Dundas TCP/IP v4.0 C

Dundas TCP/IP v4.0 C

Dundas TCP/IP v4.0 C

Dundas TCP/IP v4.0 C

Connecting to and Setting up a Network

Presentation on theme: "Connecting to and Setting up a Network"— Presentation transcript:

1 Connecting to and Setting up a Network
Chapter 9Connecting to and Setting up a Network

2 ObjectivesLearn about the TCP/IP protocols and standards Windows uses for networkingLearn how to connect a computer to a networkLearn how to configure and secure a multifunction router on a local network

3 Understanding TCP/IP and Windows Networking
Communications between computers happens on three levelsHardwareOSApplicationSteps involved in the communication processOne computer finds anotherBoth computers agree on the methods and rules for communicating (protocals)One computer takes on the role of the client and the other of the server, client/server mode.

4 Layers of Network Communication
When two devices communicate, they must use the same protocols (language)Almost all networks today use a group or suite of protocols known as TCP/IP (Transmission Control Protocol/Internet Protocol)

5 Layers of Network Communication
Data is broken up into segments and each segment is put into a packetA packet contains the data and information that identifies the type of data, where it came from, and where it is going

6 Level 1: Hardware level Root level of communication
Wireless or network cablesPhone lines or TV cable linesIncludes the network adapter and MAC addressMAC (media access control) address is a unique 48-bit hexadecimal number hard-coded on the card by the manufacturerAlso known as hardware address, physical address, adapter address, or Ethernet addressOnly used on local netowrks.

7 Level 2: Operating system level
Manages communication between itself and another computer using TCP/IPUses IP addressing - a 32-bit (IPv4) or 128 (IPv6) -bit string that is assigned to a network connection when the connection is first madeUsed to find computers any where onThe InternetIntranets - any private network that uses TCP/IP protocolsSubnets - several local networks tied together in a subsystem of the a large intranet

8 Level 3: Application level
Most applications used on the Internet or a local network are client/server applicationsClient applications, such asInternet ExplorerGoogle Chrome,OutlookCommunicate with server applications such asa web serverserver

9 Level 3: Application level
Port numberUniquely identifies computer applicationEach client and server application installed on a computer listens at a predetermined address that uniquely identifies the application on the computer.ExamplesPort 25 is inboundPort 80 internet

10 Level 3: Application level
SocketIP address followed by a colon and port numberexample: :25Web server example: :80If a client computer sends a request to :25, the server that is listening at that port responds.If a request is sent to :80, the web server listening at port 80 responds

11 OS adds the IP address for your computer 136.60.30.5 OS
APPLICATIONMicrosofts webserver is listening at Port 80 senses the packet is addressed for port 80 and processes the packetAPPLICATIONBrowser ApplicationRequestsPort 80ApplicationPacket – http protocalOSOS adds the IP address for your computerOSOS receives the packet with the sender and receiver informationHARDWARENetwork Card send packet information out over a netwrokHARDWARENetwork Card receives packet information from a netwrok based on Microsoft IP addressINTERNET

12 How IP Addresses Get Assigned
A MAC address is embedded on a network adapter at a factoryIP addresses are assigned manually or by softwareStatic IP address: manually and permanently assigned to a computer or deviceDynamic IP address: assigned by a server each time the device connects to the networkA DHCP (dynamic host configuration protocol) server assigns addresses to a DHCP client that is requesting an address

13 How IP Addresses Get Assigned
An IP address has 32 or 128 bitsInternet Protocol version 4 (IPv4) – uses a 32-bit address to identify a network connectionCurrently a shortage of IPv4 IP addressesInternet Protocol version 6 (IPv6) was created partly due to the shortage of IPv4 addressesUses 128-bit IP addressInternet Assigned Numbers Authority (IANA) is responsible for keeping track of assigned IP addresses

14 How IPv4 IP Addresses Are Used
IP address: 32 bits long, made up of 4 groups, each 8 bits longFour decimal numbers separated by periodsLargest possible 8-bit number(255 decimal)Largest possible decimal IP addressbinaryOctet: each of the four decimal numbers0 to 255, 4.3 billion potential IP addressesBinary to decimal converter at

15 How IPv4 IP Addresses Are Used
IP address identifies network and hostClasses are based on the number of possible IP addresses in each network within each classClass A addresses:First octet identifies the network and last three can be used to identify the hostThe second, third and fourth octets are use to identigy clients on the network or subnets which means that there can be up to 16 million IP address on this network.Using 87 as the network octetA client address would be

16 How IPv4 IP Addresses Are Used
Class B addresses:First two octets identify the network and last two can be used to identify the host or submetsThe third and fourth octets are use to identigy clients on the network or subnets which means that there can be up to 65 thousand IP address on this network.Using as the network octetsA client address would be

17 How IPv4 IP Addresses Are Used
Class C addresses:First three octets identify the network and the last octet can be used to identify the hostThe fourth octet is use to identigy clients on the network or subnets which means that there can be up to 256 IP address on this network.Using as the network octetA client address would be

18 How IPv4 IP Addresses Are Used

19 How IPv4 IP Addresses Are Used
Class D addresses: octets 224 through 239MulticastingClass E addresses: octets 240 through 254Research

20 How IPv4 IP Addresses Are Used
A few IP addresses are reserved for special use by TCP/IP and should not be assigned to a device

21 How IPv4 IP Addresses Are Used
Subnets using IPv4Large networks can and should be divided into smaller networks called subnetworks or subnetsTo divide a network into subnets, you designate part of the host portion of the IP address as a subnetThe subnet mask identifies which part of an IP address is the network id and which is the host idSubnet masks help a device know if an IP address is part of it’s network or belongs to another

22 How IPv4 IP Addresses Are Used
If you don’t divide a network into subnets, the default subnet mask is usedThis is called a classful subnet mask because the network portion of the IP address aligns with the class license.

23 How IPv4 IP Addresses Are Used
A network is divided into a subnet when the subnet mask takes some of the host portion for the network IDExample: Dividing into 256 subnetsThe subnet mask would be instead ofTherefore, an address of with a subnet mask of yields:Network id =Host id = 34.56

24 How IPv4 IP Addresses Are Used
Public IP addresses: available to the InternetPrivate IP addresses: used on private network (not allowed on the Internet)A computer using a private IP address on a private network can still access the Internet ifrouter or other device that stands between the network and the Internet is using NAT (Network Address Translation).NAT is a TCP/IP protocol that substitutes the public IP address of the router for the private IP address of the other computer when these computers need to communicate on the Internet.

25 How IPv4 IP Addresses Are Used
IEEE recommends that the following IP addresses be used for private networks:throughthroughthrough

26 How IPv6 IP Addresses Are Used
IPv6 address has 128 bits written as 8 blocks of hexadecimal numbers separated by colonsExample: 2001:0000:0B80:0000:0000:00D3:9C5A:00CCEach block is 16 bitsFor example, the first block in the address above is 2001 in hex, which can be written as in binaryLeading 0s in a 4-character hex block can be eliminated. For example, the IP address above:2001:0000:B80:0000:0000:D3:9C5A:CCIf blocks contain all zeros, they can be written as double colons. From IP address above:2001:0000:B80::D3:9C5A:CCOnly one set of double colons is used

27 How IPv6 IP Addresses Are Used
Terms used in the IPv6 standards:Link (local link): a local area network (LAN) or wide area network (WAN) bound by routersInterface: node’s attachment to a link can be logical or physicalphysical attachment uses a network adapter or wireless connectionLogical attachment is used for tunneling (used by IPv6 to transport IPv6 packets over an IPv4 network)Interface ID: last 64 bits or 4 blocks of an IP address identify the interfaceNeighbors: two or more nodes on the same link

28 How IPv6 IP Addresses Are Used
Three tunneling protocols for IPv6 packets to travel over an IPv4 network:ISATAP (Intra-Site Automatic Tunnel Addressing Protocol)Teredo – addresses intended to be used by this protocol always begin with the same 32-bit prefix (called fixed bits) which is 20016TO4 – older protocol being replaced by Teredo or ISATAP

29 How IPv6 IP Addresses Are Used
Three types of IPv6 addresses:Unicast address: packets are delivered to a single node on a networkMulticast address: packets are delivered to all nodes on a networkAnycast address: used by routers; identifies multiple destinations and packets are delivered to the closest destination

30 How IPv6 IP Addresses Are Used
There are three types of unicast addresses:Global unicast (global address): can be routed on the InternetMost begin with the prefix 2000::/3The /3 indicates the first three bits are fixed and always 001Link-local unicast (link-local or local address): can be used for communicating with nodes in same linkMost begin with FE80::/64Begins FE80 followed by enough zeros to make 64 bitsUnique local address (ULA): identifies a specific site within a large organizationPrefixes are FC00::/7 and FD00::/8

31 View IP Address Settings
Use the ipconfig command in a command prompt window to show the IPv4 and IPv6 addresses assigned to all network connectionsIPv6 addresses are followed by a % sign and a numberThe number is called the zone ID or scope ID and is used to identify the interface in a list of interfaces of a computer

32

33

34 Character-based Names Identify Computers and Networks
Character-based names: substitute for IP addressesHost name (computer name): name of a computerWorkgroup name: identifies a workgroup on peer to peer networks.Domain name: identifies a networkExample mycompany.comMycompany identities the network.com is the the top level domain identifier.

35 Character-based Names Identify Computers and Networks
Character-based names: substitute for IP addressesFully qualified domain name (FQDN): identifies computer and network to which it belongsExample www. mycompany.comwww is a web servermycompayn is domain name.com is the top level domain.On the Internet, a fully qualified domain name must be associated with an IP address before this computer can be foundUses name resolution – the process of associating a character-based name with an IP addressDNS server finds IP address when FDQN known

36 TCP/IP Protocol Layers

37 TCP/IP Protocols Used By The OS
TCP (Transmission Control Protocol)Connection-oriented protocolChecks whether data is received and resends if it is notWhen a TCP packet reaches destination, an acknowledgement (ack) is sent back to the sourceIf source does not receive ack, it resends the dataUsed by Web browsers andUDP (User Datagram Protocol)Connectionless protocol (best-effort)Used for broadcasting and streaming video

38 TCP/IP Protocols Used By Applications
HTTP (Hypertext Transfer Protocol) - is the protocol used for the World Wide Web and used by web browsers and web servers to communicate – port 80HTTPS (HTTP secure) protocol – port 443HTTP protocol working with a security protocol such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS), which is better than SSL, to create a secured socketused by web browsers and servers to encrypt the data before it is sent and then decrypt it before the data is processed.

39 TCP/IP Protocols Used By Applications
SMTP (Simple Mail Transfer Protocol) port 25Used to to authenticate a user to an server when the client first tries to connect to the server to sendThen send messageSMTP AUTH (SMTP Authentication) is used.POP and IMAP – port 110 (POP3)Delivery of messageTelnet – port 23Remotely control a computerNot considered secure.

40 TCP/IP Protocols Used By Applications
LDAP (Lightweight Directory Access Protocol) – port 389Used by clients when an application needs to query a databaseSMB (Server Message Block) – port 139Used by Windows to share files and printersFTP (File Transfer Protocol) – port 20 (data)Transfer files between two computersCan use browsers, Windows Explorer, or third party software to transfer files using FTP

41 TCP/IP Protocols Used By Applications
SSH (Secure Shell) – port 22Used to pass login information to a remote computer and control that computer over a networkSFTP (Secure FTP) – port 115Uses encryption to transfer filesSNMP (Simple Network Management Protocol) – port 161Used to monitor network trafficRDP (Remote Desktop Protocol) – port 3389Used by the Windows Remote Desktop and Remote Assistance utilities to connect to and control a remote computer

42 Connecting A Computer To A Network
Quick and easy in most situationsTopics coveredConnecting to a network using Ethernet, wireless, and dial-up connections

43 Connect To a Wired Network
Steps1. Install network adapter2. Connect network cable to Ethernet RJ-45 port and network port (wall jack, router, switch)Verify lights3. Windows assumes dynamic IP addressingAutomatically configures the network connection4. Verify Internet connectivity

44 Connect To a Wired Network
TroubleshootingVerify Device Manager recognizes adapter without errorsIf error occurs, try updating NIC driversIf adapter has no errors, open Network and Sharing CenterA red X indicates a problemClick X to start Windows Network DiagnosticsAfter Windows has resolved the problemShould see a clear path from the computer to the Internet

45

46 Connect To a Wired Network
Follow these steps to verify and change TCP/IP settings:Click Change adapter settings in the Network and Sharing CenterIn Network Connections window, right-click local area connection and select Properties from Shortcut menuSelect TCP/IPv4 and click PropertiesDefault setting is dynamic IP addressingTo change to static select Use the following IP addressEnter IP address, subnet mask, and default gateway

47 Connect To a Wired Network
Follow these steps to verify and change TCP/IP settings: (cont’d)If you have the IP addresses of DNS servers, check Use the following DNS server addresses and enter up to two IP addressesIf using a laptop that moves from one network to another and one network uses static:Click Alternate Configuration and select User configured to enter static IP address informationIf General tab is configured for dynamic, computer will first try to use that but will apply static if dynamic is not available

48 Connect To a Wired Network
Follow these steps to verify and change TCP/IP settings: (cont’d)Close all boxes and windows and try to access network resourcesIf still don’t connect, try to disable and enable the network connection

49 Connect To a Wireless Network
Wireless networks typesunsecured public hotspots or secured private hotspotsSteps to connect to a wireless network using Windows 7:Install wireless adapterEmbedded wireless: turn on wireless deviceA yellow star in the network icon on taskbar indicates hotspots are availableEnter the security key or password and click OK

50 Connect To a Wireless Network
Steps to connect to a wireless network using Windows 7: (cont’d)If network is unsecured, verify that Windows has configured the network as a Public networkTest the connectionFor some hotspots, a home page appears and you must enter a code or agree to the terms of use

51 Connect To a Wireless Network
Wireless networks are created using access pointsMethods used by access points to secure wireless networks:A security key is requiredSSID is not broadcastedSSID (Service Set Identifier) = nameOnly computers with registered MAC addresses are allowed to connectTo find out the MAC address of a computer use the ipconfig /all command

52 Connect To a Wireless WAN (Cellular) Network
Needed to connect to a wireless wide area network (WWAN):Hardware and softwareSubscriber Identification Module (SIM) card: flash memory card that contains all information you need to connect to a cellular network:Password and other authentication informationEncryption standardsServices that your subscription includes

53

54 Connect To a Wireless WAN (Cellular) Network
Options for hardware and software:Use an embedded mobile broadband modemTether your cell phone to your computerUse a USB broadband modem

55 Connect To a Wireless WAN (Cellular) Network
How to connect to a cellular network:Using an embedded broadband modem: insert the SIM card provided by your mobile operatorAlso need to use software either provided by your OS or your mobile operatorUsing your cell phone: install software provided by mobile operator and tether your phone to your computerUse a USB broadband modem: Ensure SIM card is inserted in the device then insert the modem into a USB portWindows finds the device and software installed on the device automatically runs

56 Connect To a Wireless WAN (Cellular) Network

57 Create A Dial-Up Connection
Bare-bones installation stepsInstall internal or external dial-up modemPlug phone line into PC modem port and wall jackOpen Network and Sharing Center window, click Set up a connection or network, select Set up a dial-up connection, click NextEnter ISP information, click Connect

58 Create A Dial-Up Connection
To use the connectionGo to Network and Sharing CenterClick Connect to a networkSelect dial-up connection, click Connect, click DialYou will hear modem dial up the ISP and make the connection

59 Create A Dial-Up Connection
Troubleshooting tips:Verify phone line and modem are workingCheck Dial-up Connection Properties box for errorsDial the number manually from a phoneTry another phone numberListen for number being dialedRemove and reinstall dial-up connection

60 Setting Up A Multifunction Router For A SOHO Network
In order to setup a SOHO (small office or home office) network you need to know:How to configure a multipurpose routerStands between the network and the InternetHow to set up and secure a wireless access pointMost SOHO routers are also a wireless access point

Источник: [https://torrent-igruha.org/3551-portal.html]
, Dundas TCP/IP v4.0 C

Information Technology

If you are having problems connecting to the campus network via Ethernet, you should make sure your network adapter is configured properly. Note: The following instructions are for on-campus connections only. Off-campus users may need to contact their Internet Service Provider (ISP) or the IT Help Center.

As of fall 2011, all residence halls at UMass Amherst have been equipped with state-of-the-art wireless Internet access. Wired Ethernet connections are not available in these buildings. For more information, please see the Wireless in Residence Halls Installation Project page. 

TCP/IP on Windows 7, 8, 8.1 & 10

  1. Go to Start > Control Panel > Network and Internet > Network and Sharing Center, then in the left-hand column, click Manage network connections.
  2. Right-click Local Area Connections and select Properties.
    Note: The name of this connection may vary if you have changed it or if you have previously connected to other wired Ethernet networks.
  3. Windows 7 might present you with a User Account Control window asking you for permission to continue. Click Continue to move on. A Local Area Connection Properties window will open.
  4. In the Connection Properties window, under This connection uses the following items:, select Internet Protocol Version 4(TCP/IPv4), then click Properties and make sure that Obtain an IP address automatically and Obtain DNS server address automatically are selected.
  5. If TCP/IP does not appear on the list under This connection uses the following items:, you must install it.
    • Click Install.
    • In the Select Network Feature Type window, select Protocol and click Add...
    • In the Select Network Protocol window, choose TCP/IP and click OK, then follow any on-screen directions.

TCP/IP on Windows Vista

Note: UMass Amherst IT no longer offers support for Windows Vista. 

  1. Go to Start > Control Panel > Network and Internet > Network and Sharing Center, then in the left-hand column, click Manage network connections.
  2. Right-click Local Area Connections and select Properties.
    Note: The name of this connection may vary if you have changed it or if you have previously connected to other wired Ethernet networks.
  3. Windows Vista might present you with a User Account Control window asking you for permission to continue. Click Continue to move on. A Local Area Connection Properties window will open.
  4. In the Connection Properties window, under This connection uses the following items:, select Internet Protocol Version 4(TCP/IPv4), then click Properties and make sure that Obtain an IP address automatically and Obtain DNS server address automatically are selected.
  5. If TCP/IP does not appear on the list under This connection uses the following items:, you must install it.
    • Click Install.
    • In the Select Network Feature Type window, select Protocol and click Add...
    • In the Select Network Protocol window, choose TCP/IP and click OK, then follow any on-screen directions.

TCP/IP on Windows XP

Note: UMass Amherst IT no longer offers support for Windows XP.

  1. Go to Start > Control Panel > Network Connections.
  2. Right-click Local Area Connection, then click Properties and select the Networking tab.
  3. In the Local Area Connection Properties window, under This connection uses the following items:, select Internet Protocol (TCP/IP), then click Properties and make sure that Obtain an IP address automatically and Obtain DNS server address automatically are selected.
  4. If TCP/IP does not appear on the list under This connection uses the following items:, you must install it.
    • Click Install.
    • In the Select Network Component Type window, select Protocol and click Add...
    • In the Select Network Protocol window, choose TCP/IP and click OK, then follow any on-screen directions.

TCP/IP on Mac OS X

  1. Go to Apple Menu > System Preferences. The System Preferences window will open.
  2. In the System Preferences window, under Internet & Wireless, click Network.
  3. In the Network window:
    • In the Location drop-down window, select Automatic.
    • Select Ethernet (at left).
    • From the Configure IPv4 drop-down menu, select Using DHCP. DNS Server and Search Domains information will auto-populate.
  4. If DNS Server and Search Domains information do not auto-populate, click Advanced. The Ethernet window will appear.
  5. In the Ethernet window, on the TCP/IP tab, from the Configure IPv4 drop-down menu, select Automatically (if not already selected), then click OK.
  6. Click Apply, then close the Network window.
Источник: [https://torrent-igruha.org/3551-portal.html]
Dundas TCP/IP v4.0 C

Comwp-contentuploads201902Untitled-1-1. png?resize1962C140amp;ssl1"divpWinThruster Crack 2020 Free Download  WinThruster Crack is a professional software for PC and MAC. Additionally, with the application WinThruster Keygen, you can fixes all the issues and problems in your devices in just a few clicks. Also, You can optimize your performance and upgrade system speed with this software. Moreover, for the best performance… Read More raquo;pdivCategory: ANDROID APPSANTIVIRUSMACOFFICEOTHERSWINDOWSTags: how to remove winthruster, winthruster, WinThruster 1.

.

What’s New in the Dundas TCP/IP v4.0 C?

Screen Shot

System Requirements for Dundas TCP/IP v4.0 C

Add a Comment

Your email address will not be published. Required fields are marked *