0% found this document useful (0 votes)
81 views69 pages

Lesson 3 2nd Grading

This document provides an overview of internet protocols and related concepts: - Internet protocols are sets of rules that govern communication within and between computer networks. They ensure messages arrive within a certain time and initiate alternative actions if timing rules are not met. - Common protocols include TCP/IP, IPX/SPX, NetBEUI, AppleTalk, HTTP, FTP, SSH, Telnet, POP3, IMAP, and SMTP. - IP addressing and subnet masking allow unique identification of devices on a network. IPconfig displays a device's IP address configuration. Ping tests connectivity to other devices.

Uploaded by

tomsawyer1105
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views69 pages

Lesson 3 2nd Grading

This document provides an overview of internet protocols and related concepts: - Internet protocols are sets of rules that govern communication within and between computer networks. They ensure messages arrive within a certain time and initiate alternative actions if timing rules are not met. - Common protocols include TCP/IP, IPX/SPX, NetBEUI, AppleTalk, HTTP, FTP, SSH, Telnet, POP3, IMAP, and SMTP. - IP addressing and subnet masking allow unique identification of devices on a network. IPconfig displays a device's IP address configuration. Ping tests connectivity to other devices.

Uploaded by

tomsawyer1105
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 69

Lesson 3:

INTERNET
PROTOCOLS

Internet Protocols
are

sets of rules
governing
communication within
and between
computers on a
network

require messages
to arrive within a
certain amount of
time so that
computers do not
wait indefinitely for

also initiate
alternative actions if
the network does not
meet the timing
rules.

The main functions of


protocols are:
Identifying errors
Compressing the
data
Deciding how the

Addressing the
data
Deciding how to
announce sent and
received data

COMMON
PROTOCOLS:
TCP/IP:

The
Transmission Control
Protocol /Internet
Protocol (TCP/IP) suite
of protocols has

internetworking. TCP/IP
represents a set of public
standards that specify
how packets of
information are
exchanged between
computers over one or

IPX/SPX:

Internetwork

Packet
Exchange/Sequenced
Packet Exchange is the
protocol suite originally
employed by Novell
Corporations network

It delivers functions
similar to those included
in TCP/IP.
NetBEUI: NetBIOS
Extended User Interface
is a protocol used
primarily on small

NetBEUI cannot be routed


or used by routers to talk
to each other on a large
network.
AppleTalk: AppleTalk is
a protocol suite used to
network Macintosh

It is composed of a
comprehensive set of
protocols that span the
seven layers of the Open
Systems Interconnection
(OSI) reference model.

HTTP:

Hypertext
Transfer Protocol governs
how files such as text,
graphics, sound, and
video are exchanged on
the World Wide Web

FTP:

File Transfer
Protocol provides
services for file transfer
and manipulation. FTP
allows multiple
simultaneous
connections to remote

SSH:

Secure Shell is
used to securely connect
to a remote computer.
Telnet: It is an
application used to
connect to a remote
computer that lacks

POP3:

Post Office
Protocol is used to
download e-mail from a
remote mail server.
IMAP: Internet Message
Access Protocol is also
used to download e-mail

SMTP:

Simple Mail
Transfer Protocol is used
to send e-mail to a
remote e-mail server.

IP Addressing
An IP address is a
number that is used to
identify a device on the
network. Each device on a
network must have a
unique IP address to

An IP address consists of
a series of 32 binary bits
(1s and 0s). It is very
difficult for humans to
read a binary IP address.
For this reason, the 32
bits are grouped into four

An IP address, even in this


grouped format, is hard
for humans to read, write,
and remember. Therefore,
each octet is presented as
its decimal value,
separated by a decimal

This format is called


dotted-decimal notation.
When a host is configured
with an IP address, it is
entered as a dotteddecimal number, such as
192.168.1.5.

The logical 32-bit IP


address is hierarchical
and is composed of two
parts:
the first part identifies
the network, and
the second part

For example, if a host has


an IP address of
192.168.18.57, the first
three octets, 192.168.18,
identify the network
portion of the address,
and the last octet, 57,

This is called hierarchical


addressing, because the
network portion indicates
the network on which
each unique host address
is located.

Five Classes of IP Address:


Class A - Used for large
networks, implemented
by large companies and
some countries

Class

B - Used for
medium-sized networks,
implemented by
universities.
Class C - Used for small
networks, implemented
by ISPs for customer

Class

D - Used for
special use for
multicasting
Class E - Used for
experimental testing

Class

D - Used for special


use for multicasting
Class E - Used for
experimental testing

Subnet Mask
The subnet mask
indicates the network
portion of an IP address.
Like the IP address, the
subnet mask is a dotteddecimal number.

Default subnet masks for


the first three classes of
IP addresses:
255.0.0.0: Class A,
which indicates that the
first octet of the IP
address is the network

255.255.0.0:

Class B,
which indicates that the
first two octets of the IP
address are the network
portion
255.255.255.0: Class C,
which indicates that the
first three octets of the IP

IpConfig
Ipconfig is a command
used to find out the IP
address of a certain
network you are
connected to

How to use the


ipconfig command?
1) Click on Start Button,
then type cmd (command
prompt) on the search
box.
2) A black screen will

3) Type ipconfig and press


enter.

Assigning a static IP
Address
1. Open the Control
Panels Network
Connections icon.
2. Open the icon
representing your

3. Click the Properties


button in the Status
dialog box.
4. From the list of items,
choose Internet Protocol
(TCP/IP).

5. Click the Properties


button. The Internet
Protocol (TCP/IP)
Properties dialog box
appears.

6.Type the IP address for


your computer. Enter the
appropriate IP Address in
the IP address section.
7. Type a subnet mask.
The value used on a local
network is commonly

but it can be different,


such as 255.255.255.127.
8. Type the default gateway

address. The default


gateway is the router, so
type the routers address.
Figure 54 shows an example
of assigning an IP Address,

9.Type the address for the


preferred DNS server. The
address should be
obtained from your
Internet Service Protocol.
It is used to help your
computer find web pages
and other addresses on

10. Type the address for


the alternate DNS server.
The alternate Domain
Name System (DNS)
servers IP address is
something that your ISP
provides.

11. Click OK to confirm


the settings.
12. Close all other open
dialog boxes and
windows.

Assigning

a Dynamic

IP Address
Dynamic Host
Configuration
Protocol (DHCP) is a
software utility used to
dynamically assign IP

DHCP server can be


set up and the hosts
can be configured to
automatically obtainan
IP address.

These are the IP address


information that a DHCP
server can assign to hosts:
IP address
Subnet mask
Default gateway
Optional values, such as a
Domain Name System (DNS)
server address

The

DHCP server
receives a request
from a host. The
server then selects IP
address information
from a set of
predefined addresses

If the host accepts the


offer, the DHCP server
leases the IP address
for a specific period of
time.

You

can configure a
computer to accept
an IP address from a
DHCP server by
clicking the Obtain an
IP address
automatically option

Ping
The ping is a
Command Prompt
command used to
test the ability of the
source computer to
reach a specified

The

ping command
operates by sending
Internet Control
Message Protocol
(ICMP) Echo Request
messages to the
destination computer

How

many of those
responses are
returned, and how
long it takes for them
to return, are the two
major pieces of
information that the

Ping Command Syntax Syntax


-t

Using this option will ping


the target until you force it to
stop using Ctrl-C.
-a - This ping command option
will resolve, if possible, the
hostname of an IP address
target.
-n count This option sets the

-l

Use this option to set the size,


in bytes, of the echo request
packet from 32 to 65,527. The
ping command will send a 32
byte echo request if you do not
use the -l option.
-f Use this ping command
option to prevent ICMP Echo
Requests from being fragmented
by routers between you and the

-i

TTL This option sets the


Time to Live (TTL) value, the
maximum of which is 255.
-v TOS This option allows you
to set a Type of Service (TOS)
value.
-r count Use this ping
command option to specify the
number of hops between the
computer and the target

-s

count Use this option to


report the time, in Internet
Timestamp format, that each
echo request is received and
echo reply is sent.
-w timeout Specifying a
timeout value when executing
the ping command adjusts the
amount of time, in milliseconds,
that ping waits for each reply.

-s

count Use this option to


report the time, in Internet
Timestamp format, that each
echo request is received and
echo reply is sent.
-w timeout Specifying a
timeout value when executing
the ping command adjusts the
amount of time, in milliseconds,
that ping waits for each reply.

-R

This option tells the ping


command to trace the round trip
path.
-S srcaddr
Use this option to
specify the source address.
-4 This forces the ping
command to use IPv4 only but is
only necessary if target is a
hostname and not an IP address.

-6

This forces the ping


command to use IPv6 only but
as with the -4 option, is only
necessary when pinging a
hostname.
target This is the destination
you wish to ping, which is either
an IP address or a hostname.
/? Use the help switch with the
ping command to show detailed

-6

This forces the ping


command to use IPv6 only but
as with the -4 option, is only
necessary when pinging a
hostname.
target This is the destination
you wish to ping, which is either
an IP address or a hostname.
/? Use the help switch with the
ping command to show detailed

Using the ping


Command
1.)Click on Start Button,
then type cmd (command
prompt) on the search box.
2) A black screen will
appear as shown in the
figure below.

This output shows several


things:
1. Decoding names to
network addresses A
domain name server
(DNS) resolves machine
names to numeric
addresses.

2. Round-trip
response time The
parts of the replies that
say things like
time=105ms show you
how long it took from
the time the client
machine sent out the

3. Routing hop count


The part of the replies that
says TTL=50 tells you about
the route the message took
from one point to another.
The acronym TTL stands for
Time to Live, which is a
measure of how many
rerouting from one point to

You might also like