NetTech Handouts 03 04
NetTech Handouts 03 04
• Domain Name System (DNS) refers to a TCP/IP protocol that is used on the Internet for translating names of
domains and their publicly advertised network nodes into IP addresses.
• Simple Network Management Protocol (SNMP) refers to a TCP/IP protocol that monitors and controls the
exchange of management information between networks and network components; it enables network
administrators to manage configurations, statistics collection, network performance, and security. SNMP model
includes three (3) components:
o Managed devices collect and store management information and make this information available to NMSs
using SNMP.
o An agent has local knowledge of management information and translates that information into a form
compatible with SNMP.
o NMS executes applications that monitor and control managed devices. NMSs provide the bulk of the
processing and memory resources required for network management.
• Terminal Emulation Protocol Network (Telnet) refers to a TCP/IP protocol that uses the TCP as the transport
protocol to establish a connection between server and client.
o It uses special software called a daemon, which is referred to as a remote host. A connection using Telnet is
called a Virtual Terminal (VTY) session, or connection.
• Remote login application (rlogin) is a UNIX command that allows authorized users to log in to other UNIX machines
(hosts) on a network and to interact as if the user were physically at the host computer. Once the user is logged
into the host, the user can do anything that the host has permitted, such as read, edit, or delete files.
• Hypertext Transfer Protocol (HTTP) refers to an application-level protocol service and an Internet standard
developed by the IETF that supports the exchange of information on the World Wide Web, as well as on internal
networks.
• HTTPS (Hypertext Transfer Protocol over Secure Socket Layer) is a secure message-oriented communications
protocol designed for use in conjunction with HTTP.
o Secure Sockets Layer (SSL) – is a security protocol that works at a socket level. This layer exists between
the TCP layer and the application layer to encrypt/decode data and authenticate concerned entities.
Window Sliding
Mechanism. requires
the sender to receive
an acknowledgment
from the receiver after
transmitting a certain
amount of data.
TCP uses the sliding window mechanism to control the data transmission rate.
TCP Shutdown (Four-
Way Handshake)
is engaged when the
data transmission is
complete in order to
disconnect the TCP
connection and release
system resources.
References:
Comer, D. (2019). The internet book: Everything you need to know about computer networking and how the internet
works. CRC Press.
Huawei. (2020). HCIA-Datacom V1.0 Training Material.
Karumanchi, N., Damodaram, A., & Rao, S. (2020). Elements of computer networking: An integrated approach. Career
Monk.
Kurose, T & Ross, K. (2021). Computer networking: A top-down approach. Pearson.
Robertazzi, T. (2017). Introduction to computer networking. Springer International.
• An IP address refers to an address that is usually assigned by the network administrator or internet
service provider in order to uniquely and universally identify each device on an IP network.
o A public IP address is what computers use to find each other online and exchange information. It
is assigned to the computer by the Internet Service Provider as soon as the computer is connected
to the Internet gateway.
▪ Static public IP address – It is a fixed IP address and is used primarily for hosting web pages
or services on the Internet.
▪ Dynamic public IP address – It is chosen from a pool of available addresses and changes each
time one connects to the Internet.
o A private IP address is what computers on a network use to communicate with the router. It can
change each time they are connected.
o Parts of an IP Address
▪ The network ID/field identifies the host that is located on the same physical network.
▪ The host ID (also known as a host address) identifies the individual host (e.g., workstation,
server, router, or other TCP/IP host) within a network.
Class B address – This uses two (2) of the four (4) octets 128.0.0.0 to 191.255.255.255
(16 bits) to indicate the network address. The two Network.Network.Host.Host
other octets, which specify the host addresses, now Number of Bits used in Network / Host – 16
have a total of 16 bits. Maximum Host of Network – 65,534
Class C address – This uses the first three octets (24 192.0.0.0 to 233.255.255.255
bits) of the IP address to identify the network portion, Network.Network.Network.Host
with the remaining octet reserved for the host portion, Number of Bits used in Network / Host – 8
which is equivalent to eight (8) bits. Maximum Host of Network – 254
Class D address – This is created to enable multicasting 224.0.0.0 to 239.255.255.255
using an IP address. A multicast address is a unique Host.Host.Host.Host
address that directs packets with that destination The first four bits of Class D must be 1110.
address to predefined groups of hosts. The first octet range for this class is 11100000 to
11101111, or 224 to 239.
Class E address – This is reserved by the Internet 240.0.0.0 to 255.255.255.255
Engineering Task Force (IETF) for its own research. The first four bits of Class E is set to “1111”.
Therefore, the first octet range for Class E
addresses is 11110000 to 11111111, 240 to 255.
o The subnet mask (default mask) determines which portion of an IP address identifies the network and
which portion identifies the host. Like the IP address, it is represented by four octets. The network bits
are represented by the 1s in the network mask, and the node bits are represented by the 0s.
Class Default Mask
Decimal Binary Shorthand
A 255.0.0.0 11111111.00000000.00000000.00000000 /8
B 255.255.0.0 11111111.11111111.00000000.00000000 /16
C 225.255.255.0 11111111.11111111.11111111.00000000 /24
Note: Class D & E are used for Multicast and Research purposes.
• Default Gateway is used to specify the address of the nearest routing device that is used by the host
device to forward addressed packets onto the network.
Subnet Masking
For our computer to tell where to break the IP address apart to get the abovementioned Input Output
parts of an IP address, the IP address must be “ANDed” with its default mask in binary. x y F = xy
0 0 0
Example: Determine the network and the host portion of an IP address, 200.133.175.33. 0 1 0
Step 1: Convert IPv4 address from decimal into binary. 1 0 0
• Step A: Divide the given decimal number by 2 and note down the remainder. 1 1 1
• Step B: Divide the obtained quotient by 2, and note the remainder again.
• Step C: Repeat the above steps until you get 0 as the quotient.
• Step D: Write the remainders in such a way that the last remainder is written first, followed by the
rest in the reverse order.
• Step E: This can also be understood in another way which states that the Least Significant Bit (LSB) of
the binary number is at the top and the Most Significant Bit (MSB) is at the bottom. This number is
the binary value of the given decimal number.
200 133 175 33
Div Qou Rem Div Qou Rem Div Qou Rem Div Qou Rem
200/2 100 0 LSB 133/2 66 1 LSB 175/2 87 1 LSB 33/2 16 1 LSB
100/2 50 0 66/2 33 0 87/2 43 1 16/2 8 0
50/2 25 0 33/2 16 1 43/2 21 1 8/2 4 0
25/2 12 1 16/2 8 0 21/2 10 1 4/2 2 0
12/2 6 0 8/2 4 0 10/2 5 0 2/2 1 0
6/2 3 0 4/2 2 0 5/2 2 1 1/2 0 1 MSB
3/2 1 1 2/2 1 0 2/2 1 0 0
1/2 0 1 MSB 1/2 0 1 MSB 1/2 0 1 MSB 0
Step 2: Check the IP Address class and use the “AND” operation to the binary equivalent of the IP address with
its equivalent default mask.
Note: Default mask to be used is 225.255.255.0 or 11111111.11111111.11111111.00000000 in Class C.
Subnetting
It refers to a process of borrowing bits from the host ID field to form a new subnet ID field.
Example: A company is granted a site address 138.45.0.0 and it needs to be subnetted into 45 individual
networks.
Step 1: Determine the class and the default mask of the IP address you have been given.
This tells us that it takes a total of 6 bits to support the value of 45, 101101.
Step 4: Determine the custom subnet mask for our network by masking.
Thus, the custom subnet mask in dotted-decimal notation is 255.255.252.0; to support 45 individual
networks with a given network ID of 138.45.0.0, we would have to use a subnet mask of 255.255.252.0
Increments of 4:
138.45.4.0 - 138.45.8.0
Step 7: Determine the number of host addresses that could support each subnetwork. Count the remaining
bits (zero’s) to the right-hand side of the custom subnet mask.
Default Mask 11111111 . 11111111 . 00000000 . 00000000
Custom Subnet Mask 11111111 . 11111111 . 11111100 . 00000000
Total Hosts = 2h- 2; h = 10
Total Hosts = 210- 2 = 1,024 - 2 (for the invalid addresses)
= 1,022 total hosts per subnetwork
Internet Protocol version 6 (IPv6) is a set of specifications designed by the IETF, which is an upgraded
version of IPv4. The other term for this is IP Next Generation (IPng).
• The length of an IPv6 address is 128 bits. Colons are generally used to divide the IPv6 address into
eight segments. Each segment contains 16 bits and is expressed in hexadecimal notation.
• Like an IPv4 address, an IPv6 address is expressed in the format of IPv6 address/mask length.
o Example: 2001:0DB8:2345:CD30:1230:4567:89AB:CDEF/64
▪ IPv6 address: 2001:0DB8:2345:CD30:1230:4567:89AB:CDEF
▪ Subnet number: 2001:0DB8:2345:CD30::/64
IPv6 Abbreviation Specifications
• The leading 0s in each 16-bit segment can be omitted. However, if all bits in a 16-bit segment are 0s, at
least one 0 must be reserved. The tailing 0s cannot be omitted.
• If one or more consecutive 16-bit segments contain only 0s, a double colon (::) can be used to represent
them, but only one :: is allowed in an entire IPv6 address.
• If an abbreviated IPv6 address contains two double colons (::), the IPv6 address cannot be restored to the
original one.