Free Essay

Networking Protocols and Port Numbers

In: Computers and Technology

Submitted By phollister84
Words 514
Pages 3
Networking Protocols and Port Numbers

NTC/405

Networking Protocols and Port Numbers

Video calls or teleconferencing are made possible with the use of some widely used networking protocols. User Datagram Protocol (UDP) is a protocol that sends a datagram in its entirety from the host to the desired destination. This protocol is used when processing time needs to be lessened. Transmission Control Protocol (TCP) is used when processing time is not as important. This protocol sends a message in packets. Each packet travels to the desired destination but may not arrive at the same time. The destination device puts the packets in order based on the header information. Real Time Transport Protocol (RTP) is a protocol that sends data without the guarantee that all packets will be received. When dealing with streaming multimedia it is not necessary to have each frame of the communication for the broadcast to be understood by the recipient. As long as the majority of the transmission is received the video feed is recognizable.

• What is a troubleshooting model? Describe how you would use a troubleshooting model to resolve a user’s inability to connect to the Internet from a physically connected networked laptop in an office. What protocols are used in this situation to connect a networked laptop to the Internet?

A troubleshooting model is a series of tasks designed to reduce a problem into more manageable steps. To resolve a user’s inability to connect to the Internet from a physically connected network a series of steps would determine the cause of the problem. • Identify how the laptop should connect to the network • Review the topology used in the network or the portion of the network • Recognize the issues • If possible talk to the user and ask the correct questions • Establish a method of resolution • Document the process Knowing how the laptop connects to the network will help in resolving the issue. If the device connects through an Ethernet cable or wirelessly makes an impact on the course of action. Reviewing the topology of the network or the portion of the network the device connects to will help in understanding where the issue originates from. Depending on the network topology the issue may be caused by another device. It is important to recognize the issues. If this is the only device having the problem it is most likely a problem with the device itself. If other devices are experiencing the same issue it is most likely an error with the network or a network device, such as a router, switch, or a hub. Talking to the user can be very helpful. The user may know when the issue became apparent. The user may have changed the settings of the laptop. Asking the right questions can turn a time consuming problem into a quick fix. Establishing a method of resolving the issue can only be done after an investigation using the previous steps. Once the problem is resolved it is important to document the steps taken. This is done to expedite the troubleshooting process the next time the problem originates.…...

Similar Documents

Premium Essay

Networking

...of network structure, same network architecture and same network topology. This form of standard allows the company to save money; the IT department is more efficient in their responsibilities, knowledge of the network and could manage critical situation faster. Each office is composed by: Routers, 24 ports Switch, 10 to 16 Workstation, 3 HP Laser Printer, 1 print server for its network, some of the external users have access to the FTP connection to access important document in the database at the main office, Corporate. All the users have access to the file server where they can upload and download their important documents to the server and also share information over the network without having to physically transfer files or external storage device. The company is managed by a Domain controller server, this facilitate the functions of the network, creating accounts and password and give them permission to access the network. One of the first decisions in computer environment design is the selection of the network type- a group of products that work together, even if they are manufactured by different companies. Products in the same group each follow the same networking rules, and you can count on them to work together properly. Today's most common network types include Ethernet, token ring, and ATM. Each of these three offers a viable alternative for supporting a LAN, each with its own costs and performance benefits. Ethernet stands as the prevailing technology and......

Words: 4651 - Pages: 19

Premium Essay

Sdn and Openflow Protocols

...OpenFlow: Enabling Innovation in Campus Networks March 14, 2008 Nick McKeown Stanford University Tom Anderson University of Washington Hari Balakrishnan MIT Guru Parulkar Stanford University Larry Peterson Princeton University Jennifer Rexford Princeton University Scott Shenker University of California, Berkeley Jonathan Turner Washington University in St. Louis is almost no practical way to experiment with new network protocols (e.g., new routing protocols, or alternatives to IP) in sufficiently realistic settings (e.g., at scale carrying real traffic) to gain the confidence needed for their widespread deployment. The result is that most new ideas from the networking research community go untried and untested; hence the commonly held belief that the network infrastructure has “ossified”. Having recognized the problem, the networking community is hard at work developing programmable networks, such as GENI [1] a proposed nationwide research facility for experimenting with new network architectures and distributed systems. These programmable networks call for programmable switches and routers that (using virtualization) can process packets for multiple isolated experimental networks simultaneously. For example, in GENI it is envisaged that a researcher will be allocated a slice of resources across the whole network, consisting of a portion of network links, packet processing elements (e.g. routers) and end-hosts; researchers program their slices to......

Words: 5029 - Pages: 21

Premium Essay

Networking

...IT130 Introduction to Networking Final Exam Study Guide These are the facts from which your exam questions will be drawn. If you know these facts, you will do well on the exam. All models are a simplified representation of the real thing, having at least all the major functions of the real item. What constitutes a major rather than a minor function is open to opinion. Most networks use a cable known in the industry as an unshielded twisted pair (UTP), usually containing four pairs of wires that can transmit and receive data. Cabling and hubs operate at the Layer 1 (Physical) layer of the OSI model. In the command window, when the utility to show the IP address and other NIC information is run, the MAC address is listed as the Physical address in the third section of the information. All NICs on the same network must use the same frame type, or they will not be able to comunicate with other NICs. 67.21.321.4 is not a valid IP address, as the third octet (321) is greater than 255. IP uses a rather unique dotted decimal notation (sometimes referred to as a dotted-octet numbering system) based on four 8-bit numbers. Each 8-bit number ranges from 0-255, and the four numbers are separated by periods. The TCP/IP model has four layers (Link, Internet, Transport, Application), unlike the OSI model which has seven layers. Transmission Control Protocol (TCP) is a connection-oriented protocol, meaning, it requires verification that a good connection has been established before......

Words: 1908 - Pages: 8

Premium Essay

Networking

...D. Network Interface layer 2. Which layer of the TCP/IP model processes requests from hosts to make sure a connection is made? The application layer. 3. What are well-known ports? Ports reserved by (ICANN) the Internet Corporation for Assigned Names. 4. Identify the port numbers for the following applications. A. Telnet-Port 23 B. HTTP-Port 80 C. FTP-Port 20,21 D. DNS-53 E. DHCP-67,68 5. Define the purpose of a connection oriented protocol. Give an example. Connection oriented protocol is for sending and receiving data making a network connection and severing that connection when the task is complete. For example when you connect to a bank website your computer has to let the site know you want to communicate with it. Then you send and receive data you expect to make it to the site and back. Finally when your business is concluded you want to terminate the connection so no one can access your private information Connection oriented protocol defines how this task is accomplished. 6. What three packets are exchanged between two hosts when establishing a TCP connection? The synchronizing packet, synchronizing acknowledgment packet, and the acknowledgement packet. 7. What is the purpose of a sequence number (SEQ=) in TCP data packets? The sequence number is used to keep track of data packets transferred between hosts. 8. Explain how a host knows whether a data packet was not received. The host sending the packet will not......

Words: 792 - Pages: 4

Free Essay

Networking

...quintessential details of the practical, this practical indeed acquainted me with intriguing and profound knowledge on how to exploit the versatile and robust Wire shark protocol analyzer to capture and examine a plethora of network packets accompanied by the ability to intercept and view network traffic which facilitates the expiation (correction) of address connection errors to establish optimal connectivity in the client and server communication interface in tandem with resolving, alleviating and troubleshooting the increase of multitudinous and perplexing networking conundrums (problems). In addition, this practical also enables us to assimilate a wide array of techniques on how to dissect important information that is being encased within each packet which enables you to covertly view secretive and confidential information such as passwords or usernames that a particular user has typed in a login interface of a certain website which might pose an imminent risk to the user as it might have dire and unbridled ramifications for the victim. Furthermore, it also succinctly accentuates the dire consequences that would ensue from the contravening of the wiretap act in tandem with the valid and justifiable exceptions that would not be regarded as flouting the Wiretapping act. Body: First and foremost, the Wire shark protocol analyzer serves as an imperative tool for inspecting and scrutinizing data packets but also delineates the process of the transfer of packets from one......

Words: 1540 - Pages: 7

Premium Essay

Computer Networking

...Term paper of computer networking (Design wireless network) x.y.z. Abstract: this document tells us about wireless network and various techniques to design a computer wireless network Keywords—wireless networks, connecting devices, switches, hubs. [pic] Campus network A campus network is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. The networking equipments (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc) are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc). In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. [pic] | | | | Introduction A computer network allows sharing of resources and information among devices connected to the network. The Advanced Research Projects Agency (ARPA) funded the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defence. It was the first operational computer network in the world. Development of the network began in 1969, based on designs developed during the 1960s. For a history see ARPANET, the first network . Purpose • Facilitating communications. Using a network, people can communicate efficiently and......

Words: 1521 - Pages: 7

Free Essay

Networking

...Install and operation of Wireless LAN Ease of Operation Critical issues for network operation SNMP (Simple Network Management Protocol) Measures against system failures; device failures, incorrect wiring Use of SNMP IPv6 Network Configuration Example Network configuration for hospitals with fewer than 100 beds Network configuration for hospitals with more than 100 and fewer than 200 beds Network configuration for hospitals with more than 200 beds (i) Network configuration for hospitals with more than 200 beds (ii) 3 4 4 5 7 7 7 8 9 10 10 11 12 13 13 13 14 15 19 20 21 21 22 23 23 24 24 25 26 27 28 30 32 34 2 | Healthcare Network Solution Healthcare Network Solution | Introduction At the end of the 20th century, computers and the technology field overall began embracing the idea of being ‘open.’ With this, we saw the development of new interoperable platforms and the advent of more healthcare-focused technologies, such as the computerization of roentgenography, CT, and sonography scanning and x-ray communications tools. At the same time, centralized computer systems downsized and tools such as electronic medical charts began operating on standard software such as Windows and UNIX. Meanwhile, with the explosive spread of the Internet, hospital networks began standardizing on IP (Internet Protocol) and shifting away from more conventional protocols, such as SNA. It has now become possible for individual hospitals to operate on a single IP network, as the systems have......

Words: 8999 - Pages: 36

Premium Essay

Wired Networking, Wireless Networking

...NETWORKING Victor P. Mangulabnan Director, Professional Services Division FYI… Ø  1 DAY TRAINING (Informal) Ø  BREAK – Lunch Ø  Mobile Phone – Off or Silent Mode Ø  Raise a hand if there’s a question Ø  Introduce yourself NETWORKING Group of Computers connected together by cables or some other medium. Is a connection of two or more components that gives people the ability to share software, peripheral devices, communicate with each other and share processing power. IS ALL ABOUT INFORMATION ! Interconnec(vity  and  Interoperability   q  Interconnectivity (hardware) •  the means of transporting information between computers, inclusive of the physical media, the data packaging mechanism, and the routing between multiple network equipment pieces from the starting node until reaching the destination node. q  Interoperability (software) •  the methodology applied to make data understandable to computers that use proprietary or simply different computer operating systems and languages. TOPICS COVERED q  Communication Networks q  Network Types q  Classification Geographic q  Protocols and Standards q  System Requirements q  Labs & Exercises Communication & Networks BASEBAND Network is one in which the cable or other network medium can carry only a single signal at any time. vs. BROADBAND Network can carry multiple signals simultaneously, using discrete frequency for each signal. How Network Communicates......

Words: 2163 - Pages: 9

Premium Essay

Networking

...Telecommunications and Networks Ghana Telecom University College Lecturer - Lempogo Forgor 2013 Objectives  By the end of this unit, students should be able to: Demonstrate understanding of computer networking, including the concepts and types as well as hardware and software Compare and contrast internet, extranet and intranet Demonstrate practical knowledge of using the internet Discuss the business value of computer networks INF 162: Introduction to Information Systems - GTUC 2013 Delivery Overview  Computer Networks and Networking  Types of computer networks  Network Connection technologies  Hardware in computer Networking  The business value of internet, extranet and intranet INF 162: Introduction to Information Systems - GTUC 2013 Delivery What is a Computer Network?  A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users.  Computer Network is a set of interconnected computer systems using special communication devices, media and software. INF 162: Introduction to Information Systems - GTUC 2013 Delivery What is Computer networking?  Networking in the field of computing is the practice of linking computer devices together to support digital communication among them.  The computers and devices on the network are called Network Nodes. ......

Words: 2597 - Pages: 11

Free Essay

Protocols

...A protocol is a set of invisible compute rules that govern how an Internet document will be transmitted onto the screen. For two computers to communicate with one another, they must be able to understand one another through the same language. In order for computers to exchange information there must be a preexisting agreement as to how the information will be structured and how the sides will send and be received. The most important that defines the common networking protocols is the OSI known as Open Systems Interconnection. Introducing the TCP and the IP are two different protocols that are often linked together. The linking of several protocols is fairly common since the functions of different protocols may be complementary so that together they carry out particular tasks that are bases of operation layers. These suits of protocols are often used with many local area networks and carries out the basic operations of the Internet. Emailing also has its own set of protocols that has a variety of both for sending and receiving mail. The most common protocol for sending mail is the SMTP that is known for as Simple Mail Transfer Protocol. Then for receiving emails, the protocol being most commonly used is the Post Office Protocol, POP for short. Both the SMTP and the POP is used for managing the transmission for delivery of mail across the Internet. Web pages that are constructed to a standard method are called Hypertext Markup Language known as HTMO. The HTMP......

Words: 413 - Pages: 2

Free Essay

Networking

...GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERsity | Assignment 01 | Advanced Network and Security | | ICT/12/0121 WMIL Wasalage | 9/23/2013 | | Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Table of Contents Abstract 01 Acknowledgement 02 Table of Content 03 List of Figures 04 1.0 Introduction to ISO OSI Reference Model 05 1.1 Physical Layer 07 1.2 Data Link Layer 08 1.3 Network Layer 10 1.4 Transport......

Words: 5991 - Pages: 24

Free Essay

Nt2640 Networking Protocol Numbers

...Assignment 2: Network protocols numbers 1. What organization has been given the responsibility for assigning protocol numbers? ICANN – The Internet Corporation for Assigned Names and Numbers 2. Determine the protocol numbers for the protocol names: Protocol| Number| IPv4| 4| IPv6| 41| TCP| 6| UDP| 17| ICMP| 1| VRRP| 112| IPSEC ESP| 50| L2TP| 115| OSPF| 89| EIGRP| 88| 3. Determine the correct ICMP type based on the description provided: ICMP Message Description| Type| Code*| Echo| 8| | Echo Reply| 0| | Time Exceeded| 11| 0| Port Unreachable| 3| 3| Fragmentation Needed| 3| 4| 4. What are the valid ranges of protocol numbers? 0-65535 5. What protocol number(s) is/are specified for experimentation and testing? 253 and 254 6. What organization has been given the responsibility for assigning port numbers, sometimes referred to as “Well Known Ports or Registered Ports”? IANA 7. Determine the protocol numbers for the protocol names: Port| Application / Protocol| TCP -23| telnet| TCP -443| HTTPS| UDP -53| Domain name system| UDP -123| Network time protocol| TCP -110| Post office protocol v3| TCP -25| Simple mail transfer protocol| TCP -80| HTTP| UDP -88| kerberos| TCP -22| SSH| UDP -161| Simple network management| 8. What numeric range is commonly referred to as the “well-known ports”? 0 to 1024 9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023 10. What do you believe would......

Words: 282 - Pages: 2

Free Essay

Protocols

...LAYER PROTOCOLS • IP (Internet Protocol) • ICMP (Internet Control Message Protocol) • ARP (Address Resolution Protocol) • RARP (Reverse Address Resolution Protocol) 4.7.1 The IP PROTOCOL • IP represents the heart of the Internet Protocol suite • Provides the main service of the layer: data transmission in connectionless mode – datagram IP Header Format IP Header Format (Including user data, this makes an IP packet) IP Header fields: • Version - Indicates the version of IP currently used (now 4); • IP Header Length - Indicates the datagram header length in 32-bit words (value = 5); • Type-of-service - Specifies how a particular upper-layer protocol would like the current datagram to be handled. Datagrams can be assigned various levels of importance through this field; • Total length - Specifies the length of the entire IP packet, including data and header, in bytes. • Identification - Contains an integer that identifies the current datagram (sequence number). This field is used for re-assembling the datagram fragments; • Flags - A 3-bit field for fragmentation control:  000 - last fragment;  001 - not last fragment;  010 - the fragmentation not allowed. • Fragment offset - measured in double-words (offset from main datagram); • Time-to-live - Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly; • Protocol - Indicates which upper-layer protocol......

Words: 1379 - Pages: 6

Free Essay

A Report to Critically Compare a Number of Routing Protocols; Including Rip V2, Eigrp & Ospf

...Configuration A Report to Critically Compare a Number of Routing Protocols; Including RIP v2, EIGRP & OSPF Paul McDermott CCNA 2 Table of Contents 1.0 Abstract 3 2.0 Introduction 4 3.0 Protocol overview 5 3.1 RIP v2 Overview 5 3.2 EIGRP Overview 6 3.3 OSPF Overview 6 4.0 Protocol Comparison 10 4.1 Topology Overview 10 4.2 Protocol Types 10 4.3 Administration Distance 10 4.4 Protocol Tables 11 4.5 Algorithm 11 4.6 Metric 12 4.7 Periodic Updates 12 4.8 Hierarchical / Scalable 12 4.9 Load Balance 13 4.10 Comparison Table 14 5.0 Conclusion 15 6.0 References 16 Abstract The following report is a critical comparison of three routing protocols; RIPv2, EIGRP and OSPF, detailing the protocol features, as well as their similarities and differences. The report takes an in-depth look at the technical elements and algorithms used in these protocols, such as Bellman Ford, DUAL, and the Dijkstra Algorithm; and how these algorithms are used to calculate the routing metric. The report also discusses the fact that EIGRP is the most desirable protocol to use on Cisco based routers, while OSPF can be used across different router manufacturers. While looking at the technical considerations that are needed in choosing a routing protocol for a desired network the report will also look into the CPU/memory requirements, and how difficult the protocol is to install and maintain on the......

Words: 4222 - Pages: 17

Premium Essay

Microsoft Networking

...maximum Routing and Remote Access Services (RRAS) connections, but Standard only has 250 (RRAS) connections. 3. The ram limit of the x86 architecture is 64GB. The x64 architecture ram limit is 2TB. 4. The advantages of installing Server Core is with so much of the operating system scaled down, a computer running Server Core can devote more of it’s resources to it’s server functions. What are missing are no start menu, no desktop explorer shell, no Microsoft Management console, and virtually no graphical applications. 5. You must re-arm or extend the Windows Server 2008 evaluation period without a product key. The grace period is 60 days. 6. ICT stands for Initial Configuration Tasks. Some of the ICT tasks are Set time zone, Configure networking, and Provide Name and Domain. 7. Server Manager Console is used to add a Server Role. 8. Simple, Spanned, Striped, Mirrored, and RAID-5 are the five different volumes supported by Server 2008. RAID-5 features that are provided are additional information known as Parity and a RAID-5 Volume can be created using a minimum of three disks and a maximum of 32 disks. 9. Mount Point is the feature that allows a volume not to be given a drive letter but is still effective in being an extension of another volume. 10. Active Volume is used to manage the licensing process for volume licenses of both Vista and Windows Server 2008. System Volume contains files necessary to boot the computer. Boot volume contains the Windows Operating System......

Words: 544 - Pages: 3