M03-Installing and Managing Network Protocols
M03-Installing and Managing Network Protocols
Level III
Note: - Once you complete the steps, the IP and DNS addresses will be reset from the adapter, and your
computer will receive a new dynamic configuration from DHCP.
Change to dynamic IP address (DHCP) from Control Panel
• To configure a network adapter to use a dynamic IP address using Control
Panel, use these steps:
• Step 1:- Open Control Panel.
• Step 2:- Click on Network and Internet.
• Step 3:- Click on Network and Sharing Center.
• Step 4:- On the left pane, click the “Change adapter settings” option.
• Step 5:- Right-click the network adapter and select the Properties option.
• Step 6:- Select the “Internet Protocol Version 4 (TCP/IPv4)” option.
• Step 7:- Click the Properties button.
• Step 8:- Select the “Obtain an IP address automatically” option.
• Step 9:- Select the “Obtain the following DNS server address automatically” option.
Step 4: -Type the following command to view the complete TCP/IP network configuration
and press Enter: ipconfig /all.
Once you complete the steps, you will have an overview of the PC's entire TCP/IP
configuration.
Refresh network settings
To release and renew the network configuration with Command Prompt, use these steps:
1. Step 1:Open Start.
2. Step 2:- Search for Command Prompt, right-click the top result, and select
the Run as administrator option.
3. Step 3:- Type the following command to remove the current network configuration
and press Enter: ipconfig /release
4. Step 4:- Type the following command to reconfigure the network configuration
and press Enter: ipconfig /renew
After you complete the steps, the first command will clear the current configuration, and the
second command will fetch new settings from the DHCP server to resolve connectivity
issues. If the dynamically assigned settings have not expired in the server, it is common to
see the same IP address reconfigured on the device.
Refresh DNS settings
To flush and rebuild the current DNS cache entries on Windows 10, use these steps:
1. Step 1:- Open Start.
2. Step 2:- Search for Command Prompt, right-click the top result, and select
the Run as administrator option.
3. Step 3:- Type the following command to clear the DNS system cache on the device
and press Enter: ipconfig /flushdns
Once you complete the steps, the entries stored in the DNS cache of Windows
10 will be deleted and refreshed. Usually, this command will come in handy
when you cannot connect to another computer or website using the host or
domain name due to outdated information in the local cache.
UNIT TWO: NETWORK PROTOCOLS APPLICATION
This unit is developed to provide you the necessary information regarding the
following content coverage and topics:
Common network protocol applications
Evaluating user requirement and recommend network-protocol services
Applying IP addressing scheme
Network layers
This unit will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
Understand common network protocol applications
Evaluate user requirement and recommend network-protocol services
Apply IP addressing scheme
2. Introduction to network protocol applications
Network protocol applications refer to the specific software or programs that utilize network
protocols to perform various tasks or enable specific functionalities within a computer network.
These applications are designed to communicate, exchange data, and provide services over the
network by adhering to standardized protocols.
Common network protocol applications
It seems like you might be looking for information on how network protocols are applied in real-
world scenarios or applications. Let us explore some practical applications of network protocols:
1. Web Browsing (HTTP/HTTPS):
Protocol: HTTP (Hypertext Transfer Protocol) and its secure version HTTPS are
fundamental for web browsing. When you access a website, your browser
communicates with the web server using these protocols to request and receive
web pages.
2. Email Communication (SMTP, POP3, IMAP):
Protocols: SMTP (Simple Mail Transfer Protocol) is used for sending emails,
while POP3 (Post Office Protocol) and IMAP (Internet Message Access Protocol)
are used for retrieving emails from mail servers. These protocols enable email
communication between clients and servers.
3. File Transfer (FTP, SFTP):
– Protocols: FTP (File Transfer Protocol) and its secure version SFTP (SSH File
Transfer Protocol) are used for transferring files between computers. These
protocols are commonly used for uploading and downloading files to and from
servers.
4. Remote Login (SSH):
Protocol: SSH (Secure Shell) is used for secure remote login to a computer or server. It
provides a secure way to access and manage remote systems over an unsecured network.
5. Voice and Video Calls (VoIP, RTP):
Protocols: VoIP (Voice over Internet Protocol) is a technology that enables voice
communication over the internet. RTP (Real-Time Transport Protocol) is often used to
transmit audio and video in real-time during VoIP calls.
6. Domain Name Resolution (DNS):
Protocol: DNS (Domain Name System) translates human-readable domain names into IP
addresses. This is crucial for accessing websites using domain names rather than numerical
IP addresses.
7. Network Management (SNMP):
Protocol: SNMP (Simple Network Management Protocol) is used for monitoring and
managing network devices. It allows administrators to collect information, configure devices,
and receive notifications about network events.
8. Instant Messaging (XMPP, IRC):
Protocols: XMPP (Extensible Messaging and Presence Protocol) and IRC (Internet Relay
Chat) are protocols used for real-time messaging and chat applications. They enable users to
send messages, join chat rooms, and share files.
9. Video Streaming (RTSP, HLS):
Protocols: RTSP (Real Time Streaming Protocol) and HLS (HTTP Live Streaming) are used
for streaming audio and video content over the internet. They facilitate the efficient delivery
of multimedia content to end-users.
10. Database Communication (JDBC, ODBC):
Protocols: JDBC (Java Database Connectivity) and ODBC (Open Database Connectivity) are
protocols that enable communication between applications and databases. They allow
applications to query, update, and manage data in databases.
These are just a few examples, and there are many other network protocols designed for specific
applications and services. The use of these protocols ensures efficient and secure communication across
diverse networked environments.