0% found this document useful (0 votes)
52 views

Networking Devices, Media and Connector

Uploaded by

Richard Sugbo
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Networking Devices, Media and Connector

Uploaded by

Richard Sugbo
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Networking Devices, Media and Connector

Internet Protocol
• A protocol is a set of rules. A letter sent through the postal system also uses protocols. Part of the protocol
specifies where on the envelope the delivery address needs to be written. If the delivery address is written in
the wrong place, the letter cannot be delivered. Internet protocol works in a similar way. Internet protocols are
sets of rules governing communication within and between computers on a network. Protocol specifications
define the format of the messages to be exchanged.
• Timing is crucial to network operation. Protocols require messages to arrive within a certain amount of time
so that computers do not wait indefinitely for messages that may have been lost. Therefore, systems maintain
one or more times during transmission of data. Protocols also initiate alternative actions if the network does
not meet the timing rules. Many protocols consist of a suite of other protocols that are stacked in layers. These
layers depend on the operation of the other layers in the suite to function properly.
To understand how networks and the Internet work, you must be familiar with the commonly used protocols. These
protocols are used to browse the web, send and receive e-mail, and transfer data files. You will encounter other protocols as
your experience in IT grows, but they are not used as often as the common protocols described here:

TCP/IP
• - The Transmission Control Protocol /Internet Protocol (TCP/IP) suite of protocols has become the dominant standard for internetworking.
• - TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more
networks.
IPX/SPX
• - Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell
• Corporation’s network operating system, NetWare.
• - It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite.
• - A large installed base of NetWare networks continues to use IPX/SPX.
NetBEUI
• - NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks.
• - NetBEUI cannot be routed or used by routers to talk to each other on a large network.
• - NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in
conjunction with another routable protocol such as TCP/IP.
• - This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to
communicate beyond the LAN over TCP/IP.
AppleTalk
• - AppleTalk is a protocol suite used to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven
layers of the Open Systems Interconnection (OSI) reference model.
• The AppleTalk protocol was designed to run over Local Talk, which is the Apple LAN physical topology. This protocol is also designed to
run over major LAN types, notably Ethernet and Token Ring.
HTTP
• - Hypertext Transfer Protocol governs how files such as text, graphics, sound, and video are exchanged on the World Wide Web (WWW).
• - The Internet Engineering Task Force (IETF) developed the standards for HTTP.
FTP
• - File Transfer Protocol provides services for file transfer and manipulation.
• - FTP allows multiple simultaneous connections to remote file systems.
SSH
• - Secure Shell is used to securely connect to a remote computer.
Telnet
• - It is an application used to connect to a remote computer that lacks security features.
POP3
• - Post Office Protocol is used to download e-mail from a remote mail server.
IMAP
• - Internet Message Access Protocol is also used to download e-mail from a remote mail server.
SMTP
• - Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server.
The more you understand about each of these protocols, the more you will understand how networks and the Internet work.
IP ADDRESSING
• An IP address is a number that is used to identify a device on the network. Each device on a network must have a unique
IP address to communicate with other network devices. Network devices are those that move data across the network,
including hubs, switches, and routers. On a LAN, each host (device that sends or receives information on the network) and
network device must have an IP address within the same network to be able to communicate with each other.
• A person’s name and fingerprints usually do not change. They provide a label or address for the person’s physical aspect—
the body. A person’s mailing address, on the other hand, relates to where the person lives or picks up mail. This address
can change. On a host, the Med
• (MAC) address is assigned to the host Network Interface Card (NIC) and is known as the physical address. The physical
address remains the same regardless of where the host is placed on the network in the same way that fingerprints remain
with someone regardless of where he or she goes. ia Access Control.
• An IP address consists of a series of 32 binary bits (1s and 0s). It is very difficult for humans to read a binary IP address.
For this reason, the 32 bits are grouped into four 8-bit bytes called octets. An IP address, even in this grouped format, is
hard for humans to read, write, and remember. Therefore, each octet is presented as its decimal value, separated by a
decimal point or period. This format is called dotted-decimal notation. When a host is configured with an IP address, it is
entered as a dotted-decimal number, such as 192.168.1.5.
• Special IP addresses
• Special IP addresses are the IP addresses which are reserved for network testing and troubleshooting. These IP addresses
cannot be assigned to an end device or an interface. Following addresses are reserved for special purpose:
• a. 0.0.0.0:- This is the first IP address of IP addresses. It represents all networks.
• b. 127.0.0.0 to 127.255.255.255: - Reserved for IP protocol testing and troubleshooting. Virtual interfaces such as
loopback adaptor use this IP range for addressing.
• c. 224.0.0.0 to 239.255.255.255 (Class D): - Reserved for multicast addresses. A multicast address is an address which has
multiple recipients.
• d. 240.0.0.0 to 255.255.255.255 (Class E): - Reserved for future use. These addresses are not used currently for any
purpose.
• e. 255.255.255.255:- This is the last IP address of IP addresses. It represents all hosts.
• Related readings from Computer Networking Notes and Study Guides (2020)
• SUBNET MASK
• The subnet mask indicates the network portion of an IP address. Like the IP address, the subnet mask is a dotted-decimal
number. Usually all hosts within a LAN use the same subnet mask. Table 3 shows default subnet masks for usable IP
addresses that are mapped to the first three classes of IP addresses:
• ➢ 255.0.0.0: Class A, which indicates that the first octet of the IP address is the network portion
• ➢ 255.255.0.0: Class B, which indicates that the first two octets of the IP address are the network portion
• ➢ 255.255.255.0: Class C, which indicates that the first three octets of the IP address are the network portion

Class D addresses are used for multicast groups. There is no need to allocate octet or bits to separate network
and host addresses. Class E addresses are reserved for research use only.
• IpConfig
• Ipconfig is a command used to find out the IP address of a certain network you are connected to.
• How to use the ipconfig command?
• 1) Click on Start Button, then type cmd (command prompt) on the search box.
• 2) A black screen will appear as shown in the figure below.
• In a home network with several computers and devices, it is ideal to assign each of them a specific address. This is for the
purpose of avoiding problems when you do troubleshooting which requires figuring out the IP address of each of them. It is
also a means to prevent address conflicts between the devices. You can also manage them with ease if you have assigned
their own addresses.
• a. Static IP Address – assigning an IP Address on a windows base computer system
• b. Dynamic IP Address – it uses a Dynamic Host Configuration Protocol (DHCP) server would automatically assign IP
addresses and greatly simplify the addressing process.
• Dynamic Host Configuration Protocol (DHCP) is a software utility used to dynamically assign IP addresses to network
devices. This dynamic process eliminates the need to manually assign IP addresses. A DHCP server can be set up and the
hosts can be configured to automatically obtain an IP address. When a computer is set to obtain an IP address
automatically, the other entire IP addressing configuration boxes are dimmed or disabled. The server maintains a list of IP
addresses to assign, and it manages the process so that every device on the network receives a unique IP address. Each
address is held for a predetermined amount of time. When the time expires, the DHCP server can use this address for any
computer that joins the network.
• These are the IP address information that a DHCP server can assign to hosts:
• IP address
• Subnet mask
• Default gateway
• Optional values, such as a Domain Name System (DNS) server address
• Ping
• The ping is a Command Prompt command used to test the ability of the source computer to reach a specified destination
computer. The ping command is usually used as a simple way to verify that a computer can communicate over the
network with another computer or network device. The ping command operates by sending Internet Control Message
Protocol (ICMP) Echo Request messages to the destination computer and waiting for a response. How many of those
responses are returned, and how long it takes for them to return, are the two major pieces of information that the ping
command provides.
• Using the ping Command
• Ping is one of your most important tools in troubleshooting Internet problems. It shows you whether the Domain Name
Server is working, whether the computer you are trying to talk to is reachable, and how long it takes to get there. It does
this at a very low level — only the most basic Internet functions have to be up and running
• IDENTIFICATION.IDENTIFY THE FOLLOWING.

• 1. _____________ represents a set of public standards that specify how packets of information are exchanged between
computers over one or more networks.
• 2. An ___________ is used by large installed base of NetWare networks.
• 3. __________cannot be routed or used by routers to talk to each other on a large network and is suitable for small peer-
to-peer networks, involving a few computers directly connected to each other.
• 4. ____________ is a protocol suite used to network Macintosh computers.
• 5. ________ governs how files such as text, graphics, sound, and video are exchanged on the World Wide Web (WWW).
6. _____________ provides services for file transfer and manipulation.
• 7. ___________ is used to send e-mail to a remote e-mail server.
• 8. An ______ is a number that is used to identify a device on the network.
• 9. When a host is configured with an IP address, it is entered as a_________________, such as 192.168.1.5.
• 10. The ____________ indicates the network portion of an IP address.

You might also like