CS 3201 Computer Networks 2014/2015 Handout: Lab 4

Size: px
Start display at page:

Download "CS 3201 Computer Networks 2014/2015 Handout: Lab 4"

Transcription

1 CS 3201 Computer Networks 2014/2015 Handout: Lab 4 Lab Content: - IP Addressing - IP Ports TCP/IP Fundamentals TCP/IP Settings - TCP/IP is a protocol that requires a little bit of knowledge to configure the systems properly. When you configure TCP/IP, you are required to know the settings for the IP address, subnet mask, and default gateway. Let s start with the IP address! IP Address - The IP address is a 32-bit value that uniquely identifies the system on the network (or the Internet). An IP address looks similar in appearance to There are four decimal values in an IP address separated by periods (.). Each decimal value is made up of 8 bits (1s and 0s), and there are four decimal values, so 8 bits times 4 equals the 32-bit address. - Since each of the decimal values is made up of 8 bits (for example, the 192), we refer to each of the decimal values as an octet. There are four octets in an IP address. It is very important to understand that the four octets in an IP address are divided into two parts a network ID and a host ID. The subnet mask determines the number of bits that make up the network ID and the number of bits that make up the host ID. Let s see how this works. Subnet Mask - When looking at a subnet mask, if there is a 255 in an octet, then the corresponding octet in the IP address is part of the network ID. For example, if I had an IP address of and a subnet mask of , the first three octets would make up the network ID and the last octet would be the host ID. The network ID assigns a unique address to the network itself, while the host ID uniquely identifies the system on the network. Table 4-1 summarizes this example. The network ID (shown with an N ) is , and the host ID is the last octet with a value of 15. This means that this system is on the network and any other system on the same network will have the same network ID. - To use a different example, if I had a subnet mask of , it would mean that the first octet of the IP address is used as the network ID portion, while the last three octets are the host ID portion of the IP address. So what is the purpose of the subnet masks? Or better yet, why do we have a subnet mask that breaks the IP address into a network ID part and a host ID? - The reason is so that when a system such as , with a subnet mask of , sends a piece of data to , the sending system first needs to determine whether the target computer exists on the same network or not. It does this by comparing the network IDs (Table 4-2); if the network IDs are the same, then both systems exist on the same network and one system can send to the other without the use of a router. If the systems exist on different networks, the data will need to be passed to the router so that the router can send the data to the other network. Eng. Maha Talaat Eng. Nareeman Sabry CN Lab (4) 1

2 TCP/IP Addressing Understanding Binary - You know from the previous discussion that the IP address is a 32-bit address divided into four 8- bit blocks (called octets). The four octets are normally displayed as decimal values but also have a binary representation that looks like Notice that there are four sets of 8 bits (1 or 0), which makes up the 32 bits (8 4 sets) of an IP address. Let s take a look at how you can determine the binary representation of an octet. - To calculate the binary value of an octet with a decimal number such as 192, you need to enable, or turn on, the bits that will add up to the number of 192, - Notice that the foregoing table has bit eight and bit seven turned on to give you a value of , which equals 192. The remaining bits will take an off state, which means they are not included in the calculation. A bit that has an on state takes a 1, and an off state takes a 0. So the combination of 8 bits to make the number 192 would be Now that you know how to convert a decimal value to binary and a binary value to decimal, try out Exercise 4-2 before moving on to the section on address classes. Address Classes - Every IP address belongs to a distinct address class. The Internet community defined these classes to accommodate networks of various sizes. The class to which the IP address belongs initially determines the network ID and host ID portions of the address, along with the number of hosts that are supported on that network. The different class addresses are named class A, class B, class C, class D, and class E. This section details each class of addresses. Class A Addresses - A class A address has a default subnet mask of , which means that the first octet is the network ID and the last three octets belong to the host ID portion of the address. Each octet can contain 256 possible values (0 255), so a class A address supports 16,777,216 hosts on the network ( ). Actually, there are only 16,777,214 valid addresses to use on systems, inasmuch as there are two addresses on each IP network you are not allowed to assign to systems because they are reserved. These are the addresses with all host bits set to 0s (the network ID) and all host bits set to 1s (the broadcast address). So with a class A address, you will not be able to assign n or n (where n is your network ID) to any hosts on the network. - You can always identify a class A address, because the value of the first octet falls between the numbers 1 and 126. Actually, an address that starts with 127 is a class A address as well, but you are not allowed to use any address that starts with 127, because it is reserved for the loopback address (more on the loopback address later). For example, the IP address is a class A address because the first octet is 12, which falls in the range Class B Addresses - Class B addresses have a default subnet mask of , which means that the first two octets are the network ID and the last two octets are the host ID portion of the address. This Eng. Maha Talaat Eng. Nareeman Sabry CN Lab (4) 2

3 means that we can have 65,536 hosts ( ) on the network. Oh, but wait! Don t forget to take off the two illegal addresses, so that gives us 65,534 addresses that can be assigned to hosts on the network. - Due to the number of hosts that are supported on a class B address, you usually find that a medium-sized company has a class B address. You can identify a class B address because the first octet starts with a number that falls between 128 and 191. Class C Addresses - Class C addresses have a subnet mask of , which means that the first three octets are the network ID and the last octet is the host ID. Having only one octet as the host ID means that a class C address can support only 254 hosts (256 2) on the network. - You can identify a class C address because it has a value for the first octet that ranges between 192 and 223. For example, an IP address of is a class C address because 202 falls between 192 and 223. You also know that this system has a subnet mask of because it is a class C address. Class D Addresses - Class D addresses are used for special types of applications on the network known as multicasting applications. Multicasting applications send data to a number of systems at the same time by sending data to the multicast address, and anyone who has registered with that address will receive the data. A multicast address is what class D addresses are used for, so you will not be assigning them specifically to hosts on the network for normal network communication. - Class D addresses have a value on the first octet that ranges from 224 to 239. With that many ranges, class D has the potential for 268,435,456 unique multicast groups that users can subscribe to from a multicast application. Class E Addresses - The funny thing about class E addresses is that they were designed for experimental purposes only, so you will never see a class E address on a network. - Class E addresses have a first octet with a value that falls in the range of Now that you are familiar with the different class addresses, Private Addresses - Another type of address you need to be aware of is what is known as a private address. A private address is an address that can be assigned to a system but cannot be used for any kind of Internet connectivity. The private addresses are nonroutable addresses, so any system using them will not be able to function off the network. The following are the three address ranges that are private: o o o Addressing Schemes - When sending data on the network, there are different ways that the data can be sent to the destination. The data can be sent to a unicast address, a broadcast address, or a multicast address. The following outlines the difference between unicast, broadcast, and multicast: o Unicast Is the sending of information to one system. With the IP protocol this is accomplished by sending data to the IP address of the intended destination system. o Broadcast Is the sending of information to all systems on the network. Data that is destined for all systems is sent by using the broadcast address for the network. An example of a broadcast address for a network is Eng. Maha Talaat Eng. Nareeman Sabry CN Lab (4) 3

4 o The broadcast address is determined by setting all host bits to 1 and then converting the octet to a decimal number. Multicast Is the sending of information to a selected group of systems. Typically this is accomplished by having the systems subscribe to a multicast address. Any data that is sent to the multicast address is then received by all systems subscribed to the address. Most multicast addresses start with 224.x.y.z and are considered class D addresses. IPv6 - Our entire discussion so far about TCP/IP is based on version 4 of TCP/IP, known as IPv4. The use of TCP/IP over the years has far exceeded expectations, and we are running out of IP addresses. For that reason, TCP/IP has been redesigned and the new version is IP version 6 (IPv6). - There are major changes to IPv6 from what we know of IPv4. For starters, IPv4 uses a 32-bit address scheme, while IPv6 will use a 128-bit address scheme. This will give us an insane number of unique possible addresses to be exact (2128)! This is a huge improvement over 232=4 billion unique addresses with IPv4. An IPv6 address will no longer use four octets. The IPv6 address is divided into eight hexadecimal values that are separated by a colon (:) as shown in the following example: 65b3:b834:45a3:0000:0000:762e:0270:5224 TCP/IP Ports - An application or process uses a TCP/IP port as an identifier for that application running on a system. - When you send data from one computer to another, you send data to the port used by that application. For example, when you type the IP address of a web site in your web browser, the web browser connects to the web server (or web application) running at that system by sending data to port 80. Port 80 is the default port of a web server. When the web server answers your request by sending the web page to your browser, the browser is running on a particular port as well and the web server sends the page to the port of the web browser. Server applications typically use low port numbers that fall under 1024, whereas client applications usually run on ports over Port numbers that are used by servers are known as well-known ports (under 1024), whereas port numbers over 1024 used by client applications are known as dynamic ports. They are called dynamic ports because many times the port is selected at runtime by the application TCP/IP Configuration Concepts Eng. Maha Talaat Eng. Nareeman Sabry CN Lab (4) 4

5 Manual Configuration - To configure TCP/IP on a Windows XP client, you will click the Start button and then right-click My Network Places and choose Properties. - The network connections window appears, and you should see your LAN connection. If you right-click your LAN connection and choose Properties, you will see your network settings, including the TCP/IP protocol. - To configure TCP/IP, select TCP/IP and choose Properties - To configure your system with a specific address, select Use The Following IP Address and then type the IP address, the subnet mask, and the default gateway; then choose OK. Once you have finished configuring TCP/IP, you will be able to communicate with network resources using the newly configured system. - Configuring a system manually is not the best approach to take on a network for a number of reasons: o Workload The amount of work involved in manually configuring each system on the network is too much for any network administrator. o Typos The potential for human error is great when inputting the parameters on multiple systems simply due to the fact that it is such a laborious task. It is also very easy to assign a duplicate address on the network, which would result in an error. o Change management It is very hard to implement major changes to your IP infrastructure when you are manually configuring systems. For example, a change to a router address would require a lot of time to update the default gateway entry on the clients. Dynamic Host Configuration Protocol (DHCP) - Configuring IP addressing on a large TCP/IP-based network can be a nightmare, especially if machines are moved from one network to another frequently. - The Dynamic Host Configuration Protocol (DHCP) can help with the workload of configuring systems on a network by assigning addresses to systems on boot-up automatically. - The process of dynamically assigning IP addresses is managed via a DHCP server. - The DHCP server is configured with a set of usable IP addresses, called a scope. - The scope can also include the subnet mask, IP addresses of the default gateway, DNS servers, WINS servers, and other necessary addresses. - When a PC comes online and is set up to use a DHCP server, it requests an IP address by transmitting a broadcast request packet looking for any DHCP servers on the network (known as DHCP Discovery). - The DHCP server responds with an offer containing an IP address that the client can lease (known as the DHCP Offer). - The client then accepts the offer by sending a request message for that address from the DHCP server (known as the DHCP Request), and then the server responds with an acknowledgment to the client that it has that address and additional settings for the lease time (known as the DHCP ACK). - The DHCP server marks the IP address in its database as being in use so that it is not assigned again. - When configuring the DHCP server, you will need to configure a scope with the following settings: o IP addresses The DHCP server issues an IP address to each DHCP client system on the network. Each system connected to a TCP/IP-based network is identified by a unique IP address. As you learned in this chapter, the IP address consists of four 8-bit octets separated by periods. The IP address is normally shown in dotted-decimal notation for example, Eng. Maha Talaat Eng. Nareeman Sabry CN Lab (4) 5

6 o o Subnet mask The IP address actually consists of two parts: the network ID and the host ID. The subnet mask is used to identify the part of the IP address that is the network ID and the part that is the host ID. Subnet masks assign 1s to the network ID bits and 0s to the host ID bits of the IP address. Default gateway A default gateway is required when the client system needs to communicate outside its own subnet. Normally, the default gateway is a router connected to the local subnet, which enables IP packets to be passed to other network segments. APIPA - Windows clients support a feature known as automatic private IP addressing (APIPA), which is a feature that provides that, when a Windows client boots up and cannot contact a DHCP server, it will configure itself automatically with a x.y address. If there is something wrong with the DHCP server and all the systems on the network cannot obtain an address from the DHCP server, the clients will all assign themselves an address within the address range and then be able to communicate with one another. - APIPA does not assign a default gateway, so you will be unable to access resources on a remote network and the Internet but you can still communicate with systems on your network. When troubleshooting to find out why a machine cannot communicate on the network, watch for systems that have the x.y address range because it means they could not find a DHCP server. Domain Name System - One service that is used throughout networks and the Internet is the Domain Name System (DNS). Most users on the network connect to resources by using a friendly name such as this style of name, known as a fully qualified domain name (FQDN), must be converted to an IP address before communication can occur. DNS is used as our solution to convert FQDNs to IP addresses. - Let s walk through an example of a name being resolved. You are sitting in your office on your network, and you try to connect to which means that your client computer will send a query to the DNS server Top-Level Domains - The root servers are responsible for ensuring that any requests for an Internet resource are forwarded to the correct top-level domain. To help organize Internet resources in the DNS distributed database, there are specific top-level domain names created, and a company or organization has to register under a top-level domain. - For example, if you are trying to connect to microsoft.com, the root DNS server forwards you to the.com top-level domain namespace. The following is a description of the most popular DNS top-level domains found on the Internet: o.com This is the commercial organizations group and is by far the largest. Almost everyone wants to be found in this domain, because it is where most customers will try to find you. o.org This is for nonprofit organizations. o.net This is for networking organizations such as island.net and nfs.net, as well as for Internet service providers such as netzero.net. o.mil This is for military organizations such as army.mil and navy.mil. o.gov This is for U.S. government offices only. o.edu This is for educational organizations. Eng. Maha Talaat Eng. Nareeman Sabry CN Lab (4) 6

7 Country Domain Names - With only six top-level domain names and the requirement that all organizations register under one of those top levels if they wanted an Internet name, this soon became a problem because there were so many names to be registered and so few choices on the top levels. Eventually, top-level names were created for country domains; therefore, if you resided in a certain country, you could register under that country domain so that your customers could find you easily. Here are a few of the most common country domain names: o.ca Canada o.ie Ireland o.uk United Kingdom o.us United States DNS Files - Most DNS servers maintain their DNS data in a number of files that exist on the hard disk of the server. In the old days, you managed the records by updating these text files, but today most DNS server environments support a graphic tool. - When you create the records graphically, the DNS files are updated. Windows servers store their DNS files in %systemroot%\system32\dns. Hosts File - Before DNS became a popular solution to hostname resolution, there was a more manual method of creating and modifying a file on the local hard disk of every system. This file would need to be updated on every system if a change was made to a server s IP address and you wanted the client applications to be aware of the change. This file, known as the hosts file, was located on each client system. Before DNS servers became a standard, network administrators used to create a text file known as the hosts file, which was used to resolve the FQDN to matching IP addresses. This text file was stored locally on each system; in the Windows word, it is stored in the %systemroot%\system32\drivers\etc folder and contains two columns one for the IP address and the other for the FQDN. Windows Internet Naming Service - The Windows Internet Naming Service (WINS) provides name resolution for NetBIOS names to matching IP addresses and is popular on large Microsoft networks. WINS is very similar to DNS but contains a database of different-style names NetBIOS names instead of fully qualified domain names. When a WINS client boots up, it registers its names within the WINS database and then queries that server any time it needs to have a computer name resolved to a matching IP address. When the WINS client shuts down, it also de-registers its names from the WINS database so that another system can register the names while it is offline. - Before WINS, the LMHOSTS file was used to assist with remote NetBIOS name resolution. The LMHOSTS file is a static file that maps NetBIOS names to IP addresses. This file is similar to the hosts file in functionality; the only difference is that the hosts file is used for mapping hostnames to IP addresses. - Name resolution is a very important part of troubleshooting networking problems chances are a large percentage of communication problems come from name resolution. Eng. Maha Talaat Eng. Nareeman Sabry CN Lab (4) 7

Binary Octet to Decimal Format Conversion

Binary Octet to Decimal Format Conversion IP Address An IP (Internet Protocol) address is a unique address that different computers on a computer network use to identify and communicate with one another. An IP address is used as an identifier

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds

More information

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask 1 2 3 4 5 6 7 8 9 10 Unit C - Network Addressing Objectives Describe the purpose of an IP address and Subnet Mask and how they are used on the Internet. Describe the types of IP Addresses available. Describe

More information

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office ExamForce.com 640-822 CCNA ICND Study Guide 31 Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office Describe the need and role of addressing

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or

The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or CBCN4103 The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or IP address. An IP address is a 32-bit address

More information

Networking Fundamentals Tom Brett

Networking Fundamentals Tom Brett Networking Fundamentals Tom Brett Data Before we look at networking, it is important for us to understand what Data is and how it is stored and represented Data According to Webopedia, data is distinct

More information

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

Chapter 18 and 22. IPv4 Address. Data Communications and Networking University of Human Development College of Science and Technology Department of Information Technology Chapter 18 and 22 Data Communications and Networking IPv4 Address 1 Lecture Outline IPv4 Addressing

More information

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols REMINDER Student Evaluations 4 Objectives Identify the major needs and stakeholders

More information

Chapter 6 Addressing the Network- IPv4

Chapter 6 Addressing the Network- IPv4 Chapter 6 Addressing the Network- IPv4 Objectives Explain the structure IP addressing and demonstrate the ability to convert between 8- bit binary and decimal numbers. Given an IPv4 address, classify by

More information

Configuring IP addressing 1

Configuring IP addressing 1 Contents Configuring IP addressing 1 Overview 1 IP address classes 1 Special IP addresses 2 Subnetting and masking 2 Assigning an IP address to an interface 2 Configuration guidelines 3 Configuration procedure

More information

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

Laboratory (03) DHCP service

Laboratory (03) DHCP service Laboratory (03) DHCP service By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Laboratory Agenda Introduction to DHCP Windows Server 2008 DHCP Install Environment WINS service Configuring

More information

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY Lecture 6 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi Overview

More information

Chapter 2: Configuring Network Protocols

Chapter 2: Configuring Network Protocols Guide to MCSE 70-291, Enhanced 2-1 Chapter 2: Configuring Network Protocols Objectives After reading the chapter and completing the exercises, students should be able to: Understand TCP/IP addressing Define

More information

BTEC Level 3 Extended Diploma Unit 9 Computer Network IP Addresses

BTEC Level 3 Extended Diploma Unit 9 Computer Network IP Addresses BTEC Level 3 Extended Diploma Unit 9 Computer Network IP Addresses What is an IP Address?????? What is an IP Address Short for Internet Protocol address, an IP or IP address is an address of a computer

More information

A+ Certification Guide. Chapter 16 (Part B) Networking

A+ Certification Guide. Chapter 16 (Part B) Networking A+ Certification Guide Chapter 16 (Part B) Networking Chapter 16 (Part B) Objectives Installing and Configuring Network Interface Cards Networking Configuration for Small Network Switches and Routers Setting

More information

x.x.x :: Notes: 128 binary bits

x.x.x :: Notes: 128 binary bits ABSTRACT The Elders of the Internet were a little short-sighted. Their Class based system didn t take into account Al Gore. His invention blew up the internet and created a need for Subnetting. In this

More information

6 Chapter 6. Figure 1 Required Unique Addresses

6 Chapter 6. Figure 1 Required Unique Addresses 6 Chapter 6 6.1 Public and Private IP Addresses The stability of the Internet depends directly on the uniqueness of publicly used network addresses. In Figure 1 Required Unique Addresses, there is an issue

More information

Network+ Guide to Networks

Network+ Guide to Networks Yarmouk University Providing Fundamental ICT Skills for Syrian Refugees (PFISR) Network+ Guide to Networks Dr. Mohammad A. Al-Jarrah jarrah@yu.edu.jo In-Depth TCP/IP Networking Understand methods of network

More information

Configuring IP addressing

Configuring IP addressing Contents Configuring IP addressing 1 Overview 1 IP address classes 1 Special IP addresses 2 Subnetting and masking 2 Assigning an IP address to an interface 3 Configuration guidelines 3 Configuration procedure

More information

Internet Addresses (You should read Chapter 4 in Forouzan)

Internet Addresses (You should read Chapter 4 in Forouzan) Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc http://alainmaterials.webs.com/ Copyright 2010 John Wiley & Sons, Inc 5-1 Chapter 5 TCP/IP

More information

Session 16 Windows 7 Professional DNS & Active Directory

Session 16 Windows 7 Professional DNS & Active Directory Session 16 Windows 7 Professional DNS & Active Directory Fall 2011 ITE153 Operating Systems 1 Session 16 Windows 7 Professional Configuring TCP/IP Addressing & Name Resolution Fall 2011 ITE153 Operating

More information

Guide to TCP/IP, Third Edition. Chapter 12: TCP/IP, NetBIOS, and WINS

Guide to TCP/IP, Third Edition. Chapter 12: TCP/IP, NetBIOS, and WINS Guide to TCP/IP, Third Edition Chapter 12: TCP/IP, NetBIOS, and WINS Objectives Discuss the history of NetBIOS Understand what NetBIOS is and its limitations Understand the role of NetBIOS in Windows 2000

More information

Network+ Guide to Networks 5 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 5 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 5 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain how the TCP/IP protocols correlate

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure COURSE OVERVIEW This five-day instructor-led course introduces students to network and applications infrastructure concepts and configurations provided by Window Server 2008. Students will be able to acquire

More information

IPv6 Transition Technologies (TechRef)

IPv6 Transition Technologies (TechRef) Tomado de: http://technet.microsoft.com/en-us/library/dd379548.aspx IPv6 Transition Technologies (TechRef) Updated: January 7, 2009 IPv6 Transition Technologies Protocol transitions are not easy, and the

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

Computer Networks Lab

Computer Networks Lab Computer Networks Lab Room: BB 219 Additional Information: http://ti.uni-due.de/ti/en/education/teaching/ss18/netlab 1. Practical Training: Network planning and installation of a file server 2. Practical

More information

MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure

MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure Course Number: 6420A Length: 5 Day(s) Certification Exam This course is associated with Exam 70-642 TS: Windows Server

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Lab 8 (IP Addressing)

Lab 8 (IP Addressing) Islamic University of Gaza Faculty of engineering Computer Department. Computer Network Lab ECOM 4121 Prepared by : Eng. Eman Al- Kurdi Lab 8 (IP Addressing) Introduction: Each device on a network must

More information

Chapter 8: Subnetting IP Networks

Chapter 8: Subnetting IP Networks Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number

More information

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I By: Dr. Ahmed ElShafee ١ Agenda OSI Layer 2 of WANs Internetwork layer Introduction Network Layer Interaction with the

More information

Module 7: Configuring and Supporting TCP/IP

Module 7: Configuring and Supporting TCP/IP Module 7: Configuring and Supporting TCP/IP Contents Overview 1 Introduction to TCP/IP 2 Examining Classful IP Addressing 10 Defining Subnets 17 Using Classless Inter-Domain Routing 29 Configuring IP Addresses

More information

Chapter 02 How Computers Find Each Other on Networks

Chapter 02 How Computers Find Each Other on Networks Chapter 02 How Computers Find Each Other on Networks TRUEFALSE 1. A hexadecimal number is a number written in the base 16 number system. (A) True (B) False 2. DNS follows a centralized database model.

More information

Lecture (03) Internet Protocol tcp/ip> OSI>

Lecture (03) Internet Protocol tcp/ip> OSI> Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing

More information

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as

More information

Copyright 2011 Sakun Sharma

Copyright 2011 Sakun Sharma Communication at Network Layer (Layer 3) Network layer is layer 3 of OSI Model. Network layer adds support of connecting multiple networks with each other. Network layer uses its own unique addressing

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections

More information

IP Addressing and Subnetting

IP Addressing and Subnetting IP Addressing and Subnetting Internet Layer The purpose of the Internet layer is to send packets from a network node and have them arrive at the destination node independent of the path taken. Internet

More information

Address Class (Exercise) B A

Address Class (Exercise) B A Address Class (Exercise) Address Class 177.100.18.4 B 119.18.45.0 A 192.249.234.191 C 10.10.251.12 A 223.32.232.190 C 129.132.24.2 B 18.250.1.1 A 150.10.15.0 B 197.14.2.0 C 174.17.9.1 B 148.17.9.1 B 193.42.1.1

More information

CCNA 1 Chapter 9 v5.0 Exam Answers 2013

CCNA 1 Chapter 9 v5.0 Exam Answers 2013 1 CCNA 1 Chapter 9 v5.0 Exam Answers 2013 How many broadcast domains are there? 1 2 3 4* 2 How many usable host addresses are there in the subnet 192.168.1.32/27? 32 30* 64 16 62 3 How many host addresses

More information

CS 3201 Computer Networks 2014/2015 Handout: Lab 3

CS 3201 Computer Networks 2014/2015 Handout: Lab 3 Lab Content: - Network Devices - Ethernet Network - MAC Address Network Devices: - Hubs, MAU s, and Repeaters Hubs Hubs are one of the most important components of a network because they act as a central

More information

IP Addressing Week 6. Module : Computer Networks Lecturer: Lucy White Office : 324

IP Addressing Week 6. Module : Computer Networks Lecturer: Lucy White Office : 324 IP Addressing Week 6 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 1 Addressing: Network & Host Network address help to identify route through the network cloud Network address

More information

White Paper Networking with EclerNet Manager

White Paper Networking with EclerNet Manager Document: AS Version: 1.0 Date: Page 1 of 12 1. Network Basics for EclerNet Manager EclerNet Manager (ENM) is the software application used for the configuration and control of the Ecler networkable devices

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

CS118 Discussion, Week 6. Taqi

CS118 Discussion, Week 6. Taqi CS118 Discussion, Week 6 Taqi 1 Outline Network Layer IP NAT DHCP Project 2 spec 2 Network layer: overview Basic functions for network layer Routing Forwarding Connection v.s. connection-less delivery

More information

IP Addressing - Subnetting

IP Addressing - Subnetting IP Addressing - Subnetting The Two Parts of an IP Address 32 Bits Prefix Host Prefix Length IP Address Classes Classes are now considered obsolete But you have to learn them because Everyone in the industry

More information

Networks: Communicating and Sharing Resources

Networks: Communicating and Sharing Resources Networks: Communicating and Sharing Resources 1 Network Fundamentals Networks o Links multiple computer systems and enables them to share data and resources o Types of computer networks: Local area network

More information

Chapter 7: IP Addressing CCENT Routing and Switching Introduction to Networks v6.0

Chapter 7: IP Addressing CCENT Routing and Switching Introduction to Networks v6.0 Chapter 7: IP Addressing CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 13 Chapter 7 - Sections & Objectives 7.1 IPv4 Network Addresses Convert between binary and decimal numbering

More information

Linux+ Guide to Linux Certification, Third Edition. Chapter 12 Network Configuration

Linux+ Guide to Linux Certification, Third Edition. Chapter 12 Network Configuration Linux+ Guide to Linux Certification, Third Edition Chapter 12 Network Configuration Objectives Describe the purpose and types of networks, protocols, and media access methods Explain the basic configuration

More information

Chapter 15 IPv6 Transition Technologies

Chapter 15 IPv6 Transition Technologies Chapter 15 IPv6 Transition Technologies Published: April 18, 2006 Updated: November 06, 2006 Writer: Joe Davies 1 Abstract This chapter describes the mechanisms that aid in the transition of Internet Protocol

More information

Chapter Motivation For Internetworking

Chapter Motivation For Internetworking Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance

More information

CTS2134 Introduction to Networking. Module Network Implementation

CTS2134 Introduction to Networking. Module Network Implementation CTS2134 Introduction to Networking Module 05.5 05.8 Network Implementation NAT Facts NAT (Network Address Translation) allows you to connect a private network to the Internet without obtaining registered

More information

Network Layer: Logical Addressing

Network Layer: Logical Addressing Network Layer: Logical Addressing Introduction The network layer is responsible for the delivery of individual packets from source to the destination host Logical Addressing A universal addressing system

More information

DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS

DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS Before you start Objectives: Familiarize yourself with the services such as File and Print, WWW, FTP, E- mail, Faxing, Remote Access, DHCP, DNS and WINS.

More information

MCSA Guide to Networking with Windows Server 2016, Exam

MCSA Guide to Networking with Windows Server 2016, Exam MCSA Guide to Networking with Windows Server 2016, Exam 70-741 First Edition Chapter 4 Implementing DHCP 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part,

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Six Designing Models for Addressing and Naming Copyright 2010 Cisco Press & Priscilla Oppenheimer Guidelines for Addressing and Naming Use a structured model for addressing

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Addressing & Subnetting

Addressing & Subnetting Addressing & Subnetting Addressing to identify and locate each host. We call it addressing. Identification: hostname, address (MAC, IP) IP add? MAC add? MAC add: local IP add: internetwork An address generally

More information

Chapter 9: Subnetting IP Networks

Chapter 9: Subnetting IP Networks Chapter 9: Subnetting IP Networks Network Segmentation Reasons for Subnetting Subnetting is the process of segmenting a network into multiple smaller network spaces called subnetworks or subnets. The purpose

More information

Operation Manual DHCP. Table of Contents

Operation Manual DHCP. Table of Contents Table of Contents Table of Contents Chapter 1 DHCP Overview... 1-1 1.1 DHCP Principles... 1-1 1.1.1 BOOTP Relay Agent... 1-3 1.1.2 DHCP and BOOTP Relay Agent... 1-4 1.2 General DHCP Configuration... 1-4

More information

Module 1: Allocating IP Addressing by Using Dynamic Host Configuration Protocol

Module 1: Allocating IP Addressing by Using Dynamic Host Configuration Protocol Contents Module 1: Allocating IP Addressing by Using Dynamic Host Configuration Protocol Overview 1 Multimedia: The Role of DHCP in the Network Infrastructure 2 Lesson: Adding and Authorizing the DHCP

More information

Mike Meyers CompTIA A+ Guide to Managing and Troubleshooting PCs Fourth Edition Visible Networks Chapter 5

Mike Meyers CompTIA A+ Guide to Managing and Troubleshooting PCs Fourth Edition Visible Networks Chapter 5 Visible Networks Chapter 5 Overview In this chapter, you will learn how to Describe the basic functions of a network, including identifying common devices and connectors Discuss the differences between

More information

Network I Lab 02. What are the major external components of the PC including the peripherals? / Characteristics

Network I Lab 02. What are the major external components of the PC including the peripherals? / Characteristics Part 01 : PC Hardware Network I Lab 02 Objective Become familiar with the basic peripheral components of a PC computer system. Identify PC connections including network attachment. Examine the internal

More information

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018 CS 43: Computer Networks 21: The Network Layer & IP November 7, 2018 The Network Layer! Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network: routing

More information

setting IP addresses copyright 2015 Robert Montante

setting IP addresses copyright 2015 Robert Montante setting IP addresses copyright 2015 Robert Montante What IP Address to Choose? Computers connect to the Internet by way of a Local Area Network LANs have network IDs - the leftmost part of the IP address

More information

IP Address Assignment

IP Address Assignment IP Address Assignment An IP address does not identify a specific computer. Instead, each IP address identifies a connection between a computer and a network. A computer with multiple network connections

More information

IPv6 Feature Facts

IPv6 Feature Facts 12.1.2 IPv6 Feature Facts The current IP addressing standard, version 4, will eventually run out of unique addresses, so a new system is being developed. It is named IP version 6 or IPv6. You should know

More information

LECTURE -4 IP ADDRESSES. IP Addresses: Classful Addressing

LECTURE -4 IP ADDRESSES. IP Addresses: Classful Addressing LECTURE -4 IP ADDRESSES IP Addresses: Classful Addressing 1 CONTENTS INTRODUCTION CLASSFUL ADDRESSING Different Network Classes Subnetting Classless Addressing 2 INTRODUCTION 3 WHAT IS AN IP ADDRESS A

More information

TCP/IP and the OSI Model

TCP/IP and the OSI Model TCP/IP BASICS TCP/IP and the OSI Model TCP/IP BASICS The network protocol of the Internet Composed of six main protocols IP Internet Protocol UDP User Datagram Protocol TCP Transmission Control Protocol

More information

Addressing the Network IPv4

Addressing the Network IPv4 Addressing the Network IPv4 Network Fundamentals Chapter 6 1 IP Addressing Structure Describe the dotted decimal structure of a binary IP address and label its parts 2 IP Addressing Structure Describe

More information

BCS Level 4 Certificate in Network Principles Syllabus QAN 603/0548/4

BCS Level 4 Certificate in Network Principles Syllabus QAN 603/0548/4 Making IT good for society BCS Level 4 Certificate in Network Principles Syllabus QAN 603/0548/4 Version 2.1 September 2017 This is a United Kingdom government regulated qualification which is administered

More information

This talk will cover the basics of IP addressing and subnetting. Topics covered will include:

This talk will cover the basics of IP addressing and subnetting. Topics covered will include: This talk will cover the basics of IP addressing and subnetting. Topics covered will include: What is an IP Address? What are Classes? What is a Network Address? What are Subnet Masks and Subnet Addresses?

More information

Operation Manual DHCP H3C S3600 Series Ethernet Switches-Release Table of Contents

Operation Manual DHCP H3C S3600 Series Ethernet Switches-Release Table of Contents Table of Contents Table of Contents Chapter 1 DHCP Overview... 1-1 1.1 Introduction to DHCP... 1-1 1.2 DHCP IP Address Assignment... 1-1 1.2.1 IP Address Assignment Policy... 1-1 1.2.2 Obtaining IP Addresses

More information

MOC 20410B: Installing and Configuring Windows Server 2012

MOC 20410B: Installing and Configuring Windows Server 2012 MOC 20410B: Installing and Configuring Windows Server 2012 Course Overview This course is part one of a three-part series that provides the skills and knowledge necessary to implement a core Windows Server

More information

Guide to TCP/IP Fourth Edition. Chapter 2: IP Addressing and Related Topics

Guide to TCP/IP Fourth Edition. Chapter 2: IP Addressing and Related Topics Guide to TCP/IP Fourth Edition Chapter 2: IP Addressing and Related Topics Objectives Describe IP addressing, anatomy and structures, and addresses from a computer s point of view Recognize and describe

More information

Chapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0

Chapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0 Chapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 13 Chapter 8 - Sections & Objectives 8.1 Subnetting an IPv4 Network Explain how subnetting segments

More information

Operation Manual DHCP. Table of Contents

Operation Manual DHCP. Table of Contents Table of Contents Table of Contents Chapter 1 DHCP Overview... 1-1 1.1 Introduction to DHCP... 1-1 1.2 DHCP IP Address Assignment... 1-2 1.2.1 IP Address Assignment Policy... 1-2 1.2.2 Obtaining IP Addresses

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

1 Connectionless Routing

1 Connectionless Routing UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing

More information

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking Objectives Describe methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

Linux System Administration

Linux System Administration IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address

More information

MOC 20410C: Installing and Configuring Windows Server 2012

MOC 20410C: Installing and Configuring Windows Server 2012 MOC 20410C: Installing and Configuring Windows Server 2012 Course Overview This course provides students with the knowledge and skills to implement a core Windows Server 2012 infrastructure in an existing

More information

CTS2134 Introduction to Networking. Module : Troubleshooting

CTS2134 Introduction to Networking. Module : Troubleshooting CTS2134 Introduction to Networking Module 10.4 10.7: Troubleshooting Interpreting ipconfig Condition Static IP DHCP Alternate Configuration APIPA ipconfig /all Output DHCP Enabled = No and DHCP Server

More information

IP Multicast Addressing

IP Multicast Addressing APPENDIX B Multicast delivery is enabled by setting up a multicast address on the Content Engine in the form of a multicast cloud configuration to which different devices, configured to receive content

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

OSI Network Layer. Chapter 5

OSI Network Layer. Chapter 5 OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

IPv6 Addressing. Design: Amir Mohammad Mohabbat

IPv6 Addressing. Design: Amir Mohammad Mohabbat IPv6 Addressing 1 Mohammad Mohabbat OBJECTIVES: To introduce the IPv6 addressing scheme and different notations used to represent an address in this version. To explain the three types of addressing used

More information

ISO 9001:2008. Pankaj Kumar Dir, TEC, DOT

ISO 9001:2008. Pankaj Kumar Dir, TEC, DOT ISO 9001:2008 Pankaj Kumar Dir, TEC, DOT AWARENESS OBJECTIVES IPv6 Address Format & Basic Rules Understanding the IPv6 Address Components Understanding & Identifying Various Types of IPv6 Addresses 3/25/2012

More information

Understanding Networking Fundamentals

Understanding Networking Fundamentals Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation

More information

Lab Calculating IPv4 Subnets

Lab Calculating IPv4 Subnets Objectives Part 1: Determine IPv4 Address Subnetting Determine the network address. Determine the broadcast address. Determine the number of hosts. Part 2: Calculate IPv4 Address Subnetting Determine the

More information

Internet Fundamentals

Internet Fundamentals Internet Fundamentals Lecture-10 IPv4 19.2 19-1 IPv4 ADDRESSES An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device (for example, a computer or a router)

More information

NUMERIC SYSTEMS USED IN NETWORKING

NUMERIC SYSTEMS USED IN NETWORKING NUMERIC SYSTEMS USED IN NETWORKING Decimal - Binary - Hexadecimal Table ASCII Code 128 64 32 16 8 4 2 1 The Letter A 0 1 0 0 0 0 0 1 Data Units Base 10 Numbering System Base 2 Numbering System Decimal

More information

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High

More information