Vous êtes sur la page 1sur 66

Lesson 10: Configuring IP Settings

MOAC 70-687: Configuring Windows 8

Overview
Exam Objective 3.1: Configure IP settings Configure name resolution Connect to a network Configure network locations Resolve connectivity issues

2013 John Wiley & Sons, Inc.

Networking Basics
Lesson 10: Configuring IP Settings

2013 John Wiley & Sons, Inc.

Networking
Networking is one of the primary functions of Windows 8. Most Windows computers are connected to either a private local area network (LAN) or to the Internet, and many are connected to both.

2013 John Wiley & Sons, Inc.

Protocols
Computers on a network communicate using protocols, which are languages that all the computers understand. These protocols operate on different levels, forming what is commonly known as a networking stack or protocol stack. The most common method for illustrating the operations of the networking stack is the Open Systems Interconnection (OSI) reference model, which consists of seven layers.
2013 John Wiley & Sons, Inc. 5

Networking Basics

The OSI reference model


2013 John Wiley & Sons, Inc. 6

The Physical Layer


At the bottom of the OSI model is the physical layer. It represents the hardware that forms the network, which consists of
1. The cable or the radio signals, which carry data from one system to another. 2. The network interface adapters, which are the hardware components in the computers that provide the connection to the physical network.

2013 John Wiley & Sons, Inc.

As you move up beyond the physical layer, the subsequent layers of the OSI model are realized in software, as protocols that provide different types of communications. Ethernet is the protocol responsible for addressing packets at the data-link layer, which it does by surrounding the data it receives from the network layer just above it with a header and footer. This header and footer and the data they contain are collectively called a frame, and the process of applying it is called data encapsulation.
2013 John Wiley & Sons, Inc. 8

The Data-Link Layer

The Data-Link Layer

Data-link layer data encapsulation


2013 John Wiley & Sons, Inc. 9

The Network Layer


The protocols that Windows uses by default at the network and transport layers are collectively called TCP/IP.
o TCP is the Transmission Control Protocol. o IP is the Internet Protocol.

2013 John Wiley & Sons, Inc.

10

IP Routing
A router is a device that connects one network to another. When you install a LAN in a home or office and connect it to the Internet, you are actually installing a router that connects your network to another network belonging to an Internet service provider (ISP). To get to their final destination, packets must be passed from router to router, through many different networks.
2013 John Wiley & Sons, Inc. 11

IPv4 Addressing
The current standard for IP is version 4 (IPv4), which defines a 32-bit address space. Each address is split into two parts:
o Network identifier: Specifies the network on which a particular system is located. o Host identifier: Specifies a particular network interface (also called a host) on the network.

2013 John Wiley & Sons, Inc.

12

IPv4 Address Classes


Class A Subnet mask First bit values (binary) First byte value (decimal) Number of network identifier bits Number of host identifier bits 255.0.0.0 0 0127 8 24 Class B 255.255.0.0 10 128191 16 16 Class C 255.255.255.0 110 192223 24 8

Number of possible networks


Number of possible hosts

126
16,777,214

16,384
65,534

2,097,152
254

2013 John Wiley & Sons, Inc.

13

Classless Inter-Domain Routing (CIDR)


CIDR differs from traditional addressing (now called classful addressing) by allowing the division between the network identifier and the host identifier to fall anywhere in an IPv4 address. It does not have to fall on one of the eightbit boundaries.

2013 John Wiley & Sons, Inc.

14

IPv4 Private Addresses


Address Class Class A IPv4 Private Address Range Subnet Mask 10.0.0.0 through 10.255.255.255 172.16.0.0 through 172.31.255.255 255.0.0.0

Class B

255.255.0.0

Class C

192.168.0.0 through 192.168.255.255

255.255.255.0

2013 John Wiley & Sons, Inc.

15

Assigning IP Addresses
Windows 8 computers can acquire IP addresses in three ways:
o Manual configuration o Dynamic Host Configuration Protocol (DHCP) o Automatic Private IP Addressing (APIPA)

2013 John Wiley & Sons, Inc.

16

DNS Name Resolution


DNS is a client/server application that is essentially a distributed database. In its most basic form, the DNS name resolution process consists of a resolver submitting a name resolution request to the DNS server specified in its TCP/IP configuration settings.

2013 John Wiley & Sons, Inc.

17

IPv6 Addressing
IPv6 expands the address space from 32 to 128 bits, which is large enough to provide more than 6.7x1023 addresses for each square meter of the Earths surface. Unlike IPv4 addresses, which use decimal notation, IPv6 addresses use hexadecimal notation, in the form of eight two-byte values, separated by colons:
XX:XX:XX:XX:XX:XX:XX:XX

2013 John Wiley & Sons, Inc.

18

IPv6 Transition
Windows 8, by default, installs support for both IPv4 and IPv6 addressing when it detects a network interface adapter in the computer. Microsoft refers to this as Windows 8s dual IP stack.

2013 John Wiley & Sons, Inc.

19

IPv6 Transition

Windows 8 support for IPv4 and IPv6


2013 John Wiley & Sons, Inc. 20

Network Layer Data Encapsulation


After IP adds its header, it sends the packet down to the data-link layer, where Ethernet adds its own header and footer to the packet. The data-link layer packet that gets transmitted over the network consists of transport layer data, encapsulated within an IP packet, which is called a datagram, which is in turn encapsulated within an Ethernet frame.
2013 John Wiley & Sons, Inc. 21

Network Layer Data Encapsulation

IP data encapsulation
2013 John Wiley & Sons, Inc. 22

The Transport Layer


There are two types of protocols that operate at the network and transport layers:
o Connection-oriented: Two communicating systems establish a connection before they transmit any data. o Connectionless: Does not require the establishment of a connection, nor does it perform error detection or correction.

2013 John Wiley & Sons, Inc.

23

Ports and Sockets


Like the protocol codes included in IP headers, the TCP and UDP headers both contain codes that identify specific applications running on the system. The codes, called ports, are published by the IANA, and the combination of an IP address and a port number is called a socket.

2013 John Wiley & Sons, Inc.

24

Ports and Sockets

Transport layer data encapsulation


2013 John Wiley & Sons, Inc. 25

Well-Known Port Numbers Used by TCP and UDP


Service Name ftp-data ftp Ssh Port Number Protocol 20 TCP 21 22 TCP Function FTP data channel; used for transmitting files between systems FTP control channel; used by FTP-connected systems for exchanging commands and responses

TCP and UDP SSH (Secure Shell) Remote Login Protocol; used to security log on to a computer from another computer on the same network and execute commands

telnet
Smtp

23
25

TCP
TCP

Telnet; used to execute commands on networkconnected systems


Simple Mail Transport Protocol (SMTP); used to send email messages

2013 John Wiley & Sons, Inc.

26

Well-Known Port Numbers Used by TCP and UDP


Service Name Domain Bootps Port Number Protocol 53 TCP and UDP 67 TCP and UDP Function DNS; used to receive host name resolution requests from clients Bootstrap Protocol (BOOTP) and DHCP servers; used to receive TCP/IP configuration requests from clients BOOTP and DHCP clients; used to send TCP/IP configuration requests to servers HTTP; used by web servers to receive requests from client browsers Post Office Protocol 3 (POP3); used to retrieve email requests from clients

Bootpc http pop3

68 80 110

TCP and UDP TCP TCP

2013 John Wiley & Sons, Inc.

27

Well-Known Port Numbers Used by TCP and UDP


Service Name nntp Port Number Protocol 119 TCP and UDP Function Network News Transfer Protocol; used to post and distribute messages to, and retrieve them from, Usenet servers on the Internet Network Time Protocol; used to exchange time signals for the purpose of synchronizing the clocks in network computers Internet Message Access Protocol version 4; used by email client programs to retrieve messages from a mail server Simple Network Management Protocol (SNMP); used by SNMP agents to transmit status information to a network management console

ntp

123

TCP and UDP

imap

143

TCP and UDP

snmp

161

TCP and UDP

https

443

TCP and UDP

Hypertext Transfer Protocol Over TLS/SSL

2013 John Wiley & Sons, Inc.

28

Transport Layer Data Encapsulation


The TCP header includes a multitude of fields that implement additional services, including:
o Packet acknowledgment: Informs the sender which packets have been delivered successfully. o Error correction: Informs the sender which packets must be retransmitted. o Flow control: Regulates the rate at which the sending system transmits its data.

2013 John Wiley & Sons, Inc.

29

The Upper Layers


The application layer Is the top of the networking stack. Provides the entrance point for programs running on a computer.

2013 John Wiley & Sons, Inc.

30

The Upper Layers

Application layer data encapsulation


2013 John Wiley & Sons, Inc. 31

Connecting to a Network
Lesson 10: Configuring IP Settings

2013 John Wiley & Sons, Inc.

32

Installing Network Support


When Windows 8 detects a network interface adapter in the computer, either during the operating system installation or afterward, it installs a device driver for the adapter, as well as the components of the default networking stack including:
Client for Microsoft Networks QoS Packet Scheduler File and Printer Sharing for Microsoft Networks Microsoft Network Adapter Multiplexor Protocol Microsoft LLDP Protocol Driver Link Layer Topology Discovery Mapper I/O Driver and Link Layer Topology Discovery Responder o Internet Protocol Version 6 (TCP/IPv6) o Internet Protocol Version 4 (TCP/IPv4) o o o o o o

2013 John Wiley & Sons, Inc.

33

Installing Network Support

Windows 8 Networks controls


2013 John Wiley & Sons, Inc. 34

Installing Network Support

Windows 8 Network sharing controls


2013 John Wiley & Sons, Inc. 35

Using the Network and Sharing Center


The Network and Sharing Center is a centralized console that offers technical specialists and system administrators access to most of the major networking tools included with Windows 8. There are several ways to open the Network and Sharing Center:
o Click the Search charm, select Settings, and search for Network and Sharing Center. o From the Desktop, click the Settings charm and click Control Panel. Then click Network and Internet > Network and Sharing Center.
2013 John Wiley & Sons, Inc. 36

Using the Network and Sharing Center

The Network and Sharing Center


2013 John Wiley & Sons, Inc. 37

Network Discovery is an important security concept first introduced in Windows Vista. It enables users to control critical network firewall controls with a single switch. Windows Firewall is a feature that was first introduced in the Windows XP Service Pack 2 release, and it is now included in Windows 8 as well. The default state of the Network Discovery setting is dependent on the network location, as set manually by the user or automatically by the computer.
2013 John Wiley & Sons, Inc.

Understanding Network Discovery

38

Changing the Network Location


After you select the initial network location during the network interface adapter installation, Windows 8 attempts to detect the type of location whenever you connect to a different network. When Windows 8 is unable to detect the network type for any reason, it errs on the side of caution and sets the network location to Public, which is the safest option.
2013 John Wiley & Sons, Inc. 39

Change the Network Location Using Homegroup Troubleshooter

The Troubleshoot and help prevent computer problems page


2013 John Wiley & Sons, Inc. 40

Configure Advanced Sharing

The Change sharing options for different network profiles dialog box
2013 John Wiley & Sons, Inc. 41

Windows 8 creates and configures local area connections automatically, but you can also manage and modify the properties of the connections manually. Each local area connection on a Windows 8 system has a status dialog box that displays real-time information about the connection. At the bottom of the dialog box are buttons that enable you to perform the following tasks:
o Properties o Disable/Enable o Diagnose

Managing Network Connections

2013 John Wiley & Sons, Inc.

42

View Connection Status

The Ethernet Status dialog box


2013 John Wiley & Sons, Inc. 43

View Connection Status

The Network Connection Details dialog box


2013 John Wiley & Sons, Inc. 44

Configuring IPv4 Settings


Most networks today use DHCP to configure the TCP/IP configuration settings of their workstations. DHCP automates the configuration process and prevents the duplication of IP addresses. There are still some situations in which it is desirable or necessary to configure the Windows 8 TCP/IP client manually.
2013 John Wiley & Sons, Inc. 45

Configure IPv4 Settings

The Network Connections window


2013 John Wiley & Sons, Inc. 46

Configure IPv4 Settings

The Internet Protocol Version 4 (TCP/IPv4) Properties sheet


2013 John Wiley & Sons, Inc. 47

Configuring IPv6 Settings


Because most computers use IPv6 autoconfiguration or DHCP, manual configuration of the Windows 8 IPv6 implementation is rarely necessary, but it is possible. The procedure for configuring IPv6 using the graphical interface is the same as that for IPv4, except that, in the Local Area Connection Properties sheet, you select Internet Protocol Version 6 (TCP/IPv6) and click Properties.
2013 John Wiley & Sons, Inc. 48

Configuring IPv6 Settings

The Internet Protocol Version 6 (TCP/IPv6) Properties sheet


2013 John Wiley & Sons, Inc. 49

Running Network Diagnostics


When a networking problem exists, clicking a warning icon launches Windows Network Diagnostics. Problems that the system can diagnose include:
o o o o o o Broken or detached cable connections IP address and subnet mask problems Default gateway problems DNS and DHCP configuration problems Networking hardware configuration problems Internet server addresses and service settings
50

2013 John Wiley & Sons, Inc.

Running Network Diagnostics

Running Windows Network Diagnostics


2013 John Wiley & Sons, Inc. 51

Using TCP/IP Tools


Lesson 10: Configuring IP Settings

2013 John Wiley & Sons, Inc.

52

Using Ipconfig.exe
All Windows operating systems, including Windows 8, have a graphical interface for configuring network connections: a command-line tool called Ipconfig.exe. The value of Ipconfig.exe is particularly apparent when a Windows 8 computer autoconfigures its TCP/IP client or uses DHCP to obtain its IP address and other TCP/IP configuration parameters. In addition to displaying the DHCP-obtained configuration settings, Ipconfig.exe also enables you to manually release the IP address that the system obtained from the DHCP server and renew existing address leases.
2013 John Wiley & Sons, Inc. 53

Using Ipconfig.exe

The Ipconfig.exe display


2013 John Wiley & Sons, Inc. 54

Using Ping.exe
Ping.exe can tell you if the TCP/IP stack of another system on the network is functioning normally. The Ping.exe program generates a series of Echo Request messages using the Internet Control Message Protocol (ICMP) and transmits them to the computer whose name or IP address you specify on the command line.
2013 John Wiley & Sons, Inc. 55

Using Ping.exe

The Ping.exe display


2013 John Wiley & Sons, Inc. 56

Using Tracert.exe
Tracert.exe is a variation on Ping.exe. The program uses ICMP Echo Request and Echo Reply messages just like Ping, but it modifies the messages by changing the value of the TTL field in the IP header. The values in the TTL field prevent packets from getting caught in router loops that keep them circulating endlessly around the internetwork.
2013 John Wiley & Sons, Inc. 57

Using Nslookup.exe
The Nslookup.exe command-line utility enables you to generate DNS request messages and transmit them to specific DNS servers on the network. The advantage of Nslookup.exe is that you can test the functionality and the quality of the information on a specific DNS server by specifying it on the command line.

2013 John Wiley & Sons, Inc.

58

Using Nslookup.exe

The Nslookup.exe display


2013 John Wiley & Sons, Inc. 59

Using Netstat.exe
Netstat.exe is a command-line program that displays status information about
o The current network connections on a computer running Windows 8. o the traffic generated by the various TCP/IP protocols.

In UNIX, the program is called netstat, and in Windows 8, it is called Netstat.exe.

2013 John Wiley & Sons, Inc.

60

Using Netstat.exe

The network connection listing in Netstat.exe


2013 John Wiley & Sons, Inc. 61

Using Netstat.exe

The Ethernet interface statistics in Netstat.exe


2013 John Wiley & Sons, Inc. 62

Using Netstat.exe

The IPv4 and IPv6 routing tables in Netstat.exe


2013 John Wiley & Sons, Inc. 63

Lesson Summary
The networking stack used on Windows 8 computers corresponds roughly to the seven-layer OSI reference model. The OSI (Open Systems Interconnection) reference model consists of seven layers: physical, data-link, network, transport, session, presentation, and application. Ethernet, the data-link layer protocol used on most LANs, consists of physical layer specifications, a frame format, and a MAC mechanism. The network and transport layer protocols work together to provide an end-to-end communication service that achieves the quality of service required by the application requesting network services.

2013 John Wiley & Sons, Inc.

64

Lesson Summary
The functions of the session, presentation, and application layers are often combined into a single application layer protocol. Windows 8 includes support for both the IPv4 and IPv6 protocols. IPv6 increases the IP address space from 32 to 128 bits, simplifies the routing process, and improves address autoconfiguration. Network Discovery is a Windows 8 feature that simplifies the task of firewall configuration by enabling you to block or allow the protocols and ports needed for the computer to browse and access the network. Windows 8 includes a variety of command-line TCP/IP tools, including Ipconfig.exe, Ping.exe, Tracert.exe, Nslookup.exe, and Netstat.exe.
2013 John Wiley & Sons, Inc. 65

Copyright 2013 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the 1976 United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

Vous aimerez peut-être aussi