Lesson 3:
INTERNET
PROTOCOLS
Internet Protocols
are
sets of rules
governing
communication within
and between
computers on a
network
require messages
to arrive within a
certain amount of
time so that
computers do not
wait indefinitely for
also initiate
alternative actions if
the network does not
meet the timing
rules.
The main functions of
protocols are:
Identifying errors
Compressing the
data
Deciding how the
Addressing the
data
Deciding how to
announce sent and
received data
COMMON
PROTOCOLS:
TCP/IP:
The
Transmission Control
Protocol /Internet
Protocol (TCP/IP) suite
of protocols has
internetworking. TCP/IP
represents a set of public
standards that specify
how packets of
information are
exchanged between
computers over one or
IPX/SPX:
Internetwork
Packet
Exchange/Sequenced
Packet Exchange is the
protocol suite originally
employed by Novell
Corporations network
It delivers functions
similar to those included
in TCP/IP.
NetBEUI: NetBIOS
Extended User Interface
is a protocol used
primarily on small
NetBEUI cannot be routed
or used by routers to talk
to each other on a large
network.
AppleTalk: AppleTalk is
a protocol suite used to
network Macintosh
It is composed of a
comprehensive set of
protocols that span the
seven layers of the Open
Systems Interconnection
(OSI) reference model.
HTTP:
Hypertext
Transfer Protocol governs
how files such as text,
graphics, sound, and
video are exchanged on
the World Wide Web
FTP:
File Transfer
Protocol provides
services for file transfer
and manipulation. FTP
allows multiple
simultaneous
connections to remote
SSH:
Secure Shell is
used to securely connect
to a remote computer.
Telnet: It is an
application used to
connect to a remote
computer that lacks
POP3:
Post Office
Protocol is used to
download e-mail from a
remote mail server.
IMAP: Internet Message
Access Protocol is also
used to download e-mail
SMTP:
Simple Mail
Transfer Protocol is used
to send e-mail to a
remote e-mail server.
IP Addressing
An IP address is a
number that is used to
identify a device on the
network. Each device on a
network must have a
unique IP address to
An IP address consists of
a series of 32 binary bits
(1s and 0s). It is very
difficult for humans to
read a binary IP address.
For this reason, the 32
bits are grouped into four
An IP address, even in this
grouped format, is hard
for humans to read, write,
and remember. Therefore,
each octet is presented as
its decimal value,
separated by a decimal
This format is called
dotted-decimal notation.
When a host is configured
with an IP address, it is
entered as a dotteddecimal number, such as
192.168.1.5.
The logical 32-bit IP
address is hierarchical
and is composed of two
parts:
the first part identifies
the network, and
the second part
For example, if a host has
an IP address of
192.168.18.57, the first
three octets, 192.168.18,
identify the network
portion of the address,
and the last octet, 57,
This is called hierarchical
addressing, because the
network portion indicates
the network on which
each unique host address
is located.
Five Classes of IP Address:
Class A - Used for large
networks, implemented
by large companies and
some countries
Class
B - Used for
medium-sized networks,
implemented by
universities.
Class C - Used for small
networks, implemented
by ISPs for customer
Class
D - Used for
special use for
multicasting
Class E - Used for
experimental testing
Class
D - Used for special
use for multicasting
Class E - Used for
experimental testing
Subnet Mask
The subnet mask
indicates the network
portion of an IP address.
Like the IP address, the
subnet mask is a dotteddecimal number.
Default subnet masks for
the first three classes of
IP addresses:
255.0.0.0: Class A,
which indicates that the
first octet of the IP
address is the network
255.255.0.0:
Class B,
which indicates that the
first two octets of the IP
address are the network
portion
255.255.255.0: Class C,
which indicates that the
first three octets of the IP
IpConfig
Ipconfig is a command
used to find out the IP
address of a certain
network you are
connected to
How to use the
ipconfig command?
1) Click on Start Button,
then type cmd (command
prompt) on the search
box.
2) A black screen will
3) Type ipconfig and press
enter.
Assigning a static IP
Address
1. Open the Control
Panels Network
Connections icon.
2. Open the icon
representing your
3. Click the Properties
button in the Status
dialog box.
4. From the list of items,
choose Internet Protocol
(TCP/IP).
5. Click the Properties
button. The Internet
Protocol (TCP/IP)
Properties dialog box
appears.
6.Type the IP address for
your computer. Enter the
appropriate IP Address in
the IP address section.
7. Type a subnet mask.
The value used on a local
network is commonly
but it can be different,
such as 255.255.255.127.
8. Type the default gateway
address. The default
gateway is the router, so
type the routers address.
Figure 54 shows an example
of assigning an IP Address,
9.Type the address for the
preferred DNS server. The
address should be
obtained from your
Internet Service Protocol.
It is used to help your
computer find web pages
and other addresses on
10. Type the address for
the alternate DNS server.
The alternate Domain
Name System (DNS)
servers IP address is
something that your ISP
provides.
11. Click OK to confirm
the settings.
12. Close all other open
dialog boxes and
windows.
Assigning
a Dynamic
IP Address
Dynamic Host
Configuration
Protocol (DHCP) is a
software utility used to
dynamically assign IP
DHCP server can be
set up and the hosts
can be configured to
automatically obtainan
IP address.
These are the IP address
information that a DHCP
server can assign to hosts:
IP address
Subnet mask
Default gateway
Optional values, such as a
Domain Name System (DNS)
server address
The
DHCP server
receives a request
from a host. The
server then selects IP
address information
from a set of
predefined addresses
If the host accepts the
offer, the DHCP server
leases the IP address
for a specific period of
time.
You
can configure a
computer to accept
an IP address from a
DHCP server by
clicking the Obtain an
IP address
automatically option
Ping
The ping is a
Command Prompt
command used to
test the ability of the
source computer to
reach a specified
The
ping command
operates by sending
Internet Control
Message Protocol
(ICMP) Echo Request
messages to the
destination computer
How
many of those
responses are
returned, and how
long it takes for them
to return, are the two
major pieces of
information that the
Ping Command Syntax Syntax
-t
Using this option will ping
the target until you force it to
stop using Ctrl-C.
-a - This ping command option
will resolve, if possible, the
hostname of an IP address
target.
-n count This option sets the
-l
Use this option to set the size,
in bytes, of the echo request
packet from 32 to 65,527. The
ping command will send a 32
byte echo request if you do not
use the -l option.
-f Use this ping command
option to prevent ICMP Echo
Requests from being fragmented
by routers between you and the
-i
TTL This option sets the
Time to Live (TTL) value, the
maximum of which is 255.
-v TOS This option allows you
to set a Type of Service (TOS)
value.
-r count Use this ping
command option to specify the
number of hops between the
computer and the target
-s
count Use this option to
report the time, in Internet
Timestamp format, that each
echo request is received and
echo reply is sent.
-w timeout Specifying a
timeout value when executing
the ping command adjusts the
amount of time, in milliseconds,
that ping waits for each reply.
-s
count Use this option to
report the time, in Internet
Timestamp format, that each
echo request is received and
echo reply is sent.
-w timeout Specifying a
timeout value when executing
the ping command adjusts the
amount of time, in milliseconds,
that ping waits for each reply.
-R
This option tells the ping
command to trace the round trip
path.
-S srcaddr
Use this option to
specify the source address.
-4 This forces the ping
command to use IPv4 only but is
only necessary if target is a
hostname and not an IP address.
-6
This forces the ping
command to use IPv6 only but
as with the -4 option, is only
necessary when pinging a
hostname.
target This is the destination
you wish to ping, which is either
an IP address or a hostname.
/? Use the help switch with the
ping command to show detailed
-6
This forces the ping
command to use IPv6 only but
as with the -4 option, is only
necessary when pinging a
hostname.
target This is the destination
you wish to ping, which is either
an IP address or a hostname.
/? Use the help switch with the
ping command to show detailed
Using the ping
Command
1.)Click on Start Button,
then type cmd (command
prompt) on the search box.
2) A black screen will
appear as shown in the
figure below.
This output shows several
things:
1. Decoding names to
network addresses A
domain name server
(DNS) resolves machine
names to numeric
addresses.
2. Round-trip
response time The
parts of the replies that
say things like
time=105ms show you
how long it took from
the time the client
machine sent out the
3. Routing hop count
The part of the replies that
says TTL=50 tells you about
the route the message took
from one point to another.
The acronym TTL stands for
Time to Live, which is a
measure of how many
rerouting from one point to