Title: Implementing, Configuring, and Troubleshooting Networking Problems
1Chapter 2
- Implementing, Configuring, and Troubleshooting
Networking Problems
2Learning Objectives
- Describe the history of the TCP/IP protocol stack
- Identify TCP/IP addresses, classes, and subnet
masks - Create a subnetting scheme for a given TCP/IP
network address - Define and assign static and dynamic TCP/IP
addresses to Windows 2000 machines
continued
3Learning Objectives
- Establish TCP/IP packet filtering
- Troubleshoot TCP/IP using command-line tools
- Describe the IPX/SPX protocol stack and frame
types - Install and configure NWLink IPX/SPX
- Optimize networking protocol bindings
4Protocol Stack
- Group of protocols that work together to complete
the network communication process - Two most common protocol stacks
- TCP/IP
- IPX/SPX
5Transmission Control Protocol/Internet Protocol
- TCP
- Transport layer protocol in the TCP/IP protocol
stack - Connection-oriented and reliable
- Provides guaranteed delivery
- IP
- Connectionless, best-effort delivery protocol in
the TCP/IP protocol stack - Handles routing of data and logical addressing
with IP addresses
6TCP/IP
- Runs majority of all major networks
- Created before the OSI model
- Does not follow the seven-layer model
- Does use a four-layer model that is related to
the OSI model
7TCP/IP Versus OSI Model
8TCP/IP Architecture
9Protocols within theTCP/IP Model
- File Transfer Protocol (FTP)
- Allows TCP/IP hosts to exchange files between one
another - Uses TCP as its transport protocol
connection-oriented and reliable - Trivial File Transfer Protocol (TFTP)
- Allows hosts to exchange files between one
another - Uses UDP as its transport protocol
connectionless and unreliable
continued
10Protocols within the TCP/IP Model
- Telnet
- Allows a host to log into a remote system and run
applications and processes on the remote system - Simple Mail Transfer Protocol (SMTP)
- The basis for all Internet mail
- Provides mail delivery services for the TCP/IP
protocol stack
continued
11Protocols within theTCP/IP Model
- Transmission Control Protocol (TCP)
- Connection-oriented and reliable
- Sacrifices speed to ensure reliable, error-free
transmission of data - User Datagram Protocol (UDP)
- Connectionless, unreliable
- Stresses speed over reliability
continued
12Protocols within theTCP/IP Model
- Internet Control Message Protocol (ICMP)
- Handles communication error messages
- Internet Group Management Protocol (IGMP)
- Provides functionality for multicasting
- Internet Protocol (IP)
- Connectionless, layer three protocol
- Determines proper routing within multiple networks
continued
13Protocols within theTCP/IP Model
- Address Resolution Protocol (ARP)
- Maps a known IP address to a Media Access Control
(MAC) layer address - Local area network (LAN) and wide area network
(WAN) technologies - Nearly all work with TCP/IP
continued
14Protocols within theTCP/IP Model
- Connection-oriented protocols
- Guarantee that packets arrive intact, in
sequence, and without errors - Sacrifice speed for reliability
- Connectionless protocols
- Send packets without regard for guaranteed
delivery - Sacrifice reliability for speed
15TCP/IP Addressing
- IP addresses
- Consist of 32 bits normally expressed either as
four binary octets separated by periods or as
four sets of decimal numbers separated by periods - Example of binary octets 11000000.10101000.00001
100.00001000 - Example of dotted decimal 192.168.12.8
- Contain a network ID and a host ID
16TCP/IP Classes
- Five different classes of IP addresses
- First three reserve a certain portion of the 32
bits available for the network ID and the host ID - Last two are used in special situations only
17TCP/IP Classes
18Subnet Masks
- 32-bit numbers used to determine the portion of
an IP address that represents the network ID and
the host ID - Place a 1 in bit positions that correspond to
network ID bits and a zero in bits that represent
host ID bits - The host can perform a logical AND function to
determine if a destination IP address is on a
local network or a remote network
19Subnet Masks
20Subnetting
- Process of borrowing host bits to increase the
number of network bits - Allows administrators to better utilize IP
networks that are either assigned to them from
the Internet Assigned Numbers Authority (IANA) or
that they decide to use from the public address
space defined by Request for Comments (RFC) 1918
21Subnetting Steps
- Determine number of subnets needed
- Determine number of bits you can borrow
continued
22Subnetting Steps
- Determine number of bits you must borrow to get
needed number of subnets - Turn on borrowed bits and determine decimal value
- Determine new subnet mask
- Find host/subnet variable
- Determine range of addresses
23Methods for Assigning IP Addresses
- Static assignment
- Manually assign an IP address to a host
- Dynamic assignment
- Configure a host to obtain an IP address
automatically using DHCP (Dynamic Host
Configuration Protocol)
24Static IP Addresses
- Most work-intensive method
- Manual configuration of IP address at each
machine - Manual configuration of DNS settings
- Allows greatest control over address assignment
25Assigning Static IP Addresses
- Access the properties for your local area
connections
26Assigning Static IP Addresses
27Assigning Static IP Addresses
- Click Internet Protocol and click the Properties
button
28Assigning Static IP Addresses
29Assigning Static IP Addresses
- Click the Use the following IP address radio
button
30Assigning Static IP Addresses
31Assigning Static IP Addresses
32Dynamic IP Addresses
- Much less labor intensive
- Saves time
- Requires an installed and properly configured
DHCP server on the network
33Configuring a DynamicIP Address
34TCP/IP Packet Filtering
- Allows control of the types of incoming IP
traffic that all network interface cards in a
machine will process - Windows 2000 provides rudimentary packet
filtering that is usually only implemented if no
other type of packet filtering is utilized
35TCP/IP Packet Filtering
36TCP/IP Packet Filtering
37Troubleshooting TCP/IP
- Command-line tools included in Windows 2000
- ipconfig
- ping (Packet Internet Groper)
- tracert (trace route)
- netstat
- nbtstat
- netdiag
- pathping
38Troubleshooting TCP/IP
- Run ipconfig /all
- Ping the loopback to find out if TCP/IP has been
loaded - Ping the local IP address
- Ping a host on the same network
- Ping a remote host
39ipconfig
- Verifies IP settings
- Most used command line switches
- ipconfig /all
- ipconfig /release
- ipconfig /renew
- ipconfig /registerdns
40ping
- Test connectivity with remote hosts
- Has many command line switches (eg, -t, -l)
41tracert
- Tests and displays the path between two TCP/IP
hosts on the same network or different networks
42Output from tracert Command
43netstat
- Displays a list of current TCP/IP connections
44nbtstat
- Checks NetBIOS over TCP/IP configurations and
settings
45netdiag
- Gives administrators access to a wealth of
information about current network configurations
of a machine - Has many switches (eg, /fix)
46pathping
- Combines the best of tracert with ping, providing
detailed statistics about the connection between
two hosts
47IPX/SPX
- IPX/SPX Internetwork Packet eXchange/Sequenced
Packet eXchange - Uses an 80-bit address format consisting of a
network.node format - Example 200.0020.7811.4a62
- Supports four frame types
48Novell Supported Frame Types
49IPX/SPX Architecture
50Main Protocols of the IPX/SPX Protocol Stack
- Internetwork Packet eXchange (IPX)
- Connectionless, layer three protocol that
provides routing function for the IPX/SPX
protocol stack - Similar in function to IP
- Sequenced Packet eXchange (SPX)
- Layer four protocol that provides guaranteed
delivery for the connectionless IPX protocol - Similar in function to TCP
continued
51Main Protocols of the IPX/SPX Protocol Stack
- Service Advertisement Protocol (SAP)
- An upper-layer protocol (layers 5, 6, and 7) used
by clients to find network services and by
servers to advertise network services - NetWare Core Protocol (NCP)
- Primary upper-layer protocol (layers 4, 5, 6, and
7) that facilitates client/server interaction - Handles basic file and print sharing,
authentication services, and directory services
continued
52Main Protocols of the IPX/SPX Protocol Stack
- Routing Information Protocol (RIP)
- An integrated, distance-vector, routing protocol
provided with the IPX/SPX protocol stack - Functions at layer 3 of the OSI model
- NetWare Link State Protocol (NLSP)
- More advanced link state routing protocol
- Designed to replace RIP
- Functions at layer 3 of the OSI model
53Installing and Configuring NWLink IPX/SPX
- Access the Local Area Connection Properties
- Access the Select Network Component Type dialog
box - Manually assign frame types and network number,
if required
54Installing and Configuring NWLink IPX/SPX
55Installing and Configuring NWLink IPX/SPX
56Installing and Configuring NWLink IPX/SPX
57Installing and Configuring NWLink IPX/SPX
58Network Protocol Bindings
- Process of associating or connecting a particular
protocol or service to a network adapter card - Rules for optimizing protocol bindings
- Move most-used protocols up in the protocol
binding order - Remove unused bindings
59Optimizing Protocol Bindings
60Optimizing Protocol Bindings
61Optimizing Protocol Bindings
62Chapter Summary
- Transmission control protocol/Internet protocol
(TCP/IP) - TCP/IP addressing
- TCP/IP classes
- Subnet masks
- Subnetting
- Static and dynamic TCP/IP addresses
continued
63Chapter Summary
- TCP/IP packet filtering
- Installing, configuring, and troubleshooting
TCP/IP - Internetwork packet eXchange/sequenced packet
eXchange (IPS/SPX) - Installing, configuring, and troubleshooting
NWLink IPX/SPX - Optimizing network protocol bindings