0% found this document useful (0 votes)
15 views22 pages

Protocols 1

The document provides an overview of network protocols, defining their functions, types, and configurations, particularly focusing on TCP/IP. It explains IP addressing, classifications, subnetting, and the roles of various protocols in network communication. Additionally, it covers the importance of DNS, routing protocols, transport protocols, and email protocols in managing network operations.

Uploaded by

Davy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views22 pages

Protocols 1

The document provides an overview of network protocols, defining their functions, types, and configurations, particularly focusing on TCP/IP. It explains IP addressing, classifications, subnetting, and the roles of various protocols in network communication. Additionally, it covers the importance of DNS, routing protocols, transport protocols, and email protocols in managing network operations.

Uploaded by

Davy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 22

Network Protocols

Topics
• Definition
• Functions of Protocols
• TCP/IP Overview
• TCP/IP Configuration
• Other Protocols
Protocols
•Protocol is a rule that governs how networks communicate
i.e. it is a method of communication between network nodes.
•Integral part of both software and hardware adhered to by
software & hardware developers.
•Only clients and servers using the same protocols to
communicate.
•There are many different types of protocols available to
accomplish different purposes
•Some work at different layers of the OSI reference model
and some work together in what is referred to as protocol
stack e,g TCP/IP
•Protocols include: IPX/SPX, TCP, IP, SNMP, HTTP, SMTP, POP,
NETBIOS, Apple Talk, SDLC etc
Functions of a protocol
i. Define the structure of the message information i.e. function
of the parity bit to the transmission data
ii. Coping up with signal errors through
(a)block checksum (a code generated and sent after a certain
number of bytes have been transmitted
Matching checksum values at both transmitter and receiver
implies absence of errors
(b)or using a polynomial code (a mathematical code that
detects burst errors
iii. Control information flow through windowing (the
transmission of multiple packets that requires acknowledgment
from receiving machine.
TCP/IP Overview
•The most common protocol is TCP/IP because it can be
supported by other operating systems e.g. LINUX and
Windows (compatibility)
•TCP/IP is fondly referred in short as IP
•There are many versions of IP protocols. The present and
commonly used one is IPv4 or simply IP that has a 32-bit
address (a maximum of 232 =4,294,967,296 addresses)
•IP (internet protocol) is responsible for routing and re-
routing packets in a network
•TCP(transmission control protocol is responsible for breaking
large messages into packets, control of packet flow to ensure
delivery and re-assembling of packets into a complete
message at the receiving node)
TCP/ IP Configuration
IP addressing
•The location of communicating nodes must be
known in order to transmit
•IP address is a number assigned to a network
node for identification and location
•It is composed of a set of four dotted decimal
numbers each of which range 0-255 in value e.g.
of an IP address is 172.68.1.10
•An IP address is split into two components; a
Network ID and an Host ID
IP addressing
Network ID (NID)
- Is the first part of the IP address
- It identifies the network segment (physical
network) in which a particular node is located in
the network.
- All nodes on the same segment will have the
same network ID.
Host ID (HID)
- Is the unique ID of the device/node
-It is the second part of the IP address
•Question. How many components are possible
with an IP address w.x.y.z?
IP Address Classification
•There are five IP classes namely A, B, C, D and
E
•They define the division between networks
and host ID.
•Are based on the physical location of the
network that an organization has.
A

E
Class “A” IP Address
•Uses only the first of the four IP decimal number
parts for network Id and the next three for the
host Id
•Out of the 32-bit addresses, it uses 7-bit for
NetID and 24-bit address for HostId leaving 1-bit
(binary 0) for class order. Therefore a prefix of 8
bits
•Allows the use of 126 (27-2) networks and
16,777 214 (224-2) hosts per network
•Good for organizations with very large number
of hosts e.g the internet (WAN)
Class “B” IP Address
•Uses the first two IP address Network ID and
last two parts for host id
•Out of the 32-bit addresses, it uses 14-bit for
NetID and 16-bit address for HostId leaving 2-
bits (binary 10) for class order. Therefore a
prefix of 16 bits
•Allows the use of 16384 (214) networks and
65534(216-2) hosts per network
•Usually assigned to medium sized to large sized
organizations with branches/campuses
distributed over regions (MANs)
Class “C” IP Address
•Uses the first three IP address parts for NetId
and the last part for HostId
•Out of the 32-bit addresses, it uses 21-bit for
NetID and 8-bit address for HostId leaving 3-bits
(binary 110) for class order. Therefore a prefix
of 24 bits
•Allows the use of 2097152 (221) networks and
fewer 254(28-2) hosts per network
•Used for small sized hosts LANs
•Commonly used because lots of networks are
required than hosts
Class “D” and “E” IP Address
•Class D is allocated to network only and is used for
multicasting networks -
•Class E is neither allocated NID nor HID and is
reserved for future IP expansion and experimental
use.
•Question. What do think is the IP address class for
our 172.168.1.10?
•IP address classes is identified using the first part
(first octet) of the four dotted decimal part . The first
octet range for each class is obtained from binary
number systems range as follows
Class Binary Number range Dotted Decimal range

A 00000000-01111111 0-127

B 10000000-10111111 128-
191
C 11000000-11011111 192-
223
D 11100000-11101111 224-
239
E 11110000-11111111 240-
255
IP Address Assignment Rules
•IP address first part cannot be 127 as it results to
looped back function used to test network
continuity. (ping address=127.0.0.1)
•Bits cannot be all binary 1s for both network and
host Ids (e.g 192.168.1.255); the address is
interpreted as a broadcast rather than a host id or
network id
•Bits as well cannot be all binary 0s (e.g
192.168.1.0 or 0.168.1.16); the address is
interpreted as this network only i.e. cannot
connect to a remote network
•Host Id must be unique to network Id for
identification
Sub netting
A number used in conjunction with IP address to
distinguish between NID and HID of e network

Class Rage 0rder Subnet Prefix Networks Host/Network


A 0-127 0 255.0.0.0 8 126 16,777 214

B 128-191 1-0 255.255.0.0 16 16384 65534


C 192-223 255.255.255.0 24 2097152 254
D 224-239 1-1-1-0 - - - -
E 240-255 1-1-1-1 - - - -
For the following IP addresses, identify the class,
network Id , host Id and correct subnet mask

197. 68.1.1 C 255.255.255.0 197.68.1 1


101. 101.1.0 A 255.0.0.0 101
101.1.0
16.5.1.1 A 255.0.0.0 16
5.1.1
158.58.6.1 B 255.255.0.0 158.58 6.1
171.201.6.1 B 255.255.0.0 171.201 6.1
•Default Gateway
•This is the IP address for the router to which packet
destined for a remote network can be sent by default
•Not a must to address but failure to address it limits the
network to a LAN
•DNS (Domain name server).
•Are servers that provide resolutions of TCP/IP host
names to the IP addresses and are essential for locating
devices on a network i.e. giving names of users
e.g. comp1 or meshack=172.68.1.10.
DNS translates human readable computer host names
into IP address that an equipment require to deliver
information
Other protocols
(a) Routing Protocols: Protocols used for routing and re-
routing packets in the internet
IP (internet protocol) designed for IBM and compatibles while
IPX (Internet Packet Exchange) designed for apple machines
(b) Transport Protocols: used for transmitting/transporting
data
TCP (transmission control protocol) used to transmit large
messages that can be broken into packets, ensures
delivery but slow.
UDP (User datagram Protocol) used to transmit messages that
are too small to fit into one packet or large unbreakable
messages, fast but unreliable.
ICMP (Internet control message protocol) transmits and
manages error messages
(c) Translators
DNS (Domain name system) converts IP address to domain
name and vice versa. ARP (Address resolution protocol)
converts IP address (logical) to MAC address (physical
address)
(d) IP address Assignment
RARP (Reverse address resolution protocol) assigns IP
address statically to nodes.
DHCP (Dynamic host configuration protocol) for dynamic IP
address assignment
(e) E-mail
SMTP (Simple mail transfer protocol) for transferring mails
from one mail server to another mail server.
POP (Post office protocol) for retrieving mails from the mail
server. Once retrieved, mails are deleted in the server.
IMAP (Internet Message Access Protocol) retrieved mails
remain in the mail server
(f) Access Protocols
Telnet for logging on/out of a network.
HTTP (Hypertext transfer protocol) for accessing web
pages (browsing)
FTP (File transfer protocol) for transferring
documents across the network (facilitates
uploading/downloading)
(g) Network Management
IGMP (Internet group management protocol) for
multicasting within TCP/IP
SNMP (Simple network management protocol) for
monitoring network performance; speed, errors
1. Consider the IP address 10110000.01001100.
10110000.01001100 in dotted binary number format
i.Convert and write the number in dotted decimal number
ii.Identity the class, NID, HID and subnet of the IP address
iii. Is it advisable to assign the address to a network node?
Explain
2. Consider the following numbers expressed in IP address
format; 198.192.198.255, 225.199.224.226, 198.292.198.0
and 127.192.198.127
i. Convert 19810 and 12710 to binary numbers
ii. Identity the class, NID, HID and subnet of each of the IP
addresses
iii. Identify and give reasons for one number that is not an IP
address.
iv. Identify and give reasons for an IP address that can be
interpreted as a broadcast, loop back and a multicast

You might also like