Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.

Slides:



Advertisements
Similar presentations
Chapter 2 Network Models.
Advertisements

Chapter Three Network Protocols.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Lesson 7 – THE BUSINESS OF NETWORKING. TCP/IP and UDP Other Internet protocols Important Internet protocols OVERVIEW.
Introduction to TCP/IP
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
Network Protocols and Standards (Part 1). Network Protocols Understanding the concepts of networking protocols is critical to being able to troubleshoot.
Chapter Overview TCP/IP Protocols IP Addressing.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
IP Addressing Basics LAB 8.
Forensic and Investigative Accounting
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Network Protocols.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Huda AL_Omairl - Network 71 Protocols and Network Software.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
11 NETWORK LAYER PROTOCOLS Chapter 5 IP IPX NetBEUI AppleTalk.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Addressing Through the Layers  Data Link Layer Address  Network Layer Address.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Networking Fundamentals Network Protocols. Protocol Rule for how networks communicate Each OSI layer handled by one or more protocols Protocol Suites.
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Mr C Johnston ICT Teacher G055 - Lecture 10 Network Protocols.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to TCP/IP.
Chapter Objectives In this chapter, you will learn:
Protocols and the TCP/IP Suite
Chapter 2 Network Models.
OSI Model IP address.
Computer Networks.
Unit 10 Setting up an IT Network
Network Wiring and Reference
The OSI Model and the TCP/IP Protocol Suite
Using MIS 2e Chapter 6 Appendix
Lecture 6: TCP/IP Networking By: Adal Alashban
Chapter Three Network Protocols.
Web Development & Design Chapter 1, Sections 4, 5 & 6
TASK 4 Guideline.
The OSI Model and the TCP/IP Protocol Suite
Topologies, Protocols and Layers
Unit Network Topologies, protocols and layers Lesson 2
Protocols and the TCP/IP Suite
I. Basic Network Concepts
ECEN “Internet Protocols and Modeling”
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer communications
Networking Theory (part 2)
Chapter 2 Network Models
Protocols 2 Key Revision Points.
Delivering the Data.
Protocols and the TCP/IP Suite
Protocol Application TCP/IP Layer Model
The OSI Model and the TCP/IP Protocol Suite
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Networking Theory (part 2)
Presentation transcript:

Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life

Internet Protocols A protocol is a set of rules. A letter sent through the postal system also uses protocols. Part of the protocol specifies where on the envelope the delivery address needs to be written. If the delivery address is written in the wrong place, the letter cannot be delivered.

Internet protocol works in a similar way. Internet protocols are sets of rules governing communication within and between computers on a network. Protocol specifications define the format of the messages to be exchanged.

The main functions of protocols are: 1. Identifying errors 2. Compressing the data 3. Deciding how the data should be sent 4. Addressing the data 5. Deciding how to announce sent and received data

TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP) suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks.

IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP.

NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other.

AppleTalk: AppleTalk is a protocol suite used to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model.

HTTP: Hypertext Transfer Protocol governs how files such as text, graphics, sound, and video are exchanged on the World Wide Web (WWW). The Internet Engineering Task Force (IETF) developed the standards for HTTP.

FTP: File Transfer Protocol provides services for file transfer and manipulation. FTP allows multiple simultaneous connections to remote file systems.

SSH: Secure Shell is used to securely connect to a remote computer.

Telnet: It is an application used to connect to a remote computer that lacks security features.

POP3: Post Office Protocol is used to download from a remote mail server.

IMAP: Internet Message Access Protocol is also used to download from a remote mail server.

SMTP: Simple Mail Transfer Protocol is used to send e- mail to a remote server.

An IP address is a number that is used to identify a device on the network. Each device on a network must have a unique IP address to communicate with other network devices. Network devices are those that move data across the network, including hubs, switches, and routers. On a LAN, each host (device that sends or receives information on the network) and network device must have an IP address within the same network to be able to communicate with each other.

A person’s name and fingerprints usually do not change. They provide a label or address for the person’s physical aspect— the body. A person’s mailing address, on the other hand, relates to where the person lives or picks up mail. This address can change.

On a host, the Media Access Control 101 (MAC) address is assigned to the host Network Interface Card (NIC) and is known as the physical address. The physical address remains the same regardless of where the host is placed on the network in the same way that fingerprints remain with someone regardless of where he or she goes.

An IP address consists of a series of 32 binary bits (1s and 0s). It is very difficult for humans to read a binary IP address. For this reason, the 32 bits are grouped into four 8-bit bytes called octets. An IP address, even in this grouped format, is hard for humans to read, write, and remember.

Therefore, each octet is presented as its decimal value, separated by a decimal point or period. This format is called dotted-decimal notation. When a host is configured with an IP address, it is entered as a dotted-decimal number, such as

Imagine if you had to enter the 32-bit binary equivalent of this: If you mistyped just 1 bit, the address would be different, and the host may not be able to communicate on the network. The logical 32-bit IP address is hierarchical and is composed of two parts. The first part identifies the network, and the second part identifies a host on that network.

Both parts are required in an IP address. For example, if a host has an IP address of , the first three octets, , identify the network portion of the address, and the last octet, 57, identifies the host. This is called hierarchical addressing, because the network portion indicates the network on which each unique host address is located.

Routers only need to know how to reach each network, not the location of each individual host.

Subnet Mask The subnet mask indicates the network portion of an IP address. Like the IP address, the subnet mask is a dotted-decimal number. Usually all hosts within a LAN use the same subnet mask. Table 3 shows default subnet masks for usable IP addresses that are mapped to the first three classes of IP addresses:

: Class A, which indicates that the first octet of the IP address is the network portion : Class B, which indicates that the first two octets of the IP address are the network portion : Class C, which indicates that the first three octets of the IP address are the network portion

Default Subnet Masks for Usable IP Addresses