Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Networking Concepts Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Configuring IPv4 and IPv6 Addressing Configure.

Similar presentations


Presentation on theme: "Introduction to Networking Concepts Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Configuring IPv4 and IPv6 Addressing Configure."— Presentation transcript:

1 Introduction to Networking Concepts Lesson 1

2 Skills Matrix Technology SkillObjective DomainObjective # Configuring IPv4 and IPv6 Addressing Configure IPv4 and IPv6 addressing 1.1

3 Introduction Name: Williams Obinkyereh MSc. IT, Post Masters Software Engineering DSC (Doctor of Computer Science) Student. Contacts: Phone: 612-516-9712 Email: obinkytt@yahoo.co.ukobinkytt@yahoo.co.uk

4 Introduction Class introduction Introduction of Course Syllabus. –Course Summary –Lab Infrastructure (Mock) –Course Plan –Evaluation –Academic integrity Discussion and questions about syllabus.

5 TCP/IP Protocol Suite Network protocols provide the logical “language” for communication over the network. The most common networking protocol in use today is Transmission Control Protocol/Internet Protocol (TCP/IP).

6 IP Addressing By subdividing TCP/IP networks into smaller groupings called subnets, the administration of a TCP/IP network can be as centralized or as decentralized as the needs of a particular organization might dictate. The largest TCP/IP network in the world, which is “owned” and administered by hundreds and thousands of separate entities, is the Internet.

7 IP Addressing For any computer or host to communicate on a TCP/IP network, it must be configured with a valid IP address. Each IP address consists of two components: –network address — This portion of the IP address is shared by all TCP/IP hosts on a particular network or subnet. –host address — This comprises the portion of the IP address that is unique to a particular computer or host. Both combined form a unique IP address across an entire TCP/IP network.

8 IP Addressing In addition to the IP address, each TCP/IP host must be configured with the following: –subnet mask — Used to identify which network the TCP/IP host resides on by defining where the network address stops and the host address begins. –default gateway — Allows a host to communicate with devices that reside on a remote network or location. You don’t need a default gateway if it is does not need to communicate outside of the host’s own subnet.

9 IPv4 Addressing

10 Alternate Configuration Tab Allows for a second address to be assigned to a network interface.

11 IPv4 Addressing The most commonly used version used today. Based on 32-bits (four bytes, or octets). 2 32 (4,294,967,296) possible addresses. Some of the possible addresses are reserved IPv4 addresses are commonly represented using what is called dotted-decimal notation, in which the decimal value of each byte is shown, using periods to separate the bytes: 10.27.3.1 192.1.120.84 192.5.18.102

12 Classful Addressing

13 Classless Inter-Domain Routing (CIDR) When classful network addresses started became scarce, public Internet Service Providers (ISPs) started to allocate many small networks to their customers. Breaks the network address space into CIDR blocks The number of masked bits is specified with the CIDR notation. Example: –10.0.0.0/8 would describe 8 bits masked and 24 bits for host numbering.

14 Subnetting Logical partitioning of an organization’s network address range into smaller blocks.

15 Private Addresses For convenience, several network address blocks were reserved for private networks. Defined as non-routable outside of the private network.

16 Network Address Translation (NAT) Hosts using private network addresses can communicate with public networks only by using network address translation (NAT), Enables routing by mapping their private network address to a different, routable network address.

17 Loopback Address Specifies itself at address 127.0.0.1

18 IPv6 Addressing IPv6 uses 128 bits, or 16 bytes, for addressing. –Providing 2 128 (about 340 billion) unique addresses. Uses eight groups of four hexadecimal digits, separated by colons. IPv6 includes a few other enhancements for performance and security. –IPSec.

19 IPv6 Addressing IPv6 addresses are 128 bits in length and expressed in hexadecimal notation. For example, –2001:0db8:85a3:08d3:13 –19:8a2e:0370:7334 If an IPv6 address contains a series of sequential zeroes, the address can be shortened to use a single zero in each group, or else the entire grouping can be represented using a double colon (::). –2001:0000:0000:0000:0000:0000:0000:7334 –2001:0:0:0:0:0:0:7334 –2001::7334

20 Domain Name System (DNS) Domain Name System (DNS) used for name resolution. It translates from Host name to IP addresses. HOSTS files also translate from Host name to IP addresses. Prevents you from remembering addresses. –Instead, remember meaningful logical names.

21 Domain Name System (DNS)

22

23 Fully Qualified Domain Name (FQDN) Describes the exact relationship between a host and its DNS domain. Example: computer1.sales.adatum.com –Host name is computer1 –In the sales domain, which is in the adatum second-level domain, which is in the.com top- level domain, which is under the “.” root domain.

24 Static Addresses When administering TCP/IP hosts, you can assign static IP addresses. –Must be configured and maintained manually. –This can become a daunting, tedious task as the number of systems grows to larger numbers.

25 Dynamic Host Configuration Protocol (DHCP) Simplifies the problem by automating the assigning, tracking, and reassigning of IP addresses. Also to provide other important settings such as the default gateway, subnet mask, DNS, and so on.

26 Dynamic Host Configuration Protocol (DHCP)

27 Routing The process of transferring data across a network from one LAN to another, provides the basis for TCP/IP communications on the Internet and nearly all other corporate networks. By configuring two network interface cards (NICs) within a Windows Server 2008 server, the server can provide a means of transmitting data from one network to another. For larger networks, the processing demands of network routing are typically handled by dedicated hardware-based routers.

28 Remote Access A Windows Server 2008 computer can act as a remote access server, which can allow remote network clients to access resources on a network as though they were physically connected to the LAN. The Windows Server 2008 remote access server can provide remote access using either dial-up connections via a modem or else through a Virtual Private Network (VPN) connection over the Internet or another public network.

29 Network Access Protection (NAP) One of the principal challenges in corporate networks is the ability to secure networks against unwarranted access. Network administrators also need to protect the network against “inside threats,” laptop computers that are physically brought inside the corporate network or that gain access to the company network through remote access technologies such as Virtual Private Networks (VPNs.) Windows Server 2008 provides the Network Access Protection platform, which provides a policy enforcement mechanism to control access to a 2008 network.

30 Installing Microsoft Windows Server 2008 Lesson 2

31 Chapter Objectives Install Windows Server 2008. Configure networking settings in Windows Server 2008. Manage storage disks in Windows Server 2008. Use commands within the Server Core.

32 Installing Windows Server 2008 Insert a bootable Windows Server 2008 media and power on the physical or virtual server.

33 Installing Windows Server 2008

34 Initial Configuration Tasks

35 Configuring Basic Network Settings

36 Windows Firewall The final task in the initial configuration task list is to configure the Windows Firewall. Initially, the Windows Firewall is on by default, and this allows you to turn it off or to change the settings.

37 Windows Firewall

38 Server Roles Server roles define a particular duty that a server might perform on a 2008 network. Server roles improve security and manageability of Windows Server 2008 computers. –Reduces the attack surface. You can use the Server Manager console to install one or multiple Server Roles.

39 Server Manager – Adding Roles

40 Features The Add features option allows adding various features and facilities that may be useful or necessary, depending on your network environment and requirements.

41 Server Manager – Adding Features

42 Basic Disks Use partition tables that are recognized and supported by older operating systems, such as MS-DOS, Windows 95, Windows 98, and Windows Me. Basic disks do not support advanced storage options, such as striped volumes, spanned volumes, and RAID-5 volumes. All disk drives in a Windows Server 2008 computer begin as basic disks until they are converted to dynamic disks.

43 Volume Describes a logical unit of disk space that is made up of space contained on one or more physical disks. Volumes on a dynamic disk can be configured as simple, spanned, mirrored, striped, or RAID-5 volumes.

44 Simple and Spanned Volumes Simple volume –Consists of free space contained on a single physical disk. –You can configure all of the available space on a disk as a simple volume, or you can configure multiple simple volumes using the space on a single disk. Spanned volume –Made up of free space from multiple physical disks. –Spanned volumes are not fault-tolerant. If you lose one disk in the volume, you will lose all data contained on all disks. –Created on 2 to 32 disks.

45 Striped Volume Made up of free space from multiple disks. Unlike a spanned volume, though, a striped volume uses RAID-0 striping to interleave the data across the disks. Improves the read performance of the volume. Striped volumes are also not fault-tolerant and will not withstand the loss of a disk in the volume. A striped volume can be created on a minimum of 2 disks and a maximum of 32 disks.

46 Mirrored Volume Fault-tolerant volume consisting of two physical disks, in which the data on one disk is copied exactly onto the second disk. This provides data redundancy, such that if one disk in the mirror fails, the other disk will continue to function without loss of data.

47 Server Core A server installation that possesses an extremely small installation footprint. Provides only the services required to perform specific roles, such as the DHCP, DNS, file server, or domain controller roles.

48 Server Core

49 Managing Server Core from the Command Line To set the correct time zone for the Server Core computer: timedate.cpl

50 Windows Activation Microsoft offers two types of software keys for a Windows Vista or Windows Server 2008 network, depending on the needs of your specific situation: –Multiple Activation Key –Key Management Service (KMS)

51 Unit 1 Assgnment Unit 1. Assignment 1. Windows 2008 Network Services Unit 1. Exercise 1. IP Addressing Scenario

52 Unit 1 Lab Unit 1. Lab 1. Preparing a Virtual Workstation Image


Download ppt "Introduction to Networking Concepts Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Configuring IPv4 and IPv6 Addressing Configure."

Similar presentations


Ads by Google