Professional Documents
Culture Documents
Ch-3. Ntw. MGMT
Ch-3. Ntw. MGMT
Ch-3. Ntw. MGMT
Network Management
As
Introduction to Network Administration Approaches
5
System and Network Administration
prep: Werkneh E.
The TCP/IP Protocol Suite
Application layer. Programs use application layer protocols to access network resources.
• Application layer protocols include: Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP),
Server Message Block (SMB)Domain Name System (DNS), Post Office Protocol 3 (POP3), Simple Network Management Protocol (SNMP), Simple
Mail Transfer Protocol (SMTP)
Transport layer. Transport layer protocols control data transfer reliability on the network. Transport layer protocols
include:
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
Internet layer. The Internet layer protocols control packet movement between networks. Internet layer protocols include:
• Internet protocol(IP) (IPv4 and IPv6)
• Address Resolution Protocol (ARP)
• Internet Group Management Protocol (IGMP)
• Internet Control Message Protocol (ICMP)
Network interface layer. The network interface layer protocols define how datagrams from the Internet layer are
transmitted on the media.
IP addressing
Dotted decimal notation
32 bits long
Four fields
Example: 10000001.00000101.00001010.01100100 or 129.5.10.100
Unicast
One packet is sent from a server to each client on request
Multicast
Packet is sent to all clients as a group
Broadcast
Sends communication to all points on network
Subnet mask
Used to show class of addressing and to divide network into subnets
IP address considerations
Network number 127.0.0.0 cannot be assigned to any network
Private addresses reserved for Network Address Translation (NAT)
Cannot assign highest network number to a host
15
System and Network Administration
prep: Werkneh E.
Internet Protocol (cont’d.)
Default gateway
IP address of the router that has a connection to other networks
Name resolution
Domain Name System (DNS) translates domain and computer names to IP
addresses
== 129.74.0.0 or 129.74/16
18 System and Network Administration
prep: Werkneh E.
Internet Protocol (cont’d.)
The lab 129.74.46 network is subnetted into several smaller networks.
By “stealing” bits from the host number, we can make the network number larger. This allows us to make a
class B or C network look like many smaller (classless) networks.
These networks are denoted by the formula N.S.H (network.subnet.host)
By using a 27 bit netmask we can divide a network up into several “23” host networks. 11111111 . 11111111 .
11111111 . 11100000
27 bits of network address, 5 bits of host address.
NID Useful Range Broadcast Add
129.74.46.32 129.74.46.33-129.74.46.62 129.74.46.63
129.74.46.64 129.74.46.65-129.74.46.94 129.74.46.95
129.74.46.96 129.74.46.97-129.74.46. 129.74.46.127
… … …
129.74.46.224 129.74.46.225-129.74.46.254 129.74.46.255