47
1 NETWORK PROTOCOLS AND SERVICES Chapter 10

11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES Identify how computers on TCP/IP

Embed Size (px)

Citation preview

Page 1: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

11

NETWORK PROTOCOLS AND SERVICES

Chapter 10

Page 2: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 2

NETWORK PROTOCOLS AND SERVICES

Identify how computers on TCP/IP networks communicate

Explain how IP addresses and subnetting work

Explain how name resolution works, and identify the primary name resolution mechanisms that are used on Microsoft Windows networks

Page 3: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 3

NETWORK PROTOCOLS AND SERVICES (CONTINUED)

Troubleshoot networking problems caused by cable connections, network adapters, modems, TCP/IP configuration, or name resolution settings.

Configure and troubleshoot Internet Connection Firewall

Configure Remote Assistance and Remote Desktop

Page 4: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 4

TCP/IP CONFIGURABLE OPTIONS

IP address (mandatory)

Subnet mask (mandatory)

Default gateway (optional)

DNS configuration (optional)

WINS configuration (optional)

Page 5: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 5

IP ADDRESS CLASSES

Class A addresses

Class B addresses

Class C addresses

Class D addresses

Class E addresses

Loopback addresses

Page 6: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 6

IP ADDRESS VALIDITY

The first byte of the IP address must fall within the following ranges: 1 through 126

128 through 191

192 through 223

IP addresses that begin with 0, 127, or 224 through 255 are invalid

The host ID cannot be all binary 0s or 1s

No number in an IP address can be greater than 255

Page 7: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 7

CHOOSING AN IP ADDRESSING SCHEME

10.0.0.0 through 10.255.255.255

172.16.0.0 through 172.31.255.255

192.168.0.0 through 192.168.255.255

Page 8: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 8

SUBNET MASKS

Class A: 255.0.0.0

Class B: 255.255.0.0

Class C: 255.255.255.0

Page 9: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 9

DEFAULT GATEWAY

Page 10: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 10

DNS

Name resolution for TCP/IP clients

Service resolution

Resolve TCP/IP host names and FQDNs to IP addresses

Page 11: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 11

TCP/IP HOSTS FILE

Page 12: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 12

NetBIOS

NetBIOS Enhanced User Interface (NetBEUI) is a fast, efficient protocol, suitable for use on small networks.

Not used very much anymore

Will have to enable a WINS server or use the LMHOSTS file

Page 13: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 13

WINS

In multiple-network environments, a WINS server can be used to maintain a database of NetBIOS name-to-IP address mappings, similar to a DNS server maintaining a database of host name-to-IP address mappings

Page 14: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 14

LMHOSTS FILE

The Lmhosts file is a simple text file that contains IP addresses followed by the name of the host, similar to a TCP/IP hosts file. The Lmhosts file is stored in the System_root\System32\Drivers\Etc folder.

Page 15: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 15

CONFIGURING LAN AND HIGH-SPEED INTERNET CONNECTIONS

Page 16: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 16

ADDING A NETWORK COMPONENT

Page 17: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 17

RENAMING, DISABLING, AND DELETING A LOCAL AREA CONNECTION

Page 18: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 18

CONFIGURING TCP/IP

Page 19: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 19

ALTERNATE TCP/IP CONFIGURATION BY USER-CONFIGURED SETTINGS

Page 20: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 20

MANUAL CONFIGURATION OF TCP/IP PROPERTIES

Automatic configuration of TCP/IP properties is convenient, but there will be situations where you will want the control that is afforded by manual configuration

Page 21: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 21

GENERAL NETWORK TROUBLESHOOTING

What isn’t working?

What is working?

Did whatever isn’t working ever work?

Does it work intermittently or not at all?

Has anything changed since the last time it worked?

Is there a relationship between things that are working and things that are not?

Page 22: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 22

TROUBLESHOOTING TCP/IP

Are the computers involved physically connected to the network?

Does Event Viewer report any warnings or errors?

Are TCP/IP parameters configured correctly?

Is the computer receiving an address from the DHCP server?

Page 23: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 23

TROUBLESHOOTING TCP/IP (CONTINUED)

Can the computer establish basic connectivity using the Ping command?

Is there a DNS or NetBIOS name-resolution problem?

Are the default gateway and additional routes configured in the local routing table?

Page 24: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 24

TROUBLESHOOTING PHYSICAL CONNECTIVITY

Check the properties of the network adapter

Make sure that the network cable is connected to the network card

Page 25: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 25

VERIFYING TCP/IP CONFIGURATION

TCP/IP settings to check include: Incorrect IP address

Duplicate IP address

Incorrect subnet mask

Incorrect or missing default gateway

Incorrect or missing DNS server

Incorrect or missing WINS server

Page 26: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 26

PING

Page 27: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 27

IPCONFIG

Page 28: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 28

TROUBLESHOOTING DHCP CLIENTS

Use Ipconfig /renew to force the client to refresh the DHCP configuration

Ensure that the DHCP server is functioning and is not out of IP addresses

If the DHCP server is remote, verify that the DHCP Relay Agent is functioning

Page 29: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 29

TROUBLESHOOTING BASIC CONNECTIVITY

If the client appears to have an appropriate TCP/IP configuration, you can perform basic connectivity testing using the Ping command

Page 30: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 30

TRACERT COMMAND

The Tracert command-line utility can help you figure out exactly where along the route the breakdown happened

Page 31: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 31

PATHPING COMMAND

The Pathping command is a combination of both Ping and Tracert, displaying information about packet loss at every router between the host computer and the remote one

Page 32: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 32

TCP/IP HOST NAME RESOLUTION METHODS

Local host name

DNS cache

Hosts file

DNS server

Page 33: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 33

NETBIOS NAME RESOLUTION METHODS

NetBIOS name cache

WINS server

Broadcast

Lmhosts file

Page 34: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 34

UNDERSTANDING INTERNET CONNECTION FIREWALL

Limits the data that comes into a computer or a network

Does not limit what happens on a stand-alone computer or inside the network, or the data that passes between computers on a local network

Works independently of any networking hardware

Can keep a security log of discarded packets

Page 35: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 35

ENABLING INTERNET CONNECTION FIREWALL

Page 36: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 36

ICF LOGGING

Two available ICF logging options: Log Dropped Packets

Log Successful Connections

Page 37: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 37

INTERNET CONTROL MESSAGE PROTOCOL (ICMP)

Page 38: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 38

ALLOWING SERVICES IN ICF

Page 39: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 39

ESTABLISHING A REMOTE ASSISTANCE SESSION

Start Menu – Help and Support

Page 40: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 40

REMOTE ASSISTANCE CONSOLE

Page 41: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 41

TAKING SHARED CONTROL OF THE USER’S COMPUTER

Can fully manipulate the computer

Can load and unload drivers

Can launch applications

Can View event logs

Cannot copy files from the user’s hard drive

Page 42: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 42

REMOTE DESKTOP

Remote Desktop is designed to allow a user to have full control over her or his Windows XP Professional Edition desktop from another computer on the network

Page 43: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 43

CONFIGURING REMOTE DESKTOP

Must have the check box selected.

Port 3389 must be opened on the firewall.

Page 44: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 44

MANAGING REMOTE DESKTOP SESSIONS

Page 45: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 45

CHAPTER SUMMARY

When configuring TCP/IP, you must configure an IP address and a subnet mask. Optionally, you can configure a default gateway and name server addresses.

A computer can obtain IP addressing information automatically or you can configure a static IP address.

Name resolution is the process of resolving a user-friendly name to an IP address. Name resolution mechanisms include DNS and WINS.

Page 46: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 46

CHAPTER SUMMARY (CONTINUED)

When troubleshooting a networking problem, you should check for problems with cable connections, network adapters, modems, TCP/IP configuration, or name resolution settings.

Internet Connection Firewall provides a level of security against unwanted network traffic coming from outside your private network.

Page 47: 11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP

Chapter 10: Network Protocols and Services 47

CHAPTER SUMMARY (CONTINUED)

Remote Assistance provides a way for a user to request help from an expert and even let that expert control the user’s desktop. Remote Desktop provides a way for a user to control his or her desktop while away from the main computer.