Escolar Documentos
Profissional Documentos
Cultura Documentos
OSS Training
Cristina Mrmureanu
OSS Trainer
Agenda
IP addresses
Network components
OSI Layer
DNS records
2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Networking
IP addresses
IP v4
It is an addresses used to identify a device in a network
Format:
32 bits, divided in network portion and host portion
It is formed out of 4 octets (4x8 bits): 172.16.81.100
Class
Subnet Mask
decimal
No. of Hosts
per network
No. of
Networks
Star-End of IP address
255.0.0.0
16 millions
127
1.0.0.0 - 126.255.255.255
255.255.0.0
65000
16000
128.0.0.0 - 191.255.255.255
255.255.255.0
254
2 millions
192.0.0.0 - 223.255.255.255
Reserved
224.0.0.0 - 239.255.255.255
Reserved
224.0.0.0 - 239.255.255.255
2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
IP Class
Start
End
10.0.0.0
10.255.255.255
172.16.0.0
172.31.255.255
192.168.0.0
192.168.255.255
Network Mask
DHCP
Dynamic Host Configuration Protocol
Computers request IP addresses and networking
parameters automatically from a DHCP server
Dynamic allocation
Static allocation
Uses UDP
IPv6
It is the replacement of IPv4
Format:
128 bits, divided in network portion and host portion
It is formed of 8 portions x:x:x:x:x:x:x:x x= 4
hexadecimal digits:
2001:0DA8:E800:0000:0260:3EFF:FE47:0001
Advantages
Simplified header format for efficient packet handling
Elimination of need for network address translation
(NAT)
8
VPN
It is a secure channel
Headers are not interpreted until they reach the destination
Network components
Hub, switch, router
10
Hubs
11
Switches
12
Routers
Receives/Forwards packages
from/towards other networks
Can be connected to 1 or more networks
Most commonly is connects to the internet through the ISP
Internet service provider
13
0 0 1
1 0
14
01100111
15
27
26
25
24
23
22
21
20
128
64
32
16
OSI Layer
16
Packet headers
17
Transport Protocols
TCP
UDP
The content is
delivered, even if a
packet is missing
If a packet is not
received, it is asked for
again
Encryption Protocols
SSL
TLS
Uses X.509certificates
Uses X.509certificates
It is applied to e-mails,
Web browsing, instant
messaging, voiceover
IP
It is applied to e-mails,
Web browsing, instant
messaging, voiceover
IP
It is initiated in layer 5
Session, but works on
layer 6 - presentation
It is initiated in layer 5
Session, but works on
layer 6 - presentation
20
E-mail Protocols
POP
IMAP
Receive e-mails
Receive e-mails
Uses TCP/IP
Users TCP/IP
No folder concepts
21
SMTP Protocols
Simple Mail Transfer Protocol
Ports 25 , 465 and 587 (SSL)
Sending e-mails
Used by most of the e-mail providers
22
MAPI
Secure connection
Users UDP/TCP
23
DNS records
24
25