Title: Bootstrap Protocol (BOOTP)
1Bootstrap Protocol (BOOTP)
- Service that simplifies IP address management
FIGURE 11-12 BOOTP process
- Diskless workstations are workstations that do
not contain any hard disks
2Dynamic Host Configuration Protocol (DHCP)
- Automated means of assigning a unique IP address
to every device on a network - Reasons for implementing DHCP
- Reduce the time and planning spent on IP address
management - Reduce the potential for errors in assigning IP
addresses - Enable users to move their workstations and
printers without having to change their TCP/IP
configuration - Make IP addressing transparent for mobile users
3DHCP Leasing Process
- Lease
- Agreement between DHCP server and client on how
long the client will borrow a DHCP-assigned
address
FIGURE 11-13 DHCP lease agreement
4Terminating a DHCP Lease
- Release
- Act of terminating a DHCP lease
- To release TCP/IP settings in Windows 95
- Click Start, then Run
- In the Run box, type winipcfg, then click OK
FIGURE 11-14 IP Configuration window
5Terminating a DHCP Lease
- To release TCP/IP settings in Windows 95 (cont.)
- In the IP Configuration box, click Release All to
release the DHCP lease - Click OK to accept the confirmation message
6Obtaining a New IP Address on a Windows 95 Machine
- Click Start, then Run
- In the Run box, type winipcfg, then click OK
- In the IP Configuration box, click Renew All to
obtain new TCP/IP from the DHCP server - Click OK to accept the confirmation message
- Click OK to close the IP Configuration box
7Windows Internet Naming Service (WINS)
- Provides a means of resolving NetBIOS names with
IP addresses - WINS offers several advantages
- Guarantees a unique NetBIOS name is used for each
computer on a network - Support for DHCP
- Better network performance
8Configuring a Windows 95 Workstation for WINS
Service
- Right-click Network Neighborhood, then click
Properties in the shortcut menu - In the Network Properties box, click
Configuration - Highlight the TCP/IP protocol in the list of
installed networking components, then click
Properties - Click WINS Configuration
- Click Enable WINS Resolution to establish the
identity of your WINS server
9Configuring a Windows 95 Workstation for WINS
Service
- Type the IP address the your WINS server next to
the Primary WINS Server text box - If you have a second WINS Server, types its IP
address in the spaces provided next to the
Secondary WINS Server text box - Click OK to save changes
- Click OK to exit Network Properties
- Click Yes to restart the computer
10Review of TCP/IP Subprotocols
- Internet Protocol (IP)
- Transport Control Protocol (TCP)
- User Datagram Protocol (UDP)
- Internet Control Message Protocol (ICMP)
- Address Resolution Protocol (ARP)
- Telnet
- File Transfer Protocol (FTP)
- Simple Network Management Protocol (SNMP)
11Reverse Address Resolution Protocol
- Allows the client to send a broadcast message
with the MAC address of a device and receive the
devices IP address in reply
FIGURE 11-15 How RARP works
12Simple Mail Transfer Protocol(SMTP) and Post
Office Protocol (POP)
- SMTP
- Responsible for moving messages from one e-mail
server to another - POP
- Provides centralized storage for e-mail messages
13Internet Mail Access Protocol (IMAP)
- Mail storage and manipulation protocol that
depends on SMTPs transport system - Developed as a more sophisticated alternative to
POP - Most current version is version 4 (IMAP4)
- Biggest advantage of IMAP4 over POP relates to
the fact users can store messages on the mail
server
14Additional Features of IMAP4
- Users can retrieve all or only a portion of any
mail message - Users can review their messages and delete them
while the messages remain on the server - Users can create sophisticated methods of
organizing messages on the server - Users can share a mailbox in a central location
- IMAP4 can provide better security than POP
because it supports authentication
15TCP/IP Troubleshooting
- Packet Internet Groper (PING)
- Troubleshooting utility that can verify TCP/IP is
installed, bound to the NIC, configured
correctly, and communicating with the network - An echo request is a signal sent out to another
computer - An echo reply is the other computers response
signal - Process of sending this signal back and forth is
known as pinging
16Packet Internet Groper (PING)
FIGURE 11-17 Syntax of PING command
17Packet Internet Groper (PING)
FIGURE 11-18 Example of successful and
unsuccessful PING
18Netstat and Nbstat
- Netstat
- Displays statistics and the state of current
TCP/IP connections - Nbstat
- Provides information about NetBIOS names and
their addresses
19Nslookup and Traceroute
- Nslookup
- Allows you to look up the DNS host name of a
network node by specifying its IP address, or
vice versa - Traceroute
- Uses ICMP to trace the path from one networked
node to another - Also known as tracert on Windows machines
20Internet Services
- World Wide Web (WWW)
- Collection of interfaced networks that share
resources and exchange information according to
specific protocols and formats - Browser
- Software that provides clients with a simple,
graphical interface to the Web
21World Wide Web (WWW)
- Uniform Resource Locator (URL)
- Standard means of identifying every Web page
- Unqualified host name
- Host name minus its prefix
22E-mail andFile Transfer Protocol (FTP)
- E-mail
- Currently, e-mail is the most relied-upon
Internet service you will manage - FTP
- Manages files transfers between TCP/IP hosts
23Gopher and Newsgroups
- Gopher
- Allows you to navigate through a series of menus
to find and read specific files - Newsgroups
- Provides means of conveying messages in which
information is distributed to a wide group of
users at once - Network News Transfer Protocol (NNTP)
- Supports process of reading newsgroup messages,
posting new messages, and transferring news files
between news servers
24E-commerce andInternet Telephony
- E-commerce
- Means of conducting business over the Web
- Internet Telephony
- Provision of telephone service over the Internet
- Voice over IP (VoIP)
- Standardization of Internet telephony
25Chapter Summary
- Every device on a TCP/IP-based network must have
a unique IP address to ensure reliable data
delivery - In addition to Class A, B, and C networks, Class
D and E networks exist, although consumers and
companies do not use them - To use IP addresses more efficiently, the concept
of subnetting was applied to the Internet in the
mid-1980s
26Chapter Summary
- Gateways are a combination of software and
hardware that enable two different network
segments to exchange data - A socket is a logical address assigned to a
specific process running on a host computer - The use of port numbers simplifies TCP/IP
communications - Every host belongs to a domain
27Chapter Summary
- In the mid-1980s, the Network Information Center
(NIC) at Stanford Research Institute devised a
hierarchical way of tracking domain names and
their addresses, called the Domain Name System
(DNS) - Dynamic Host Configuration Protocol (DHCP) is an
automated means of assigning a unique IP address
to every device on a network - With DHCP, a device leases an IP address while it
attached to the network
28Chapter Summary
- Windows Internet Naming Service (WINS) provides a
means of resolving NetBIOS names with IP
addresses - TCP/IP is a suite of protocols, commonly called
subprotocols - TCP/IP carries the highest potential of causing
problems because it requires the most planning
and post-installation configuration
29Chapter Summary
- TCP/IP comes with a complete set of
troubleshooting tools that can help you to track
down most TCP/IP-related problems - There are numerous Internet services, including
the World Wide Web, e-mail, File Transfer
Protocol, gopher, newsgroups, e-commerce, and
Internet Telephony