Professional Documents
Culture Documents
Internet Protocols g10 Chs Edz
Internet Protocols g10 Chs Edz
PTORSOOCL
INTERNET
.
PROTOCOLS
TCP/ IP
IPX / SPX
NetBEUI
AppleTalk
AppleTalk
POP3: Post Office Protocol is used to download email from a remote mail server.
IMAP: Internet Message Access Protocol is also
used to download e-mail from a remote mail server.
SMTP: Simple Mail Transfer Protocol is used to
send e-mail to a remote e-mail server.
IP ADDRESSING
An IP address is a number that is used to identify a
device on the network. Each device on a network must
have a unique IP address to communicate with other
network devices.
Network devices are those that move data across the
network, including hubs, switches, and routers. On a
LAN, each host (device that sends or receives
information on the network) and network device must
have an IP address within the same network to be able
to communicate with each other.
Table 6.
Five Classes of IP Address
IP Classes
Class A
Purpose
Class B
Class C
Class D
Class E
THANK YOU
FOR
LISTENING
Subnet Mask
indicates the network portion of an IP
address. Like the IP address, the subnet
mask is a dotted-decimal number.
Usually all hosts within a LAN use the
same subnet mask. Table 3 shows default
subnet masks for usable IP addresses
that are mapped to the first three classes
of IP addresses:
Network
Host
Octet
Class A
Network
Host
Octet
Class C
Network
Octet
Host
2
ipconfig
Type ipconfig and press enter. The figure below shows the IP configuration window using the ipconfig command. The information
from this window will be useful because it shows the IP address, subnet mask and default gateway of a network you are connected
to
PING
The pingis aCommand Prompt commandused to test
the ability of the source computer to reach a specified
destination computer. The ping command is usually
used as a simple way to verify that a computer can
communicate over the network with another computer
or network device.
The ping command operates by sending Internet Control
Message Protocol (ICMP) Echo Request messages to the
destination computer and waiting for a response. How
many of those responses are returned, and how long it
takes for them to return, are the two major pieces of
information that the ping command provides.
Syntax
Description
-t
Using this option will ping thetargetuntil you force it to stop usingCtrl-C.
-a-
-ncount
-lsize
This option sets the number of ICMP Echo Request messages to send. If
you execute the ping command without this option, four requests will be
sent.
-f
Use this ping command option to prevent ICMP Echo Requests from being
fragmented by routers between you and thetarget. The-foption is most
often used to troubleshoot Path Maximum Transmission Unit (PMTU)
issues.
This option sets the Time to Live (TTL) value, the maximum of which is
255.
-iTTL
Use this option to set the size, in bytes, of the echo request packet from
32 to 65,527. The ping command will send a 32 byte echo request if you do
not use the-loption.
-Ssrcaddr
-4
This forces the ping command to use IPv4 only but is only
necessary iftargetis a hostname and not an IP address.
-6
This forces the ping command to use IPv6 only but as with
the-4option, is only necessary when pinging a hostname.
-R
target
/?
END.