moac 70-687 l10.ce-kl

Upload: harman-singh

Post on 19-Oct-2015

46 views

Category:

Documents


0 download

DESCRIPTION

ojooo

TRANSCRIPT

PowerPoint Presentation

Lesson 10: Configuring IP SettingsMOAC 70-687: Configuring Windows 8

1OverviewExam Objective 3.1: Configure IP settingsConfigure name resolutionConnect to a networkConfigure network locationsResolve connectivity issues 2013 John Wiley & Sons, Inc.2Lecture notes go here2Networking BasicsLesson 10: Configuring IP Settings 2013 John Wiley & Sons, Inc.3Lecture notes go here3NetworkingNetworking is one of the primary functions of Windows 8. Most Windows computers are connected to either a private local area network (LAN) or to the Internet, and many are connected to both. 2013 John Wiley & Sons, Inc.44ProtocolsComputers on a network communicate using protocols, which are languages that all the computers understand. These protocols operate on different levels, forming what is commonly known as a networking stack or protocol stack. The most common method for illustrating the operations of the networking stack is the Open Systems Interconnection (OSI) reference model, which consists of seven layers. 2013 John Wiley & Sons, Inc.55Networking BasicsThe OSI reference model 2013 John Wiley & Sons, Inc.6

6The Physical LayerAt the bottom of the OSI model is the physical layer.It represents the hardware that forms the network, which consists of The cable or the radio signals, which carry data from one system to another. The network interface adapters, which are the hardware components in the computers that provide the connection to the physical network. 2013 John Wiley & Sons, Inc.77The Data-Link LayerAs you move up beyond the physical layer, the subsequent layers of the OSI model are realized in software, as protocols that provide different types of communications. Ethernet is the protocol responsible for addressing packets at the data-link layer, which it does by surrounding the data it receives from the network layer just above it with a header and footer.This header and footer and the data they contain are collectively called a frame, and the process of applying it is called data encapsulation.

2013 John Wiley & Sons, Inc.88The Data-Link LayerData-link layer data encapsulation 2013 John Wiley & Sons, Inc.9

9The Network LayerThe protocols that Windows uses by default at the network and transport layers are collectively called TCP/IP. TCP is the Transmission Control Protocol.IP is the Internet Protocol. 2013 John Wiley & Sons, Inc.1010IP RoutingA router is a device that connects one network to another. When you install a LAN in a home or office and connect it to the Internet, you are actually installing a router that connects your network to another network belonging to an Internet service provider (ISP). To get to their final destination, packets must be passed from router to router, through many different networks. 2013 John Wiley & Sons, Inc.1111IPv4 AddressingThe current standard for IP is version 4 (IPv4), which defines a 32-bit address space. Each address is split into two parts: Network identifier: Specifies the network on which a particular system is located.Host identifier: Specifies a particular network interface (also called a host) on the network.

2013 John Wiley & Sons, Inc.1212IPv4 Address Classes 2013 John Wiley & Sons, Inc.13Class AClass BClass CSubnet mask255.0.0.0255.255.0.0255.255.255.0First bit values (binary)010110First byte value (decimal)0127128191192223Number of network identifier bits81624Number of host identifier bits24168Number of possible networks12616,3842,097,152Number of possible hosts16,777,21465,53425413Classless Inter-Domain Routing (CIDR)CIDR differs from traditional addressing (now called classful addressing) by allowing the division between the network identifier and the host identifier to fall anywhere in an IPv4 address.It does not have to fall on one of the eight-bit boundaries. 2013 John Wiley & Sons, Inc.1414IPv4 Private Addresses 2013 John Wiley & Sons, Inc.15Address ClassIPv4 Private Address RangeSubnet MaskClass A10.0.0.0 through 10.255.255.255255.0.0.0Class B172.16.0.0 through 172.31.255.255255.255.0.0Class C192.168.0.0 through 192.168.255.255255.255.255.015Assigning IP AddressesWindows 8 computers can acquire IP addresses in three ways:Manual configuration Dynamic Host Configuration Protocol (DHCP) Automatic Private IP Addressing (APIPA) 2013 John Wiley & Sons, Inc.16Manual configuration It is possible for administrators to manually assign IP addresses to hosts and configure each computer to use the address assigned to it. However, this method requires much more time and effort than the other alternatives, and is prone to error.Dynamic Host Configuration Protocol (DHCP) DHCP is a client/server application and protocol that enables clients to obtain IP addresses from a pool provided by a server, and then return the addresses to the pool when the clients no longer need them. Windows 8 includes a DHCP client, which it uses by default. The Windows server products all include a full-featured DHCP server, which you can configure to assign any range of addresses in a variety of ways. Automatic Private IP Addressing (APIPA) When a Windows 8 computer with no IP address starts, and it fails to locate a DHCP server on the network, the TCP/IP client automatically configures itself using an address in the 169.254.0.0/16 network. This enables computers on a small network with no DHCP server to communicate without the need for manual configuration.16DNS Name ResolutionDNS is a client/server application that is essentially a distributed database.In its most basic form, the DNS name resolution process consists of a resolver submitting a name resolution request to the DNS server specified in its TCP/IP configuration settings. 2013 John Wiley & Sons, Inc.1717IPv6 AddressingIPv6 expands the address space from 32 to 128 bits, which is large enough to provide more than 6.7x1023 addresses for each square meter of the Earths surface.Unlike IPv4 addresses, which use decimal notation, IPv6 addresses use hexadecimal notation, in the form of eight two-byte values, separated by colons:XX:XX:XX:XX:XX:XX:XX:XX 2013 John Wiley & Sons, Inc.1818IPv6 TransitionWindows 8, by default, installs support for both IPv4 and IPv6 addressing when it detects a network interface adapter in the computer.Microsoft refers to this as Windows 8s dual IP stack. 2013 John Wiley & Sons, Inc.1919IPv6 TransitionWindows 8 support for IPv4 and IPv6 2013 John Wiley & Sons, Inc.20

20Network Layer Data EncapsulationAfter IP adds its header, it sends the packet down to the data-link layer, where Ethernet adds its own header and footer to the packet. The data-link layer packet that gets transmitted over the network consists of transport layer data, encapsulated within an IP packet, which is called a datagram, which is in turn encapsulated within an Ethernet frame. 2013 John Wiley & Sons, Inc.2121Network Layer Data EncapsulationIP data encapsulation 2013 John Wiley & Sons, Inc.22

22The Transport LayerThere are two types of protocols that operate at the network and transport layers:Connection-oriented: Two communicating systems establish a connection before they transmit any data. Connectionless: Does not require the establishment of a connection, nor does it perform error detection or correction.

2013 John Wiley & Sons, Inc.2323Ports and SocketsLike the protocol codes included in IP headers, the TCP and UDP headers both contain codes that identify specific applications running on the system. The codes, called ports, are published by the IANA, and the combination of an IP address and a port number is called a socket. 2013 John Wiley & Sons, Inc.2424Ports and SocketsTransport layer data encapsulation 2013 John Wiley & Sons, Inc.25

25Well-Known Port Numbers Used by TCP and UDP 2013 John Wiley & Sons, Inc.26Service NamePort NumberProtocolFunctionftp-data20TCPFTP data channel; used for transmitting files between systemsftp21TCPFTP control channel; used by FTP-connected systems for exchanging commands and responses Ssh22TCP and UDPSSH (Secure Shell) Remote Login Protocol; used to security log on to a computer from another computer on the same network and execute commandstelnet23TCPTelnet; used to execute commands on network-connected systemsSmtp25TCPSimple Mail Transport Protocol (SMTP); used to send email messages 26Well-Known Port Numbers Used by TCP and UDP 2013 John Wiley & Sons, Inc.27Service NamePort NumberProtocolFunctionDomain53TCP and UDPDNS; used to receive host name resolution requests from clientsBootps67TCP and UDPBootstrap Protocol (BOOTP) and DHCP servers; used to receive TCP/IP configuration requests from clientsBootpc68TCP and UDP BOOTP and DHCP clients; used to send TCP/IP configuration requests to servershttp80TCPHTTP; used by web servers to receive requests from client browserspop3110TCPPost Office Protocol 3 (POP3); used to retrieve email requests from clients27Well-Known Port Numbers Used by TCP and UDP 2013 John Wiley & Sons, Inc.28Service NamePort NumberProtocolFunctionnntp119TCP and UDPNetwork News Transfer Protocol; used to post and distribute messages to, and retrieve them from, Usenet servers on the Internetntp123TCP and UDPNetwork Time Protocol; used to exchange time signals for the purpose of synchronizing the clocks in network computersimap143TCP and UDPInternet Message Access Protocol version 4; used by email client programs to retrieve messages from a mail serversnmp161TCP and UDPSimple Network Management Protocol (SNMP); used by SNMP agents to transmit status information to a network management consolehttps443TCP and UDPHypertext Transfer Protocol Over TLS/SSL28Transport Layer Data EncapsulationThe TCP header includes a multitude of fields that implement additional services, including:Packet acknowledgment: Informs the sender which packets have been delivered successfully.Error correction: Informs the sender which packets must be retransmitted.Flow control: Regulates the rate at which the sending system transmits its data. 2013 John Wiley & Sons, Inc.2929The Upper LayersThe application layer Is the top of the networking stack.Provides the entrance point for programs running on a computer. 2013 John Wiley & Sons, Inc.3030The Upper LayersApplication layer data encapsulation 2013 John Wiley & Sons, Inc.31

31Connecting to a NetworkLesson 10: Configuring IP Settings 2013 John Wiley & Sons, Inc.32Lecture notes go here32Installing Network SupportWhen Windows 8 detects a network interface adapter in the computer, either during the operating system installation or afterward, it installs a device driver for the adapter, as well as the components of the default networking stack including:Client for Microsoft NetworksQoS Packet Scheduler File and Printer Sharing for Microsoft Networks Microsoft Network Adapter Multiplexor Protocol Microsoft LLDP Protocol Driver Link Layer Topology Discovery Mapper I/O Driver and Link Layer Topology Discovery Responder Internet Protocol Version 6 (TCP/IPv6) Internet Protocol Version 4 (TCP/IPv4) 2013 John Wiley & Sons, Inc.33Client for Microsoft Networks Provides application layer services that enable programs to access shared files and printers on the network.QoS Packet Scheduler Enables the network client to prioritize network traffic based on bandwidth availability and changing network conditions.File and Printer Sharing for Microsoft Networks Enables the computer to share its files and printers with other users on the network.Microsoft Network Adapter Multiplexor Protocol Provides support for network adapter load balancing and failoverMicrosoft LLDP Protocol Driver Provides Link Layer Discovery Protocol support for Microsoft Data Center Networking (DCN)Link Layer Topology Discovery Mapper I/O Driver and Link Layer Topology Discovery Responder Implement the protocol that enables Windows 7Windows 8 to compile a map of the computers on the network.Internet Protocol Version 6 (TCP/IPv6) Provides support for the IPv6 network layer protocol, including 128-bit IP addresses.Internet Protocol Version 4 (TCP/IPv4) Provides support for the IPv4 network layer protocol, including 32-bit IP addresses.33Installing Network SupportWindows 8 Networks controls 2013 John Wiley & Sons, Inc.34

34Installing Network SupportWindows 8 Network sharing controls 2013 John Wiley & Sons, Inc.35

35Using the Network and Sharing CenterThe Network and Sharing Center is a centralized console that offers technical specialists and system administrators access to most of the major networking tools included with Windows 8. There are several ways to open the Network and Sharing Center:Click the Search charm, select Settings, and search for Network and Sharing Center.From the Desktop, click the Settings charm and click Control Panel. Then click Network and Internet > Network and Sharing Center. 2013 John Wiley & Sons, Inc.3636Using the Network and Sharing CenterThe Network and Sharing Center 2013 John Wiley & Sons, Inc.37

37Understanding Network DiscoveryNetwork Discovery is an important security concept first introduced in Windows Vista. It enables users to control critical network firewall controls with a single switch. Windows Firewall is a feature that was first introduced in the Windows XP Service Pack 2 release, and it is now included in Windows 8 as well. The default state of the Network Discovery setting is dependent on the network location, as set manually by the user or automatically by the computer. 2013 John Wiley & Sons, Inc.3838Changing the Network LocationAfter you select the initial network location during the network interface adapter installation, Windows 8 attempts to detect the type of location whenever you connect to a different network.When Windows 8 is unable to detect the network type for any reason, it errs on the side of caution and sets the network location to Public, which is the safest option. 2013 John Wiley & Sons, Inc.3939Change the Network Location Using Homegroup TroubleshooterThe Troubleshoot and help prevent computer problems page 2013 John Wiley & Sons, Inc.40

40Configure Advanced SharingThe Change sharing options for different network profiles dialog box 2013 John Wiley & Sons, Inc.41

41Managing Network ConnectionsWindows 8 creates and configures local area connections automatically, but you can also manage and modify the properties of the connections manually.Each local area connection on a Windows 8 system has a status dialog box that displays real-time information about the connection. At the bottom of the dialog box are buttons that enable you to perform the following tasks:PropertiesDisable/Enable Diagnose

2013 John Wiley & Sons, Inc.4242View Connection StatusThe Ethernet Status dialog box 2013 John Wiley & Sons, Inc.43

43View Connection StatusThe Network Connection Details dialog box 2013 John Wiley & Sons, Inc.44

44Configuring IPv4 SettingsMost networks today use DHCP to configure the TCP/IP configuration settings of their workstations. DHCP automates the configuration process and prevents the duplication of IP addresses. There are still some situations in which it is desirable or necessary to configure the Windows 8 TCP/IP client manually. 2013 John Wiley & Sons, Inc.4545Configure IPv4 SettingsThe Network Connections window 2013 John Wiley & Sons, Inc.46

46Configure IPv4 SettingsThe Internet Protocol Version 4 (TCP/IPv4) Properties sheet 2013 John Wiley & Sons, Inc.47

47Configuring IPv6 SettingsBecause most computers use IPv6 autoconfiguration or DHCP, manual configuration of the Windows 8 IPv6 implementation is rarely necessary, but it is possible. The procedure for configuring IPv6 using the graphical interface is the same as that for IPv4, except that, in the Local Area Connection Properties sheet, you select Internet Protocol Version 6 (TCP/IPv6) and click Properties. 2013 John Wiley & Sons, Inc.4848Configuring IPv6 SettingsThe Internet Protocol Version 6 (TCP/IPv6) Properties sheet 2013 John Wiley & Sons, Inc.49

49Running Network DiagnosticsWhen a networking problem exists, clicking a warning icon launches Windows Network Diagnostics. Problems that the system can diagnose include:Broken or detached cable connectionsIP address and subnet mask problemsDefault gateway problemsDNS and DHCP configuration problemsNetworking hardware configuration problemsInternet server addresses and service settings 2013 John Wiley & Sons, Inc.5050Running Network DiagnosticsRunning Windows Network Diagnostics 2013 John Wiley & Sons, Inc.51

51Using TCP/IP ToolsLesson 10: Configuring IP Settings 2013 John Wiley & Sons, Inc.52Lecture notes go here52Using Ipconfig.exeAll Windows operating systems, including Windows 8, have a graphical interface for configuring network connections: a command-line tool called Ipconfig.exe.The value of Ipconfig.exe is particularly apparent when a Windows 8 computer autoconfigures its TCP/IP client or uses DHCP to obtain its IP address and other TCP/IP configuration parameters.In addition to displaying the DHCP-obtained configuration settings, Ipconfig.exe also enables you to manually release the IP address that the system obtained from the DHCP server and renew existing address leases.

2013 John Wiley & Sons, Inc.5353Using Ipconfig.exeThe Ipconfig.exe display 2013 John Wiley & Sons, Inc.54

54Using Ping.exePing.exe can tell you if the TCP/IP stack of another system on the network is functioning normally. The Ping.exe program generates a series of Echo Request messages using the Internet Control Message Protocol (ICMP) and transmits them to the computer whose name or IP address you specify on the command line. 2013 John Wiley & Sons, Inc.5555Using Ping.exeThe Ping.exe display 2013 John Wiley & Sons, Inc.56

56Using Tracert.exeTracert.exe is a variation on Ping.exe. The program uses ICMP Echo Request and Echo Reply messages just like Ping, but it modifies the messages by changing the value of the TTL field in the IP header. The values in the TTL field prevent packets from getting caught in router loops that keep them circulating endlessly around the internetwork. 2013 John Wiley & Sons, Inc.5757Using Nslookup.exeThe Nslookup.exe command-line utility enables you to generate DNS request messages and transmit them to specific DNS servers on the network. The advantage of Nslookup.exe is that you can test the functionality and the quality of the information on a specific DNS server by specifying it on the command line. 2013 John Wiley & Sons, Inc.5858Using Nslookup.exeThe Nslookup.exe display 2013 John Wiley & Sons, Inc.59

59Using Netstat.exeNetstat.exe is a command-line program that displays status information about The current network connections on a computer running Windows 8. the traffic generated by the various TCP/IP protocols. In UNIX, the program is called netstat, and in Windows 8, it is called Netstat.exe. 2013 John Wiley & Sons, Inc.6060Using Netstat.exeThe network connection listing in Netstat.exe 2013 John Wiley & Sons, Inc.61

61Using Netstat.exeThe Ethernet interface statistics in Netstat.exe 2013 John Wiley & Sons, Inc.62

62Using Netstat.exeThe IPv4 and IPv6 routing tables in Netstat.exe 2013 John Wiley & Sons, Inc.63

63Lesson SummaryThe networking stack used on Windows 8 computers corresponds roughly to the seven-layer OSI reference model.The OSI (Open Systems Interconnection) reference model consists of seven layers: physical, data-link, network, transport, session, presentation, and application.Ethernet, the data-link layer protocol used on most LANs, consists of physical layer specifications, a frame format, and a MAC mechanism.The network and transport layer protocols work together to provide an end-to-end communication service that achieves the quality of service required by the application requesting network services.

2013 John Wiley & Sons, Inc.6464Lesson SummaryThe functions of the session, presentation, and application layers are often combined into a single application layer protocol.Windows 8 includes support for both the IPv4 and IPv6 protocols. IPv6 increases the IP address space from 32 to 128 bits, simplifies the routing process, and improves address autoconfiguration.Network Discovery is a Windows 8 feature that simplifies the task of firewall configuration by enabling you to block or allow the protocols and ports needed for the computer to browse and access the network.Windows 8 includes a variety of command-line TCP/IP tools, including Ipconfig.exe, Ping.exe, Tracert.exe, Nslookup.exe, and Netstat.exe.

2013 John Wiley & Sons, Inc.6565

Copyright 2013 John Wiley & Sons, Inc.All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the 1976 United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

66