This document provides an overview of implementing IPv4, including:
- Lessons on TCP/IP protocols, IPv4 addressing, subnetting, and configuration/troubleshooting of IPv4
- Formatting IPv4 addresses using dotted decimal notation and relating this to binary numbers
- Classifying IPv4 addresses as private or public and examples of simple/complex IPv4 implementations
- Benefits of subnetting like segmenting traffic and techniques for calculating subnet/host addresses
- Tools for configuring and troubleshooting IPv4 like Windows PowerShell, Ping, Tracert, and Message Analyzer
Module 3: Configuring and Troubleshooting DNS
This module introduces you to Domain Name System (DNS), which is the foundation name service in Windows Server 2008 R2. It is vital that you understand how to deploy, configure, manage, and troubleshoot this critical service.
Lessons
Installing the DNS Server Role
Configuring the DNS Server Role
Configuring DNS Zones
Configuring DNS Zone Transfers
Managing and Troubleshooting DNS
Lab : Configuring and Troubleshooting DNS
Selecting a DNS Configuration
Deploying and Configuring DNS
Troubleshooting DNS
After completing this module, students will be able to:
Install the DNS server role.
Configure the DNS server role.
Create and configure DNS zones.
Configure zone transfers.
Manage and troubleshoot DNS.
SSDN Technology is a training institute located in Delhi Gurgaon, NCR & India which offer best MCSA - SQL SERVER 2012 training by our experienced trainer. We are providing live project training with full lab facility. For more details for a bright future call us at +91-9999-111-686.
http://www.ssdntech.com/sql-server-training.aspx
MCSA Installing & Configuring Windows Server 2012 70-410omardabbas
Highlights of the main topics requested for the 70-410 exam, covering main subjects with some info and details about most points and minor subjects requested
Module 3: Configuring and Troubleshooting DNS
This module introduces you to Domain Name System (DNS), which is the foundation name service in Windows Server 2008 R2. It is vital that you understand how to deploy, configure, manage, and troubleshoot this critical service.
Lessons
Installing the DNS Server Role
Configuring the DNS Server Role
Configuring DNS Zones
Configuring DNS Zone Transfers
Managing and Troubleshooting DNS
Lab : Configuring and Troubleshooting DNS
Selecting a DNS Configuration
Deploying and Configuring DNS
Troubleshooting DNS
After completing this module, students will be able to:
Install the DNS server role.
Configure the DNS server role.
Create and configure DNS zones.
Configure zone transfers.
Manage and troubleshoot DNS.
SSDN Technology is a training institute located in Delhi Gurgaon, NCR & India which offer best MCSA - SQL SERVER 2012 training by our experienced trainer. We are providing live project training with full lab facility. For more details for a bright future call us at +91-9999-111-686.
http://www.ssdntech.com/sql-server-training.aspx
MCSA Installing & Configuring Windows Server 2012 70-410omardabbas
Highlights of the main topics requested for the 70-410 exam, covering main subjects with some info and details about most points and minor subjects requested
Konsep pembangunan tapak web & laman webAhmad Faizar
Untuk mengetahui konsep-konsep asas pembanguan sesebuah tapak & laman web
Menyediakan satu tapak & laman web dengan menggunakan aplikasi web page editor
Menghantar web page yang telah siap ke laman web percuma
8-Lect_8 Addressing the Network.tcp.pptxZahouAmel1
Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing
Similar to Microsoft Offical Course 20410C_05 (20)
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
2. Module Overview
• Overview of TCP/IP
• Understanding IPv4 Addressing
• Subnetting and Supernetting
• Configuring and Troubleshooting IPv4
3. Lesson 1: Overview of TCP/IP
• The TCP/IP Protocol Suite
• Protocols in the TCP/IP Suite
• TCP/IP Applications
• What Is a Socket?
4. The TCP/IP Protocol Suite
Network Interface Ethernet
Mobile
broadbandWi-Fi
Application HTTP FTP SMTP
DNS POP3 SNMP
TCP/IP Protocol Suite
Transport TCP UDP
Internet IPv6IPv4
ARP IGMP
ICMP
5. Protocols in the TCP/IP Suite
TCP/IP Protocol SuiteTCP/IPOSI
TCP UDP
Ethernet
Mobile
broadband
Wi-Fi
Application
Transport
Network
Interface
Application
Presentation
Session
Transport
Network
Data Link
Physical
Internet IPv6IPv4
ARP IGMP
ICMP
HTTP DNS
FTP POP3
SMTP SNMP
7. What Is a Socket?
A socket is a combination of an IP address, a transport
protocol, and a port
TCP/IP Protocol Suite
TCP/UDP
IPv6IPv4
HTTP (80)
HTTPS (443)
POP3 (110)
SMTP (25)
DNS (53)
FTP (21)
8. Lesson 2: Understanding IPv4 Addressing
• IPv4 Addressing
• Public and Private IPv4 Addresses
• How Dotted Decimal Notation Relates to Binary
Numbers
• Simple IPv4 Implementations
• More Complex IPv4 Implementations
9. IPv4 Addressing
• Each networked computer must be assigned a unique IPv4
address
• Network communication for a computer is directed to the IPv4
address of the computer
• Each IPv4 address contains:
Network ID, identifying the network
Host ID, identifying the computer
• The subnet mask identifies which part of the IPv4 address is
the network ID (255) and the host ID (0)
IP address 172 16 0 10
Subnet mask 255 255 0 0
Network ID 172 16 0 0
Host ID 0 0 0 10
10. IPv4 Addressing
Subnet 1
Dotted decimal representation
of the address and subnet mask
An IPv4 configuration identifies a computer to other computers on a network
IP Address: 192.168.1.181
Subnet mask: 255.255.255.0
IP Address: 192.168.1.180
Subnet mask: 255.255.255.0
IP Address: 192.168.1.182
Subnet mask: 255.255.255.0
11. IPv4 Addressing
Subnet 2
Subnet 1
Dotted decimal representation
of the address and subnet mask
Default gateway defines the
preferred router
An IPv4 configuration identifies a computer to other computers on a network
IP Address: 192.168.1.181
Subnet mask: 255.255.255.0
IP Address: 192.168.1.180
Subnet mask: 255.255.255.0
IP Address: 192.168.1.182
Subnet mask: 255.255.255.0
IP Address: 192.168.2.201
Subnet mask: 255.255.255.0
IP Address: 192.168.2.202
Subnet mask: 255.255.255.0
IP Address: 192.168.2.200
Subnet mask: 255.255.255.0
12. Public and Private IPv4 Addresses
Private
• Not routable on the
Internet
• 10.0.0.0/8
• 172.16.0.0/12
• 192.168.0.0./16
• Can be assigned locally
by organization
• Must be translated to
access the Internet
Public
• Required by devices and
hosts that connect directly
to the Internet
• Must be globally unique
• Routable on the Internet
• Must be assigned by
IANA/RIR
13. How Dotted Decimal Notation Relates to
Binary Numbers
Dotted decimal notation is based on the decimal number
system, but computers use IP addresses in binary
• Within an 8-bit octet, each bit position has a decimal value
• A bit that is set to 0 always has a zero value
• A bit that is set to 1 can be converted to a decimal value
• The low-order bit represents a decimal value of 1
• The high-order bit represents a decimal value of 128
• If all bits in an octet are set to 1, then the octet’s decimal
value is 255, the highest possible value of an octet:
• 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1
14. How Dotted Decimal Notation Relates to
Binary Numbers
8-Bit Octet
Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0
15. How Dotted Decimal Notation Relates to
Binary Numbers
8-Bit Octet
27 26 25 24 23 22 21 20
Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0
16. How Dotted Decimal Notation Relates to
Binary Numbers
Decimal Value
8-Bit Octet
128 64 32 16 8 4 2 1
27 26 25 24 23 22 21 20
Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0
17. Simple IPv4 Implementations
Network ID Host ID
1 1 0
xw y z
Network ID Host ID
1 0
xw y z
Network
ID
Host ID
0
xw y z
Class C (/24)
Small Network
Class B (/16)
Medium
Network
Class A (/8)
Large
Network
19. Lesson 3: Subnetting and Supernetting
• How Bits Are Used in a Subnet Mask or Prefix
Length
• The Benefits of Using Subnetting
• Calculating Subnet Addresses
• Calculating Host Addresses
• Discussion: Creating a Subnetting Scheme for a
New Office
• What Is Supernetting?
20. 1 0 Network ID Host ID
0 65,534
Subnet ID1 0 Network ID Host ID
2 32,766
Subnet ID1 0 Network ID Host ID
4 16,382
Subnet ID1 0 Network ID Host ID
8 8,190
Subnet ID1 0 Network ID Host ID
16 4,094
Subnet ID1 0 Network ID Host ID
32 2,046
Subnet ID1 0 Network ID Host ID
64 1,022
Subnet ID1 0 Network ID Host ID
128 510
Subnet ID1 0 Network ID Subnet ID Host ID
256 254
Class B Address with Subnet
How Bits Are Used in a Subnet Mask or Prefix Length
21. The Benefits of Using Subnetting
By using subnets, you can:
• Use a single network address across multiple
locations
• Reduce network congestion by segmenting
traffic
• Increase security by using firewalls
• Overcome limitations of current technologies
When you subdivide a network into subnets, you
create a unique ID for each subnet that is derived
from the main network ID
22. Calculating Subnet Addresses
When determining subnet addresses you should:
• Choose the number of subnet bits based on the
number of subnets required
• Use 2n to determine the number of subnets
available from n bits
For five locations, the following three subnet bits
are required:
• 5 locations = 5 subnets required
• 22 = 4 subnets (not enough)
• 23 = 8 subnets
23. Calculating Host Addresses
When determining host addresses you should:
•Choose the number of host bits based on the
number of hosts that you require on each
subnet
•Use 2n-2 to determine the number of hosts
that are available on each subnet
For subnets with 100 hosts, seven host bits are
required:
• 26-2 = 62 hosts (not enough)
• 27-2 = 126 hosts
24. Discussion: Creating a Subnetting Scheme for a
New Office
• How many subnets are required?
• How many bits are required to create that
number of subnets?
• How many hosts are required on each subnet?
• How many bits are required to allow that
number of hosts?
• What is an appropriate subnet mask to meet
these needs?
20 minutes
25. What Is Supernetting?
• Supernetting combines multiple small networks
into a larger network
• The networks that you are combining must be
contiguous
• The following table shows an example of
supernetting two class C networks
Network Range
192.168.00010000.00000000/24 192.168.16.0 - 192.168.16.255
192.168.00010001.00000000/24 192.168.17.0 - 192.168.17.255
192.168.00010000.00000000/23 192.168.16.0 - 192.168.17.255
26. Lesson 4: Configuring and Troubleshooting IPv4
• Configuring IPv4 Manually
• Configuring IPv4 Automatically
• Using Windows PowerShell Cmdlets to
Troubleshoot IPv4
• IPv4 Troubleshooting Tools
• The IPv4 Troubleshooting Process
• What Is Microsoft Message Analyzer?
• Demonstration: How to Capture and Analyze
Network Traffic by Using Microsoft Message
Analyzer
28. Configuring IPv4 Manually
Example using the netsh command-line tool:
Netsh interface ipv4 set address name="Local Area
Connection" source=static addr=10.10.0.10
mask=255.255.255.0 gateway=10.10.0.1
Examples using Windows PowerShell cmdlets:
Set-DNSClientServerAddresses –InterfaceAlias
“Local Area Connection”
–ServerAddresses 10.12.0.1,10.12.0.2
New-NetIPAddress –InterfaceAlias “Local Area
Connection” –IPAddress 10.10.0.10
-PrefixLength 24 –DefaultGateway 10.10.0.1
29. Configuring IPv4 Automatically
DHCP Server with
IPv4 Scope
IPv4 DHCP Client
Set-NetIPInterface –InterfaceAlias "Local Area
Connection" –Dhcp Enabled
Restart-NetAdapter –Name "Local Area Connection"
Code example:
An APIPA address on an interface indicates that a
DHCP server could not be contacted
30. Using Windows PowerShell Cmdlets to
Troubleshoot IPv4
For network configuration and troubleshooting in
Windows Server 2012 and earlier versions, use:
• Command-line tools
• Windows PowerShell cmdlets
In earlier versions of Windows Server:
• Windows PowerShell required using Windows
Management Instrumentation (WMI) objects
• WMI objects are not as easy to use as native
Windows PowerShell cmdlets
31. Using Windows PowerShell Cmdlets to
Troubleshoot IPv4
Some of the new Windows PowerShell cmdlets:
Get-NetAdapter
Restart-NetAdapter
Get-NetIPInterface
Get-NetIPAddress
Get-NetRoute
Get-NetConnectionProfile
Get-DNSClientCache
Get-DNSClientServerAddress
Register-DnsClient
Set-DnsClient
Set-DnsClientGlobalSetting
Set-DnsClientServerAddress
Set-NetIPAddress
Set-NetIPv4Protocol
Set-NetIPInterface
Test-Connection
Test-NetConnection
Resolve-Dnsname
32. IPv4 Troubleshooting Tools
Use the following tools to troubleshoot IPv4:
• Ipconfig
• Ping
• Tracert
• Pathping
• Telnet
• Netstat
• Resource Monitor
• Windows Network Diagnostics
• Event Viewer
33. The IPv4 Troubleshooting Process
After you identify the scope of the problem, use the
following tools to troubleshoot network connectivity:
Step Windows PowerShell Command-line
tool
Identify the network
path between hosts
Test-NetConnection -TraceRoute tracert
Verify the network
configuration is correct
Get-NetIPAddress ipconfig
See if the remote host
responds
Test-NetConnection ping
Test the service on a
remote host
Use an application such as Internet Explorer
See if the default
gateway responds
Test-NetConnection ping
34. What Is Microsoft Message Analyzer?
Capture
message
data
Import
message
data
Save
message
data
View
message
data
Filter
message
data
Create
charts
from
captured
data
You can use Microsoft Message Analyzer to perform
the following network analysis tasks:
35. Demonstration: How to Capture and Analyze Network
Traffic by Using Microsoft Message Analyzer
In this demonstration, you will see how to:
• Start a new Capture/Trace in Microsoft Message
Analyzer
• Capture packets from a ping request
• Analyze the captured network traffic
• Filter the network traffic
37. Lab Scenario
You have recently accepted a promotion to
the server support team. One of your first
assignments is configuring the infrastructure
service for a new branch office.
After a security review, your manager has asked
you to calculate new subnets for the branch office
to support segmenting network traffic. You also
need to troubleshoot a connectivity problem on a
server in the branch office.
38. Lab Review
• Why is variable-length subnetting required in this
lab?
• Which Windows PowerShell cmdlet can you use to
view the local routing table of a computer instead
of using route print?
39. Module Review and Takeaways
• Review Questions
• Best Practices
• Common Issues and Troubleshooting Tips
• Tools