You are on page 1of 8

An Introduction to Networking Terminology, Interfaces, and Protocols - Physical

 Application:
Connection o The application layer is the layer that the users and user-
 connection refers to pieces of related information that are applications most often interact with. Network
transferred through a network. This generally infers that a communication is discussed in terms of availability of
connection is built before the data transfer (by following the resources, partners to communicate with, and data
procedures laid out in a protocol) and then is deconstructed at the synchronization.
at the end of the data transfer.  Presentation:
Packet o The presentation layer is responsible for mapping resources
 A packet is, generally speaking, the most basic unit that is and creating context. It is used to translate lower level
transferred over a network. When communicating over a network, networking data into data that applications expect to see.
packets are the envelopes that carry your data (in pieces) from one  Session:
end point to the other. o The session layer is a connection handler. It creates,
 Packets have a header portion that contains information about the maintains, and destroys connections between nodes in a
packet including the source and destination, timestamps, network persistent way.
hops, etc. The main portion of a packet contains the actual data  Transport:
being transferred. It is sometimes called the body or the payload. o The transport layer is responsible for handing the layers above
Network Interface it a reliable connection. In this context, reliable refers to the
 A network interface can refer to any kind of software interface to ability to verify that a piece of data was received intact at the
networking hardware. For instance, if you have two network cards other end of the connection.
in your computer, you can control and configure each network  Network:
interface associated with them individually. o The network layer is used to route data between different
LAN: nodes on the network. It uses addresses to be able to tell
 LAN stands for "local area network". It refers to a network or a which computer to send information to. This layer can also
portion of a network that is not publicly accessible to the greater break apart larger messages into smaller chunks to be
internet. A home or office network is an example of a LAN. reassembled on the opposite end.
WAN:  Data Link:
 WAN stands for "wide area network". It means a network that is o This layer is implemented as a method of establishing and
much more extensive than a LAN. While WAN is the relevant term maintaining reliable links between different nodes or devices
to use to describe large, dispersed networks in general, it is usually on a network using existing physical connections.
meant to mean the internet, as a whole.  Physical:
Protocol o The physical layer is responsible for handling the actual
 A protocol is a set of rules and standards that basically define a physical devices that are used to make a connection. This layer
language that devices can use to communicate. There are a great involves the bare software that manages physical connections
number of protocols in use extensively in networking, and they are as well as the hardware itself (like Ethernet).
often implemented in different layers.  TCP/IP Model
Port o The TCP/IP model, more commonly known as the Internet
 A port is an address on a single machine that can be tied to a protocol suite, is another layering model that is simpler and
specific piece of software. It is not a physical interface or location, has been widely adopted. It defines the four separate layers,
but it allows your server to be able to communicate using more some of which overlap with the OSI model:
than one application. - Application
Firewall - Transport
 A firewall is a program that decides whether traffic coming into a - Internet
server or going out should be allowed. A firewall usually works by - Link
creating rules for which type of traffic is acceptable on which ports.
Generally, firewalls block ports that are not used by a specific  Application:
application on a server. o In this model, the application layer is responsible for creating
NAT and transmitting user data between applications. The
 NAT stands for network address translation. It is a way to translate applications can be on remote systems, and should appear to
requests that are incoming into a routing server to the relevant operate as if locally to the end user.
devices or servers that it knows about in the LAN. This is usually
implemented in physical LANs as a way to route requests through  Transport:
one IP address to the necessary backend servers. o The transport layer is responsible for communication between
VPN processes. This level of networking utilizes ports to address
 VPN stands for virtual private network. It is a means of connecting different services. It can build up unreliable or reliable
separate LANs through the internet, while maintaining privacy. This connections depending on the type of protocol used.
is used as a means of connecting remote systems as if they were on
a local network, often for security reasons. Internet:
OSI Model o The internet layer is used to transport data from node to node in a
 Historically, one method of talking about the different layers of network. This layer is aware of the endpoints of the connections,
network communication is the OSI model. OSI stands for Open but does not worry about the actual connection needed to get
Systems Interconnect. from one place to another. IP addresses are defined in this layer as
 This model defines seven separate layers. The layers in this model a way of reaching remote systems in an addressable manner.
are:
- Application Link:
- Presentation o The link layer implements the actual topology of the local network
- Session that allows the internet layer to present an addressable interface.
- Transport It establishes connections between neighboring nodes to send
- Network data.
- Data Link
Interfaces • Session
o Interfaces are networking communication points for your • Transport
computer. Each interface is associated with a physical or virtual • Network
networking device. • Data Link
o Typically, your server will have one configurable network interface • Physical
for each Ethernet or wireless internet card you have.
o In addition, it will define a virtual network interface called the APPLICATION LAYER
"loopback" or local host interface. This is used as an interface to The application layer is the layer that the users and user-applications most
connect applications and processes on a single computer to other often interact with. Network communication is discussed in terms of
applications and processes. You can see this referenced as the "lo" availability of resources, partners to communicate with, and data
interface in many tools. synchronization. This layer contains a variety of commonly needed functions:
Media Access Control • Resource sharing and device redirection
o Media access control is a communications protocol that is used to • Remote printer access
distinguish specific devices. Each device is supposed to get a unique • Network management
MAC address during the manufacturing process that differentiates • Electronic messaging (such as mail)
it from every other device on the internet. • Remote file access
o Addressing hardware by the MAC address allows you to reference a • Inter-process communication
device by a unique value even when the software on top may • Directory services
change the name for that specific device during operation. • Network virtual terminals
o Media access control is one of the only protocols from the link
layer that you are likely to interact with on a regular basis. PRESENTATION LAYER
The presentation layer formats the data to be presented to the application
IP layer. This layer may translate data from a format used by the application
o The IP protocol is one of the fundamental protocols that allow the layer into a common format at the sending station, then translate the
internet to work. IP addresses are unique on each network and common format to a format known to the application layer at the receiving
they allow machines to address each other across a network. It is station.
implemented on the internet layer in the IP/TCP model. The presentation layer provides:
o Networks can be linked together, but traffic must be routed when • Character code translation: for example, ASCII to EBCDIC.
crossing network boundaries. This protocol assumes an unreliable • Data conversion: bit order, CR-CR/LF, integer-floating point, and so
network and multiple paths to the same destination that it can on.
dynamically change between. • Data compression: reduces the number of bits that need to be
transmitted on the network.
ICMP • Data encryption: encrypt data for security purposes. For example,
o ICMP stands for internet control message protocol. It is used to password encryption.
send messages between devices to indicate the availability or error
conditions. These packets are used in a variety of network SESSION LAYER
diagnostic tools, such as ping and trace route. The session layer is a connection handler. It creates, maintains, and destroys
HTTP connections between nodes in a persistent way. It provides:
o HTTP stands for hypertext transfer protocol. It is a protocol defined • Session establishment, maintenance and termination: allows two
in the application layer that forms the basis for communication on application processes on different machines to establish, use and
the web. terminate a connection, called a session.
HTTP defines a number of functions that tell the remote system what you are • Session support: performs the functions that allow these processes
requesting. For instance, GET, POST, and DELETE all interact with the to communicate over the network, performing security, name
requested data in a different way. recognition, logging, and so on.

FTP TRANSPORT LAYER


o FTP stands for file transfer protocol. It is also in the application The transport layer ensures that messages are delivered error-free, in
layer and provides a way of transferring complete files from one sequence, and with no losses or duplications. It relieves the higher layer
host to another. protocols from any concern with the transfer of data between them and
It is inherently insecure, so it is not recommended for any externally facing their peers.
network unless it is implemented as a public, download-only resource.
The size and complexity of a transport protocol depends on the type of
DNS service it can get from the network layer. For a reliable network layer with
o DNS stands for domain name system. It is an application layer virtual circuit capability, a minimal transport layer is required. If the network
protocol used to provide a human-friendly naming mechanism for layer is unreliable and/or only supports datagrams, the transport protocol
internet resources. It is what ties a domain name to an IP address should include extensive error detection and recovery.
and allows you to access sites by name in your browser.
SSH  Message segmentation: accepts a message from the (session) layer
o SSH stands for secure shell. It is an encrypted protocol above it, splits the message into smaller units (if not already small
implemented in the application layer that can be used to enough), and passes the smaller units down to the network layer.
communicate with a remote server in a secure way. Many The transport layer at the destination station reassembles the
additional technologies are built around this protocol because of its message.
end-to-end encryption and ubiquity.  Message acknowledgment: provides reliable end-to-end message
=============================================================== delivery with acknowledgments.
OSI  Message traffic control: tells the transmitting station to "back-off"
The Open Systems Interconnect (OSI) model has seven layers. This article when no message buffers are available.
describes and explains them, beginning with the 'lowest' in the hierarchy (the  Session multiplexing: multiplexes several message streams, or
physical) and proceeding to the 'highest' (the application). The layers are sessions onto one logical link and keeps track of which messages
stacked this way: belong to which sessions (see session layer).
• Application
• Presentation
Typically, the transport layer can accept relatively large messages, but there  EMAIL (electronic mail) -
are strict message size limits imposed by the network (or lower) layer. a system for sending messages from one individual to another via
Consequently, the transport layer must break up the messages into smaller telecommunications links between computers or terminals using
units, or frames, prepending a header to each frame. dedicated software
 PAGING
NETWORK LAYER o One of the earliest forms of messaging to mobile devices.
o Involves a caller dialing a telephone number associated
with the intended recipient of the page.
The network layer controls the operation of the subnet, deciding which o The majority of pagers are used as one-way
physical path the data should take based on network conditions, priority of communication devices. When the user receives a
service, and other factors. It provides: message, that person responds either by calling the
number sent in the page or by some other appropriate
means.
Routing: routes frames among networks. o This is an effective way to alert people that you want to
get in touch with them or have them carry out a task.
o The most common two-way paging devices are the
 Subnet traffic control: routers (network layer intermediate systems) can Motorola TimePort and RIM's BlackBerry.
instruct a sending station to "throttle back" its frame transmission when  Short Message Service (SMS)
the router's buffer fills up. o was first introduced in Europe in 1991 as part of the GSM
 Frame fragmentation: if it determines that a downstream router's Phase 1 standard.
maximum transmission unit (MTU) size is less than the frame size, a o makes it possible to send and receive short text messages to
router can fragment a frame for transmission and re-assembly at the and from mobile telephones.
destination station. o The message can contain alphanumeric characters to a
 Logical-physical address mapping: translates logical addresses, or maximum length of 160 characters for Latin alphabets,
names, into physical addresses. including English, and 70 characters for non-Latin alphabets,
 Subnet usage accounting: has accounting functions to keep track of frames such as Chinese.
forwarded by subnet intermediate systems, to produce billing information. o provides an easy way for individuals to communicate with one
DATA LINK LAYER another and with external systems and can even be received
The data link layer provides error-free transfer of data frames from one node during a voice call.
to another over the physical layer, allowing layers above it to assume o Benefits of sms
virtually error-free transmission over the link. To do this, the data link layer o Guaranteed message delivery using a store-and-
provides: forward approach.
 Link establishment and termination: establishes and terminates the o Ease of use, without additional software or
logical link between two nodes. hardware.
 Frame traffic control: tells the transmitting node to "back-off" when no o Low-cost method for information delivery.
frame buffers are available. o Revenue source for service providers.
 Frame sequencing: transmits/receives frames sequentially.  Enhanced Message Service (EMS
 Frame acknowledgment: provides/expects frame acknowledgments. o allows users to send richer content, including pictures,
Detects and recovers from errors that occur in the physical layer by animations, sounds, and formatted text. EMS can be
added to existing SMS infrastructures, saving operators
retransmitting non-acknowledged frames and handling duplicate frame
receipt. from having to make large investments to add these new
features.
 Frame delimiting: creates and recognizes frame boundaries.
o Feature of Ems:
 Frame error checking: checks received frames for integrity.
 Sounds and melodies.
 Media access management: determines when the node "has the right"
 Pictures and animations.
to use the physical medium.
 Formatted text.
 Concatenated messages.
PHYSICAL LAYER
 Multimedia Message Service (MMS)
o takes the capabilities of EMS one step further, adding
The physical layer, the lowest layer of the OSI model, is concerned with the true richness to the message content. In addition to the
transmission and reception of the unstructured raw bit stream over a capability for pictures, formatted text, and sound
physical medium. It describes the electrical/optical, mechanical, and introduced in EMS, MMS also provides support for voice,
functional interfaces to the physical medium, and carries the signals for all of audio and video clips, and presentation information.
the higher layers. It provides: o provides automatic immediate delivery for custom
content, as well as store-and-forward capabilities when
the recipient is unable to receive the message. MMS also
 Data encoding: modifies the simple digital signal pattern (1s and adds support for email addressing, so messages can be
0s) used by the PC to better accommodate the characteristics of sent to an email address from the MMS client.
the physical medium, and to aid in bit and frame synchronization. It  Instant Messaging (IM)
determines: o a type of online chat that offers real-time text
transmission over the Internet
 What signal state represents a binary 1 o More advanced instant messaging can add file transfer,
 How the receiving station knows when a "bit-time" starts clickable hyperlinks, Voice over IP, or video chat.
 Application-to-Application Messaging
How the receiving station delimits a frame o different from all of the messaging technologies we have
MESSAGING discussed so far
o this provides nearly unlimited flexibility as to the types of
 the sending and processing of email and similar electronic
messages that can be sent and how messages are
communications.
handled.
o can be used to create stand-alone messaging applications
TYPES OF MESSAGING
or applications in conjunction with other smart client
technology such as a mobile database and Ring Topology
synchronization
o permits communication between custom programs  A local-area network (LAN) whose topology is a ring. That is, all of
running on mobile or wireless devices and a centrally- the nodes are connected in a closed loop. Messages travel around
located server application. the ring, with each node reading those messages addressed to it.
 Advantage: One main advantage to a ring network is that it can
Topologies and Ethernet Standards span larger distances than other types of networks.
 Disadvantage: Moving, adding and changing the devices can
Ethernet affect the network.

 A local-area network (LAN) architecture developed by Xerox


Corporation in cooperation with DEC and Intel in 1976.
 Ethernet uses a bus or star topology and supports data transfer
rates of 10 Mbps.

Bus Topology

Tree Topology
 A bus network is a network topology in which nodes are directly
connected to a common linear (or branched) half-duplex link called
 This is a "hybrid" topology that combines characteristics of linear
a bus.
bus and star topologies. In a tree network, groups of star-
 Main Advantage: It's easy to connect a computer or device and
configured networks are connected to a linear bus backbone
typically it requires less cable than a star topology.
cable.
 Main Disadvantage: The entire network shuts down if there is a
 Main Advantage: A Tree topology is a good choice for large
break in the main wire and it can be difficult to identify the
computer networks as the tree topology "divides" the whole
problem if the network shuts down.
network into parts that are more easily manageable.
 Main Disadvantage: The entire network depends on a central hub
and a failure of the central hub can cripple the whole network.

Mesh Topology
NETWORK HARDWARE
 In a mesh network, devices are connected with many redundant • also known as network equipment or computer networking
interconnections between network nodes. In a true mesh topology devices, are physical devices which are required for
every node has a connection to every other node in the network. communication and interaction between devices on a computer
network.
Routers
 A device that connects any number of LANs.
 Uses standardized protocols to move packets efficiently to their
destination.
 A router is a network device which is responsible for routing traffic
from one to another network.
Hubs
 An unintelligent network device that sends one signal to all of the
stations connected to it.
Star Topology  Hubs are used for star topology networks, but they are often used
with other configurations to make it easy to add and remove
 In a star network devices are connected to a central computer, computers without bringing down the network.
called a hub. Nodes communicate across the network by passing Switch
data through the hub.  is a device that connects a number of computers together to make
 Main Advantage: In a star network, one malfunctioning node a LAN.
doesn't affect the rest of the network.  Split large networks into small segments, decreasing the number of
 Main Disadvantage: If the central computer fails, the entire users sharing the same network resources and bandwidth.
network becomes unusable.  The typical use of a switch is at the centre of a star network (or as
part of a hybrid network) - the switch has cables plugged into it
from each computer.
Bridge
• Ha single input and single output port
• Is a network device that typically links together two different parts
of a LAN.
Repeater
• Connectivity devices that regenerate and amplify an analog or
digital signal
• Can not connect different network architecture.
• Is an electronic device that amplifies the signal it receives.
Modem  Peer-to-peer
• A modem stands for (Modulator and Demodulator).
• it modulates and demodulates the signal between the digital data o network operating systems allow users to share
of a computer and the analogue signal of a telephone line. resources and files located on their computers and to
Firewall access shared resources found on other computers. In a
• Is a device, or a piece of software that is placed between your peer-to-peer network, all computers are considered
computer and the rest of the network. equal; they all have the same privileges to use the
• a piece of hardware or software put on the network to prevent resources available on the network.
some communications forbidden by the network policy. o Peer-to-peer networks are designed primarily for small to
Proxy Server medium local area networks. Windows for Workgroups is
• computer network service which allows clients to make indirect an example of the program that can function as peer-to-
network connections to other network services. peer network operating
• Is a computer setup to share a resource, usually an Internet
connection.
Network Cable
• Cables are still used in most networks, rather than using only
wireless, because they can carry much more data per second, and
are more secure (less open to hacking).
Network Interface Card systems.
• Connectivity devices enabling a workstation, server, printer, or  Client/server
other node to receive and transmit data over the network media o network operating systems allow the network to
centralize functions and applications in one or more
dedicated file servers. The file servers become the heart
Network Operating System of the system, providing access to resources and
providing security.
 is an operating system that includes special functions for o The workstations (clients) have access to the resources
connecting computers and devices into a local-area network (LAN) available on the file servers. The network operating
or Inter-network. system allows multiple users to simultaneously share the
same resources irrespective of physical location. Novell
Netware and Windows 2000 Server are examples of
client/ server network operating systems.

Duplex
 A duplex communication system is a point-to-point system
composed of two connected parties or devices that can
communicate with one another in both directions.
 "Du" comes from "duo" that means "double", and "plex" that
means "structure" or "parts of“.
 An operating system that provides the connectivity among a
Simplex
number of autonomous computers is called a network operating
 The simplex transmission is the one that travels in only one
system. A typical configuration for a network operating system is a
direction
collection of personal computers along with a common printer,
 There are Two types of Duplex Communication System:
server and file server for archival storage, all tied together by a
o Half Duplex
local network.
 The half-duplex transmission is capable of
 Short for network operating system, NOS is the software that
sending signal in both directions, but in only
allows multiple computers to communicate, share files and
one direction at a time. Some networks use
hardware devices with one another. Some examples of network
half-duplex transmission, but it is required to
operating systems include Novell NetWare, Microsoft Windows NT,
specify this requirement for all the nodes in the
Microsoft Windows 2000, Microsoft Windows XP, Sun Solaris,
network.
Linux, etc.
 Example:
Features of Network Operating System
 device is a walkie-talkie two-way
o Provide basic operating system features such as support for
radio that has a "push-to-talk"
processors, protocols, automatic hardware detection and support
button;
multi-processing of applications.
o Full-Duplex
o Provide security features such as authentication, logon
 Full-duplex data transmission means that data
restrictions and access control.
can be transmitted in both directions on a
o Provide name and directory services.
signal carrier at the same time.
o Provide file, print, web services and back-up services.
 It allows signal transmission in both directions
o Support Internetworking such as routing and WAN ports.
simultaneously.
o User management and support for logon and logoff, remote
 Example:
access; system management, administration and auditing tools
 a telephone is a full-duplex device
with graphical interfaces.
because both parties can talk at once.
o
The Difference between Half Duplex & Full Duplex
Peer-to-peer and Client / server.
 Half-duplex is used to describe communication where only... one
Mainly there are two types of network operating systems named as
side can talk at a time.
peer-to-peer and client / server.
 Full-duplex is used to describe communication where both sides
are able to send and receive data at the same time.
In depth tcp/ip networking information for every other gateway on the Internet, it
• Subnetting would be overtaxed. Instead, each handles only a
• Subnetting separates a network into multiple logically relatively small amount of addressing information, which
defined segments, or subnets. Networks are commonly it uses to forward data to another gateway that knows
subnetted according to geographic locations, more about the data’s destination. The gateways that
departmental boundaries, or technology types. make up the internet backbone are called core gateways.
• A network administrator might separate traffic to • Address Translation
accomplish the following… • An organizations default gateway can also be used to
• Enhance security “hide” the organizations internal IP addresses and keep
• Improve performance them from being recognized on a public network.
• Simplify troubleshooting • A public network is one that any user may access with
• The challenges of Classful Addressing in IPv4 (No subnetting) little or no restrictions.
• The simplest type of IPv4 is known as classful addressing • On private networks, hiding IP addresses allows network
(which was the Class A, Class B & Class C network managers more flexibility in assigning addresses. Clients
addresses). behind a gateway may use any IP addressing scheme,
• Classful addressing has the following limitations. regardless of whether it is recognized as legitimate by the
• Restriction in the number of usable IPv4 addresses (class Internet authorities but as soon as those devices need to
C would be limited to 254 addresses) go on the internet, they must have legitimate IP
• Difficult to separate traffic from various parts of a addresses to exchange data.
network • When a clients transmission reaches the default gateway,
• IPv4 Subnet Masks the gateway opens the IP datagram and replaces the
• Subnetting depends on the use of subnet masks to client’s private IP address with an Internet recognized IP
identify how a network is subdivided. A subnet mask address. This process is known as NAT (Network Address
indicates where network information is located in an IPv4 Translation).
address. • TCP/IP Mail Services
• The 1 in a subnet mask indicates that corresponding bits • All Internet mail services rely on the same principles of
in the IPv4 address contain network information (likewise mail delivery, storage, and pickup, though they may use
0 indicates the opposite) different types of software to accomplish these functions.
• Each network class is associated with a default subnet • Email servers and clients communicate through special
mask… TCP/IP application layer protocols. These protocols, all of
• Class A = 255.0.0.0 which operate on a variety of operating systems are
• Class B = 255.255.0.0 discussed below…
• Class C = 255.255.255.0 • MIME (Multipurpose Internet Mail Extensions)
• An example of calculating the network ID for a particular • The standard message format specified by SMTP allows
device with a subnet mask is shown below.. for lines that contain no more than 1000 ascii characters
• IP Address = 199.34.89.127 meaning if you relied solely on SMTP you would have
• Subnet Mask = 255.255.255.0 very short messages and nothing like pictures included in
• Resultant Network ID = 199.34.89.0 an email.
• IPv4 Subnetting Techniques • MIME us a standard for encoding and interpreting binary
• Subnetting breaks the rules of classful IPv4 addressing. files, images, video, and non-ascii character sets within
• CIDR (classless Interdomain Routing) an email message.
• CIDR is also known as classless routing or supernetting. • MIME identifies each element of a mail message
• In CIDR conventional network class distinctions do not according to content type.
exist, a subnet boundary can move to the left, therefore • MIME does not replace SMTP but works in conjunction
generating more usable IP addresses on your network. A with it.
subnet created by moving the subnet boundary to the • Most modern email clients and servers support MIME
left is known as a supernet. • POP (Post Office Protocol)
• With CIDR also came new shorthand for denoting the • POP is an application layer protocol used to retrieve
position of subnet boundaries known as CIDR notation or messages from a mail server
slash notation. CIDR notation takes the form of the • POP3 relies on TCP and operates over port 110
network ID followed by a forward slash (/) followed by • With POP3 mail is delivered and stored on a mail server
the number of bits that are used for the extended until it is downloaded by a user
network prefix. • Disadvantage of POP3 is that it typically does not allow
• To take advantage of classless routing, your networks users to save their messages on the server because of
routers must be able to interpret IP addresses that don;t this IMAP is sometimes used
adhere to conventional network class parameters. • IMAP (Internet Message Access Protocol)
Routers that rely on older routing protocols (i.e. RIP) are • IMAP is a retrieval protocol that was developed as a more
not capable of interpreting classless IP addresses. sophisticated alternative to POP3
• Internet Gateways • The single biggest advantage IMAP4 has over POP3 is that
• Gateways are a combination of software and hardware users can store messages on the mail server, rather than
that enable two different network segments to exchange having to continually download them
data. A gateway facilitates communication between • Users can retrieve all or only a portion of any mail
different networks or subnets. Because on device cannot message
send data directly to a device on another subnet, a • Users can review their messages and delete them while
gateway must intercede and hand off the information. the messages remain on the server
Every device on a TCP/IP based network has a default • Users can create sophisticated methods of organizing
gateway (a gateway that first interprets its outbound messages on the server
requests to other subnets, and then interprets its • Users can share a mailbox in a central location
inbound requests from other subnets). • Disadvantages of IMAP are typically related to the fact
• The internet contains a vast number of routers and that it requires more storage space on the server.
gateways. If each gateway had to track addressing •
• Additional TCP/IP Utilities security risks. It's called static because it doesn't change. It's the
• Nearly all TCP/IP utilities can be accessed from the exact opposite of a dynamic IP address, which does change.
command prompt on any type of server or client running  Routers, phones, tablets, desktops, laptops, and any other device
TCP/IP. The syntaxt may differ depending on the OS of that can use an IP address can be configured to have a static IP
the client. address. This might be done through the device giving out IP
• Below is a list of additional TCP/IP utilities – research addresses (like the router) or by manually typing the IP address
their use on your own! into the device from the device itself. Static IP addresses are also
• Ipconfig (Windows) & Ifconfig (Linux) sometimes referred to as fixed IP addresses or dedicated IP
• Netstat addresses.
• Nbtstat Static IP address advantages include:
• Hostname, Host & Nslookup • Lower costs
• Dig (Linux) • Email server hosting capabilities
• Whois (Linux) • Easy maintenance
• Traceroute (Tracert) • Ideal for online gaming
• Mtr (my traceroute) Static IP address disadvantages include:
• Route • Devices that has static IP have to configure manually
 Ifconfig • Poor security
• Some common operations include…
• -a – Applies the command to all interfaces on a Static vs Dynamic IP Addresses
device, can be used with other switches  The opposite of a never-changing static IP address is an ever-
• down – Marks the interface as unavailable to changing dynamic IP address. A dynamic IP address is just a regular
the network address like a static IP is, but it's not permanently tied to any
• up – Reinitializes the interface after it has been particular device. Instead, they're used for a specific amount of
taken “down” so that it is once again available time and then returned to an address pool so that other devices
to the network can use them.
 Dig  This is one reason that dynamic IP addresses are so useful. If
 Stands for domain information groper. an ISP were to use static IP addresses for all of their customers,
 Dig allows you to query a DNS database and find the that would mean that there'd constantly be a limited supply of
host name associated with a specific IP address or addresses for new customers. Dynamic addresses provide a way for
vice versa. IP addresses to be reused when they're not in use elsewhere,
 Dig is useful for helping network administrators providing internet access for many more devices than what would
diagnose DNS problems otherwise be possible.
 Dig can provide more information than nslookup  Static IP addresses limit downtime. When dynamic addresses
 Dig is included with UNIX and Linux operating obtain a new IP address, any user that's connected to the existing
systems one will be kicked off from the connection and have to wait to find
Dynamic Host Configuration Protocol (DHCP) the new address. This wouldn't be a wise setup to have if the
• Dynamic Host Configuration Protocol (DHCP) is a client/server server is hosting a website, a file sharing service, or an online video
protocol that automatically provides an Internet Protocol (IP) host game, all of which normally require constantly active connections.
with its IP address and other related configuration information  The public IP address assigned to the routers of most home and
such as the subnet mask and default gateway. business users is a dynamic IP address. Larger companies usually do
• There are more than one billion computers in the world, and each not connect to the internet via dynamic IP addresses; instead, they
individual computer needs its own IP address whenever it's online. have static IP addresses assigned to them which do not change.
The TCP/IP protocols (our computers' built-in, internal networking
software) include a DHCP protocol. It automatically assigns and Static and DHCP Addressing
keeps tabs of IP addresses and any "subnetworks" that require  Most IP networks use dynamic addressing via DHCP (Dynamic Host
them. Nearly all IP addresses are dynamic, as opposed to "static" IP Configuration Protocol) rather than static IP assignment, because
addresses that never change. dynamic IP addresses are the most efficient for the service
• DHCP is a part of the "application layer," which is just one of the provider. Dynamic addressing is convenient because it's easy for
several TCP/IP protocols. All of the processing and figuring out of administrators to set up. DHCP works automatically with minimal
what to send to whom happens virtually instantly. intervention needed, allowing mobile devices to easily move
• The key word in DHCP is "dynamic." Because instead of having just between different networks.
one fixed and specific IP address, most computers will be assigned
one that is available from a subnet or "pool" that is assigned to the However, static IP addressing offers some advantages to some users:
network. The Internet isn't one big computer in one big location. • A static IP address best supports name resolution across wide area
It's an interconnected network of networks, all created to make networks (WANs), enabling devices to be reliably reached by their
one-on-one connections between any two clients that want to assigned host names. Web and FTP servers often use fixed
exchange information. addressing for this reason.
• One of the features of DHCP is that it provides IP addresses that • Using static IP addresses on home networks provides slightly better
"expire." When DHCP assigns an IP address, it actually leases that protection against network security problems than does DHCP
connection identifier to the user's computer for a specific amount address assignment.
of time. The default lease is five days. • Download and upload speeds are often faster with static IPs than
Static Ip Address with dynamic IP
 A static Internet Protocol (IP) address (static IP address) is a
permanent number assigned to a computer by an Internet service
provider (ISP). It is an IP address that was manually configured for a
device, versus one that was assigned via a DHCP server. Static IP
addresses are useful for gaming, website hosting or Voice over
Internet Protocol (VoIP) services. Speed and reliability are key
advantages. Because a static address is constant, systems with
static IP addresses are vulnerable to data mining and increased

You might also like