Managing Network connections
description
Transcript of Managing Network connections
![Page 1: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/1.jpg)
Managing Network connections
![Page 2: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/2.jpg)
Network Cabling
![Page 3: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/3.jpg)
Ethernet Topology
• Bus topology– Connects each node in a line– Has no central connection point
• Star topology– Connects all nodes to a centralized hub– More popular; easier to maintain
![Page 4: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/4.jpg)
Ethernet Topology
![Page 5: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/5.jpg)
Ethernet Using Star Topology
![Page 6: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/6.jpg)
Ethernet Using Star Bus Topology
![Page 7: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/7.jpg)
Repeaters
![Page 8: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/8.jpg)
Wireless LANs (WLANs)
• Make connections using a wireless NIC• Communicate directly or connect to a LAN by way of
a wireless access point (AP)• Popular where cables are difficult to install• Slower than wired networks• Security is an issue• Standards– 1999 IEEE 802.11b (Wi-Fi, AirPort)– Bluetooth
![Page 9: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/9.jpg)
Bridges and Switches• Bridges
– Send broadcast messages; not good for large networks
– Effective at separating high-volume areas on a LAN
– Work best when used to connect LANs that usually do not communicate outside their immediate network
• Switches– Send a packet only to network
segment for which it is destined
![Page 10: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/10.jpg)
Bridges Compared with Switches
![Page 11: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/11.jpg)
MAC Addresses
• Unique addresses that are permanently embedded in a NIC and identify a device on a LAN
• Expressed as six pairs of hexadecimal numbers and letters
• A local address• Used at the lowest (physical) networking level for
NICs and other devices on the same network to communicate
![Page 12: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/12.jpg)
12
Architectural Overview of the TCP/IP
12
![Page 13: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/13.jpg)
The TCP/IP Protocols
• The TCP/IP protocols – Provide networking connectivity support for
computers (called hosts) on LANs and WANs – Follow a set of standards for how computers
communicate and how networks are interconnected
– Follow the four-layer Department of Defense (DOD) model
![Page 14: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/14.jpg)
14
Internet Protocol
• Internet Protocol (IP) does the actual delivery of datagrams.
• IP adds the following header fields to each packet:
Source IP Address Destination IP Address Protocol
Checksum Time to Live (TTL)
![Page 15: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/15.jpg)
15
IP Addressing
• Every host on a TCP/IP network must have a unique IP address (a 32-bit number that identifies both the host and the network the host is located on).
• IP addresses are expressed in dotted-decimal format, such as 192.168.123.132.
• Each set of four dotted-decimal numbers represents eight bits of the binary address. – The addresses range from 00000000 to 11111111,
or, in decimal notation, from 0 to 255.
![Page 16: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/16.jpg)
16
IP Addressing (Cont.) • An IP address is accompanied by a subnet mask.• The subnet mask, when compared to the IP address,
identifies the part of the IP address that is the network identifier and the part that is the host identifier.– The 1s identify network bits and the 0s identify host bits.– In the subnet mask 255.255.0.0, the first 16 bits (2 octets)
are the equivalent of all ones in binary form.• The first two octets of the IP address are the network identifier.• The last two octets represent the host identifier.
![Page 17: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/17.jpg)
17
IP Address Classes
![Page 18: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/18.jpg)
18
IP Address Ranges for Private Networks
Class Network Addresses
A 10.0.0.0 through 10.255.255.255
B 172.16.0.0 through 172.31.255.255
C 192.168.0.0 through 192.168.255.255
![Page 19: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/19.jpg)
19
Using Ipconfig.exe
• Use Ipconfig.exe to view the TCP/IP configuration settings on a host, including IP address, subnet mask, and default gateway. – At the command prompt, type ipconfig or ipconfig
/all and then press Enter.– Use the /all parameter to display more
information.• Running Ipconfig is an easy way to view the IP
address and other parameters that the DHCP server has assigned to your computer.
![Page 20: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/20.jpg)
20
Using Ping
• Ping is a command-line utility that uses Echo Request messages to determine if the TCP/IP stack of another computer on the network is functioning normally.
• From a command prompt, type ping target (where target is the IP address or the name [DNS or NetBIOS, Example ping www.google.co.in] of the computer you are trying to contact).– A successful ping results in several reply messages from the
target computer.– If the ping fails, one or both computers might have a
networking hardware or software problem.
– Example c:\> ping 192.168.1.2
![Page 21: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/21.jpg)
21
Using Traceroute
• Tracert.exe, a variant of Ping, displays the path that packets take to their destination.
• From a command prompt, type tracert target (where target is the IP address or the name [DNS or NetBIOS] of the target computer).
• Use Tracert.exe to isolate the location of a network communications problem, particularly when a router is suspected.
• Example C:\> tracert.exe 192.168.1.2
![Page 22: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/22.jpg)
22
Using Pathping • Pathping is a route tracing tool that
– Sends packets to each router on the way to a final destination over a period of time
– Computes results based on the packets returned from each hop• You can use Pathping.exe to isolate problems because it
shows the degree of packet loss at any given router or link.
• From the command line, type pathping target (where target is the IP address or the name [DNS or NetBIOS] of the target computer).
• Example C:\> pathping.exe 192.168.1.2
![Page 23: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/23.jpg)
23
Using Route.exe (Cont.)
• The ROUTE PRINT command displays the current contents of the routing table.
• To create a new entry, use ROUTE ADD with parameters that specify the values for the entry.
• Example C:\> route.exe 192.168.1.2
![Page 24: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/24.jpg)
24
Using Route.exe
• Use Route.exe to create, delete, or modify static routes in a routing table on a computer running Windows 2000.
• Route.exe uses the following syntax:ROUTE [-f] [-p][command[destination] [MASK netmask] [gateway] [METRIC metric] [IF interface]]
• The Route.exe command variable takes one of four values:
PRINT ADD
DELETE CHANGE
![Page 25: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/25.jpg)
25
Using Arp.exe
• IP uses ARP to discover the hardware address that each datagram is transmitted to.
• Resolved addresses are stored in an ARP cache.• Use Arp.exe to view or change the contents of the ARP
cache.• Arp.exe uses the following syntax:
ARP [-a {ipaddress}] [-n ipaddress] [-s ipaddress hwaddress {interface}] [-d ipaddress {interface}]
![Page 26: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/26.jpg)
26
Using Netstat.exe
• Netstat.exe is a Windows 2000 command-line utility that displays information about – The current network connections of a computer
using TCP/IP – The traffic generated by various TCP/IP protocols
• Netstat.exe uses the following syntax: NETSTAT [interval] [-a] [-p protocol] [-n] [-e] [-r] [-s]
![Page 27: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/27.jpg)
27
Using Nbtstat.exe
• Nbtstat.exe is a Windows 2000 command-line utility that displays information about the NetBIOS over TCP/IP connections used by Windows 2000 when communicating with other Windows computers on a TCP/IP LAN.
• Nbtstat.exe uses the following syntax:NBTSTAT [-a name] [-A ipaddress] [-c] [-n] [-r] [-R] [-s] [-S] [-RR]
• The parameters for Nbtstat.exe are case-sensitive.
![Page 28: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/28.jpg)
28
Using Nslookup.exe
• Nslookup.exe is a Windows 2000 command-line utility that enables you to generate DNS request messages and transmit them to a specific DNS server on the network.
• Nslookup.exe uses the following syntax:
NSLOOKUP DNSname DNSserver– DNSname specifies the DNS name you want to
resolve.– DNSserver specifies the DNS name (or IP address
of the DNS server) you want to query for the name you want to resolve.
![Page 29: Managing Network connections](https://reader034.fdocuments.in/reader034/viewer/2022051517/568157c9550346895dc554e3/html5/thumbnails/29.jpg)
Try your own…
LEARN , LEAP , LEAD…