Presentation is loading. Please wait.

Presentation is loading. Please wait.

11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.

Similar presentations


Presentation on theme: "11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP."— Presentation transcript:

1 11 NETWORK PROTOCOLS AND SERVICES Chapter 10

2 Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP networks communicate  Explain how IP addresses and subnetting work  Explain how name resolution works, and identify the primary name resolution mechanisms that are used on Microsoft Windows networks  Identify how computers on TCP/IP networks communicate  Explain how IP addresses and subnetting work  Explain how name resolution works, and identify the primary name resolution mechanisms that are used on Microsoft Windows networks

3 Chapter 10: Network Protocols and Services3 NETWORK PROTOCOLS AND SERVICES (CONTINUED)  Troubleshoot networking problems caused by cable connections, network adapters, modems, TCP/IP configuration, or name resolution settings.  Configure and troubleshoot Internet Connection Firewall  Configure Remote Assistance and Remote Desktop  Troubleshoot networking problems caused by cable connections, network adapters, modems, TCP/IP configuration, or name resolution settings.  Configure and troubleshoot Internet Connection Firewall  Configure Remote Assistance and Remote Desktop

4 Chapter 10: Network Protocols and Services4 TCP/IP CONFIGURABLE OPTIONS  IP address (mandatory)  Subnet mask (mandatory)  Default gateway (optional)  DNS configuration (optional)  WINS configuration (optional)  IP address (mandatory)  Subnet mask (mandatory)  Default gateway (optional)  DNS configuration (optional)  WINS configuration (optional)

5 Chapter 10: Network Protocols and Services5 IP ADDRESS CLASSES  Class A addresses  Class B addresses  Class C addresses  Class D addresses  Class E addresses  Loopback addresses  Class A addresses  Class B addresses  Class C addresses  Class D addresses  Class E addresses  Loopback addresses

6 Chapter 10: Network Protocols and Services6 IP ADDRESS VALIDITY  The first byte of the IP address must fall within the following ranges:  1 through 126  128 through 191  192 through 223  IP addresses that begin with 0, 127, or 224 through 255 are invalid  The host ID cannot be all binary 0s or 1s  No number in an IP address can be greater than 255  The first byte of the IP address must fall within the following ranges:  1 through 126  128 through 191  192 through 223  IP addresses that begin with 0, 127, or 224 through 255 are invalid  The host ID cannot be all binary 0s or 1s  No number in an IP address can be greater than 255

7 Chapter 10: Network Protocols and Services7 CHOOSING AN IP ADDRESSING SCHEME  10.0.0.0 through 10.255.255.255  172.16.0.0 through 172.31.255.255  192.168.0.0 through 192.168.255.255  10.0.0.0 through 10.255.255.255  172.16.0.0 through 172.31.255.255  192.168.0.0 through 192.168.255.255

8 Chapter 10: Network Protocols and Services8 SUBNET MASKS  Class A: 255.0.0.0  Class B: 255.255.0.0  Class C: 255.255.255.0  Class A: 255.0.0.0  Class B: 255.255.0.0  Class C: 255.255.255.0

9 Chapter 10: Network Protocols and Services9 DEFAULT GATEWAY

10 Chapter 10: Network Protocols and Services10 DNS  Name resolution for TCP/IP clients  Service resolution  Resolve TCP/IP host names and FQDNs to IP addresses  Name resolution for TCP/IP clients  Service resolution  Resolve TCP/IP host names and FQDNs to IP addresses

11 Chapter 10: Network Protocols and Services11 TCP/IP HOSTS FILE

12 Chapter 10: Network Protocols and Services12 NetBIOS  NetBIOS Enhanced User Interface (NetBEUI) is a fast, efficient protocol, suitable for use on small networks.  Not used very much anymore  Will have to enable a WINS server or use the LMHOSTS file  NetBIOS Enhanced User Interface (NetBEUI) is a fast, efficient protocol, suitable for use on small networks.  Not used very much anymore  Will have to enable a WINS server or use the LMHOSTS file

13 Chapter 10: Network Protocols and Services13 WINS  In multiple-network environments, a WINS server can be used to maintain a database of NetBIOS name-to-IP address mappings, similar to a DNS server maintaining a database of host name-to-IP address mappings

14 Chapter 10: Network Protocols and Services14 LMHOSTS FILE  The Lmhosts file is a simple text file that contains IP addresses followed by the name of the host, similar to a TCP/IP hosts file. The Lmhosts file is stored in the System_root\System32\Drivers\Etc folder.

15 Chapter 10: Network Protocols and Services15 CONFIGURING LAN AND HIGH-SPEED INTERNET CONNECTIONS

16 Chapter 10: Network Protocols and Services16 ADDING A NETWORK COMPONENT

17 Chapter 10: Network Protocols and Services17 RENAMING, DISABLING, AND DELETING A LOCAL AREA CONNECTION

18 Chapter 10: Network Protocols and Services18 CONFIGURING TCP/IP

19 Chapter 10: Network Protocols and Services19 ALTERNATE TCP/IP CONFIGURATION BY USER- CONFIGURED SETTINGS

20 Chapter 10: Network Protocols and Services20 MANUAL CONFIGURATION OF TCP/IP PROPERTIES  Automatic configuration of TCP/IP properties is convenient, but there will be situations where you will want the control that is afforded by manual configuration

21 Chapter 10: Network Protocols and Services21 GENERAL NETWORK TROUBLESHOOTING  What isn’t working?  What is working?  Did whatever isn’t working ever work?  Does it work intermittently or not at all?  Has anything changed since the last time it worked?  Is there a relationship between things that are working and things that are not?  What isn’t working?  What is working?  Did whatever isn’t working ever work?  Does it work intermittently or not at all?  Has anything changed since the last time it worked?  Is there a relationship between things that are working and things that are not?

22 Chapter 10: Network Protocols and Services22 TROUBLESHOOTING TCP/IP  Are the computers involved physically connected to the network?  Does Event Viewer report any warnings or errors?  Are TCP/IP parameters configured correctly?  Is the computer receiving an address from the DHCP server?  Are the computers involved physically connected to the network?  Does Event Viewer report any warnings or errors?  Are TCP/IP parameters configured correctly?  Is the computer receiving an address from the DHCP server?

23 Chapter 10: Network Protocols and Services23 TROUBLESHOOTING TCP/IP (CONTINUED)  Can the computer establish basic connectivity using the Ping command?  Is there a DNS or NetBIOS name-resolution problem?  Are the default gateway and additional routes configured in the local routing table?  Can the computer establish basic connectivity using the Ping command?  Is there a DNS or NetBIOS name-resolution problem?  Are the default gateway and additional routes configured in the local routing table?

24 Chapter 10: Network Protocols and Services24 TROUBLESHOOTING PHYSICAL CONNECTIVITY  Check the properties of the network adapter  Make sure that the network cable is connected to the network card  Check the properties of the network adapter  Make sure that the network cable is connected to the network card

25 Chapter 10: Network Protocols and Services25 VERIFYING TCP/IP CONFIGURATION  TCP/IP settings to check include:  Incorrect IP address  Duplicate IP address  Incorrect subnet mask  Incorrect or missing default gateway  Incorrect or missing DNS server  Incorrect or missing WINS server  TCP/IP settings to check include:  Incorrect IP address  Duplicate IP address  Incorrect subnet mask  Incorrect or missing default gateway  Incorrect or missing DNS server  Incorrect or missing WINS server

26 Chapter 10: Network Protocols and Services26 PING

27 Chapter 10: Network Protocols and Services27 IPCONFIG

28 Chapter 10: Network Protocols and Services28 TROUBLESHOOTING DHCP CLIENTS  Use Ipconfig /renew to force the client to refresh the DHCP configuration  Ensure that the DHCP server is functioning and is not out of IP addresses  If the DHCP server is remote, verify that the DHCP Relay Agent is functioning  Use Ipconfig /renew to force the client to refresh the DHCP configuration  Ensure that the DHCP server is functioning and is not out of IP addresses  If the DHCP server is remote, verify that the DHCP Relay Agent is functioning

29 Chapter 10: Network Protocols and Services29 TROUBLESHOOTING BASIC CONNECTIVITY  If the client appears to have an appropriate TCP/IP configuration, you can perform basic connectivity testing using the Ping command

30 Chapter 10: Network Protocols and Services30 TRACERT COMMAND  The Tracert command-line utility can help you figure out exactly where along the route the breakdown happened

31 Chapter 10: Network Protocols and Services31 PATHPING COMMAND  The Pathping command is a combination of both Ping and Tracert, displaying information about packet loss at every router between the host computer and the remote one

32 Chapter 10: Network Protocols and Services32 TCP/IP HOST NAME RESOLUTION METHODS  Local host name  DNS cache  Hosts file  DNS server  Local host name  DNS cache  Hosts file  DNS server

33 Chapter 10: Network Protocols and Services33 NETBIOS NAME RESOLUTION METHODS  NetBIOS name cache  WINS server  Broadcast  Lmhosts file  NetBIOS name cache  WINS server  Broadcast  Lmhosts file

34 Chapter 10: Network Protocols and Services34 UNDERSTANDING INTERNET CONNECTION FIREWALL  Limits the data that comes into a computer or a network  Does not limit what happens on a stand- alone computer or inside the network, or the data that passes between computers on a local network  Works independently of any networking hardware  Can keep a security log of discarded packets  Limits the data that comes into a computer or a network  Does not limit what happens on a stand- alone computer or inside the network, or the data that passes between computers on a local network  Works independently of any networking hardware  Can keep a security log of discarded packets

35 Chapter 10: Network Protocols and Services35 ENABLING INTERNET CONNECTION FIREWALL

36 Chapter 10: Network Protocols and Services36 ICF LOGGING  Two available ICF logging options:  Log Dropped Packets  Log Successful Connections  Two available ICF logging options:  Log Dropped Packets  Log Successful Connections

37 Chapter 10: Network Protocols and Services37 INTERNET CONTROL MESSAGE PROTOCOL (ICMP)

38 Chapter 10: Network Protocols and Services38 ALLOWING SERVICES IN ICF

39 Chapter 10: Network Protocols and Services39 ESTABLISHING A REMOTE ASSISTANCE SESSION Start Menu – Help and Support

40 Chapter 10: Network Protocols and Services40 REMOTE ASSISTANCE CONSOLE

41 Chapter 10: Network Protocols and Services41 TAKING SHARED CONTROL OF THE USER’S COMPUTER  Can fully manipulate the computer  Can load and unload drivers  Can launch applications  Can View event logs  Cannot copy files from the user’s hard drive  Can fully manipulate the computer  Can load and unload drivers  Can launch applications  Can View event logs  Cannot copy files from the user’s hard drive

42 Chapter 10: Network Protocols and Services42 REMOTE DESKTOP  Remote Desktop is designed to allow a user to have full control over her or his Windows XP Professional Edition desktop from another computer on the network

43 Chapter 10: Network Protocols and Services43 CONFIGURING REMOTE DESKTOP Must have the check box selected. Port 3389 must be opened on the firewall.

44 Chapter 10: Network Protocols and Services44 MANAGING REMOTE DESKTOP SESSIONS

45 Chapter 10: Network Protocols and Services45 CHAPTER SUMMARY  When configuring TCP/IP, you must configure an IP address and a subnet mask. Optionally, you can configure a default gateway and name server addresses.  A computer can obtain IP addressing information automatically or you can configure a static IP address.  Name resolution is the process of resolving a user-friendly name to an IP address. Name resolution mechanisms include DNS and WINS.  When configuring TCP/IP, you must configure an IP address and a subnet mask. Optionally, you can configure a default gateway and name server addresses.  A computer can obtain IP addressing information automatically or you can configure a static IP address.  Name resolution is the process of resolving a user-friendly name to an IP address. Name resolution mechanisms include DNS and WINS.

46 Chapter 10: Network Protocols and Services46 CHAPTER SUMMARY (CONTINUED)  When troubleshooting a networking problem, you should check for problems with cable connections, network adapters, modems, TCP/IP configuration, or name resolution settings.  Internet Connection Firewall provides a level of security against unwanted network traffic coming from outside your private network.  When troubleshooting a networking problem, you should check for problems with cable connections, network adapters, modems, TCP/IP configuration, or name resolution settings.  Internet Connection Firewall provides a level of security against unwanted network traffic coming from outside your private network.

47 Chapter 10: Network Protocols and Services47 CHAPTER SUMMARY (CONTINUED)  Remote Assistance provides a way for a user to request help from an expert and even let that expert control the user’s desktop. Remote Desktop provides a way for a user to control his or her desktop while away from the main computer.


Download ppt "11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP."

Similar presentations


Ads by Google