SlideShare a Scribd company logo
1 of 22
IT Networking for Application Developers Presenter: Roy Kim [email_address] blog: roykimsharepoint.wordpress.com
Agenda ,[object Object],[object Object],[object Object],[object Object],[email_address] [email_address]
Benefits of Networking Knowledge ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[email_address] [email_address]
Network Diagram DMZ Internet [email_address] [email_address] Switch Hosts Router Subnet Firewall Security
Network Fundamentals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[email_address] [email_address]
Network Fundamentals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[email_address] [email_address]
Network Fundamentals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[email_address] [email_address]
TCP/IP Protocol Suite ,[object Object],[object Object],[email_address] [email_address]
Hosts: TCP/IP Configuration IP Address MAC Address Subnet Mask Default Gateway DNS Server DHCP Enabled DHCP Server 192.168.1.100 00-50-56-C0-00-01 255.255.255.0 192.168.1.1 192.168.2.101 Yes 192.168.2.200 [email_address] [email_address]
Subnetting DMZ Internet Subnet Mask 255.255.255.192  or CIDR /26 Network ID 192.168.1.0 10.21.128.1 [email_address] [email_address] 192.168.1.128 192.168.1.0 192.168.1.64 192.168.1.2 192.168.1.3 192.168.1.4 192.168.1.5 Hosts: 192.168.1.66-126 Hosts: 192.168.1.29-190 192.168.1.1 192.168.1.65 192.168.1.129
[object Object],[email_address] [email_address] Binary form Dot-decimal notation IP address 11000000.10101000.00000101.10000010 192.168.5.130 Subnet mask 11111111.11111111.11111111.00000000 255.255.255.0 Network prefix 11000000.10101000.00000101.00000000 192.168.5.0 Host part 00000000.00000000.00000000.10000010 0.0.0.130 Binary form Dot-decimal notation IP address 11000000.10101000.00000101.10000010 192.168.5.130 Subnet mask 11111111.11111111.11111111. 11 000000 255.255.255.192 Network prefix 11000000.10101000.00000101.10000000 192.168.5.128 Host part 00000000.00000000.00000000.00000010 0.0.0.2
Troubleshooting Areas ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[email_address] [email_address]
Troubleshooting Connectivity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[email_address] [email_address]
[object Object],[email_address] [email_address]
Troubleshooting Connectivity ,[object Object],[object Object],[object Object],[email_address] [email_address]
Troubleshooting Connectivity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[email_address] [email_address]
Troubleshooting Connectivity ,[object Object],[object Object],[object Object],[object Object],[object Object],[email_address] [email_address]
Troubleshooting Connectivity ,[object Object],[object Object],[object Object],[email_address] [email_address]
Troubleshooting Host Name Resolution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[email_address] [email_address]
Troubleshooting  Firewall Rules ,[object Object],[object Object],[object Object],[object Object],[object Object],[email_address] [email_address]
Troubleshooting  TCP Ports ,[object Object],[object Object],[object Object],[email_address] [email_address]
Tools Summary [email_address] [email_address] Tool Description Arp Allows viewing and editing of the Address Resolution Protocol (ARP) cache. Hostname Displays the host name of the computer. Ipconfig Displays the current TCP/IP configuration for both IPv4 and IPv6. Also used to manage Dynamic Host Configuration Protocol (DHCP)-allocated IPv4 address configurations, display or flush the DNS client resolver cache, and register DNS names. Netsh Configuration tool for many network services. For each network service, there is a context containing commands specific for that service. For the  netsh interface ip  contexts, displays and administers TCP/IP protocol settings on either the local computer or a remote computer. Netstat Displays protocol statistics and information on current TCP connections. Nslookup Performs DNS queries and displays the results. Ping Sends Internet Control Message Protocol (ICMP) Echo or Internet Control Message Protocol for IPv6 (ICMPv6) Echo Request messages to test reachability. Route Allows viewing of the IPv4 and IPv6 routing tables and editing of the IPv4 routing table. Tracert Sends ICMP Echo or ICMPv6 Echo Request messages to trace the network route taken by IPv4 or IPv6 packets to a specific destination. Pathping Sends ICMP Echo or ICMPv6 Echo Request messages to trace the route an IPv4 or IPv6 packet takes to a destination and displays information on packet losses for each router and link in the path. Event Viewer Records errors and events. Performance Logs and Alerts Logs TCP/IP core protocol performance and sends alerts (the SNMP service must be installed). Network Monitor Captures and displays the contents of TCP/IP packets sent to and from computers running Windows Server 2003. Telnet Tests TCP connection establishment between two nodes.

More Related Content

What's hot

5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IPHameda Hurmat
 
Link i pv4
Link i pv4Link i pv4
Link i pv4NARESH A
 
Sharing your-internet-connection-on-linux
Sharing your-internet-connection-on-linuxSharing your-internet-connection-on-linux
Sharing your-internet-connection-on-linuxjasembo
 
Dhcp & dhcp relay agent in cent os 5.3
Dhcp & dhcp relay agent in cent os 5.3Dhcp & dhcp relay agent in cent os 5.3
Dhcp & dhcp relay agent in cent os 5.3Sophan Nhean
 
06 coms 525 tcpip - dhcp and dns
06   coms 525 tcpip - dhcp and dns06   coms 525 tcpip - dhcp and dns
06 coms 525 tcpip - dhcp and dnsPalanivel Kuppusamy
 
Domain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTPDomain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTPsaurav kumar
 
Bootstrapping with bootp and dhcp
Bootstrapping with bootp and dhcpBootstrapping with bootp and dhcp
Bootstrapping with bootp and dhcpAshish Malik
 
DNS server config on cisco packet tracer
DNS server config on cisco packet tracerDNS server config on cisco packet tracer
DNS server config on cisco packet tracerArjun Das
 
Network testing and debugging
Network testing and debuggingNetwork testing and debugging
Network testing and debuggingSADEED AMEEN
 
DNS windows server(2008R2) & linux(SLES 11)
DNS windows server(2008R2) & linux(SLES 11)DNS windows server(2008R2) & linux(SLES 11)
DNS windows server(2008R2) & linux(SLES 11)Tola LENG
 
Jingle: Cutting Edge VoIP
Jingle: Cutting Edge VoIPJingle: Cutting Edge VoIP
Jingle: Cutting Edge VoIPmattjive
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionMahmmoud Mahdi
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesRubal Sagwal
 
Content Navigation
Content NavigationContent Navigation
Content Navigationsanjoysanyal
 

What's hot (18)

5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
Link i pv4
Link i pv4Link i pv4
Link i pv4
 
Sharing your-internet-connection-on-linux
Sharing your-internet-connection-on-linuxSharing your-internet-connection-on-linux
Sharing your-internet-connection-on-linux
 
Dhcp & dhcp relay agent in cent os 5.3
Dhcp & dhcp relay agent in cent os 5.3Dhcp & dhcp relay agent in cent os 5.3
Dhcp & dhcp relay agent in cent os 5.3
 
06 coms 525 tcpip - dhcp and dns
06   coms 525 tcpip - dhcp and dns06   coms 525 tcpip - dhcp and dns
06 coms 525 tcpip - dhcp and dns
 
Module17 nat v2
Module17 nat v2Module17 nat v2
Module17 nat v2
 
Domain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTPDomain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTP
 
Tcpip Intro
Tcpip IntroTcpip Intro
Tcpip Intro
 
Bootstrapping with bootp and dhcp
Bootstrapping with bootp and dhcpBootstrapping with bootp and dhcp
Bootstrapping with bootp and dhcp
 
DNS server config on cisco packet tracer
DNS server config on cisco packet tracerDNS server config on cisco packet tracer
DNS server config on cisco packet tracer
 
Lession4 Dhcp
Lession4 DhcpLession4 Dhcp
Lession4 Dhcp
 
Network testing and debugging
Network testing and debuggingNetwork testing and debugging
Network testing and debugging
 
DNS windows server(2008R2) & linux(SLES 11)
DNS windows server(2008R2) & linux(SLES 11)DNS windows server(2008R2) & linux(SLES 11)
DNS windows server(2008R2) & linux(SLES 11)
 
Jingle: Cutting Edge VoIP
Jingle: Cutting Edge VoIPJingle: Cutting Edge VoIP
Jingle: Cutting Edge VoIP
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Content Navigation
Content NavigationContent Navigation
Content Navigation
 

Viewers also liked

SharePoint 2013 Hosted App Presentation by Roy Kim
SharePoint 2013 Hosted App Presentation by Roy KimSharePoint 2013 Hosted App Presentation by Roy Kim
SharePoint 2013 Hosted App Presentation by Roy KimRoy Kim
 
SharePoint Hosted Add-in with AngularJS and Bootstrap
SharePoint Hosted Add-in with AngularJS and BootstrapSharePoint Hosted Add-in with AngularJS and Bootstrap
SharePoint Hosted Add-in with AngularJS and BootstrapRoy Kim
 
Deep Learning in Azure
Deep Learning in AzureDeep Learning in Azure
Deep Learning in AzureJulian Lee
 
Chief Data Officer: Customer Analytics Innovation
Chief Data Officer: Customer Analytics InnovationChief Data Officer: Customer Analytics Innovation
Chief Data Officer: Customer Analytics InnovationCraig Milroy
 
NoSQL no Azure - Azure Tech Nights - 2017
NoSQL no Azure - Azure Tech Nights - 2017NoSQL no Azure - Azure Tech Nights - 2017
NoSQL no Azure - Azure Tech Nights - 2017Renato Groff
 
Data Science Capability Framework
Data Science Capability FrameworkData Science Capability Framework
Data Science Capability FrameworkCraig Milroy
 
Docker For Azure Deployment Walkthrough
Docker For Azure Deployment WalkthroughDocker For Azure Deployment Walkthrough
Docker For Azure Deployment WalkthroughTimothy Wong
 
TCN on Air: Everything You Were Told about How to Build a Board was Wrong
TCN on Air: Everything You Were Told about How to Build a Board was WrongTCN on Air: Everything You Were Told about How to Build a Board was Wrong
TCN on Air: Everything You Were Told about How to Build a Board was WrongThe Capital Network
 
Trabacus v2 an introduction
Trabacus v2   an introductionTrabacus v2   an introduction
Trabacus v2 an introductionPavan Manvi
 
The Capital Network - Working with angel groups
The Capital Network - Working with angel groupsThe Capital Network - Working with angel groups
The Capital Network - Working with angel groupsThe Capital Network
 
Best Uses of Social Media in Healthcare
Best Uses of Social Media in HealthcareBest Uses of Social Media in Healthcare
Best Uses of Social Media in HealthcareMichele Affronte
 
Industry Uses of HHS Data
Industry Uses of HHS DataIndustry Uses of HHS Data
Industry Uses of HHS DataDavid Portnoy
 
Chief Data Officer: Evolution to the Chief Analytics Officer and Data Science
Chief Data Officer: Evolution to the Chief Analytics Officer and Data ScienceChief Data Officer: Evolution to the Chief Analytics Officer and Data Science
Chief Data Officer: Evolution to the Chief Analytics Officer and Data ScienceCraig Milroy
 
Chief Data Officer: DataOps - Transformation of the Business Data Environment
Chief Data Officer: DataOps - Transformation of the Business Data EnvironmentChief Data Officer: DataOps - Transformation of the Business Data Environment
Chief Data Officer: DataOps - Transformation of the Business Data EnvironmentCraig Milroy
 
Azure IaaS Server Lifecycle Presentation
Azure IaaS Server Lifecycle PresentationAzure IaaS Server Lifecycle Presentation
Azure IaaS Server Lifecycle PresentationDaniel Toomey
 
Setting Up a Windows Network
Setting Up a Windows NetworkSetting Up a Windows Network
Setting Up a Windows NetworkAmir Villas
 

Viewers also liked (20)

SharePoint 2013 Hosted App Presentation by Roy Kim
SharePoint 2013 Hosted App Presentation by Roy KimSharePoint 2013 Hosted App Presentation by Roy Kim
SharePoint 2013 Hosted App Presentation by Roy Kim
 
SharePoint Hosted Add-in with AngularJS and Bootstrap
SharePoint Hosted Add-in with AngularJS and BootstrapSharePoint Hosted Add-in with AngularJS and Bootstrap
SharePoint Hosted Add-in with AngularJS and Bootstrap
 
Deep Learning in Azure
Deep Learning in AzureDeep Learning in Azure
Deep Learning in Azure
 
Chief Data Officer: Customer Analytics Innovation
Chief Data Officer: Customer Analytics InnovationChief Data Officer: Customer Analytics Innovation
Chief Data Officer: Customer Analytics Innovation
 
Service Fabric
Service FabricService Fabric
Service Fabric
 
NoSQL no Azure - Azure Tech Nights - 2017
NoSQL no Azure - Azure Tech Nights - 2017NoSQL no Azure - Azure Tech Nights - 2017
NoSQL no Azure - Azure Tech Nights - 2017
 
Data Science Capability Framework
Data Science Capability FrameworkData Science Capability Framework
Data Science Capability Framework
 
Docker For Azure Deployment Walkthrough
Docker For Azure Deployment WalkthroughDocker For Azure Deployment Walkthrough
Docker For Azure Deployment Walkthrough
 
Azure WorkshopPart1 Intro
Azure WorkshopPart1   IntroAzure WorkshopPart1   Intro
Azure WorkshopPart1 Intro
 
TCN on Air: Everything You Were Told about How to Build a Board was Wrong
TCN on Air: Everything You Were Told about How to Build a Board was WrongTCN on Air: Everything You Were Told about How to Build a Board was Wrong
TCN on Air: Everything You Were Told about How to Build a Board was Wrong
 
Trabacus v2 an introduction
Trabacus v2   an introductionTrabacus v2   an introduction
Trabacus v2 an introduction
 
Working The Network
Working The NetworkWorking The Network
Working The Network
 
The Capital Network - Working with angel groups
The Capital Network - Working with angel groupsThe Capital Network - Working with angel groups
The Capital Network - Working with angel groups
 
Best Uses of Social Media in Healthcare
Best Uses of Social Media in HealthcareBest Uses of Social Media in Healthcare
Best Uses of Social Media in Healthcare
 
Industry Uses of HHS Data
Industry Uses of HHS DataIndustry Uses of HHS Data
Industry Uses of HHS Data
 
Chief Data Officer: Evolution to the Chief Analytics Officer and Data Science
Chief Data Officer: Evolution to the Chief Analytics Officer and Data ScienceChief Data Officer: Evolution to the Chief Analytics Officer and Data Science
Chief Data Officer: Evolution to the Chief Analytics Officer and Data Science
 
Chief Data Officer: DataOps - Transformation of the Business Data Environment
Chief Data Officer: DataOps - Transformation of the Business Data EnvironmentChief Data Officer: DataOps - Transformation of the Business Data Environment
Chief Data Officer: DataOps - Transformation of the Business Data Environment
 
Azure IaaS Server Lifecycle Presentation
Azure IaaS Server Lifecycle PresentationAzure IaaS Server Lifecycle Presentation
Azure IaaS Server Lifecycle Presentation
 
Setting Up a Windows Network
Setting Up a Windows NetworkSetting Up a Windows Network
Setting Up a Windows Network
 
USES OF THE COMPUTER NETWORK
USES OF THE COMPUTER NETWORKUSES OF THE COMPUTER NETWORK
USES OF THE COMPUTER NETWORK
 

Similar to Networking For Application Developers by Roy Kim

DNS server packet tracer
DNS server packet tracerDNS server packet tracer
DNS server packet tracerJalalMiah5
 
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.Louis Göhl
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image DvdSusan Cox
 
DNS Server configuration in cisco packet tracer
DNS Server configuration in cisco packet tracerDNS Server configuration in cisco packet tracer
DNS Server configuration in cisco packet tracerShovonKumar1
 
DNS server configuration in packet tracer
DNS server configuration in packet tracerDNS server configuration in packet tracer
DNS server configuration in packet tracerprodhan999
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCP
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCPKonfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCP
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCPWalid Umar
 
Dns server configuration
Dns server configurationDns server configuration
Dns server configurationGolam Sadeque
 
Dns server converted
Dns server convertedDns server converted
Dns server convertedmariymmithila
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
Bt0076, tcp ip
Bt0076, tcp ipBt0076, tcp ip
Bt0076, tcp ipsmumbahelp
 
Bt0076, tcp ip
Bt0076, tcp ipBt0076, tcp ip
Bt0076, tcp ipsmumbahelp
 
c bstatC nslookupDefault Server pdc.corp.example.comAdd.pdf
c bstatC nslookupDefault Server pdc.corp.example.comAdd.pdfc bstatC nslookupDefault Server pdc.corp.example.comAdd.pdf
c bstatC nslookupDefault Server pdc.corp.example.comAdd.pdfannaelctronics
 
Asas Pelayaran Internet
Asas Pelayaran InternetAsas Pelayaran Internet
Asas Pelayaran InternetAhmad Faizar
 

Similar to Networking For Application Developers by Roy Kim (20)

Networking 101
Networking 101Networking 101
Networking 101
 
Networking 101
Networking 101Networking 101
Networking 101
 
Networking 101
Networking 101Networking 101
Networking 101
 
Applications.docx
Applications.docxApplications.docx
Applications.docx
 
DNS server packet tracer
DNS server packet tracerDNS server packet tracer
DNS server packet tracer
 
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
 
DNS Server configuration in cisco packet tracer
DNS Server configuration in cisco packet tracerDNS Server configuration in cisco packet tracer
DNS Server configuration in cisco packet tracer
 
DNS server configuration in packet tracer
DNS server configuration in packet tracerDNS server configuration in packet tracer
DNS server configuration in packet tracer
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCP
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCPKonfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCP
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCP
 
Dns server configuration
Dns server configurationDns server configuration
Dns server configuration
 
Dns server converted
Dns server convertedDns server converted
Dns server converted
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Bt0076, tcp ip
Bt0076, tcp ipBt0076, tcp ip
Bt0076, tcp ip
 
Bt0076, tcp ip
Bt0076, tcp ipBt0076, tcp ip
Bt0076, tcp ip
 
Ubuntu For Intranet Services
Ubuntu For Intranet ServicesUbuntu For Intranet Services
Ubuntu For Intranet Services
 
c bstatC nslookupDefault Server pdc.corp.example.comAdd.pdf
c bstatC nslookupDefault Server pdc.corp.example.comAdd.pdfc bstatC nslookupDefault Server pdc.corp.example.comAdd.pdf
c bstatC nslookupDefault Server pdc.corp.example.comAdd.pdf
 
Asas Pelayaran Internet
Asas Pelayaran InternetAsas Pelayaran Internet
Asas Pelayaran Internet
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 

More from Roy Kim

Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...
Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...
Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...Roy Kim
 
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUGAzure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUGRoy Kim
 
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentAzure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentRoy Kim
 
Azure App Gateway and Log Analytics under Penetration Tests
Azure App Gateway and Log Analytics under Penetration TestsAzure App Gateway and Log Analytics under Penetration Tests
Azure App Gateway and Log Analytics under Penetration TestsRoy Kim
 
Applying Advanced Techniques to Azure Web Apps
Applying Advanced Techniques to Azure Web AppsApplying Advanced Techniques to Azure Web Apps
Applying Advanced Techniques to Azure Web AppsRoy Kim
 
Big Data Analytics from Azure Cloud to Power BI Mobile
Big Data Analytics from Azure Cloud to Power BI MobileBig Data Analytics from Azure Cloud to Power BI Mobile
Big Data Analytics from Azure Cloud to Power BI MobileRoy Kim
 
Design and Configure Azure App Service Web Apps
Design and Configure Azure App Service Web AppsDesign and Configure Azure App Service Web Apps
Design and Configure Azure App Service Web AppsRoy Kim
 
SharePoint 2016 Hybrid Overview
SharePoint 2016 Hybrid OverviewSharePoint 2016 Hybrid Overview
SharePoint 2016 Hybrid OverviewRoy Kim
 
Designing for SharePoint Provider Hosted Apps
Designing for SharePoint Provider Hosted AppsDesigning for SharePoint Provider Hosted Apps
Designing for SharePoint Provider Hosted AppsRoy Kim
 
Microsoft Azure For Solutions Architects
Microsoft Azure For Solutions ArchitectsMicrosoft Azure For Solutions Architects
Microsoft Azure For Solutions ArchitectsRoy Kim
 
SharePoint Saturday 2010 - SharePoint 2010 Content Organizer Feature
SharePoint Saturday 2010 - SharePoint 2010 Content Organizer FeatureSharePoint Saturday 2010 - SharePoint 2010 Content Organizer Feature
SharePoint Saturday 2010 - SharePoint 2010 Content Organizer FeatureRoy Kim
 

More from Roy Kim (11)

Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...
Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...
Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...
 
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUGAzure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
 
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentAzure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
 
Azure App Gateway and Log Analytics under Penetration Tests
Azure App Gateway and Log Analytics under Penetration TestsAzure App Gateway and Log Analytics under Penetration Tests
Azure App Gateway and Log Analytics under Penetration Tests
 
Applying Advanced Techniques to Azure Web Apps
Applying Advanced Techniques to Azure Web AppsApplying Advanced Techniques to Azure Web Apps
Applying Advanced Techniques to Azure Web Apps
 
Big Data Analytics from Azure Cloud to Power BI Mobile
Big Data Analytics from Azure Cloud to Power BI MobileBig Data Analytics from Azure Cloud to Power BI Mobile
Big Data Analytics from Azure Cloud to Power BI Mobile
 
Design and Configure Azure App Service Web Apps
Design and Configure Azure App Service Web AppsDesign and Configure Azure App Service Web Apps
Design and Configure Azure App Service Web Apps
 
SharePoint 2016 Hybrid Overview
SharePoint 2016 Hybrid OverviewSharePoint 2016 Hybrid Overview
SharePoint 2016 Hybrid Overview
 
Designing for SharePoint Provider Hosted Apps
Designing for SharePoint Provider Hosted AppsDesigning for SharePoint Provider Hosted Apps
Designing for SharePoint Provider Hosted Apps
 
Microsoft Azure For Solutions Architects
Microsoft Azure For Solutions ArchitectsMicrosoft Azure For Solutions Architects
Microsoft Azure For Solutions Architects
 
SharePoint Saturday 2010 - SharePoint 2010 Content Organizer Feature
SharePoint Saturday 2010 - SharePoint 2010 Content Organizer FeatureSharePoint Saturday 2010 - SharePoint 2010 Content Organizer Feature
SharePoint Saturday 2010 - SharePoint 2010 Content Organizer Feature
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Networking For Application Developers by Roy Kim

  • 1. IT Networking for Application Developers Presenter: Roy Kim [email_address] blog: roykimsharepoint.wordpress.com
  • 2.
  • 3.
  • 4. Network Diagram DMZ Internet [email_address] [email_address] Switch Hosts Router Subnet Firewall Security
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Hosts: TCP/IP Configuration IP Address MAC Address Subnet Mask Default Gateway DNS Server DHCP Enabled DHCP Server 192.168.1.100 00-50-56-C0-00-01 255.255.255.0 192.168.1.1 192.168.2.101 Yes 192.168.2.200 [email_address] [email_address]
  • 10. Subnetting DMZ Internet Subnet Mask 255.255.255.192 or CIDR /26 Network ID 192.168.1.0 10.21.128.1 [email_address] [email_address] 192.168.1.128 192.168.1.0 192.168.1.64 192.168.1.2 192.168.1.3 192.168.1.4 192.168.1.5 Hosts: 192.168.1.66-126 Hosts: 192.168.1.29-190 192.168.1.1 192.168.1.65 192.168.1.129
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Tools Summary [email_address] [email_address] Tool Description Arp Allows viewing and editing of the Address Resolution Protocol (ARP) cache. Hostname Displays the host name of the computer. Ipconfig Displays the current TCP/IP configuration for both IPv4 and IPv6. Also used to manage Dynamic Host Configuration Protocol (DHCP)-allocated IPv4 address configurations, display or flush the DNS client resolver cache, and register DNS names. Netsh Configuration tool for many network services. For each network service, there is a context containing commands specific for that service. For the  netsh interface ip  contexts, displays and administers TCP/IP protocol settings on either the local computer or a remote computer. Netstat Displays protocol statistics and information on current TCP connections. Nslookup Performs DNS queries and displays the results. Ping Sends Internet Control Message Protocol (ICMP) Echo or Internet Control Message Protocol for IPv6 (ICMPv6) Echo Request messages to test reachability. Route Allows viewing of the IPv4 and IPv6 routing tables and editing of the IPv4 routing table. Tracert Sends ICMP Echo or ICMPv6 Echo Request messages to trace the network route taken by IPv4 or IPv6 packets to a specific destination. Pathping Sends ICMP Echo or ICMPv6 Echo Request messages to trace the route an IPv4 or IPv6 packet takes to a destination and displays information on packet losses for each router and link in the path. Event Viewer Records errors and events. Performance Logs and Alerts Logs TCP/IP core protocol performance and sends alerts (the SNMP service must be installed). Network Monitor Captures and displays the contents of TCP/IP packets sent to and from computers running Windows Server 2003. Telnet Tests TCP connection establishment between two nodes.

Editor's Notes

  1. http://technet.microsoft.com/en-us/library/hh182191.aspx IT Networking for Application Developers: Knowing how to troubleshoot your development machine, test and production environments for networking connectivity issues.
  2. A network supports communication between one device to another. Sometimes, devices just do not communicate. What should we do? Understanding IT Networking and Troubleshooting for Connectivity As an application developer, I have always wondered how networking works and what their configuration means. And so I have gone on a research journey on answering my own questions and sharing them with you in this presentation from perspective of an application developer.
  3. Host Generally, routers, printers, switches, hubs and modems are not considered as host in everyday networking language.
  4. DNS server resolves fully qualified domain names to IP addresses – similar to a phone book. Hosts cache DNS mappings into their DNS client resolver cache. When a new host name is resolved, the host saves it in the DNS client resolver cache for a period of time. The local host file gets loaded to the DNS client resolver cache. File location: C:\\Windows\\System32\\drivers\\etc DHCP server allows for a host for automatic IP configuration for communication on a network. Centralized management for hosts to be connected to a network. As a result, two hosts won’t have the same IP address assigned. Can provide local caching of DNS resolvers. In the case where a host needs a static IP address assignment, the DHCP server can create a client reservation for an IP address based on the MAC address. For example, servers and network printers would normally have client reservations. A network interface is configured with DHCP server IP address.
  5. A  firewall  is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. [TODO: further expansion]
  6. As we have identified the basic networking devices that enable communication, TCP/IP is the “language” as to how they communicate. TCP/IP is a suite of protocols that also include UDP, ARP, ICMP, DHCP, DNS, IGMP and others. The standard for internet based communication. A protocol has header and message format. a set of rules and standards of exchanging data. can be specific to a layer in the OSI or TCP/IP model.
  7. IP Address Numerical identification of a device on a network. Two components – network ID or subnet prefix and host ID Supports routing Static IP assignment is configured at one time to the network interface and is constant. Usually through manual user configuration. Dynamic IP assignment is done through a DHCP server within the network. Each time a network device is connected, a new IP address is given. Also it has a defined lease duration before a new IP address is assigned. For home networks, the router serves as a DHCP server. Windows Server has the DHCP server role feature that can be installed and serve to assign IP addresses. In a DHCP enabled network, it is best to statically assign IP addresses to routers, firewalls, servers, print servers. This is configured in the DHCP server as a ‘client reservation’. Given the MAC address of the device, one can configure an IP address within it scope. For example, if a network printer is turned on/off then it will receive a new IP address from the DHCP server, clients will not be able to print; therefore configuring for client reservation. Subnet Mask A subnet is a partition of a network. Applying the subnet mask to an IP address yields the network ID and Host ID. All hosts in a subnet work share the same network ID. MAC Address Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are hardwired to the network interface cards. 48-bit address. Default Gateway A router on a network or subnet that serves as the entry and exit point to another network. When a destination IP address does not match any routes or the subnet IP range, then the packet is sent to the default gateway for further routing.
  8. http://wiki.xtronics.com/index.php/IP_Subnet_Masks#Mask_.3D_.2F25 Subnet Mask 255.255.255.192 can have 62 usable hosts per each of the 4 subnets. Network ID is 192.168.1.0 Hosts 192.168.1.0-63 192.168.1.64-127 192.168.1.128-191 192.168.1.192-255
  9. [May drop this slide, but feel it is good to illustrate how subnetting works.]
  10. Verify tcip/ip installation ping 127.0.0.1 Verify IP Address ipconfig /all netsh interface ip show config ipconfig /release ipconfig /renew To see IP configuration settings on a remote server netsh –r filesrv1 interface ip show config (provide username and password as part of arguments) Ping the Loopback Address 127.0.0.1 Ping 127.0.0.1 to verify that TCP/IP is working properly If you receive an error message at this point, TCP/IP (protocol) is not properly installed. Remove and reinstall TCP/IP.   Local Area Connection >  Properties > General  tab, click  Install , select  Protocol , and then click  Add . Ping Your Computer's IP Address ping <computer’s IP address>  to verify network adaptor is working properly  If you receive an error message at this point, there may be a communication problem between Windows NT and your network adapter. To correct, remove and reinstall your network adapter driver.  IP Conflict scenario If a host on a DHCP network is configured with static IP addresses manually where the IP address is already assigned by DHCP server, then an IP conflict will result. Communication is will split between the two hosts. The Event Viewer can log such events. ARP cache The address resolution protocol (ARP) cache is a list of recently resolved IP address to Media Access Control (MAC) address mappings. The MAC address is the unique physical address embedded in each network interface card. To display IP address to MAC address mappings: arp –a The ARP cache may have old mappings and hinder connectivity. To clear arp cache: arp –d Situation: If two switches are patched or have direct connection, the ARP tables can refer to one another creating a loop.
  11. Verify tcip/ip installation ping 127.0.0.1 Verify IP Address ipconfig /all netsh interface ip show config ipconfig /release ipconfig /renew To see IP configuration settings on a remote server netsh –r filesrv1 interface ip show config (provide username and password as part of arguments) Ping the Loopback Address 127.0.0.1 Ping 127.0.0.1 to verify that TCP/IP is working properly If you receive an error message at this point, TCP/IP (protocol) is not properly installed. Remove and reinstall TCP/IP.   Local Area Connection >  Properties > General  tab, click  Install , select  Protocol , and then click  Add . Ping Your Computer's IP Address ping <computer’s IP address>  to verify network adaptor is working properly  If you receive an error message at this point, there may be a communication problem between Windows NT and your network adapter. To correct, remove and reinstall your network adapter driver.  IP Conflict scenario If a host on a DHCP network is configured with static IP addresses manually where the IP address is already assigned by DHCP server, then an IP conflict will result. Communication is will split between the two hosts. The Event Viewer can log such events. ARP cache The address resolution protocol (ARP) cache is a list of recently resolved IP address to Media Access Control (MAC) address mappings. The MAC address is the unique physical address embedded in each network interface card. To display IP address to MAC address mappings: arp –a The ARP cache may have old mappings and hinder connectivity. To clear arp cache: arp –d Situation: If two switches are patched or have direct connection, the ARP tables can refer to one another creating a loop.
  12. Default Gateway ipconfig to display default gateway IP address. Ping default gateway to verify connectivity. If error, then router is not connected, turned off, or hardware failure. Subnet Mask A wrong subnet can disrupt communication from one host to another. If a subnet mask of a host is “within” the subnet mask of another host and the router’s, then the other host can communicate to the first. Example, PC1 can communicate with PC2 PC1 - 192.168.1.10 /24 PC2 - 192.168.1.210 /25 Default Gateway - 192.168.1.1 /24 Wrong subnet mask effect on a host - https://learningnetwork.cisco.com/message/75037 If you have PC1 and PC2 on 192.168.1.0 /24 network and you have PC3 and PC4 on the 192.168.2.0 /24 network, you can attach them all to the same switch and PC1 will communicate with PC2 and PC3 will communicate with PC4 because the rules are all correct. But, PC1/PC2 can't communicate with PC3/PC4 because they are located on different subnets and require routing.
  13. Connecting to other via ping command ping <computer IP address> If ‘request timed out’ possible issue with router(s), intermediate network devices or target host. Note: a host may deny ping (ICMP) requests as a security measure (on the internet). Verify Persistent Route Table Entries All computers have a route table to route packets to neighboring nodes. Route table is automatically rebuilt at reboot. route -print to display route table. A persistent route may be old or incorrect. route –print netstat –r To clear, route –f [Route tables shouldn’t be a problem area.] TCP/IP Routing Basics for Windows NT - http://support.microsoft.com/kb/140859/EN-US Verify reachability with intermediate routers Troubleshoot whether it is a router issue rather than a target host issue. tracert <IP address> reports each router or gateway crossed by a TCP/IP packet on its way to another host.  Possible firewall or proxy blocking packet. Note: a router may deny ping (ICMP) requests as a security measure (on the internet).
  14. Connecting to other via ping command ping <computer IP address> If ‘request timed out’ possible issue with router(s), intermediate network devices or target host. Note: a host may deny ping (ICMP) requests as a security measure (on the internet). Verify Persistent Route Table Entries All computers have a route table to route packets to neighboring nodes. Route table is automatically rebuilt at reboot. route -print to display route table. A persistent route may be old or incorrect. route –print netstat –r To clear, route –f [Route tables shouldn’t be a problem area.] TCP/IP Routing Basics for Windows NT - http://support.microsoft.com/kb/140859/EN-US Verify reachability with intermediate routers Troubleshoot whether it is a router issue rather than a target host issue. tracert <IP address> reports each router or gateway crossed by a TCP/IP packet on its way to another host.  Possible firewall or proxy blocking packet. Note: a router may deny ping (ICMP) requests as a security measure (on the internet).
  15. Verify DNS Configuration nslookup <DNS server IP address> Queries DNS server to resolve host name to IP addresses. Note that the local host file overrides DNS lookups, but nslookup does not consider the host file. Although a host reachable by IP, it may not be reachable by host name or a FQDN. This would be due to DNS server issues. Verify through ipconfig /all that the DNS server IP address is correct. netsh interface ip show dns  ping the DNS server by IP address. Verify DNS server on the network. To re-register the local computer in the DNS database on name servers. What this means is that all DNS names for the local computer are first released and then renewed in the DNS database (assuming you have an Active Directory network that uses Dynamic DNS or DDNS for registering DNS names in the database). ipconfig /registerdns Verify DNS client resolver cache Verify DNS entries ipconfig /displaydns In the event of DNS configuration changes, may need to flush the DNS client resolver cache. Clear cache ipconfig /flushdns NetBIOS NetBIOS name resolution means successfully mapping a NetBIOS name to an IP address. A NetBIOS name is a 16-byte address that is used to identify a NetBIOS resource on the network. A NetBIOS name is either a unique (exclusive) or group (nonexclusive) name. When a NetBIOS process is communicating with a specific process on a specific computer, a unique name is used. When a NetBIOS process is communicating with multiple processes on multiple computers, a group name is used. To reload remote cache name table nbtstat -r Host File File location: %SystemRoot% \\system32\\drivers\\etc\\hosts  DNS client resolver cache is populated with the host file entries along with DNS server records Host file entries override DNS entries. The nslookup command does not resolve entries in the host file.
  16. Check Packet Filtering or Firewall Rules Verify TCP Session Establishment Although a remote host is reachable by ping tool, verify TCP connection. telnet <IP address> <TCP Port>
  17. Check Packet Filtering or Firewall Rules Verify TCP Session Establishment Although a remote host is reachable by ping tool, verify TCP connection. telnet <IP address> <TCP Port>
  18. http://sourcedaddy.com/windows-7/troubleshooting-network-issues.html