0% found this document useful (0 votes)
86 views26 pages

Inbound 5452307813129942300

Internet protocols are sets of rules that govern communication between computers on a network. They specify the format of messages exchanged and ensure timing requirements are met. Common protocols include TCP/IP, HTTP, FTP, SSH, Telnet, POP3, IMAP, and SMTP. IP addresses identify devices on a network and consist of a series of binary bits organized into four octets in dotted-decimal notation like 192.168.1.5. Subnet masks distinguish the network and host portions of an IP address. Subnetting divides large networks into smaller, easier to manage subnets.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views26 pages

Inbound 5452307813129942300

Internet protocols are sets of rules that govern communication between computers on a network. They specify the format of messages exchanged and ensure timing requirements are met. Common protocols include TCP/IP, HTTP, FTP, SSH, Telnet, POP3, IMAP, and SMTP. IP addresses identify devices on a network and consist of a series of binary bits organized into four octets in dotted-decimal notation like 192.168.1.5. Subnet masks distinguish the network and host portions of an IP address. Subnetting divides large networks into smaller, easier to manage subnets.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

IP Addressing

Internet Protocols

192.168.1.5
Internet Protocols

A protocol is a set of rules. A letter sent through the postal system also uses protocols. Part of the
protocol specifies where on the envelope the delivery address needs to be written. If the delivery address is
written in the wrong place, the letter cannot be delivered. Internet protocol works in a similar way. Internet
protocols are sets of rules governing communication within and between computers on a network. Protocol
specifications define the format of the messages to be exchanged.

Timing is crucial to network operation. Protocols require messages to arrive within a certain amount
of time so that computers do not wait indefinitely for messages that may have been lost. Therefore, systems
maintain one or more times during transmission of data. Protocols also initiate alternative actions if the
network does not meet the timing rules. Many protocols consist of a suite of other protocols that are stacked in
layers. These layers depend on the operation of the other layers in the suite to function properly.
Internet Protocols

The main functions of protocols are:


 Identifying errors
 Compressing the data
 Deciding how the data should be sent
 Addressing the data
 Deciding how to announce sent and received data
Internet Protocols

To understand how networks and the Internet work, you must be familiar with the commonly used protocols.
These protocols are used to browse the web, send and receive e-mail, and transfer data files. You will
encounter other protocols as your experience in IT grows, but they are not used as often as the common
protocols described here:

 TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP) suite of protocols has become the
dominant standard for internetworking. TCP/IP represents a set of public standards that specify how
packets of information are exchanged between computers over one or more networks.

 HTTP: Hypertext Transfer Protocol governs how files such as text, graphics, sound, and video are
exchanged on the World Wide Web (WWW). The Internet Engineering Task Force (IETF) developed the
standards for HTTP.

 FTP: File Transfer Protocol provides services for file transfer and manipulation. FTP allows multiple
simultaneous connections to remote file systems.
Internet Protocols

 SSH: Secure Shell is used to securely connect to a remote computer.

 Telnet: It is an application used to connect to a remote computer that lacks security features.

 POP3: Post Office Protocol is used to download e-mail from a remote mail server.

 IMAP: Internet Message Access Protocol is also used to download


e-mail from a remote mail server.

 SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server.
IP Addressing

A network address serves as a unique identifier for a computer or other device on a network. When set up
correctly, computers can determine the addresses of other computers and devices on the network and use these
addresses to communicate with one another.

An IP address is a unique numerical value that is used to identify a computer on a network. There are two
kinds of IP addresses, public (also called globally unique IP addresses) and private. Public IP addresses are
assigned by the Internet Assigned Numbers Authority (IANA).

An IP address is a number that is used to identify a device on the network. Each device on a network must
have a unique IP address to communicate with other network devices. Network devices are those that move
data across the network, including hubs, switches, and routers. On a LAN, each host (device that sends or
receives information on the network) and network device must have an IP address within the same network to
be able to communicate with each other.
IP Addressing

A person’s name and fingerprints usually do not change. They provide a label or address for the person’s
physical aspect—the body. A person’s mailing address, on the other hand, relates to where the person lives or
picks up mail. This address can change. On a host, the Media Access Control (MAC) address is assigned to
the host Network Interface Card (NIC) and is known as the physical address. The physical address remains the
same regardless of where the host is placed on the network in the same way that fingerprints remain with
someone regardless of where he or she goes.
IP Addressing

An IP address consists of a series of 32 binary


bits (1s and 0s). It is very difficult for humans to
read a binary IP address. For this reason, the 32
bits are grouped into four 8-bit bytes called
octets. An IP address, even in this grouped
format, is hard for humans to read, write, and
remember. Therefore, each octet is presented as
its decimal value, separated by a decimal point
or period. This format is called dotted-decimal
notation. When a host is configured with an IP
address, it is entered as a dotted-decimal number,
such as 192.168.1.5.
IP Addressing

Imagine if you had to enter the 32-bit binary equivalent of this:

11000000101010000000000100000101. If you mistyped just 1 bit, the address would be different, and
the host may not be able to communicate on the network. The logical 32-bit IP address is hierarchical and
is composed of two parts. The first part identifies the network, and the second part identifies a host on that
network. Both parts are required in an IP address. For example, if a host has an IP address of
192.168.18.57, the first three octets, 192.168.18, identify the network portion of the address, and the last
octet, 57, identifies the host. This is called hierarchical addressing, because the network portion indicates
the network on which each unique host address is located. Routers only need to know how to reach each
network, not the location of each individual host.
IP Addressing Versions

The most popular type of virtual network addressing is the Internet Protocol (IP). The current IP
Address (IP version 6, IPv6) consists of 16bytes (128 bits) that uniquely identify connected devices. The
design of IPv6 incorporates a much larger IP address space than its predecessor IPv4 to scale up support
for many billions of devices.

Much of the IPv4 address space was allocated to Internet service providers and other large organizations
to assign to their customers and to Internet servers—these are called public IP addresses. Certain private IP
addresses ranges were established to support internal networks like home networks with devices that did
not need to be directly connected to the Internet.
IP Addressing Assignment

Network addresses are associated with network devices through several different methods:
 Networks can be configured to assign IP addresses automatically in a process called dynamic address
assignment.
 Network administrators can choose specific IP addresses and assign them to devices manually in a
process called static address assignment.
 Network adapter vendors set a unique MAC address in the read-only memory (ROM) of each unit
manufactured in a process sometimes called “burning.”
Classes of IP Address

IP Classes Purpose
Class A Used for large networks, implemented by large companies and some countries

Class B Used for medium-sized networks, implemented by universities

Class C Used for small networks, implemented by ISPs for customer subscriptions

Class D Used for special use for multicasting


Class E Used for experimental testing
Classes of IP Address
Subnetting

Subnetting is a process of dividing large network into the smaller networks based
on layer 3 IP address. Subnetting happens when we extend default boundary of
subnet mask. Every computer on network has an IP address that represent its
location on network. Two version of IP addresses are available IPv4 and IPv6.
Subnet Mask

The subnet mask indicates the network portion of an IP address. Like the IP address, the
subnet mask is a dotted-decimal number. Usually all hosts within a LAN use the same subnet
mask. Table shows default subnet masks for usable IP addresses that are mapped to the first
three classes of IP addresses:

255.0.0.0: Class A, which indicates that the first octet of the IP address is the network portion

255.255.0.0: Class B, which indicates that the first two octets of the IP address are the
network portion

255.255.255.0: Class C, which indicates that the first three octets of the IP address are the
network portion
Subnet Mask

Class D addresses are used for multicast groups. There is no need to allocate octet or bits to
separate network and host addresses. Class E addresses are reserved for research use only.

Network component - Defines network segment of device.


Host component - Defines the specific device on a particular network segment
Subnet

Subnet mask is a 32 bits long address used to distinguish between network address and host
address in IP address. Subnet mask is always used with IP address. Subnet mask has only
one purpose, to identify which part of an IP address is network address and which part is host
address.

In decimal notation
IP address 192.168.1.10 Subnet mask 255.255.255.0
Network address is 192.168.1 and host address is 10.

In binary notation
IP address 11000000.10101000.00000001.00001010
Subnetmask 11111111.11111111.11111111.00000000
Network address is 11000000.10101000.00000001 and host address is 00001010
Advantage of Subnetting

 Subnetting breaks large network in smaller networks and smaller networks are
easier to manage.
 Subnetting reduces network traffic by removing collision and broadcast traffic,
that overall improve performance.
 Subnetting allows you to apply network security polices at the interconnection
between subnets.
 Subnetting allows you to save money by reducing requirement for IP range
Example of Subnetting
The picture below shows our example network (192.168.0.0). All computers
here have been configured with the default class C subnet mask
(255.255.255.0):
Example of Subnetting

Because of the subnet mask we used, all these computers are part of
the one network marked in blue. This also means that any one of these
hosts (computers, router and server) can communicate with each other.
Example of Subnetting

If we now wanted to partition this network into smaller segments, then we would need to
change the subnet mask appropriately so we can get the desired result. Let's say we needed
to change the subnet mask from 255.255.255.0 to 255.255.255.224 on each configured
host.
Example of Subnetting

The picture below shows us how the computers will see the network once the subnet
mask has changed:
Activity:
Classes of IP Address

Identify the following IP address if they can communicate or not. Write Cc if


they can communicate and Cn if they cannot.

1. 192.168.2.1 and 192.168.3.2


2. 2.1.3.5 and 2.2.5.3
3. 128.1.3.5 and 128.1.5.3
4. 126.168.2.1 and 125.167.3.2
5. 124.32.3.5 and 124.1.5.3
Classes of IP Address

Reflect:
Why do you think IP address and subnet mask plays an important role in
a network?

You might also like