Lesson 9: Configuring IP Settings MOAC 70-687: Configuring Windows 8.1.

Slides:



Advertisements
Similar presentations
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Advertisements

IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
Lesson 17: Configuring Security Policies
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Chapter 8 Administering TCP/IP.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
1 Version 3.0 Module 9 TCP/IP Protocol and IP Addressing.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Lesson 1: Configuring Network Load Balancing
Lesson 11: Deploying and Configuring the DHCP Service
Lesson 19: Configuring Windows Firewall
Lesson 2: Configuring Servers
Lesson 18: Configuring Application Restriction Policies
Lesson 9: Creating and Configuring Virtual Networks
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
Chapter Overview TCP/IP Protocols IP Addressing.
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
Network Layer (Part IV). Overview A router is a type of internetworking device that passes data packets between networks based on Layer 3 addresses. A.
Chapter Overview TCP/IP Overview Configuring TCP/IP Clients
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
Lesson 3 Introduction to Networking Concepts Lesson 3.
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Presentation on Osi & TCP/IP MODEL
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Cisco 1 - Networking Basics Perrine. J Page 19/17/2015 Chapter 9 What transport layer protocol does TFTP use? 1.TCP 2.IP 3.UDP 4.CFTP.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
1 Version 3.0 Module 11 TCP Application and Transport.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 8: Introduction to Windows Networking.
Connecting to a Network Lesson 5. Objectives Understand the OSI Reference Model and its relationship to Windows 7 networking Install and configure networking.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Lesson 3: Migrating and Configuring User Data
Lesson 11: Configuring and Maintaining Network Security
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
Lesson 12: Configuring Remote Management
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
5 Lesson 5: Installing and Configuring Desktop Applications and Windows Store Apps MOAC : Configuring Windows 8.1.
10.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 10: Exploring TCP/IP and.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Lesson 6: Controlling Access to Local Hardware and Applications
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
Computer Networking 网络课件 双语教学 模拟实验 计算机网络教研室 Department of Computer Networking Application CHAPTER 14 INTERNETWORKING 1 The first section 2 Exercises.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Understand IPv6 Part 2 LESSON 3.3_B Networking Fundamentals.
Chapter 9 Objectives Understand TCP/IP Protocol.
Chapter 15 – Part 2 Networks The Internal Operating System
Lesson 8: Configuring IP Settings MOAC : Configuring Windows Devices.
TCP/IP Protocol Suite and IP Addressing
Presentation transcript:

Lesson 9: Configuring IP Settings MOAC : Configuring Windows 8.1

Overview Exam Objective 3.1: Configure IP settings o Configure name resolution o Connect to a network o Configure network locations © 2013 John Wiley & Sons, Inc. 2

Networking Basics Lesson 9: Configuring IP Settings © 2013 John Wiley & Sons, Inc.3

Networking Networking is one of the primary functions of Windows 8.1. Most Windows computers are connected to either a private local area network (LAN) or to the Internet, and many are connected to both. © 2013 John Wiley & Sons, Inc. 4

Protocols Computers on a network communicate using protocols, which are nothing more than languages that all of the computers understand. These protocols operate on different levels, forming what is commonly known as a networking stack or protocol stack. The most common method for illustrating the operations of the networking stack is the Open Systems Interconnection (OSI) reference model, which consists of seven layers. © 2013 John Wiley & Sons, Inc. 5

Networking Basics The OSI reference model © 2013 John Wiley & Sons, Inc.6

The Physical Layer At the bottom of the OSI model is the physical layer, which represents the hardware that forms the network. The physical layer of the OSI model consists of the cable or the radio signals that carry data from one system to another and the network interface adapters, which are the hardware components in the computers that provide the connection to the physical network. © 2013 John Wiley & Sons, Inc. 7

The Data-Link Layer As you move up beyond the physical layer, the subsequent layers of the OSI model are realized in software, as protocols that provide different types of communications. Ethernet is the protocol responsible for addressing packets at the data-link layer, which it does by surrounding the data it receives from the network layer just above it with a header and footer. This header and footer and the data they contain are collectively called a frame and the process of applying it is called data encapsulation. © 2013 John Wiley & Sons, Inc. 8

The Data-Link Layer Data-link layer data encapsulation © 2013 John Wiley & Sons, Inc.9

The Network Layer The protocols that Windows uses by default at the network and transport layers are collectively called TCP/IP. TCP is the Transmission Control Protocol and IP is the Internet Protocol. © 2013 John Wiley & Sons, Inc. 10

IP Routing A router is simply a device that connects one network to another. When you install a LAN in a home or office, and connect it to the Internet, you are actually installing a router that connects your network to another network belonging to an Internet service provider (ISP). To get to their final destination, packets must be passed from router to router, through many different networks. © 2013 John Wiley & Sons, Inc. 11

IPv4 Addressing The current standard for IP is version 4 (IPv4), which defines a 32-bit address space. Each address is split into two parts: o Network identifier – As the name implies, specifies the network on which a particular system is located. o Host identifier – Specifies a particular network interface (also called a host) on the network. © 2013 John Wiley & Sons, Inc. 12

IPv4 Address Classes © 2013 John Wiley & Sons, Inc. 13 Class AClass BClass C Subnet mask First bit values (binary) First byte value (decimal)0–127128–191192–223 Number of network identifier bits81624 Number of host identifier bits24168 Number of possible networks12616,3842,097,152 Number of possible hosts16,777,21465,534254

Classless Inter-Domain Routing (CIDR) CIDR differs from traditional addressing (now called classful addressing) by allowing the division between the network identifier and the host identifier to fall anywhere in an IPv4 address; it does not have to fall on one of the eight-bit boundaries. © 2013 John Wiley & Sons, Inc. 14

IPv4 Private Addresses © 2013 John Wiley & Sons, Inc. 15 Address Class IPv4 Private Address RangeSubnet Mask Class A through Class B through Class C through

Assigning IP Addresses Windows 8.1 computers can acquire IP addresses in the following three ways: o Manual configuration o Dynamic Host Configuration Protocol (DHCP) o Automatic Private IP Addressing (APIPA) © 2013 John Wiley & Sons, Inc. 16

DNS Name Resolution DNS is a client/server application that is essentially a distributed database. In its most basic form, the DNS name resolution process consists of a resolver submitting a name resolution request to the DNS server specified in its TCP/IP configuration settings. © 2013 John Wiley & Sons, Inc. 17

IPv6 Addressing IPv6 expands the address space from 32 to 128 bits, which is large enough to provide more than 6.7x1023 addresses for each square meter of the Earth’s surface. Unlike IPv4 addresses, which use decimal notation, IPv6 addresses use hexadecimal notation, in the form of eight two-byte values, separated by colons, as follows: XX:XX:XX:XX:XX:XX:XX:XX © 2013 John Wiley & Sons, Inc. 18

IPv6 Transition Windows 8.1, by default, installs support for both IPv4 and IPv6 addressing when it detects a network interface adapter in the computer. Microsoft refers to this as Windows 8.1’s dual IP stack. © 2013 John Wiley & Sons, Inc. 19

IPv6 Transition Windows 8.1 support for IPv4 and IPv6 © 2013 John Wiley & Sons, Inc.20

Network Layer Data Encapsulation After IP adds its header, it sends the packet down to the data-link layer, where Ethernet adds its own header and footer to the packet. Thus, the data-link layer packet that gets transmitted over the network consists of transport layer data, encapsulated within an IP packet, which is called a datagram, which is in turn encapsulated within an Ethernet frame. © 2013 John Wiley & Sons, Inc. 21

Network Layer Data Encapsulation IP data encapsulation © 2013 John Wiley & Sons, Inc.22

The Transport Layer There are two types of protocols that operate at the network and transport layers: o Connection-oriented – A connection-oriented protocol is one in which two communicating systems establish a connection before they transmit any data. o Connectionless – A connectionless protocol does not require the establishment of a connection, nor does it perform error detection or correction. © 2013 John Wiley & Sons, Inc. 23

Ports and Sockets As with the protocol codes included in IP headers, the TCP and UDP headers both contain codes that identify specific applications running on the system. The codes are called ports The combination of an IP address and a port number is called a socket. © 2013 John Wiley & Sons, Inc. 24

Ports and Sockets Transport layer data encapsulation © 2013 John Wiley & Sons, Inc.25

Well-Known Port Numbers Used by TCP and UDP © 2013 John Wiley & Sons, Inc. 26 Service Name Port NumberProtocolFunction ftp-data20TCPFTP data channel; used for transmitting files between systems ftp21TCPFTP control channel; used by FTP-connected systems for exchanging commands and responses Ssh22TCP and UDPSSH (Secure Shell) Remote Login Protocol; used to security log on to a computer from another computer on the same network and execute commands. telnet23TCPTelnet; used to execute commands on network- connected systems Smtp25TCPSimple Mail Transport Protocol (SMTP); used to send messages

Well-Known Port Numbers Used by TCP and UDP © 2013 John Wiley & Sons, Inc. 27 Service Name Port NumberProtocolFunction Domain53TCP and UDPDNS; used to receive host name resolution requests from clients Bootps67TCP and UDPBootstrap Protocol (BOOTP) and DHCP servers; used to receive TCP/IP configuration requests from clients Bootpc68TCP and UDPBOOTP and DHCP clients; used to send TCP/IP configuration requests to servers http80TCPHTTP; used by Web servers to receive requests from client browsers pop3110TCPPost Office Protocol 3 (POP3); used to retrieve e- mail requests from clients

Well-Known Port Numbers Used by TCP and UDP © 2013 John Wiley & Sons, Inc. 28 Service Name Port NumberProtocolFunction nntp119TCP and UDPNetwork News Transfer Protocol; used to post and distribute messages to, and retrieve them from, Usenet servers on the Internet. ntp123TCP and UDPNetwork Time Protocol; used to exchange time signals for the purpose of synchronizing the clocks in network computers. imap143TCP and UDPInternet Message Access Protocol version 4; used by client programs to retrieve messages from a mail server snmp161TCP and UDPSimple Network Management Protocol (SNMP); used by SNMP agents to transmit status information to a network management console https443TCP and UDPHypertext Transfer Protocol Over TLS/SSL;

Transport Layer Data Encapsulation The TCP header includes a multitude of fields that implement additional services, including the following: o Packet acknowledgment – Informs the sender which packets have been delivered successfully o Error correction – Informs the sender which packets must be retransmitted o Flow control – Regulates the rate at which the sending system transmits its data. © 2013 John Wiley & Sons, Inc. 29

The Upper Layers The application layer is the top of the networking stack, and as such, it provides the entrance point for programs running on a computer. © 2013 John Wiley & Sons, Inc. 30

The Upper Layers Application layer data encapsulation © 2013 John Wiley & Sons, Inc.31

Connecting to a Network Lesson 9: Configuring IP Settings © 2013 John Wiley & Sons, Inc.32

Installing Network Support When Windows 8.1 detects a network interface adapter in the computer, either during the operating system installation or afterwards, it installs a device driver for the adapter, as well as the components of the default networking stack, which are as follows: o Client for Microsoft Networks o File and Printer Sharing for Microsoft Networks o QoS Packet Scheduler o Microsoft Network Adapter Multiplexor Protocol o Microsoft LLDP Protocol Driver o Link Layer Topology Discovery Mapper I/O Driver and Link Layer Topology Discovery Responder o Internet Protocol Version 6 (TCP/IPv6) o Internet Protocol Version 4 (TCP/IPv4) © 2013 John Wiley & Sons, Inc. 33

Installing Network Support Windows 8.1 Network controls © 2013 John Wiley & Sons, Inc.34

Installing Network Support Windows 8.1 Network sharing controls © 2013 John Wiley & Sons, Inc.35

Using the Network and Sharing Center The Network and Sharing Center is a centralized console that provides technical specialists and system administrators with access to most of the major networking tools included with Windows 8.1. As with many Windows tools, there are several ways to open the Network and Sharing Center, two of which are as follows: o Click the Search charm, select Settings, and search for “Network and Sharing Center.” o From the Desktop, click the Settings charm and click Control Panel. Then click Network and Internet > Network and Sharing Center. © 2013 John Wiley & Sons, Inc. 36

Using the Network and Sharing Center The Network and Sharing Center © 2013 John Wiley & Sons, Inc.37

Understanding Network Discovery Network Discovery is an important security concept first introduced in Windows Vista. It enables users to control critical network firewall controls with a single switch. Windows Firewall is a feature that was first introduced in the Windows XP Service Pack 2 release, and is now included in Windows 8.1 as well. The default state of the Network Discovery setting is dependent on the network location, as set manually by the user or automatically by the computer. © 2013 John Wiley & Sons, Inc. 38

Changing the Network Location After you select the initial network location during the network interface adapter installation, Windows 8.1 attempts to detect the type of location whenever you connect to a different network. When Windows 8.1 is unable to detect the network type for any reason, it errs on the side of caution and sets the network location to Public, which is the safest option. © 2013 John Wiley & Sons, Inc. 39

Change the Network Location Using Homegroup Troubleshooter The Troubleshoot and help prevent computer problems page © 2013 John Wiley & Sons, Inc.40

Configure Advanced Sharing The Change sharing options for different network profiles dialog box © 2013 John Wiley & Sons, Inc.41

Managing Network Connections Windows 8.1 creates and configures local area connections automatically, but you can also manage and modify the properties of the connections manually. Each local area connection on a Windows 8 system has a status dialog box that displays real time information about the connection. At the bottom of the dialog box are buttons that enable you to perform the following tasks: o Properties o Disable/Enable o Diagnose © 2013 John Wiley & Sons, Inc. 42

View Connection Status The Ethernet Status dialog box © 2013 John Wiley & Sons, Inc.43

View Connection Status The Network Connection Details dialog box © 2013 John Wiley & Sons, Inc.44

Configuring IPv4 Settings Most networks today use DHCP to configure the TCP/IP configuration settings of their workstations. DHCP automates the configuration process and prevents the duplication of IP addresses. However, there are still some situations in which it is desirable or necessary to configure the Windows 8.1 TCP/IP client manually. © 2013 John Wiley & Sons, Inc. 45

Configure IPv4 Settings The Internet Protocol Version 4 (TCP/IPv4) Properties sheet © 2013 John Wiley & Sons, Inc.46

Configuring IPv6 Settings Because most computers use IPv6 autoconfiguration or DHCP, manual configuration of the Windows 8.1 IPv6 implementation is rarely necessary, but it is possible. The procedure for configuring IPv6 using the graphical interface is the same as that for IPv4, except that, in the Local Area Connection Properties sheet, you select Internet Protocol Version 6 (TCP/IPv6) and click Properties. © 2013 John Wiley & Sons, Inc. 47

Configuring IPv6 Settings The Internet Protocol Version 6 (TCP/IPv6) Properties sheet © 2013 John Wiley & Sons, Inc.48

Running Network Diagnostics When a networking problem exists, clicking a warning icon launches Windows Network Diagnostics. Problems that the system can diagnose include the following: o Broken or detached cable connections o IP address and subnet mask problems o Default gateway problems o DNS and DHCP configuration problems o Networking hardware configuration problems o Internet server addresses and service settings © 2013 John Wiley & Sons, Inc. 49

Using TCP/IP Tools Lesson 9: Configuring IP Settings © 2013 John Wiley & Sons, Inc.50

Using Ipconfig.exe All Windows operating systems, including Windows 8.1, have a graphical interface for configuring network connections: a command line tool called Ipconfig.exe. The value of Ipconfig.exe is particularly apparent when a Windows 8.1 computer autoconfigures its TCP/IP client or uses DHCP to obtain its IP address and other TCP/IP configuration parameters In addition to displaying the DHCP-obtained configuration settings, Ipconfig.exe also enables you to manually release the IP address the system obtained from the DHCP server and renew existing address leases. © 2013 John Wiley & Sons, Inc. 51

Using Ipconfig.exe The Ipconfig.exe display © 2013 John Wiley & Sons, Inc.52

Using Ping.exe Ping.exe can tell you if the TCP/IP stack of another system on the network is functioning normally. The Ping.exe program generates a series of Echo Request messages using the Internet Control Message Protocol (ICMP) and transmits them to the computer whose name or IP address you specify on the command line. © 2013 John Wiley & Sons, Inc. 53

Using Ping.exe The Ping.exe display © 2013 John Wiley & Sons, Inc.54

Using Tracert.exe Tracert.exe is a variation on Ping.exe. The program uses ICMP Echo Request and Echo Reply messages just like Ping, but it modifies the messages by changing the value of the TTL field in the IP header. The values in the TTL field prevent packets from getting caught in router loops that keep them circulating endlessly around the internetwork. © 2013 John Wiley & Sons, Inc. 55

Using Nslookup.exe The advantage of Nslookup.exe is that you can test the functionality and the quality of the information on a specific DNS server by specifying it on the command line. The Nslookup.exe command-line utility enables you to generate DNS request messages and transmit them to specific DNS servers on the network. © 2013 John Wiley & Sons, Inc. 56

Using Nslookup.exe The Nslookup.exe display © 2013 John Wiley & Sons, Inc.57

Lesson Summary The networking stack used on Windows 8.1 computers corresponds roughly to the seven-layer OSI reference model. The OSI (Open Systems Interconnection) reference model consists of seven layers: physical, data-link, network, transport, session, presentation, and application. Ethernet, the data-link layer protocol used on most LANs, consists of physical layer specifications, a frame format, and a MAC mechanism. The network and transport layer protocols work together to provide an end-to-end communication service that achieves the quality of service required by the application requesting network services. © 2013 John Wiley & Sons, Inc. 58

Lesson Summary The functions of the session, presentation, and application layers are often combined into a single application layer protocol. Windows 8.1 includes support for both the IPv4 and IPv6 protocols. IPv6 increases the IP address space from 32 to 128 bits, simplifies the routing process, and improves address autoconfiguration. Network Discovery is a Windows 8.1 feature that simplifies the task of firewall configuration by enabling you to block or allow the protocols and ports need for the computer to browse and access the network. Windows 8.1 includes a variety of command line TCP/IP tools, including Ipconfig.exe, Ping.exe, Tracert.exe, Nslookup.exe, and Netstat.exe. © 2013 John Wiley & Sons, Inc. 59

Copyright 2013 John Wiley & Sons, Inc.. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the 1976 United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc.. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.