default next- hop address is
present. If so, the packet is sent there. If no default address is present, the router
sends an ICMP host unreachable or network unreachable message back to the
sender. If you see this message, it usually indicates a router failure at some point in the
network.
The difficult part of a routers job is not how it routes packets, but how it builds up its
table. In the simplest case, the router table is static: it is read in from a file at start- up.
This is adequate for simple networks. You dont even need a dedicated piece of kit for
this, because routing functionality is built into IP.
Dynamic routing is more complicated. A router builds up its table by broadcasting
ICMP router solicitation messages, to which other routers respond. Routing protocols
are used to discover the shortest path to a location. Routes are updated periodically in
response to traffic conditions and availability of a route. However, the details of how
TCP/IP Tutorial - P2
http://www.itp-journals.com/TCP_IP_tutorial_page2.htm (5 of 6) [9/16/2002 11:29:08 AM]
this all works is beyond the scope of this article.
Back to TCP/IP tutorial: page 1
Related Articles
TCP/IP Tutorial Parts 2-4 G
Understanding DHCP G
Network Address Translation G
OSI Reference Model Tutorial G
IPv6 Tutorial G
Did you like this article?
Click here to get hundreds more practical technical support guides and articles just like
this one.
Copyright International Technology Publishing, 2001
TCP/IP Tutorial - P2
http://www.itp-journals.com/TCP_IP_tutorial_page2.htm (6 of 6) [9/16/2002 11:29:08 AM]
TCP/IP Tutorial
Never really understood TCP/IP? Well now is your chance with this multi
part TCP tutorial from PC Network Advisor by Julian Moss
To read this article just click on each part (requires Adobe Acrobat Reader, if
you don't have it, click here)
Understanding TCP/IP Tutorial Part 1 G
Understanding TCP/IP Tutorial Part 2 G
Understanding TCP/IP Tutorial Part 3 G
Understanding TCP/IP Tutorial Part 4 G
Addendum: IP Addressing in detail G
Understanding DHCP
http://www.itp-journals.com/search/c04102.htm [9/16/2002 11:37:36 AM]
What to do if you don't have Adobe Acrobat Reader
You have two choices:
Choice 1. Download the Free Reader now
To read the articles on this web site, you'll need the free Acrobat Reader plug-in installed on your
PC. With millions of Acrobat documents now on the Web, it's an essential surfing accessory.
To download free, the latest version of the Acrobat reader from the Adobe web site, click here.
Choice 2. See if the article is available in plain text
A limited number of our most popular articles are available in plain text. You can read these
without the Acrobat Reader. Here's the full list:
How to Make a Bootable CD
How to Dual Boot Windows 2000
How to Build a Firewall
Understanding IPv6
Understanding NAT (Network Address Translation)
Understanding the OSI 7 Layer Model
TCP/IP Explained
Troubleshooting Monitor Problems
Windows Registry Tutorial
Understanding DHCP
The Windows Scripting Host Explained
Products * Buy * Search * Contact us * Home
Viewing PC Support Advisor and PC Network Advisor with Acrobat Reader
http://www.itp-journals.com/acrobat.htm [9/16/2002 11:37:46 AM]
W
ith the growth of the In-
ternet, TCP/IP has now be-
come a must-have protocol
for most computer networks. It pro-
vides a single network protocol that is
supported by almost every type of
computer system, a plethora of appli-
cations that use it, and it is well suited
to both large and small networks. Its
also essential if you wish to set up an
intranet.
The downside of TCP/IP is that,
unlike protocols such as IPX, it needs
addresses and configuration settings
to be defined on each computer or pe-
ripheral onthe network. This canentail
animmense amount of systemadmini-
stration work.
DHCP stands for Dynamic Host
Configuration Protocol, and is used to
centrally allocate and manage TCP/IP
configurations of client nodes. If
youve got more than a handful of
computers to manage, then DHCP can
help to save a great deal of time and
trouble in setting up and administer-
ing a TCP/IP network. DHCP offers
the following features:
G It allows you to define pools of
TCP/IP addresses, which are then
allocatedto client PCs bythe server.
These pools are called scopes in
DHCP terminology.
G Not only are the TCP/IP addresses
handed out, so are all the related
configuration settings like the sub-
net mask, default router, DNS serv-
er, that are required to make
TCP/IP work correctly.
G DHCP works across most TCP/IP
routers and allocates IPs according
tothe subnet the request camefrom.
This means you wont need to re-
configure a PC that is moved from
one subnet to another.
G Addresses can be leasedfor periods
of time - so an IP address that is not
used for the duration of the lease is
put back into the unallocated pool.
This helps recover TCP/IP ad-
dresses that are no longer used.
What Do I Need?
To use DHCP you need a DHCP
server (to allocate the addresses and
maintain a database) and DHCP cli-
ents, which will be discussed later.
A DHCP server is included in Win-
dows NTServer 3.51 and4.0. Although
this article is concentrating on NT
Server, DHCP isnt a Microsoft stand-
ard and is available from other ven-
dors for NT (such as MetaInfo), and on
other platforms. For more information
see the DHCPFAQ, whichis discussed
below.
How Does DHCP Work?
When a DHCP client is first
switched on, it sends a broadcast
packet on the network with a DHCP
request. This is picked up by a DHCP
server, whichallocates anIPaddress to
the PC, from one of the scopes (the
pools of addresses) it has available.
Each DHCP scope is used for a differ-
ent TCP/IP network segment. On net-
works with routers that support
DHCP, extra information is added to
the request by the router to tell the
server which network the request
came from. The DHCP server uses this
information to pick an address from
the correct scope. The server replies to
the client, allocating it the TCP/IP ad-
dress and settings required.
However, DHCP doesnt allocate
the address permanently. It tells the
client that it has leased the address
to it for a specific time period, which
you as administrator can control. By
default DHCP is installedwith a three-
day lease period. When the lease ex-
pires, the client can ask the server to
renew the lease. If the DHCP server
doesnt hear fromthe client beyondthe
expiry of the lease period, it will put
that address back in the pool ready to
be re-used.
When the DHCP client obtains a
lease on an address, it knows howlong
the lease period is. So it knows that it
can use the address without reference
to the DHCP server until the lease ex-
pires. When it does expire, it can re-
quest a renewal. The implicationof this
Issue 87 (September 1997) Page 11 File: C04102.1
Setting up TCP/IP on a network is essential if you wish to build an intranet. However, defining
an addressing system and setting up the correct address on each workstation and server is far
from trivial. Dynamic Host Configuration Protocol can be a great help.
By Howard Richards
The downside of TCP/IP is that, unlike
protocols such as IPX, it needs addresses
and configuration settings to be defined
on each computer or peripheral on the
network. This can entail an immense
amount of system administration work.
Understanding DHCP
PC Network Advisor
Connectivity:Overview
is that changing DHCP settings on the
server wont instantly change all your
DHCP client PCs, as they wont find
out about the changes until they ask
the server to renew their lease. This is
one factor you need to consider when
you decide your lease period.
BeforeYouI nstall
Tempting as it might be to install
DHCPright nowandstart settingit up,
there are a few things youll need to
investigate to make sure it will work.
The first is to check whether DHCP is
supported on the network clients you
have on your network. At present, the
following are known to support
DHCP:
G Windows NT and Windows 95
(built-in).
G Windows for Workgroups (using
Microsofts 32-bit TCP/IP stack).
G HPs JetDirect range of network
printer cards.
G Some other third-party TCP/IP
stacks.
G Some versions of Unix, such as So-
laris 2.6.
There is a DHCP FAQ at http://-
web.syr.edu/~jmwobus/comfaqs/-
dhcp.faq.html that includes a more
comprehensive list of DHCP-sup-
ported clients. If a particular client
doesnt support DHCP, youll need to
manually allocate a TCP/IP address
and ensure that your DHCP server
doesnt try to hand that address out by
excluding it from the relevant scope.
The second item to check is router
support for DHCP if you have a wide-
area network. DHCP clients use a
broadcast packet to find a DHCP serv-
er, so if a client is on one side of a
router, and the server on the other, it is
possible the router will filter out those
broadcasts. The recent software revi-
sions on many routers include support
for DHCP-forwarding (see the list be-
low), but it isnt normally enabled by
default, so youll need to get this fea-
ture switched on. Routers that do sup-
port DHCP are:
G Cisco revisions 9.21 and 10.0 (and
above).
G 3Com: version 8.0 includes support
for DHCP.
G Wellfleet/Bay networks: Enabling
BOOTPon version 9.00 (andabove)
of BayRs.
Search your router documentation
for more details of DHCP support and
how to enable the service. Note that if
youre connected to the Internet, your
firewall and router should be config-
ured to block all DHCP-related traffic.
DHCP uses the same TCP/IP port as
BOOTP, so blocking port 67 for the
UDP protocol will allow this.
Finally youll need to consider the
impact of DHCP on any domain name
servers (DNS) you have. The dynamic
allocation of TCP/IP addresses under
DHCP means that clients can change
their TCP/IP addresses. If you have a
domain name server with a static text
file of IP addresses and host names,
this will require maintenance to keepit
in sync with DHCP. A more efficient
methodis to use the domain name serv-
er service that is built into NT Server
version 4.0, as this can be linked to
DHCP, so that it automatically knows
about DHCP changes of TCP/IP ad-
dresses. Such a service is known as
DDNS (Dynamic Domain Name Serv-
er).
If you are still using NT server 3.5
and you dont want to upgrade to NTS
4.0 for this feature, you might consider
a third-party solution such as Meta-
Infos TCP/IP suite which incorpo-
rates linked DHCP and DDNS servers.
AnExample
Lets follow an example to see this
inaction. I have twonetworksegments
(Marketing and Finance) linked by a
TCP/IP router. The Marketing seg-
ment is a class B network (130.1.0.0),
and the Finance segment is a class C
network (192.2.2.0). My router con-
nects these together, and uses the ad-
dresses 130.1.0.1 and 192.2.2.1. My NT
server that IminstallingDHCPonwas
installed as 130.1.0.32, and Ive got a
Unix server that doesnt support
DHCP at address 130.1.0.33.
File: C04102.2 Issue 87 (September 1997) Page 12
Tips
G A recommendation to anyone who is converting an existing TCP/IP
network to use DHCP is to start small, with just one or two clients, and
restrict the DHCP scopes to two or three verified unused addresses for
testing purposes. This helps avoid the possible problem of DHCP allo-
catingthe IPaddresses of existingnetworknodes. Once youve got DHCP
working for the test clients, youcan alter the scopes to cover the full range
of addresses, and convert the remaining clients to use DHCP.
G The DHCP Manager utility can be run remotely on NT workstations, so
you dont have to work at the NT Server when managing DHCP servers.
Youcaninstall it fromthe NTServer CD-ROMfromthe\SUPPORT\CLI-
ENTS\SRVTOOLS\WINNT\i386 directory.
When a DHCP client is first switched
on, it sends a broadcast packet on the
network with a DHCP request. This
is picked up by a DHCP server, which
allocates an IP address to the PC,
from one of the scopes.
PC Network Advisor
Connectivity:Overview
Step1
The first step is to document all the
network addresses already in use, es-
tablish what ranges DHCP will use,
and check you knowwhat TCP/IPset-
tings each network requires. Ive de-
cided that I want to keep a few
addresses (241-254) spare in each net-
work that I can allocate to other clients
which dont support DHCP in future.
So, for Marketing, the range of ad-
dresses I can use is 130.1.0.2 to
130.1.0.240 (excluding 130.1.0.32 and
130.1.0.33). For Finance, its 192.2.2.2 to
192.2.2.240.
As you can see, Ive avoided the
addresses used by the router, and the
non-DHCP hosts. Ive excluded the
router because that shouldhave a fixed
TCP/IP address. The DHCP server
cannot also be a DHCP client, so I have
to manually configure this NTServers
TCP/IP address. NT servers that are
not running DHCP or WINS services
can be configured using DHCP.
Step2
Now, we install the DHCP server
software on the NT Server. Its under
the Networks control panel, by select-
ing the Add Software button, under
the TCP/IP and related components
heading. After rebooting the server,
you can administer it from the DHCP
Manager tool (see Figure 1), which
should be available on either the Start
Menu or the Program Manager. The
left-hand pane shows DHCP servers
and the scopes that are defined. The
right-hand pane shows the DHCP op-
tions set for the selected scope.
Step3
Now, Create one scope for each net-
work segment. Ive got two segments,
so I create two scopes (Marketing and
Finance) using the Scope/Create
menu option. To define a scope you fill
in the dialog box as shown in Figure 2.
The start and end addresses for the
Marketing scope are 130.1.0.2 and
130.1.0.240. As this is a class Bnetwork,
the subnet mask is 255.255.0.0. In this
scope, I also have to define the exclu-
sion of the two servers, so a DHCP
client wont get allocated those ad-
dresses. You can have single-address
exclusions or ranges, as shown here.
Next I have to define the lease dura-
tion - in this example the default of
three days is used. The name and com-
ment are just for descriptive purposes.
Once youve defined the scope and
clicked OK, youll be prompted to
make the scope active.
The length of the lease period de-
pends on your environment. If its not
rapidly changing you can set longer
lease periods (more than three days),
so that leases are re-assigned only if
computers leave the network. If your
environment is continually changing
you might consider using shorter lease
periods, so that changes to the DHCP
options (discussed below) are distrib-
uted quickly. When you first start to
use DHCP its best to stick to short
leases of a few hours, so any problems
in your DHCP settings are changed
without needing to visit all the DHCP
clients to force renewals. Once things
are stable, you can gradually increase
the lease periods on the server.
Step4
Define the TCP/IP options for
DHCP - options can be set globally for
DHCP, individually for each scope, or
as a default. Aglobal option will apply
to any DHCP scope, whereas the
scope-level option is defined differ-
ently for each scope. An example here
is the router address, which will differ
for the Marketing and Finance scopes.
Default options can be used to define
something globally that can be over-
ridden by a scope setting for excep-
tions. In this example, all the DHCP
options except the Router address are
the same for both scopes, so Ill use the
Global settings. DHCP supports a
large range of options that can be de-
fined, but most installations will only
require the following:
003 Router.
006 DNS Servers.
015 Domain Name.
044 WINS/NBNS servers.
046 WINS/NBT node type.
If you look again at Figure 1, you
can see (from the map of the world
icons) that all these settings have been
defined as Global for DHCP, except
for the router address, which is differ-
ent for each network. Youll only need
options 044 and 046 if youre using a
WINS server - if youre not using
WINS, you dont need to define either
of options 44 and 46.
When you set option 044, youll get
the following message:
Warning : In order for WINS
to function properly, you
must now set option 46
(WINS/NBT Node Type), and set
it to either 0x02 (P-Node),
0x04 (M-Node) or 0x08 (H-
Node)
The various node types tell Mi-
crosoft network clients howto register
and look up computer names on Mi-
crosoft networks. The best option to
use is 0x08 (H-Node). This mode tells
the client PC to use the WINS server
when finding the address of another
computer or a share, but that it should
fall back to using broadcasts if the
WINS server isnt available. This
means that it reduces the number of
Issue 87 (September 1997) Page 13 File: C04102.3
Figure 1 - The DHCP Manager tool.
PC Network Advisor
DHCP
Connectivity:Overview
broadcasts on your network, and
speeds up browsing shares, printers
and so forth. For more detail on node
types, see the NT Server documenta-
tion (the TCP/IP section, chapter 3), or
search the Microsoft TechNet database
online at www.microsoft.com for arti-
cle Q119493.
Step5
Test some DHCP clients by chang-
ing these to use DHCP. If youve al-
ready got manually configured
TCP/IP settings on existing comput-
ers, youll need to clear these first as
they can override the settings that
DHCP uses. Once youve changed the
PCtouse DHCP, reboot andthe DHCP
client should request and receive the
DHCP-allocated address and settings.
You can check that DHCP is working
on Windows 95 by using the
WINIPCFG.EXE utility (from the
Start/Run menu). This shows the
TCP/IP settings, and also has options
to force the PC to renew or release its
DHCP settings.
There is a similar utility available
for Windows NT, included in the NT
Resource Kit, or alternatively you can
use the built-in command-line utility
IPCONFIG.
Other I ssues
You can run more than one DHCP
server on a network. You must not,
however, define the overlapping or
identical scopes on different DHCP
servers, as NTs DHCP servers (unlike
WINS) dont communicate with each
other. This could result in two nodes
being allocated the same TCP/IP ad-
dress. MetaInfo produces a DHCP
server for NT which does support
communication between servers for
addedresilience shouldyoudesire this
feature - check their company web site
at www.metainfo.com for more infor-
mation.
If you have problems with getting
DHCP to work, dont forget to use the
Microsoft TechNet database available
for free at Microsofts web site, as well
as the books online on the NT Server
CD-ROM for reference.
DHCP is a very stable service, and
once youve set it up, it requires very
little maintenance. You shouldcheck it
at least once each month to see how
many free addresses are available, to
plan your network growth and pre-
vent the server from running out. Best
of all, you will rarely need to visit a
workstation ever again to configure its
TCP/IP settings.
File: C04102.4 Issue 87 (September 1997) Page 14
The Author
Howard Richards ([email protected])
runs an IT consultancy.
PCNA
Figure 2 - Defining a scope.
When the DHCP client obtains a lease
on an address, it knows how long the lease
period is. So it knows that it can use the
address without reference to the DHCP
server until the lease expires.
PC Network Advisor
Connectivity:Overview
OSI 7 Layer Model Tutorial
The OSI Reference model is clearly and simply explained in this free tutorial from PC
Network Advisor.
This is a plain text version of the original article. Click OSI Reference Model PDF Version for the
original version complete with pictures.
If you spend much time in the company of network technicians you will eventually hear
them say something like "That's Layer 2 only" or "That's our new Layer 4 switch". The
technicians are referring to the OSI 7 Layer Reference Model. "OSI" stands for Open
System Interconnection.
The OSI Reference model defines seven layers that describe how applications running
upon network-aware devices may communicate with each other. The model is generic
and applies to all network types, not just TCP/ IP, and all media types, not just
Ethernet. It is for this reason that any network technician will glibly throw around the
term" Layer 4" and expect to be understood.
It should be noted, however, that most protocols in day-to-day use work on a slightly
modified layer system. TCP/ IP, for example, uses a 6-rather than a 7-layer model.
Nevertheless, in order to ease the exchange of ideas, even those who only ever use
TCP/ IP will refer to the 7-layer model when discussing networking principles with
peers from a different networking background.
Confusingly, the OSI was a working group within the ISO (International Standards
Organisation) and, therefore, many people refer to the OSI Reference model as the
ISO Reference model. They are referring to the same thing.
Traditionally, layer diagrams are drawn with Layer 1 at the bottom and Layer 7 at the
top. The remainder of this article describes each layer, starting from the bottom, and
explains some of the devices and protocols you might expect to find in your data centre
operating at this layer.
Layer 1 of the 7 layer Model is the Physical Layer and defines the physical and
electrical characteristics of the network. The NIC cards in your PC and the interfaces
on your routers all run at this level since, eventually, they have to pass strings of ones
and zeros down the wire.
Layer 2 is known as the Data Link Layer. It defines the access strategy for sharing
the physical medium, including data link and media access issues. Protocols such as
PPP, SLIP and HDLC live here.
On an Ethernet, of course, access is governed by a device's MAC address, the six byte
number that is unique to each NIC. Devices which depend on this level include bridges
and switches, which learn which segment's devices are on by learning the MAC
addresses of devices attached to various ports.
OSI Reference Model Tutorial
http://www.itp-journals.com/OSI_7_layer_model_page1.htm (1 of 2) [9/16/2002 11:38:45 AM]
This is how bridges are eventually able to segment off a large network, only forwarding
packets between ports if two devices on separate segments need to communicate.
Switches quickly learn a topology map of the network, and can thus switch packets
between communicating devices very quickly. It is for this reason that migrating a
device between different switch ports can cause the device to lose network
connectivity for a while, until the switch, or bridge, re-ARPs.
Go to "OSI Reference Model" Page 2
Related Articles
TCP/IP Tutorial G
Understanding DHCP G
Network Address Translation G
IPv6 Tutorial G
Troubleshooting CISCO
Routers
Troubleshooting Monitor
Problems
Removing Unwanted DLLs
Troubleshooting Microsoft
Word
Understanding RAID
Understanding VPNs
How to Use DHCP
How to Conduct a Security
Audit
Giving a Technical Training
Course
Diagnosing & Fixing
Motherboard Faults
How to Detect Forged Email
Understanding Virtual Network
Computing
Windows 2K Tips
Understanding the Windows
Scripting Host
Upgrading a Server from
Windows NT to Windows
2000
Automating Windows 2000
Installation
Understanding Intrusion
Detection Systems
How to Measure Helpdesk
Performance
Securing Windows NT
Understanding PHP
Inkjet Printer Cartridge
Survey
Home Publications Subscribers About ITP Contact ITP
If you experience any problems with this site, contact [email protected]
The content of this web is copyright 2002, International Technology Publishing
Make Tech Support Easy with PC Support Advisor
http://www.itp-journals.com/ (2 of 2) [9/16/2002 11:39:10 AM]