70-687 8.1 Lecture Slides Lesson 9x

Download Report

Transcript 70-687 8.1 Lecture Slides Lesson 9x

Lesson 9: Configuring IP
Settings
MOAC 70-687: Configuring Windows 8.1
Overview
• Exam Objective 3.1: Configure IP settings
o Configure name resolution
o Connect to a network
o Configure network locations
© 2013 John Wiley & Sons, Inc.
2
Networking Basics
Lesson 9: Configuring IP Settings
© 2013 John Wiley & Sons, Inc.
3
Networking
• Networking is one of the primary functions of
Windows 8.1. Most Windows computers are
connected to either a private local area
network (LAN) or to the Internet, and many
are connected to both.
© 2013 John Wiley & Sons, Inc.
4
Protocols
• Computers on a network communicate using
protocols, which are nothing more than
languages that all of the computers
understand.
• These protocols operate on different levels,
forming what is commonly known as a
networking stack or protocol stack.
• The most common method for illustrating the
operations of the networking stack is the Open
Systems Interconnection (OSI) reference model,
which consists of seven layers.
© 2013 John Wiley & Sons, Inc.
5
Networking Basics
The OSI reference model
© 2013 John Wiley & Sons, Inc.
6
The Physical Layer
• At the bottom of the OSI model is the
physical layer, which represents the
hardware that forms the network.
• The physical layer of the OSI model consists
of the cable or the radio signals that carry
data from one system to another and the
network interface adapters, which are the
hardware components in the computers
that provide the connection to the physical
network.
© 2013 John Wiley & Sons, Inc.
7
The Data-Link Layer
• As you move up beyond the physical layer, the
subsequent layers of the OSI model are realized
in software, as protocols that provide different
types of communications.
• Ethernet is the protocol responsible for
addressing packets at the data-link layer, which
it does by surrounding the data it receives from
the network layer just above it with a header
and footer.
• This header and footer and the data they
contain are collectively called a frame and the
process of applying it is called data
encapsulation.
© 2013 John Wiley & Sons, Inc.
8
The Data-Link Layer
Data-link layer data encapsulation
© 2013 John Wiley & Sons, Inc.
9
The Network Layer
• The protocols that Windows uses by default
at the network and transport layers are
collectively called TCP/IP. TCP is the
Transmission Control Protocol and IP is the
Internet Protocol.
© 2013 John Wiley & Sons, Inc.
10
IP Routing
• A router is simply a device that connects
one network to another. When you install a
LAN in a home or office, and connect it to
the Internet, you are actually installing a
router that connects your network to
another network belonging to an Internet
service provider (ISP).
• To get to their final destination, packets must
be passed from router to router, through
many different networks.
© 2013 John Wiley & Sons, Inc.
11
IPv4 Addressing
• The current standard for IP is version 4 (IPv4),
which defines a 32-bit address space. Each
address is split into two parts:
o Network identifier – As the name implies, specifies
the network on which a particular system is
located.
o Host identifier – Specifies a particular network
interface (also called a host) on the network.
© 2013 John Wiley & Sons, Inc.
12
IPv4 Address Classes
Class A
Class B
Class C
Subnet mask
255.0.0.0
255.255.0.0
First bit values (binary)
0
10
255.255.255.
0
110
First byte value (decimal)
0–127
128–191
192–223
Number of network identifier bits
8
16
24
Number of host identifier bits
24
16
8
Number of possible networks
126
16,384
2,097,152
Number of possible hosts
16,777,214
65,534
254
© 2013 John Wiley & Sons, Inc.
13
Classless Inter-Domain
Routing (CIDR)
• CIDR differs from traditional addressing (now
called classful addressing) by allowing the
division between the network identifier and
the host identifier to fall anywhere in an IPv4
address; it does not have to fall on one of
the eight-bit boundaries.
© 2013 John Wiley & Sons, Inc.
14
IPv4 Private Addresses
Address
Class
IPv4 Private Address Range
Subnet Mask
Class A
10.0.0.0 through
10.255.255.255
255.0.0.0
Class B
172.16.0.0 through
172.31.255.255
255.255.0.0
Class C
192.168.0.0 through
192.168.255.255
255.255.255.0
© 2013 John Wiley & Sons, Inc.
15
Assigning IP Addresses
• Windows 8.1 computers can acquire IP
addresses in the following three ways:
o Manual configuration
o Dynamic Host Configuration Protocol (DHCP)
o Automatic Private IP Addressing (APIPA)
© 2013 John Wiley & Sons, Inc.
16
DNS Name Resolution
• DNS is a client/server application that is
essentially a distributed database.
• In its most basic form, the DNS name
resolution process consists of a resolver
submitting a name resolution request to the
DNS server specified in its TCP/IP
configuration settings.
© 2013 John Wiley & Sons, Inc.
17
IPv6 Addressing
• IPv6 expands the address space from 32 to
128 bits, which is large enough to provide
more than 6.7x1023 addresses for each
square meter of the Earth’s surface.
• Unlike IPv4 addresses, which use decimal
notation, IPv6 addresses use hexadecimal
notation, in the form of eight two-byte
values, separated by colons, as follows:
XX:XX:XX:XX:XX:XX:XX:XX
© 2013 John Wiley & Sons, Inc.
18
IPv6 Transition
• Windows 8.1, by default, installs support for
both IPv4 and IPv6 addressing when it
detects a network interface adapter in the
computer.
• Microsoft refers to this as Windows 8.1’s dual
IP stack.
© 2013 John Wiley & Sons, Inc.
19
IPv6 Transition
Windows 8.1 support for IPv4 and IPv6
© 2013 John Wiley & Sons, Inc.
20
Network Layer Data
Encapsulation
• After IP adds its header, it sends the packet
down to the data-link layer, where Ethernet
adds its own header and footer to the
packet.
• Thus, the data-link layer packet that gets
transmitted over the network consists of
transport layer data, encapsulated within an
IP packet, which is called a datagram,
which is in turn encapsulated within an
Ethernet frame.
© 2013 John Wiley & Sons, Inc.
21
Network Layer Data
Encapsulation
IP data encapsulation
© 2013 John Wiley & Sons, Inc.
22
The Transport Layer
• There are two types of protocols that
operate at the network and transport layers:
o Connection-oriented – A connection-oriented
protocol is one in which two communicating
systems establish a connection before they
transmit any data.
o Connectionless – A connectionless protocol does
not require the establishment of a connection,
nor does it perform error detection or correction.
© 2013 John Wiley & Sons, Inc.
23
Ports and Sockets
• As with the protocol codes included in IP
headers, the TCP and UDP headers both
contain codes that identify specific
applications running on the system.
• The codes are called ports
• The combination of an IP address and a port
number is called a socket.
© 2013 John Wiley & Sons, Inc.
24
Ports and Sockets
Transport layer data encapsulation
© 2013 John Wiley & Sons, Inc.
25
Well-Known Port Numbers
Used by TCP and UDP
Service
Name
ftp-data
Port
Number Protocol
20
TCP
ftp
21
TCP
Ssh
22
TCP and UDP SSH (Secure Shell) Remote Login Protocol; used
to security log on to a computer from another
computer on the same network and execute
commands.
telnet
23
TCP
Telnet; used to execute commands on networkconnected systems
Smtp
25
TCP
Simple Mail Transport Protocol (SMTP); used to
send e-mail messages
© 2013 John Wiley & Sons, Inc.
Function
FTP data channel; used for transmitting files
between systems
FTP control channel; used by FTP-connected
systems for exchanging commands and responses
26
Well-Known Port Numbers
Used by TCP and UDP
Service
Name
Domain
Port
Number Protocol
53
TCP and UDP
Bootps
67
TCP and UDP
Bootstrap Protocol (BOOTP) and DHCP servers;
used to receive TCP/IP configuration requests
from clients
Bootpc
68
TCP and UDP
BOOTP and DHCP clients; used to send TCP/IP
configuration requests to servers
http
80
TCP
HTTP; used by Web servers to receive requests
from client browsers
pop3
110
TCP
Post Office Protocol 3 (POP3); used to retrieve email requests from clients
© 2013 John Wiley & Sons, Inc.
Function
DNS; used to receive host name resolution
requests from clients
27
Well-Known Port Numbers
Used by TCP and UDP
Service
Name
nntp
Port
Number Protocol
119
TCP and UDP
ntp
123
TCP and UDP
Network Time Protocol; used to exchange time
signals for the purpose of synchronizing the
clocks in network computers.
imap
143
TCP and UDP
Internet Message Access Protocol version 4;
used by e-mail client programs to retrieve
messages from a mail server
snmp
161
TCP and UDP
Simple Network Management Protocol (SNMP);
used by SNMP agents to transmit status
information to a network management console
https
443
TCP and UDP
Hypertext Transfer Protocol Over TLS/SSL;
© 2013 John Wiley & Sons, Inc.
Function
Network News Transfer Protocol; used to post
and distribute messages to, and retrieve them
from, Usenet servers on the Internet.
28
Transport Layer Data
Encapsulation
• The TCP header includes a multitude of
fields that implement additional services,
including the following:
o Packet acknowledgment – Informs the sender
which packets have been delivered successfully
o Error correction – Informs the sender which
packets must be retransmitted
o Flow control – Regulates the rate at which the
sending system transmits its data.
© 2013 John Wiley & Sons, Inc.
29
The Upper Layers
• The application layer is the top of the
networking stack, and as such, it provides
the entrance point for programs running on
a computer.
© 2013 John Wiley & Sons, Inc.
30
The Upper Layers
Application layer data encapsulation
© 2013 John Wiley & Sons, Inc.
31
Connecting to a Network
Lesson 9: Configuring IP Settings
© 2013 John Wiley & Sons, Inc.
32
Installing Network
Support
• When Windows 8.1 detects a network interface
adapter in the computer, either during the
operating system installation or afterwards, it installs
a device driver for the adapter, as well as the
components of the default networking stack, which
are as follows:
Client for Microsoft Networks
File and Printer Sharing for Microsoft Networks
QoS Packet Scheduler
Microsoft Network Adapter Multiplexor Protocol
Microsoft LLDP Protocol Driver
Link Layer Topology Discovery Mapper I/O Driver and
Link Layer Topology Discovery Responder
o Internet Protocol Version 6 (TCP/IPv6)
o Internet Protocol Version 4 (TCP/IPv4)
o
o
o
o
o
o
© 2013 John Wiley & Sons, Inc.
33
Installing Network Support
Windows 8.1 Network controls
© 2013 John Wiley & Sons, Inc.
34
Installing Network Support
Windows 8.1 Network sharing controls
© 2013 John Wiley & Sons, Inc.
35
Using the Network and
Sharing Center
• The Network and Sharing Center is a centralized
console that provides technical specialists and
system administrators with access to most of the
major networking tools included with Windows
8.1.
• As with many Windows tools, there are several
ways to open the Network and Sharing Center,
two of which are as follows:
o Click the Search charm, select Settings, and search
for “Network and Sharing Center.”
o From the Desktop, click the Settings charm and click
Control Panel. Then click Network and Internet >
Network and Sharing Center.
© 2013 John Wiley & Sons, Inc.
36
Using the Network and Sharing
Center
The Network and Sharing Center
© 2013 John Wiley & Sons, Inc.
37
Understanding Network
Discovery
• Network Discovery is an important security
concept first introduced in Windows Vista. It
enables users to control critical network firewall
controls with a single switch.
• Windows Firewall is a feature that was first
introduced in the Windows XP Service Pack 2
release, and is now included in Windows 8.1 as
well.
• The default state of the Network Discovery
setting is dependent on the network location,
as set manually by the user or automatically by
the computer.
© 2013 John Wiley & Sons, Inc.
38
Changing the Network
Location
• After you select the initial network location
during the network interface adapter
installation, Windows 8.1 attempts to detect
the type of location whenever you connect
to a different network.
• When Windows 8.1 is unable to detect the
network type for any reason, it errs on the
side of caution and sets the network
location to Public, which is the safest option.
© 2013 John Wiley & Sons, Inc.
39
Change the Network Location
Using Homegroup Troubleshooter
The Troubleshoot and help prevent computer problems
page
© 2013 John Wiley & Sons, Inc.
40
Configure Advanced Sharing
The Change sharing options for different network
profiles dialog box
© 2013 John Wiley & Sons, Inc.
41
Managing Network
Connections
• Windows 8.1 creates and configures local area
connections automatically, but you can also
manage and modify the properties of the
connections manually.
• Each local area connection on a Windows 8
system has a status dialog box that displays real
time information about the connection.
• At the bottom of the dialog box are buttons
that enable you to perform the following tasks:
o Properties
o Disable/Enable
o Diagnose
© 2013 John Wiley & Sons, Inc.
42
View Connection Status
The Ethernet Status dialog box
© 2013 John Wiley & Sons, Inc.
43
View Connection Status
The Network Connection Details dialog box
© 2013 John Wiley & Sons, Inc.
44
Configuring IPv4 Settings
• Most networks today use DHCP to configure
the TCP/IP configuration settings of their
workstations.
• DHCP automates the configuration process
and prevents the duplication of IP
addresses.
• However, there are still some situations in
which it is desirable or necessary to
configure the Windows 8.1 TCP/IP client
manually.
© 2013 John Wiley & Sons, Inc.
45
Configure IPv4 Settings
The Internet Protocol Version 4 (TCP/IPv4) Properties
sheet
© 2013 John Wiley & Sons, Inc.
46
Configuring IPv6 Settings
• Because most computers use IPv6
autoconfiguration or DHCP, manual
configuration of the Windows 8.1 IPv6
implementation is rarely necessary, but it is
possible.
• The procedure for configuring IPv6 using the
graphical interface is the same as that for
IPv4, except that, in the Local Area
Connection Properties sheet, you select
Internet Protocol Version 6 (TCP/IPv6) and
click Properties.
© 2013 John Wiley & Sons, Inc.
47
Configuring IPv6 Settings
The Internet Protocol Version 6 (TCP/IPv6) Properties
sheet
© 2013 John Wiley & Sons, Inc.
48
Running Network
Diagnostics
• When a networking problem exists, clicking
a warning icon launches Windows Network
Diagnostics.
• Problems that the system can diagnose
include the following:
o
o
o
o
o
o
Broken or detached cable connections
IP address and subnet mask problems
Default gateway problems
DNS and DHCP configuration problems
Networking hardware configuration problems
Internet server addresses and service settings
© 2013 John Wiley & Sons, Inc.
49
Using TCP/IP Tools
Lesson 9: Configuring IP Settings
© 2013 John Wiley & Sons, Inc.
50
Using Ipconfig.exe
• All Windows operating systems, including Windows
8.1, have a graphical interface for configuring
network connections: a command line tool called
Ipconfig.exe.
• The value of Ipconfig.exe is particularly apparent
when a Windows 8.1 computer autoconfigures its
TCP/IP client or uses DHCP to obtain its IP address
and other TCP/IP configuration parameters
• In addition to displaying the DHCP-obtained
configuration settings, Ipconfig.exe also enables
you to manually release the IP address the system
obtained from the DHCP server and renew existing
address leases.
© 2013 John Wiley & Sons, Inc.
51
Using Ipconfig.exe
The Ipconfig.exe display
© 2013 John Wiley & Sons, Inc.
52
Using Ping.exe
• Ping.exe can tell you if the TCP/IP stack of
another system on the network is functioning
normally. The Ping.exe program generates a
series of Echo Request messages using the
Internet Control Message Protocol (ICMP)
and transmits them to the computer whose
name or IP address you specify on the
command line.
© 2013 John Wiley & Sons, Inc.
53
Using Ping.exe
The Ping.exe display
© 2013 John Wiley & Sons, Inc.
54
Using Tracert.exe
• Tracert.exe is a variation on Ping.exe. The
program uses ICMP Echo Request and Echo
Reply messages just like Ping, but it modifies
the messages by changing the value of the
TTL field in the IP header. The values in the
TTL field prevent packets from getting
caught in router loops that keep them
circulating endlessly around the
internetwork.
© 2013 John Wiley & Sons, Inc.
55
Using Nslookup.exe
• The advantage of Nslookup.exe is that you
can test the functionality and the quality of
the information on a specific DNS server by
specifying it on the command line.
• The Nslookup.exe command-line utility
enables you to generate DNS request
messages and transmit them to specific DNS
servers on the network.
© 2013 John Wiley & Sons, Inc.
56
Using Nslookup.exe
The Nslookup.exe display
© 2013 John Wiley & Sons, Inc.
57
Lesson Summary
• The networking stack used on Windows 8.1 computers
corresponds roughly to the seven-layer OSI reference model.
• The OSI (Open Systems Interconnection) reference model
consists of seven layers: physical, data-link, network, transport,
session, presentation, and application.
• Ethernet, the data-link layer protocol used on most LANs,
consists of physical layer specifications, a frame format, and a
MAC mechanism.
• The network and transport layer protocols work together to
provide an end-to-end communication service that achieves
the quality of service required by the application requesting
network services.
© 2013 John Wiley & Sons, Inc.
58
Lesson Summary
• The functions of the session, presentation, and application
layers are often combined into a single application layer
protocol.
• Windows 8.1 includes support for both the IPv4 and IPv6
protocols. IPv6 increases the IP address space from 32 to 128
bits, simplifies the routing process, and improves address
autoconfiguration.
• Network Discovery is a Windows 8.1 feature that simplifies the
task of firewall configuration by enabling you to block or allow
the protocols and ports need for the computer to browse and
access the network.
• Windows 8.1 includes a variety of command line TCP/IP tools,
including Ipconfig.exe, Ping.exe, Tracert.exe, Nslookup.exe,
and Netstat.exe.
© 2013 John Wiley & Sons, Inc.
59
Copyright 2013 John Wiley & Sons, Inc..
All rights reserved. Reproduction or translation of this work beyond that
named in Section 117 of the 1976 United States Copyright Act without the
express written consent of the copyright owner is unlawful. Requests for
further information should be addressed to the Permissions Department, John
Wiley & Sons, Inc.. The purchaser may make back-up copies for his/her own
use only and not for distribution or resale. The Publisher assumes no
responsibility for errors, omissions, or damages, caused by the use of these
programs or from the use of the information contained herein.