Mod 03
Mod 03
Network+ Guide
to Networks,
Ninth Edition
Module 3: Addressing
Module Objectives
By the end of this module, you should be able to:
Datos
Addressing Overview
• There are four addressing methods:
octets 8 bits
▶ Ex. 92.106.50.200
Addressing Overview
• IPv6 addresses
▶ have 128 bits
• A 32-bit IPv4 address is organized into four groups of 8 bits each (known as octets):
• Ex. Here is an IPv4 address in binary:11010001101001011100100000000001
• Each of the four octets can be any number from 0 to 255
• Some IP addresses are reserved
• Example of an IPv4 address: 72.56.105.12
IPv4 Addresses
INTERNET
192.168.2.15 HOST
NETWORK HOST NETWORK
255.255.255.0
192.168.1.10
192.168.2.25
255.255.255.0
255.255.255.0
SALES DEPT
NETWORK MANAGEMENT DEPT ACCT DEPT
IPv4 Addresses
Static IP addresses are assigned manually by the network administrator
Dynamic IP addresses are automatically assigned by a DHCP server
DHCP Dynamic Host Configuration Protocol server – manages the dynamic distribution of IP addresses to
devices on a network.
Static IPv4 Address Assignment
Dynamic IPv4 Address Assignment
Public and Private IPv4 Addresses
Internet Assigned Numbers Authority (IANA)
https://www.iana.org/numbers
Users are assigned IP addresses by
Internet service providers (ISPs).
PUBLIC IP
PUBLIC IP
• Multicast networking is
based on the simple
concept that a
single packet can be
sent by a server and it
will be received by many
receivers. Multicast is
different from broadcast
because it’s more
selective*
*From: https://www.auvik.com/franklyit/blog/multicast-networking/
Anycasting
Socket
Ports and Sockets
• Port numbers are divided into
three types:
• Well-known ports - 0 to 1023-
Telnet-23, FTP-21,HTTP-80
• Registered ports - 1024 to
49151- increase security
• Dynamic and private ports -
49152 to 65535 – for use
without restriction.
• TCP & UDP ensure that data is
transmitted to the correct process
running on a single device.
Ports and Sockets
Socket Pairs
• A URI is a string of characters that identifies a specific network resource. As shown in the
figure, a URI has two specializations:
• Uniform Resource Name (URN) - This identifies only the namespace of the resource (web
page, document, image, etc.) without reference to the protocol.
• Uniform Resource Locator (URL) - This defines the network location of a specific resource
on the network. HTTP or HTTPS URLs are typically used with web browsers. Other
protocols such as FTP, SFTP, SSH, and others can be used as a URL.
• Protocol/scheme - HTTPS or other protocols such as FTP, SFTP, mailto, and NNTP
• Parts of a URI:
▶ Hostname - www.example.com
▶ Fragment - #page155
Domain Names and DNS
• DNS is an Application layer client-server system of
computers and databases made up of these elements:
• Namespace - the entire collection of computer names
and their associated IP addresses stored in databases
on DNS name servers around the globe
• Name servers - hold databases, which are organized
in a hierarchical structure
• Resolvers - a DNS client that requests information
from DNS name servers
Name Servers
• Four common types of DNS servers:
• Primary DNS server – the authoritative name server for the organization
• Holds the authoritative DNS database for the organization’s zones
• Secondary DNS server – backup authoritative name server for the
organization
• Caching DNS server – accesses the public DNS data and caches the DNS
information it collects
• Forwarding DNS server – receives queries from local clients but doesn’t work
to resolve the queries
• Any of these DNS server types can co-exist on the same machine
• DNS name servers are organized in a hierarchical structure
• At the root level, 13 clusters of root DNS servers hold information used to locate
top-level domain (TLD) servers
Namespace Databases
• Each organization that provides host services is responsible
for providing and maintaining its own DNS authoritative
servers for public access
• An authoritative name server is the authority on computer
names and their IP addresses for computers in their domains
• The domains that the organization is responsible for managing
are called a DNS zone
Name Servers
Troubleshooting Tools
• Command-line tools are a great resource to troubleshoot network
problems
• ping (Packet Internet Groper) utility is used to verify that TCP/IP is:
• Installed
• Bound to the NIC
• Configured correctly
• Communicating with the network
• The ping utility sends out a signal called an echo request to another
device (request for a response)
• The other computer responds in the form of an echo reply
• ICMP (Internet Control Message Protocol) is the protocol used by
the echo request/reply to carry error messages and information about
the network
Troubleshooting Tools
Answer: b. ICMP
The protocol used by the ping echo request and echo reply is ICMP
(Internet Control Message Protocol), a lightweight protocol used to carry
error messages and information about a network.
Summary
Now that the lesson has ended, you should be able to:
• Work with MAC addresses
• Configure TCP/IP settings on a computer, including IP address, subnet
mask, default gateway, and DNS servers
• Identify the ports of several common network protocols
• Describe domain names and the name resolution process
• Use command-line tools to troubleshoot common network problems