2 INTRODUCTION TO NETWORK PROTOCOLS
PROJECTS Project 2.1
Understanding Binary Numbering, Conversion to Decimal Numbering, and Logical Operations
Project 2.2
Subnetting
Project 2.3
Examining Routing
Project 2.4
Installing and Configuring the TCP/IP Protocol
Project 2.5
Configuring Bindings
Project 2.6
Using TCP/IP Troubleshooting Tools
Project 2.7
Monitoring Network Traffic
35
36 Windows Network Administration Project Manual
Project 2.1
Understanding Binary Numbering, Conversion to Decimal Numbering, and Logical Operations
Overview
Understanding IP addressing is an important skill that network administrators must possess. To do so, you must first understand how binary numbering works, and how to convert from binary to decimal. This is key to being able to convert binary IP addresses into their decimal equivalents. You also need to be able to understand the basic logical operations AND, OR, and XOR. It is also nearly impossible to understand subnetting (a method of splitting an IP network address into smaller groups of IP addresses that can be used on different networks) without fully understanding these concepts. Binary is a counting system that uses only two numerals: 0 and 1. The positions in a binary number (called bits rather than digits) represent powers of 2 rather than powers of 10: 1, 2, 4, 8, 16, 32, and so on. To figure the decimal value of a binary number, you multiply each bit by its corresponding power of 2 and then add the results. The decimal value of binary 11111, for example, which is 31, is calculated as follows: 1 * 20 = 1* 1 = 1 + 1 * 21 = 1* 2 = 2 + 1 * 22 = 1* 4 = 4 + 1 * 23 = 0 * 8 = 8 + 1 * 24 = 1 * 16 = 16
The table below summarizes how AND, OR, and XOR work. The first two columns of the table indicate the two values used in the process. The result of the process (AND, OR, or XOR) is indicated under their column headings. Logical Operations for Binary Values First Value
Second Value
AND
0
0
0
0
0
1
0
1
1
0
0
1
1
1
1
1
The following example shows how you would calculate 10010101 AND 11011101: 10010101 AND 11011101 Result: 10010101
Introduction to Network Protocols 37
Project 2.1
Understanding Binary Numbering, Conversion to Decimal Numbering, and Logical Operations
Outcomes
After completing this project, you will know how to: convert binary numbers into their decimal equivalents use basic logical operations such as AND convert binary IP addresses into their decimal equivalents
What you’ll need
To complete this project, you will need: the worksheet below
Completion time
30 minutes
Precautions
None
Part A: Convert binary numbers to their decimal equivalents 1. 11000000: ___________________________________________________________________________ 2. 10101000: ___________________________________________________________________________ 3. 11111111: ___________________________________________________________________________ 4.
00000101: ___________________________________________________________________________
5. 00010100: ___________________________________________________________________________
Part B: Perform the AND operation 1. 11000000 11111111 Result: ___________________________________________________________________________
38 Windows Network Administration Project Manual
2. 10101000 11111111 Result: ___________________________________________________________________________ 3. 00000101 00000000 Result: ___________________________________________________________________________
Part C: Convert binary numbers to an IP address using dotted decimal notation 1. 01111111.00000000.00000000.00000001 ___________________________________________________________________________ 2. 01111111.00000000.00000000.00000001 ___________________________________________________________________________ 3. 11111111.11111111.11111111.11111111 __________________________________________________________________________
Introduction to Network Protocols 39
Project 2.2
Subnetting
Overview
There are two parts of an IP address: the network ID and the host ID. When data are transferred from one network to another, the router reads the header information to determine the path to the next router or to the other network. You can use the AND operation (known as ANDing) to determine the network ID of an IP address if you know the subnet mask. For instance, for the IP address 144.28.16.17, with a subnet mask of 255.255.240.0, you can find the network ID as follows: 144 . IP address: 10010000 Subnet mask: 11111111 Network ID: 10010000 144 .
28 . 00011100 11111111 00011100 28 .
16 . 00010000 11110000 00010000 16 .
17 00010001 00000000 00000000 0
Subnetting is a method of splitting an IP network address into smaller groups of IP addresses that can be used on different networks. A smaller segment of a larger network that is created by a network administrator through the use of a subnet mask is referred to as a subnetwork. Subnetting can make network traffic management more efficient. Network administrators use subnetting to create these subnetworks to avoid having to lease an extraordinary amount of IP addresses. Without subnetting, each node on every network would have to have its own public IP address. There are simply not enough public IP addresses to make this happen. Outcomes
After completing this project, you will know how to: use ANDing to determine the network ID of an IP address create a basic subnet scheme that segments a network into 12 networks
What you’ll need
To complete this project, you will need: the worksheet below
Completion time
30 minutes
Precautions
None
Part A: Use ANDing to find the network ID of an IP address 1. IP address: 192.168.5.20 Subnet mask: 255.255.255.0 Network ID: ___________________________________________________________________________
40 Windows Network Administration Project Manual
2. IP address: 172.20.0.0 Subnet mask: 255.255.0.0 Network ID: ___________________________________________________________________________
Part B: Subnet a Class C IP Address Subnet the Class C IP address, 192.168.1.0, into 12 subnets. There are a limited number of host IDs because the first three octets are part of the network ID. 1. What will your subnet mask be? ___________________________________________________________________________ 2. What is the first and second network IDs? What is the last network ID? ___________________________________________________________________________ 3. What is the first host ID? What is the last host ID? ___________________________________________________________________________ ___________________________________________________________________________
Introduction to Network Protocols 41
Project 2.3
Examining Routing
Overview
It is important for a network administrator to understand the process of routing. To reduce broadcast traffic, networks are split into broadcast domains using a router. A routing table is a table maintained by all IP hosts that contains a list of routes for all networks of which the client is aware. You can also manually add a route to the routing table. In this project, you will use the route print command to view the routing table maintained by your computer and add a static route specified by your instructor.
Outcomes
After completing this project, you will know how to: use the route print command to view a routing table add a route to a routing table manually
What you’ll need
To complete this project, you will need: a Windows XP/2000 or Windows Server 2003/2000 Server computer the IP address, subnet mask, and gateway for the new route
Completion time
10 minutes
Precautions
None
1. Turn on the computer and log on as an administrator 2. Click Start, and then click Run to open the Run dialog box. Enter cmd in the Open text box to open a Command window. 3. At the command prompt, enter route print and press Enter (see Figure 2-1).
Figure 2-1: Route print
42 Windows Network Administration Project Manual
4. What is the default route? ___________________________________________________________________________ 5. What is the default gateway? ___________________________________________________________________________ 6. What other routes exist in the table? ___________________________________________________________________________ ___________________________________________________________________________ 7. At the command prompt, enter route add [IP address] mask [subnet mask gateway] and press Enter to update the routing table manually with the new route. 8. At the command prompt, enter route print and press Enter to view the new route added to the routing table. Capture a screenshot of the routing table and print a copy to hand in to your instructor. 9. Close the Command window when you have finished.
Introduction to Network Protocols 43
Project 2.4
Installing and Configuring the TCP/IP Protocol
Overview
Transmission Control Protocol/Internet Protocol (TCP/IP) is a suite of protocols that enables communications among resources across a network. TCP/IP is the main networking protocol in use today and is the core protocol for the Internet. TCP/IP is automatically installed when Windows Server 2003 is installed, but you should verify that it has not been uninstalled. It is important for a network administrator to understand the process of routing. To reduce broadcast traffic, networks are split into broadcast domains using a router. A routing table is a table maintained by all IP hosts that contains a list of routes for all networks of which the client is aware. You can also manually add a route to the routing table. In this project, you will use the route print command to view the routing table maintained by your computer and add a static route specified by your instructor.
Outcomes
After completing this project, you will know how to: check to see if TCP/IP is installed install TCP/IP if it is not installed manually configure TCP/IP
What you’ll need
To complete this project, you will need: a Windows XP/2000 computer connected in a network. Your instructor should provide you with the following information: • IP address •
default gateway
•
IP address of preferred DNS server
Completion time
10 minutes
Precautions
Be sure to check with your system administrator before altering settings on a school networked client computer.
1. If necessary, start your computer and log on as an administrator 2. To confirm that TCP/IP is installed, click Start, and then open the Control Panel. 3. Click Network Connections, and then right-click Local Area Connection. A shortcut menu will appear. 4. Click Properties to open the Local Area Connection Properties dialog box (Figure 22). If Internet Protocol (TCP/IP) is listed, it is already installed.
44 Windows Network Administration Project Manual
Figure 2-2: Local Area Connection Properties dialog box
5. If TCP/IP is not installed, install it. To do so, click Install to open the Select Network Component Type dialog box. 6. Click Protocol, then click Add to open the Select Network Protocol dialog box. 7. Select the Internet Protocol (TCP/IP) option and click OK. Close the Select Network Component Type dialog box. 8. On the General tab of the Local Area Connection Properties dialog box, select Internet Protocol (TCP/IP) and then click the Properties button to open the Internet Protocol (TCP/IP Properties) dialog box.
Introduction to Network Protocols 45
9. If the Obtain an IP address automatically option button is selected, this means the computer is configured to obtain an IP address automatically from a DHCP server, whose role is automatically assign addresses to LAN members and also automatically configure the other TCP/IP parameters for network hosts as they boot. However, some of the computers on a network must have what is known as a “static” IP address. In a static IP addressing system, the IP addresses and other TCP/IP parameters for the hosts are manually configured and do not change. Record what you see in the Internet Protocol (TCP/IP) Properties dialog box. ___________________________________________________________________________ ___________________________________________________________________________ 10. To manually configure TCP/IP, select the Use the following IP address option button and enter the IP address provided to you by your instructor. The default subnet mask for that class of IP address is automatically assigned. Next enter the default gateway provided to you by your instructor. This is the IP address for the router that will link this computer with other networks (e.g., the Internet). 11. The Use the following DNS server addresses option button is automatically selected. Enter the IP address of the preferred DNS server, and if applicable, the IP address of an alternate DNS server. 12. Click the Advanced button. Record the name of the dialog box that appears and the data that are visible within the dialog box. ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ 13. Click the DNS tab. List the three settings that are applied to all connections with TCP/IP enabled: ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ 14. Click the WINS tab. Are any WINS addresses listed? Is LMHosts lookup enabled? What is the NetBIOS setting? ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________
46 Windows Network Administration Project Manual
15. Click the Options tab. Then click the Properties button. Record the default IP security settings. ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ 16. Click Cancel to return to the Advanced TCP/IP Settings dialog box. 17. Click the TCP/IP filtering option. Then click the Properties button. Record the three types of packet filtering that you can apply. ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ 18. Click Cancel to return to the Advanced TCP/IP Settings dialog box. 19. Click OK to save the settings and return to the Internet Protocol (TCP/IP) Properties dialog box. 20. Click OK to return to the Local Area Connection Properties dialog box.
Project 2.5
Configuring Bindings
Overview
Binding is the process by which a protocol is linked to a network adapter and certain network services. Windows operating systems enable you to adjust the order in which protocols are used so the protocols used most often are accessed first when a connection is established, which will enhance network performance.
Outcomes
After completing this project, you will know how to: adjust the order in which protocols are used by various services by adjusting the bindings for your adapter
What you’ll need
To complete this project, you will need: a Windows XP/2000 or Windows Server 2003/2000 Server computer
Completion time
10 minutes
Precautions
Be sure to check with your system administrator before altering settings on a school networked client computer.
Introduction to Network Protocols 47
1. Turn on the computer and log on as an administrator. 2. Click Start, and then open the Control Panel. Select Network Connections to open the Network Connections window. Open the Advanced menu and select Advanced Settings. 3. The Advanced Setting dialog box opens. Examine the Bindings for list box on the Adapters and Bindings tab (see Figure 2-3). What protocols are listed there and to what network services are they bound? ___________________________________________________________________________ ___________________________________________________________________________
Figure 2-3: Advanced Settings dialog box
4. You can change the order in which the protocols are used by various services with the Up and Down arrow buttons on the side of the box. You can also remove a particular protocol from a particular service by unchecking its check box.
48 Windows Network Administration Project Manual
Project 2.6
Using TCP/IP Troubleshooting Tools
Overview
There are a number of tools that you can use to troubleshoot TCP/IP. Among them are ipconfig, ping, tracert and pathping. The ipconfig command is used to check TCP/IP configuration on a local computer. The ping command allows you to check the computer’s network connectivity. The tracert command maps the path that packets take as they flow to a remote system. The pathping command combines the functionality of both ping and tracert. In this project, you will practice using all of these tools.
Outcomes
After completing this project, you will know how to: use the ipconfig command use the ping command use the tracert command use the pathping command
What you’ll need
To complete this project, you will need: a Windows XP/Windows 2000 computer or a Windows Server 2003/2000 Server computer configured with TCP/IP and connected to a network the IP address of a remote host
Completion time
30 minutes
Precautions
None
1. Turn on the computer and log on as an administrator. 2. Click Start, and then click Run to open the Run dialog box. Enter cmd in the Open text box to open a Command window. 3. At the command prompt, enter ipconfig and press Enter to view the computer’s IP configuration (see Figure 2-4).
Introduction to Network Protocols 49
Figure 2-4: Using Ipconfig
4. Record the configuration settings for your computer including the IP address, subnet mask, default gateway, and DNS servers. ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ 5. At the command prompt, enter ipconfig /all and press Enter. How does what you see differ from what you viewed using just the ipconfig command? ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ 6. At the command prompt, enter ipconfig /release and press Enter. This command releases the IP address from the computer causing the computer to lose connectivity to any node outside the computer. 7. At the command prompt, enter ipconfig /renew and press Enter. This command restores an IP address from the computer, causing the computer to reestablish its identity and restore connectivity that was established prior to the execution of the ipconfig /release command. It is quite common that during the ipconfig /release and ipconfig /renew process, the IP address will be the same as assigned before. However, this is not always the case. If it is not, record the newly established configuration settings for your computer including the IP address, subnet mask, default gateway, and DNS servers. ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________
50 Windows Network Administration Project Manual
8. At the command prompt, enter ping 127.0.0.1 and press Enter. This address, known as the loopback address, verifies your network interface card is functioning (see Figure 2-5).
Figure 2-5: Pinging the loopback address
9. At the command prompt, enter ping [IP address of a remote host] and press Enter. Record the Ping statistics for the ping, including the packets sent, packets received, packets lost, and the minimum, maximum, and average approximate round trip times in milliseconds below. ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ 10. At the command prompt, enter tracert [IP address of remote host] and press Enter. Examine the results. Did the tracert complete successfully? If yes, how many hops did it take? If not, how do you know? ___________________________________________________________________________ ___________________________________________________________________________ 11. At the command prompt, enter pathping [IP address of a remote host] and press Enter. How does what you see differ from what you viewed using the tracert command? ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ Project 2.7
Monitoring Network Traffic
Introduction to Network Protocols 51
Overview
Once you get your network up and running, it is imperative that you be able to quickly diagnose potential problem areas. One of the biggest concerns for network users is bandwidth. Bandwidth is the most important factor in the speed and effectiveness of a network. Monitoring your network allows you to be proactive, rather than reactive in your network management processes. Furthermore, once you realize you, indeed, have a problem in your network, the ability to monitor network traffic is crucial to the successful remedy for these problems. Windows Server 2003 comes with a monitoring tool that allows you to capture frames sent to and from the server. This built-in function of the operating system is used daily in today’s networking world and it is an effective tool.
Outcomes
After completing this project, you will know how to: install Network Monitor use Network Monitor
What you’ll need
To complete this project, you will need: a Windows Server 2003 computer with the Network Monitor driver installed and connected to a Windows client
Completion time
30 minutes
Precautions
Attempting to monitor network traffic on a production system is normally prohibited in most organizations.
1. Turn on the computer and log on as an administrator. 2. Click Start, open the Control Panel, and then click Add or Remove Programs. Then, click Add/Remove Windows Components. 3. Scroll down the Components list and select the check box in front of Management and Monitoring Tools (see Figure 2-6). You do not need to select the other tools at this time. Click OK. 4. Click the Next button. After the configuration changes are complete, click Finish and close any open windows.
52 Windows Network Administration Project Manual
Figure 2-6: Windows Components
5. You can now capture traffic on your network. If you have a second computer, you can capture data traffic between the two systems. 6. Click Start, point to Administrative Tools, and click Network Monitor. The Microsoft Network Monitor window opens. You will be prompted to select a network on which you want to capture data. If you do not select a network, Network Monitor will select the local area network by default. 7. Click OK to open the Select a Network dialog box. Select the connection you want to monitor and click OK. 8. The Capture Window (Station Stats) for the connection selected opens in the Microsoft Network Monitor window. Click the Start Capture button. Allow some time to pass (see Figure 2-7).
Introduction to Network Protocols 53
Figure 2-7: Viewing Network Statistics
9. How many frames have been captured? How many bytes were sent? How many bytes were received? What kind of traffic was sent? ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ 10. Then, click the Stop Capture button. A message box asks if you want to save the captured summary data to a file. Click Yes and enter a file name, and then click Save to save the file (see Figure 2-8).
54 Windows Network Administration Project Manual
Figure 2-8: Capture summary
11. Examine the file. What are the protocols used? What are the source and destination addresses? Notice if there are any the broadcast messages. How large are the frames? Record what you observe. ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________