0% found this document useful (0 votes)
27 views37 pages

Install and Manage

configure and Admin server8

Uploaded by

edget
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views37 pages

Install and Manage

configure and Admin server8

Uploaded by

edget
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

HARDWARE AND NETWORKING SERVICE LEVEL- III

Based on November, 2023 Version-II

MODULE TITLE: - Installing and managing Network Protocols


MODULE CODE: EIS HNS3 M03 1123
NOMINAL DURATION: 40 Hours
Prepared by: - Ministry of Labor and Skill
1. Introduction to network protocols
A network is like a digital community where computers and other devices are connected to each other, allowing
them to communicate and share information. Imagine it as a way for computers to talk to each other, just like
people do in a community. The main need of networks are:
Sharing of resource: - Networks allow us to share things like files, printers, and internet connections. It is like
sharing toys or books with friends.
Communication: - Computers on a network can send messages to each other. It is similar to sending notes or
messages to friends in your school.
Collaboration: - People can work together on projects even if they are not in the same place. It is like doing a
group project with friends from different classrooms.
A protocol is like a set of rules or instructions that everyone follows to make sure
things work smoothly. Think of it as a recipe or a game with specific steps that
everyone needs to understand and follow.
Network protocols are a set of rules and conventions that govern how data is
transmitted, received, and processed in a computer network. These protocols
enable communication between devices by defining the format and sequencing of
data exchanged between them. The use of standardized protocols ensures
interoperability and seamless communication across diverse hardware and
software platforms. Network Protocols are a set of rules governing exchange of
information in an easy, reliable and secure way. In order for two computers to talk
to each other, they must be speaking the same language.
Here is an introduction to some key aspects of network protocols:
Communication standard
Network protocols serve as communication standards, establishing a common language for devices to
exchange information. These standards define how data is formatted, transmitted, and interpreted by
devices in a network.
Protocol stack

Network protocols are often organized into a layered structure known as a protocol stack. The most
well-known reference model for this is the OSI (Open Systems Interconnection) model, which
consists of seven layers, each addressing specific aspects of network communication. Page 3 of 49
Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III Version -1
November, 2023
1.1. Network protocol
A network protocol is a standardized set of rules that allows devices on a network to communicate
efficiently. These rules cover how data is formatted, transmitted, received, and how devices identify and
address each other. Think of the internet as a massive global conversation. For everyone to understand
and respond appropriately there must be a common language. Network protocols ensure that devices
worldwide can understand and interpret data consistently. Each protocol serves a specific purpose, and
understanding their applications can help in designing and troubleshooting network systems. Here are
some common network protocols and their applications:
Transmission Control Protocol (TCP):
Application: Web browsing, email, file transfer.
Description: Ensures reliable, ordered, and error-checked delivery of data. Used for applications where
accurate and complete data transmission is crucial.
Internet Protocol (IP):
Application: Routing and addressing data packets on the internet.
Description: Responsible for addressing and routing data packets between devices on
a network. IP is fundamental for internet communication.
Hypertext Transfer Protocol (HTTP):
Application: Web browsing.
Description: Facilitates the transfer of hypertext (web pages) between a web server
and a web browser. The foundation of data communication on the World Wide Web.
File Transfer Protocol (FTP):
Application: File transfer between computers.
Description: Enables the transfer of files between a local and remote computer.
Commonly used for website maintenance and data sharing.
Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3)/Internet Message Access Protocol
(IMAP):
Application: Email communication.
Description: SMTP is used for sending emails, while POP3 and IMAP are used for receiving emails. These
protocols work together to manage email communication.
Domain Name System (DNS):
Page 4 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III
Version -1 November, 2023

Application: Resolving domain names to IP addresses.


Description: Translates human-readable domain names (e.g., www.example.com) into IP addresses that
computers use to identify each other on the internet.
Dynamic Host Configuration Protocol (DHCP):
Application: Automatic IP address assignment.
Description: Dynamically assigns IP addresses to devices on a network, making it easier to manage and configure large
networks.
Secure Shell (SSH) and Telnet:
Application: Remote command-line access to servers.
Description: SSH provides secure, encrypted communication for accessing and managing remote servers, while Telnet is an
older protocol without encryption.
Simple Network Management Protocol (SNMP):
Application: Network management and monitoring.
Description: Facilitates the exchange of management information between network devices, allowing administrators to
monitor and manage network performance.
Hyper Text Transfer Protocol Secure (HTTPS):
Application: Secure web browsing.
Description: An extension of HTTP with added security features using SSL/TLS encryption, ensuring secure
communication for online transactions and sensitive data.
Figure 1. 1 Network protocol Page 5 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network
Protocols Level - III Version -1 November, 2023

Understanding these protocols and their applications is crucial for network administrators, developers, and
anyone involved in managing or troubleshooting computer networks. Each protocol plays a specific role in
enabling the diverse range of services we use in our interconnected digital world.
1.2. Manage appropriate network protocol service
Managing network protocol services involves overseeing the configuration, monitoring, and maintenance of
the protocols that enable communication and data transfer within a network. To manage the service of network
protocol we use select, test and validate appropriate network protocol service.
1.2.1. Select network protocol service
Selecting an appropriate network protocol service depends on the specific requirements and goals of your
network. Here are some common scenarios along with corresponding network protocol services:
1. Web Browsing:
Appropriate Protocol: Hypertext Transfer Protocol (HTTP) or its secure counterpart HTTPS.
Description: HTTP is used for standard web browsing, while HTTPS adds a layer of security with encrypted
communication.
2. Secure Remote Access:
Appropriate Protocol: Secure Shell (SSH) or Virtual Private Network (VPN) protocols.
Description: SSH provides secure command-line access, while VPNs enable secure access to a private network
over the internet.
3. File Transfer:
Appropriate Protocol: File Transfer Protocol (FTP) or Secure File Transfer Protocol (SFTP).
Description: FTP is suitable for basic file transfers, while SFTP adds encryption for enhanced security.
4. Email Communication:
Appropriate Protocol: Simple Mail Transfer Protocol (SMTP) for sending emails, and Post Office Protocol (POP3)
or Internet Message Access Protocol (IMAP) for receiving emails.
Description: SMTP is used to send emails, while POP3 and IMAP retrieve emails from a server.
5. Network Management: Page 6 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network
Protocols Level - III Version -1 November, 2023

Appropriate Protocol: Simple Network Management Protocol (SNMP).


Description: SNMP facilitates the exchange of management information between network devices, allowing for
monitoring and control.
6. Dynamic IP Address Assignment:
Appropriate Protocol: Dynamic Host Configuration Protocol (DHCP).
Description: DHCP automatically assigns IP addresses to devices on a network, simplifying network
configuration.
7. Web Security:
Appropriate Protocol: HTTPS (SSL/TLS).
Description: HTTPS ensures secure communication between a web browser and a server, crucial for online
transactions and sensitive data.
8. Real-Time Communication:
Appropriate Protocol: Real-Time Transport Protocol (RTP) for audio and video streaming.
Description: RTP is commonly used for real-time communication, such as VoIP (Voice over Internet Protocol) and
video conferencing.
9. Domain Name Resolution:
Appropriate Protocol: Domain Name System (DNS).
Description: DNS translates human-readable domain names into IP addresses, facilitating internet navigation.
10. Remote System Management:
Appropriate Protocol: Intelligent Platform Management Interface (IPMI) or Remote Desktop Protocol (RDP).
Description: IPMI provides remote management capabilities for servers, while RDP allows remote access to
desktop environments.

11. Database Connectivity:


Appropriate Protocol: Structured Query Language (SQL) protocols like MySQL, PostgreSQL, or Microsoft SQL
Server protocols.
Description: Each database system often has its own protocol for communication between client applications and
database servers.
12. Collaboration and Messaging: Page 7 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network
Protocols Level - III Version -1 November, 2023

Appropriate Protocol: Extensible Messaging and Presence Protocol (XMPP) for instant messaging.
Description: XMPP is commonly used for real-time communication and collaboration in messaging applications.

When selecting a network protocol service, consider the specific needs, security requirements, and compatibility
with your network infrastructure and devices. It's often a good practice to use secure versions of protocols (e.g.,
HTTPS instead of HTTP) when dealing with sensitive data or communication. Additionally, stay informed about
updates and advancements in protocols to ensure the continued security and efficiency of your network.
1.2.2. Test network protocol service
Testing network protocol services is a crucial step to ensure that they operate as intended, meet performance
expectations, and are secure. Below are key steps and considerations for testing an appropriate network protocol
service:
1. Functionality Testing:
Objective: Verify that the protocol service performs its intended functions.
Activities:- Perform basic operations and transactions using the protocol. Test different features and functionalities
provided by the protocol.

2. Performance Testing:
Objective: Assess the speed, responsiveness, and efficiency of the protocol service.
Activities:-Measure data transfer rates under varying network conditions.Test the protocol's performance under heavy
loads and high traffic.
3. Security Testing:
Objective: Identify and address potential security vulnerabilities in the protocol service.
Activities:-Conduct penetration testing to uncover potential weaknesses. Verify that encryption mechanisms (e.g.,
SSL/TLS) are implemented correctly.

4. Compatibility Testing:
Objective: Ensure that the protocol service is compatible with different devices, platforms, and software applications.
Activities:-Test the protocol across various operating systems and devices. Verify interoperability with different versions
of the protocol.
Page 8 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III Version -1
November, 2023

5. Reliability and Stability Testing:


Objective: Assess the reliability and stability of the protocol service under normal and stressful conditions.
Activities:-Conduct stress testing to simulate heavy usage and monitor the protocol's behavior. Evaluate how the protocol
handles unexpected events or errors.
6. Scalability Testing:
Objective: Evaluate the ability of the protocol service to scale with the growth of the network.
Activities:-Test the protocol's performance as the number of users or devices increases. Assess how well the protocol
handles additional network nodes.

7. Usability Testing:
Objective: Assess the user-friendliness and ease of use of the protocol service.
Activities:- Gather feedback from end-users regarding their experience with the protocol. Identify and address any
usability issues or user interface concerns.

8. Error Handling and Recovery Testing:


Objective: Verify how well the protocol service handles errors and recovers from failures.
Activities:- Intentionally induce errors and observe the protocol's response. Test the recovery mechanisms to ensure
minimal disruption.
9. Interoperability Testing:
Objective: Confirm that the protocol service works seamlessly with other protocols and network devices.
Activities:- Test the protocol's compatibility with devices from different vendors. Verify integration with other
network services.

10. Documentation Verification:


Objective: Confirm that the documentation accurately reflects the protocol service's features and configurations.
Activities:-Review the official documentation for completeness and accuracy. Ensure that configuration steps align
with the actual behavior of the protocol.

By following these testing activities, you can ensure that the network protocol service is thoroughly evaluated for
functionality, performance, security, and usability. Regular testing and monitoring are essential to maintain the
reliability and effectiveness of the protocol service over time. Page 9 of 49 Ministry of Labor and Skills Author/Copyright
Install and Manage Network Protocols Level - III Version -1 November, 2023
1.2.3. Validate network protocol service
Validating an appropriate network protocol service involves ensuring that the service meets the intended
requirements, operates effectively, and complies with relevant standards. Here's a step-by-step guide for validating a
network protocol service:
Review Requirements:
Objective: Confirm that the network protocol service aligns with the specified requirements.
Activities: - Refer to the initial project or network requirements documentation.

Verify that the chosen protocol addresses the identified needs.


Check Standards Compliance:
Objective: Ensure that the network protocol service complies with industry standards and specifications.
Activities: - Refer to relevant standards documents.
Confirm that the protocol adheres to protocols and conventions outlined in industry specifications.
Functional Validation:
Objective: Confirm that the protocol service performs its intended functions.
Activities:- Execute test cases based on functional requirements. Verify that the protocol service meets expectations
for data transfer, addressing, and other functionalities.
Performance Validation:
Objective: Assess the performance of the protocol service under various conditions.
Activities:- Measure data transfer rates, latency, and throughput. Evaluate performance under both normal and peak
load scenarios.
Security Validation:
Objective: Confirm that the protocol service implements necessary security measures.
Activities:-Verify the use of encryption mechanisms (e.g., SSL/TLS). Conduct security testing to identify and
address potential vulnerabilities.
Compatibility and Interoperability Testing:
Objective: Ensure that the protocol service works seamlessly with other protocols and devices.
Page 10 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III Version -1
November, 2023

Activities:-Test interoperability with devices from different vendors.Verify compatibility with various operating
systems and network environments.
Error Handling Validation:
Objective: Confirm that the protocol service effectively handles errors and failures.
Activities:- Intentionally induce errors and assess the protocol's response. Verify the effectiveness of error recovery
mechanisms.
Scalability Validation:
Objective: Assess the protocol service's ability to scale with network growth.
Activities:- Test performance as the number of users or devices increases. Evaluate scalability under different network
conditions.
Usability Validation:
Objective: Assess the user-friendliness and ease of use of the protocol service.
Activities:- Gather feedback from end-users. Evaluate the protocol service's user interface and overall user
experience.
Documentation Verification:
Objective: Confirm that documentation accurately reflects the protocol service's features and configurations.
Activities:- Review official documentation for completeness and accuracy.

Ensure that configuration steps align with the actual behavior of the protocol.
Compliance Validation:
Objective: Verify that the protocol service complies with industry standards and regulatory requirements.
Activities:- Conduct audits to ensure adherence to relevant standards. Confirm compliance with any legal or
regulatory requirements.
Feedback and Improvement:
Objective: Gather feedback from stakeholders and end-users to identify areas for improvement.
Activities: - Encourage open communication and feedback. Use feedback to make necessary adjustments and
improvements.

By following these validation activities, you can ensure that the network protocol service is thoroughly assessed,
meets requirements, and operates effectively in the intended network Page 11 of 49 Ministry of Labor and Skills
Author/Copyright Install and Manage Network Protocols Level - III Version -1 November, 2023

environment. Regular validation, monitoring, and feedback mechanisms contribute to the continuous improvement
of the protocol service.
1.3. Design a network address system
Designing a network address system involves planning how devices on a network will be identified and
communicated with. This includes defining IP addressing schemes, sub-netting, and addressing assignments. Below
are the steps to design a network address system:
Define Network Requirements:

Clearly understand the requirements of your network. Consider the number of devices, scalability, security needs,
and any specific constraints or regulations.
Choose IP Addressing Scheme:

Decide whether you will use IPv4 or IPv6. IPv4 is the most widely used, but IPv6 is becoming increasingly
important due to the exhaustion of IPv4 addresses.
Address Space Planning:

Determine the size of your network and allocate address space accordingly. Plan for growth to ensure that your
addressing scheme can accommodate future expansion.
sub netting:
Divide your network into subnets to improve efficiency, security, and manageability. Sub netting allows you
to group devices logically and control traffic flow.
Select Private IP Address Range:

If you are using IPv4, choose a private IP address range for your internal network. Common private IP
address ranges include 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to
192.168.255.255.
Assign Subnet Addresses:

Assign specific subnets to different departments, functions, or physical locations based on your
organization's structure and needs. Document the purpose of each subnet.
Plan for VLANs (Virtual LANs):

If your network includes VLANs, plan how they will be integrated into your addressing scheme. VLANs
allow you to logically segment a network regardless of physical location.
Consider DHCP (Dynamic Host Configuration Protocol):
Decide whether to use static or dynamic IP addressing. DHCP can simplify IP address management by automatically
assigning addresses to devices on the network. Page 12 of 49 Ministry of Labor and Skills Author/Copyright Install and
Manage Network Protocols Level - III Version -1 November, 2023

Document Addressing Plan:

Create a detailed document outlining the entire addressing plan. Include information about the address ranges,
subnets, VLANs, and any other relevant details. This document will be valuable for troubleshooting and future
network administrators.
Implement IPv6 (if applicable):
If you are designing a new network or upgrading an existing one, consider implementing IPv6
alongside IPv4. IPv6 provides a larger address space and is essential for the long-term sustainability of
your network.
Consider Network Security:

Implement security measures in your addressing plan, such as using firewalls, access control lists
(ACLs), and private addressing for internal resources.
Plan for Remote Access:

If your network supports remote access, plan how devices will be addressed and secured. This may
involve using VPNs (Virtual Private Networks) and addressing schemes for remote networks.
Validate and Test:
Before deploying the addressing scheme, validate it in a test environment. This helps identify any issues and ensures
that the design meets the requirements.
Document Network Changes:

Keep the addressing plan documentation updated whenever there are changes to the network. This includes
additions of new subnets, modifications to existing ones, and changes to device addressing.
Monitor and Adjust:

Regularly monitor the network for performance, security, and growth. Adjust the addressing plan as needed to
accommodate changes in requirements or network topology.
By following these steps, you can design a network address system that meets the requirements of your
organization, provides scalability, and ensures efficient and secure communication among devices on the network.
Designing a network addressing system involves allocating IP addresses with consideration for subnets and host
IDs. When designing a network-addressing scheme, sub netting involves dividing an IP address space into smaller,
more manageable sub-networks. Each subnet has its own unique subnet ID, and devices within the subnet are
assigned host IDs. Page 13 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols
Level - III Version -1 November, 2023
1.3.1. IP address
IP addresses are classified into two main types based on version: IPv4 (Internet Protocol version 4) and IPv6 (Internet
Protocol version 6). These types differ in their format and the number of bits used to represent addresses.
1. IPv4 (Internet Protocol version 4):
Format: IPv4 addresses are 32-bit numerical labels, typically represented in dotted-decimal format (e.g., 192.168.0.1).
Address Space: Provides approximately 4.3 billion unique addresses.
Notation: Consists of four octets separated by periods (e.g., 192.168.0.1).
Common Usage: Still widely used in most networks today.
Example: 192.168.1.1

2. IPv6 (Internet Protocol version 6):


Format: IPv6 addresses are 128-bit hexadecimal numbers, separated by colons (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
Address Space: Offers an immensely larger address space than IPv4, allowing for virtually unlimited unique addresses.
Notation: Consists of eight groups of four hexadecimal digits, separated by colons.
Common Usage: Becoming increasingly adopted as IPv4 addresses are exhausted.
Example: 2001:0db8::1
Additional Types:
1. Public IP Address:- is globally unique and routable on the Internet. The Internet Assigned Numbers Authority
(IANA) to organizations and individuals assigns it.
Example: The IP address assigned to your home router by your Internet Service Provider (ISP).

2. Private IP Address:- are reserved for use within private networks and are not routable on the public Internet.
They are defined in RFC 1918.
Example: Addresses from ranges like 192.168.0.0 to 192.168.255.255, 172.16.0.0 to 172.31.255.255, and
10.0.0.0 to 10.255.255.255.
3. Static IP Address:- is manually assigned to a device and does not change over time. It is often used for servers
and network devices.
Example: Configuring a printer with a fixed IP address of 192.168.1.100.
Page 14 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III Version -1
November, 2023

4. Dynamic IP Address: is assigned automatically by a DHCP (Dynamic Host Configuration Protocol) server. It
may change periodically.
Example: Computers and smartphones in a home network obtaining IP addresses from a router's DHCP server.
Understanding these types of IP addresses is essential for effective network management and communication on the
Internet.
IP address class
IP address classes are a way to categorize IP addresses based on their initial bits, and they were a part of the original
design of the Internet Protocol (IPv4). IP addresses are divided into five different classes, designated as Class A, Class
B, Class C, Class D, and Class E. Each class has a specific range of IP addresses that can be assigned to networks.
Class A: Range: 1.0.0.0 to 126.0.0.0
Network ID: The first octet represents the network ID, and the remaining three octets are used for host addresses.
Example: 10.0.0.1

Class B: Range: 128.0.0.0 to 191.255.0.0


Network ID: The first two octets represent the network ID, and the remaining two octets are used for host addresses.
Example: 172.16.0.1
Class C: Range: 192.0.0.0 to 223.255.255.0
Network ID: The first three octets represent the network ID, and the last octet is used for host addresses.
Example: 192.168.0.1

Class D: Range: 224.0.0.0 to 239.255.255.255


Purpose: Class D addresses are reserved for multicast groups, which are used for one-to-many communication.

Class E:
Page 15 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III Version -1 November, 2023

Range: 240.0.0.0 to 255.255.255.254


Purpose: Class E addresses are reserved for experimental or future use and are not used in general networking.
1.4. Configuring and testing IP address
Configuring and testing an IP address involves setting up the IP address on a device, such as a computer or network
device, and ensuring that it can communicate with other devices on the network. Below are step-by-step instructions
for configuring and testing an IP address on a typical computer running a Windows operating system. Keep in mind
that the exact steps may vary slightly depending on the operating system in use.
1.4.1. Configuring an IP Address (Windows):
Open Network Settings: Open the "Settings" menu on your computer and go to "Network
& Internet."
Access Network Connections: Click on "Change adapter options" to access your network connections.
Select Network Adapter: Right-click on the network adapter you want to configure (e.g., Ethernet or Wi-Fi) and choose
"Properties."

Choose Internet Protocol Version 4 (TCP/IPv4): In the properties window, find and select "Internet Protocol Version 4
(TCP/IPv4)" from the list.

Specify IP Address: Choose the option to "Use the following IP address" and enter the desired IP address, subnet mask,
default gateway, and DNS server addresses. These values should be provided by your network administrator or
determined based on your network configuration.

Save Changes: Click "OK" to save the changes and close the properties window.
Testing the IP Address (Windows):
Open Command Prompt: Open the Command Prompt by searching for "cmd" in the Start menu.

Page 16 of 49 Ministry of Labor and Skills Author/Copyright Install and Manage Network Protocols Level - III Version -1
November, 2023

Check IP Configuration: Use


the command ipconfig to display the current IP configuration of the device. Verify that the
configured IP address, subnet mask, default gateway, and DNS server information match the values you set. Use the
following commands on CMD

Bash
Ipconfig

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy