Install and Manage
Install and Manage
Network protocols are often organized into a layered structure known as a protocol stack. The most
well-known reference model for this is the OSI (Open Systems Interconnection) model, which
consists of seven layers, each addressing specific aspects of network communication. Page 3 of 49
Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III Version -1
November, 2023
1.1. Network protocol
A network protocol is a standardized set of rules that allows devices on a network to communicate
efficiently. These rules cover how data is formatted, transmitted, received, and how devices identify and
address each other. Think of the internet as a massive global conversation. For everyone to understand
and respond appropriately there must be a common language. Network protocols ensure that devices
worldwide can understand and interpret data consistently. Each protocol serves a specific purpose, and
understanding their applications can help in designing and troubleshooting network systems. Here are
some common network protocols and their applications:
Transmission Control Protocol (TCP):
Application: Web browsing, email, file transfer.
Description: Ensures reliable, ordered, and error-checked delivery of data. Used for applications where
accurate and complete data transmission is crucial.
Internet Protocol (IP):
Application: Routing and addressing data packets on the internet.
Description: Responsible for addressing and routing data packets between devices on
a network. IP is fundamental for internet communication.
Hypertext Transfer Protocol (HTTP):
Application: Web browsing.
Description: Facilitates the transfer of hypertext (web pages) between a web server
and a web browser. The foundation of data communication on the World Wide Web.
File Transfer Protocol (FTP):
Application: File transfer between computers.
Description: Enables the transfer of files between a local and remote computer.
Commonly used for website maintenance and data sharing.
Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3)/Internet Message Access Protocol
(IMAP):
Application: Email communication.
Description: SMTP is used for sending emails, while POP3 and IMAP are used for receiving emails. These
protocols work together to manage email communication.
Domain Name System (DNS):
Page 4 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III
Version -1 November, 2023
Understanding these protocols and their applications is crucial for network administrators, developers, and
anyone involved in managing or troubleshooting computer networks. Each protocol plays a specific role in
enabling the diverse range of services we use in our interconnected digital world.
1.2. Manage appropriate network protocol service
Managing network protocol services involves overseeing the configuration, monitoring, and maintenance of
the protocols that enable communication and data transfer within a network. To manage the service of network
protocol we use select, test and validate appropriate network protocol service.
1.2.1. Select network protocol service
Selecting an appropriate network protocol service depends on the specific requirements and goals of your
network. Here are some common scenarios along with corresponding network protocol services:
1. Web Browsing:
Appropriate Protocol: Hypertext Transfer Protocol (HTTP) or its secure counterpart HTTPS.
Description: HTTP is used for standard web browsing, while HTTPS adds a layer of security with encrypted
communication.
2. Secure Remote Access:
Appropriate Protocol: Secure Shell (SSH) or Virtual Private Network (VPN) protocols.
Description: SSH provides secure command-line access, while VPNs enable secure access to a private network
over the internet.
3. File Transfer:
Appropriate Protocol: File Transfer Protocol (FTP) or Secure File Transfer Protocol (SFTP).
Description: FTP is suitable for basic file transfers, while SFTP adds encryption for enhanced security.
4. Email Communication:
Appropriate Protocol: Simple Mail Transfer Protocol (SMTP) for sending emails, and Post Office Protocol (POP3)
or Internet Message Access Protocol (IMAP) for receiving emails.
Description: SMTP is used to send emails, while POP3 and IMAP retrieve emails from a server.
5. Network Management: Page 6 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network
Protocols Level - III Version -1 November, 2023
Appropriate Protocol: Extensible Messaging and Presence Protocol (XMPP) for instant messaging.
Description: XMPP is commonly used for real-time communication and collaboration in messaging applications.
When selecting a network protocol service, consider the specific needs, security requirements, and compatibility
with your network infrastructure and devices. It's often a good practice to use secure versions of protocols (e.g.,
HTTPS instead of HTTP) when dealing with sensitive data or communication. Additionally, stay informed about
updates and advancements in protocols to ensure the continued security and efficiency of your network.
1.2.2. Test network protocol service
Testing network protocol services is a crucial step to ensure that they operate as intended, meet performance
expectations, and are secure. Below are key steps and considerations for testing an appropriate network protocol
service:
1. Functionality Testing:
Objective: Verify that the protocol service performs its intended functions.
Activities:- Perform basic operations and transactions using the protocol. Test different features and functionalities
provided by the protocol.
2. Performance Testing:
Objective: Assess the speed, responsiveness, and efficiency of the protocol service.
Activities:-Measure data transfer rates under varying network conditions.Test the protocol's performance under heavy
loads and high traffic.
3. Security Testing:
Objective: Identify and address potential security vulnerabilities in the protocol service.
Activities:-Conduct penetration testing to uncover potential weaknesses. Verify that encryption mechanisms (e.g.,
SSL/TLS) are implemented correctly.
4. Compatibility Testing:
Objective: Ensure that the protocol service is compatible with different devices, platforms, and software applications.
Activities:-Test the protocol across various operating systems and devices. Verify interoperability with different versions
of the protocol.
Page 8 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III Version -1
November, 2023
7. Usability Testing:
Objective: Assess the user-friendliness and ease of use of the protocol service.
Activities:- Gather feedback from end-users regarding their experience with the protocol. Identify and address any
usability issues or user interface concerns.
By following these testing activities, you can ensure that the network protocol service is thoroughly evaluated for
functionality, performance, security, and usability. Regular testing and monitoring are essential to maintain the
reliability and effectiveness of the protocol service over time. Page 9 of 49 Ministry of Labor and Skills Author/Copyright
Install and Manage Network Protocols Level - III Version -1 November, 2023
1.2.3. Validate network protocol service
Validating an appropriate network protocol service involves ensuring that the service meets the intended
requirements, operates effectively, and complies with relevant standards. Here's a step-by-step guide for validating a
network protocol service:
Review Requirements:
Objective: Confirm that the network protocol service aligns with the specified requirements.
Activities: - Refer to the initial project or network requirements documentation.
Activities:-Test interoperability with devices from different vendors.Verify compatibility with various operating
systems and network environments.
Error Handling Validation:
Objective: Confirm that the protocol service effectively handles errors and failures.
Activities:- Intentionally induce errors and assess the protocol's response. Verify the effectiveness of error recovery
mechanisms.
Scalability Validation:
Objective: Assess the protocol service's ability to scale with network growth.
Activities:- Test performance as the number of users or devices increases. Evaluate scalability under different network
conditions.
Usability Validation:
Objective: Assess the user-friendliness and ease of use of the protocol service.
Activities:- Gather feedback from end-users. Evaluate the protocol service's user interface and overall user
experience.
Documentation Verification:
Objective: Confirm that documentation accurately reflects the protocol service's features and configurations.
Activities:- Review official documentation for completeness and accuracy.
Ensure that configuration steps align with the actual behavior of the protocol.
Compliance Validation:
Objective: Verify that the protocol service complies with industry standards and regulatory requirements.
Activities:- Conduct audits to ensure adherence to relevant standards. Confirm compliance with any legal or
regulatory requirements.
Feedback and Improvement:
Objective: Gather feedback from stakeholders and end-users to identify areas for improvement.
Activities: - Encourage open communication and feedback. Use feedback to make necessary adjustments and
improvements.
By following these validation activities, you can ensure that the network protocol service is thoroughly assessed,
meets requirements, and operates effectively in the intended network Page 11 of 49 Ministry of Labor and Skills
Author/Copyright Install and Manage Network Protocols Level - III Version -1 November, 2023
environment. Regular validation, monitoring, and feedback mechanisms contribute to the continuous improvement
of the protocol service.
1.3. Design a network address system
Designing a network address system involves planning how devices on a network will be identified and
communicated with. This includes defining IP addressing schemes, sub-netting, and addressing assignments. Below
are the steps to design a network address system:
Define Network Requirements:
Clearly understand the requirements of your network. Consider the number of devices, scalability, security needs,
and any specific constraints or regulations.
Choose IP Addressing Scheme:
Decide whether you will use IPv4 or IPv6. IPv4 is the most widely used, but IPv6 is becoming increasingly
important due to the exhaustion of IPv4 addresses.
Address Space Planning:
Determine the size of your network and allocate address space accordingly. Plan for growth to ensure that your
addressing scheme can accommodate future expansion.
sub netting:
Divide your network into subnets to improve efficiency, security, and manageability. Sub netting allows you
to group devices logically and control traffic flow.
Select Private IP Address Range:
If you are using IPv4, choose a private IP address range for your internal network. Common private IP
address ranges include 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to
192.168.255.255.
Assign Subnet Addresses:
Assign specific subnets to different departments, functions, or physical locations based on your
organization's structure and needs. Document the purpose of each subnet.
Plan for VLANs (Virtual LANs):
If your network includes VLANs, plan how they will be integrated into your addressing scheme. VLANs
allow you to logically segment a network regardless of physical location.
Consider DHCP (Dynamic Host Configuration Protocol):
Decide whether to use static or dynamic IP addressing. DHCP can simplify IP address management by automatically
assigning addresses to devices on the network. Page 12 of 49 Ministry of Labor and Skills Author/Copyright Install and
Manage Network Protocols Level - III Version -1 November, 2023
Create a detailed document outlining the entire addressing plan. Include information about the address ranges,
subnets, VLANs, and any other relevant details. This document will be valuable for troubleshooting and future
network administrators.
Implement IPv6 (if applicable):
If you are designing a new network or upgrading an existing one, consider implementing IPv6
alongside IPv4. IPv6 provides a larger address space and is essential for the long-term sustainability of
your network.
Consider Network Security:
Implement security measures in your addressing plan, such as using firewalls, access control lists
(ACLs), and private addressing for internal resources.
Plan for Remote Access:
If your network supports remote access, plan how devices will be addressed and secured. This may
involve using VPNs (Virtual Private Networks) and addressing schemes for remote networks.
Validate and Test:
Before deploying the addressing scheme, validate it in a test environment. This helps identify any issues and ensures
that the design meets the requirements.
Document Network Changes:
Keep the addressing plan documentation updated whenever there are changes to the network. This includes
additions of new subnets, modifications to existing ones, and changes to device addressing.
Monitor and Adjust:
Regularly monitor the network for performance, security, and growth. Adjust the addressing plan as needed to
accommodate changes in requirements or network topology.
By following these steps, you can design a network address system that meets the requirements of your
organization, provides scalability, and ensures efficient and secure communication among devices on the network.
Designing a network addressing system involves allocating IP addresses with consideration for subnets and host
IDs. When designing a network-addressing scheme, sub netting involves dividing an IP address space into smaller,
more manageable sub-networks. Each subnet has its own unique subnet ID, and devices within the subnet are
assigned host IDs. Page 13 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols
Level - III Version -1 November, 2023
1.3.1. IP address
IP addresses are classified into two main types based on version: IPv4 (Internet Protocol version 4) and IPv6 (Internet
Protocol version 6). These types differ in their format and the number of bits used to represent addresses.
1. IPv4 (Internet Protocol version 4):
Format: IPv4 addresses are 32-bit numerical labels, typically represented in dotted-decimal format (e.g., 192.168.0.1).
Address Space: Provides approximately 4.3 billion unique addresses.
Notation: Consists of four octets separated by periods (e.g., 192.168.0.1).
Common Usage: Still widely used in most networks today.
Example: 192.168.1.1
2. Private IP Address:- are reserved for use within private networks and are not routable on the public Internet.
They are defined in RFC 1918.
Example: Addresses from ranges like 192.168.0.0 to 192.168.255.255, 172.16.0.0 to 172.31.255.255, and
10.0.0.0 to 10.255.255.255.
3. Static IP Address:- is manually assigned to a device and does not change over time. It is often used for servers
and network devices.
Example: Configuring a printer with a fixed IP address of 192.168.1.100.
Page 14 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III Version -1
November, 2023
4. Dynamic IP Address: is assigned automatically by a DHCP (Dynamic Host Configuration Protocol) server. It
may change periodically.
Example: Computers and smartphones in a home network obtaining IP addresses from a router's DHCP server.
Understanding these types of IP addresses is essential for effective network management and communication on the
Internet.
IP address class
IP address classes are a way to categorize IP addresses based on their initial bits, and they were a part of the original
design of the Internet Protocol (IPv4). IP addresses are divided into five different classes, designated as Class A, Class
B, Class C, Class D, and Class E. Each class has a specific range of IP addresses that can be assigned to networks.
Class A: Range: 1.0.0.0 to 126.0.0.0
Network ID: The first octet represents the network ID, and the remaining three octets are used for host addresses.
Example: 10.0.0.1
Class E:
Page 15 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III Version -1 November, 2023
Choose Internet Protocol Version 4 (TCP/IPv4): In the properties window, find and select "Internet Protocol Version 4
(TCP/IPv4)" from the list.
Specify IP Address: Choose the option to "Use the following IP address" and enter the desired IP address, subnet mask,
default gateway, and DNS server addresses. These values should be provided by your network administrator or
determined based on your network configuration.
Save Changes: Click "OK" to save the changes and close the properties window.
Testing the IP Address (Windows):
Open Command Prompt: Open the Command Prompt by searching for "cmd" in the Start menu.
Page 16 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III Version -1
November, 2023
Bash
Ipconfig