You are on page 1of 16
Internet Protocols = =,35: fixed |, ~ ISP address ae resossinnn assigned 1 sna ried gl i Ps - different a —. dynamic == unique ==/3 use... i by: EILLEN IVY A. PORTUGUEZ Siari John H. Roemer Memorial National High Sehool VF Internet Protocols ¥ » Aprotocol is a set of rules. » Part of the protocol specifies where on th Ie the delivery address needs to be written. Ifthe delivery address is written in the wrong place, the letter cannot be delivered. » Internet protocols are set of rules governing communication within and between computers on a network. THE MAIN FUNCTIONS OF rao ARE: » Identifying errors » Compressing the data » Deciding how the data is to be sent » Addressing the data » Deciding how to announce sent and received data. a COMMONLY USED INTERNET PROTOCOLS » TCP/IP: The transmission Control Protocol/Internet Protocol suite protocols has become the dominant standard for internetworking. TCPIIP pe pile a set of public standards that specify how packets of information are exchanged between computers over one or more networks. IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation's network operating system, NetWare. NetBEUI: NetBIOS Extended User Interface is a protocol primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers talk to each other on a large network. - suitable for small peer-to-peer networks, involving a few computers directly connected to each other. a ima y | _ ‘Commonly Used Internet Protocol COMMONLY USED INTERNET PROTOCOLS » AppleTalk: AppleTalk is a protocol suite to network Macintosh computers - designed to run over LocalTalk, which is the Apple LAN physical topology, - also designed to run over major LAN types, notably Ethernet and Token Ring HTTP: Hyper Text Transfer Protocol governs how files such as text, graphics, sound, and video are exchanged on the World Wide Web (www). a » FTP: File Transfer Protocol provides services for file transfer and manipulation. FTP allows multiple simultaneous computer that lacks security features. » SSH: Secure Shell is used to securely connect to a remote computer » TelNet: An application used to connect to a remote computer that lacks security features. » POP3: Post Office Protocol is used to download e-mail from remote mail server. a » IMAP: Internet Message Access Protocol is also used to download e-mail from a remote mail server. » SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server. a IP ADDRESSING » An IP Addressing is a number that is used to identify a device on the network. » Each device on a network must have a unique IP address to communicate with other network devices. Network devices are devices that move data across the network, including hubs, switches, and routers. » On aLAN, each host (device that sends or receives information on the network) and network device must have an IP address within the same network to be able to communicate with each other. » An IP address consists of a series of 32 binary bits (1s and Os). It is very difficult for humans to read binary IP address. For this reason, the 32 bits are grouped into four 8-bit bytes called OCTETS. An IP Address, even in this grouped format, is hard for humans to read, write, and remember. a FIVE CLASSES OF IP ADDRESS Class A Used for large networks, implemented by large companies and some countries. Class B Used for medium-sized networks, implemented by universities. Class C Used for small networks, implemented by ISPs for customer subscriptions. Class D Used for special use for multicasting Class E Used for experimental testing Subnet Mask » Indicates the network portion of an IP address. » Like the IP address, the subnet mask is a dotted-decimal number. a The table shows default subnet masks for usable IP addresses that are mapped to the first three classes of IP address: » 255.0.0.0: Class A, which indicates that the first octet of the IP address is the network portion » 255.255.0.0: Class B, which indicates that the first two octets of the IP addresses are the network portion » 255.255.255.0: Class C, which indicates that the first three octets of the IP address are the network portion. » Class D addresses are used for multicast groups. There is no need to allocate octet or bits to separate network and host addresses » Class E addresses are reserved for research use only, IP Config » Is a command used to find out the IP address of a certain network you are connected to. a How to use the IPConfig command? 1. Click the Start Button, then type cmd (command prompt) on the search box, 2. Ablack screen will appear as shown in the figure. 3. Type ipconfig and press enter. The figure below shows the IP configuration window using the ipconfig command. The information from this window will be useful because it shows the IP address, subnet mask and default gateway of a network you are connected. a Assigning a static IP Address Here are the procedures in assigning an IP address on a windows base computer system. 1. Open the Control Panel's Network Connection icon. 2. Open the icon representing your computer's network connection. 3. Click the Properties button in the Status dialog box —

You might also like