Académique Documents
Professionnel Documents
Culture Documents
Overview
Exam Objective 3.1: Configure IP settings Configure name resolution Connect to a network Configure network locations Resolve connectivity issues
Networking Basics
Lesson 10: Configuring IP Settings
Networking
Networking is one of the primary functions of Windows 8. Most Windows computers are connected to either a private local area network (LAN) or to the Internet, and many are connected to both.
Protocols
Computers on a network communicate using protocols, which are languages that all the computers understand. These protocols operate on different levels, forming what is commonly known as a networking stack or protocol stack. The most common method for illustrating the operations of the networking stack is the Open Systems Interconnection (OSI) reference model, which consists of seven layers.
2013 John Wiley & Sons, Inc. 5
Networking Basics
As you move up beyond the physical layer, the subsequent layers of the OSI model are realized in software, as protocols that provide different types of communications. Ethernet is the protocol responsible for addressing packets at the data-link layer, which it does by surrounding the data it receives from the network layer just above it with a header and footer. This header and footer and the data they contain are collectively called a frame, and the process of applying it is called data encapsulation.
2013 John Wiley & Sons, Inc. 8
10
IP Routing
A router is a device that connects one network to another. When you install a LAN in a home or office and connect it to the Internet, you are actually installing a router that connects your network to another network belonging to an Internet service provider (ISP). To get to their final destination, packets must be passed from router to router, through many different networks.
2013 John Wiley & Sons, Inc. 11
IPv4 Addressing
The current standard for IP is version 4 (IPv4), which defines a 32-bit address space. Each address is split into two parts:
o Network identifier: Specifies the network on which a particular system is located. o Host identifier: Specifies a particular network interface (also called a host) on the network.
12
126
16,777,214
16,384
65,534
2,097,152
254
13
14
Class B
255.255.0.0
Class C
255.255.255.0
15
Assigning IP Addresses
Windows 8 computers can acquire IP addresses in three ways:
o Manual configuration o Dynamic Host Configuration Protocol (DHCP) o Automatic Private IP Addressing (APIPA)
16
17
IPv6 Addressing
IPv6 expands the address space from 32 to 128 bits, which is large enough to provide more than 6.7x1023 addresses for each square meter of the Earths surface. Unlike IPv4 addresses, which use decimal notation, IPv6 addresses use hexadecimal notation, in the form of eight two-byte values, separated by colons:
XX:XX:XX:XX:XX:XX:XX:XX
18
IPv6 Transition
Windows 8, by default, installs support for both IPv4 and IPv6 addressing when it detects a network interface adapter in the computer. Microsoft refers to this as Windows 8s dual IP stack.
19
IPv6 Transition
IP data encapsulation
2013 John Wiley & Sons, Inc. 22
23
24
TCP and UDP SSH (Secure Shell) Remote Login Protocol; used to security log on to a computer from another computer on the same network and execute commands
telnet
Smtp
23
25
TCP
TCP
26
68 80 110
27
ntp
123
imap
143
snmp
161
https
443
28
29
30
Connecting to a Network
Lesson 10: Configuring IP Settings
32
33
Network Discovery is an important security concept first introduced in Windows Vista. It enables users to control critical network firewall controls with a single switch. Windows Firewall is a feature that was first introduced in the Windows XP Service Pack 2 release, and it is now included in Windows 8 as well. The default state of the Network Discovery setting is dependent on the network location, as set manually by the user or automatically by the computer.
2013 John Wiley & Sons, Inc.
38
The Change sharing options for different network profiles dialog box
2013 John Wiley & Sons, Inc. 41
Windows 8 creates and configures local area connections automatically, but you can also manage and modify the properties of the connections manually. Each local area connection on a Windows 8 system has a status dialog box that displays real-time information about the connection. At the bottom of the dialog box are buttons that enable you to perform the following tasks:
o Properties o Disable/Enable o Diagnose
42
52
Using Ipconfig.exe
All Windows operating systems, including Windows 8, have a graphical interface for configuring network connections: a command-line tool called Ipconfig.exe. The value of Ipconfig.exe is particularly apparent when a Windows 8 computer autoconfigures its TCP/IP client or uses DHCP to obtain its IP address and other TCP/IP configuration parameters. In addition to displaying the DHCP-obtained configuration settings, Ipconfig.exe also enables you to manually release the IP address that the system obtained from the DHCP server and renew existing address leases.
2013 John Wiley & Sons, Inc. 53
Using Ipconfig.exe
Using Ping.exe
Ping.exe can tell you if the TCP/IP stack of another system on the network is functioning normally. The Ping.exe program generates a series of Echo Request messages using the Internet Control Message Protocol (ICMP) and transmits them to the computer whose name or IP address you specify on the command line.
2013 John Wiley & Sons, Inc. 55
Using Ping.exe
Using Tracert.exe
Tracert.exe is a variation on Ping.exe. The program uses ICMP Echo Request and Echo Reply messages just like Ping, but it modifies the messages by changing the value of the TTL field in the IP header. The values in the TTL field prevent packets from getting caught in router loops that keep them circulating endlessly around the internetwork.
2013 John Wiley & Sons, Inc. 57
Using Nslookup.exe
The Nslookup.exe command-line utility enables you to generate DNS request messages and transmit them to specific DNS servers on the network. The advantage of Nslookup.exe is that you can test the functionality and the quality of the information on a specific DNS server by specifying it on the command line.
58
Using Nslookup.exe
Using Netstat.exe
Netstat.exe is a command-line program that displays status information about
o The current network connections on a computer running Windows 8. o the traffic generated by the various TCP/IP protocols.
60
Using Netstat.exe
Using Netstat.exe
Using Netstat.exe
Lesson Summary
The networking stack used on Windows 8 computers corresponds roughly to the seven-layer OSI reference model. The OSI (Open Systems Interconnection) reference model consists of seven layers: physical, data-link, network, transport, session, presentation, and application. Ethernet, the data-link layer protocol used on most LANs, consists of physical layer specifications, a frame format, and a MAC mechanism. The network and transport layer protocols work together to provide an end-to-end communication service that achieves the quality of service required by the application requesting network services.
64
Lesson Summary
The functions of the session, presentation, and application layers are often combined into a single application layer protocol. Windows 8 includes support for both the IPv4 and IPv6 protocols. IPv6 increases the IP address space from 32 to 128 bits, simplifies the routing process, and improves address autoconfiguration. Network Discovery is a Windows 8 feature that simplifies the task of firewall configuration by enabling you to block or allow the protocols and ports needed for the computer to browse and access the network. Windows 8 includes a variety of command-line TCP/IP tools, including Ipconfig.exe, Ping.exe, Tracert.exe, Nslookup.exe, and Netstat.exe.
2013 John Wiley & Sons, Inc. 65
Copyright 2013 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the 1976 United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.