Network Services Lesson 6 Objectives Skills/Concepts Objective Domain

Network Services Lesson 6 Objectives Skills/Concepts Objective Domain

Network Services Lesson 6 Objectives Skills/Concepts Objective Domain Description Objective Domain Number Setting up common networking services

Understanding network services 3.5 Defining more network services Understanding network services 3.5 Defining Name Resolution

Techniques Understand Name Resolution 3.4 DHCP Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that enables configured client computers to obtain IP addresses automatically The IP information obtained might include the following: IP addresses Subnet masks

Gateway addresses DNS server addresses Other advanced options The DHCP Server service provides the following benefits: Reliable IP address configuration Reduced network administration DHCP Server Before a DHCP server can start leasing IP addresses to client computers, the following steps must be performed: 1. Install the DHCP service 2. Configure an IP scope 3. Activate the scope 4. Authorize the server

5. Configure advanced IP options (optional) DEMO: Install and view the DHCP Service (and console) DORA DHCP sessions use a four-step process known as DORA. Discovery: The client sends a broadcast to the network to find a DHCP server Offer: The DHCP server sends a unicast offering of an IP address to the client Request: The client broadcasts to all servers that it has accepted the offer Acknowledge: The DHCP server sends a final unicast to the client

Hey, are there any DHCP Servers here? (DHCPDiscover) that includes the IP information the client will use Yes, I am a DHCP Server, and here is DHCP utilizes ports 67 and 68 an IP Address for you (DHCPOffer ) Thanks, I like that IP and I will take it (DHCPRequest) Ok, its yours. Pleasure doing business with you (DHCPAck)

DEMO: Add a DHCP Scope APIPA Automatic Private IP Addressing (APIPA) is a service for assigning unique IP addresses on small office/home office (SOHO) networks without deploying the DHCP service APIPA can get in the way of a client obtaining an IP address properly (e.g., when a client attempts to obtain an IP address from a DHCP server, but the DHCP server is too busy) Disable APIPA APIPA is disabled using Registry

Editor 1. Open Registry Editor 2. In Registry Editor, navigate to the following registry key: KEY_LOCAL_MACHINE\SYSTEM\ CurrentControlSet\Services\Tcpip\ Parameters 3. Create the following entry: IPAutoconfigurationEnabled: REG_DWORD 4. Assign a value of 0 to disable Automatic Private IP Addressing (APIPA) support.

5. Close Registry Editor. DEMO: Disable APIPA Remote Desktop Services Remote Desktop Services, formerly known as Terminal Services, is a type of thin-client terminal server computing. RDS enables virtual desktop infrastructure (VDI), sessionbased desktops, and applications, allowing users to work anywhere Thin-client computers and PCs can connect to servers running Remote Desktop Services Remote Desktop Services

Remote Desktop Connection (DEMO) Computer Name Computer Name Routing and Remote Access Service Routing and Remote Access Service (RRAS) supports remote user or site-to-site connectivity by using virtual private network (VPN) or dial-up connections. RRAS consists of the following components: Remote Access. By using RRAS, you can deploy VPN connections to provide end users

with remote access to your organization's network. You can also create a site-to-site VPN connection between two servers at different locations. Routing. RRAS is a software router and an open platform for routing and networking. It offers routing services to businesses in local area network (LAN) and wide area network (WAN) environments or over the Internet by using secure VPN connections. Routing is used for multiprotocol LAN-to-LAN, LAN-to-WAN, VPN, and network address translation (NAT) routing services. Microsoft RRAS was formerly known as Remote Access Service (RAS) Routing and Remote Access Service Internet/ISP

DEMO: Install and view Routing and Remote Access Internet Protocol Security (IPSec) Protocol within the TCP/IP suite that encrypts and authenticates IP packets Ensures private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services Designed to secure any application traffic because it resides on the network layer (or Internet layer for the TCP/IP reference model) Used in conjunction with virtual private networks and is an

integral part of IPv6 IPsec has been defined to work in two different modes: Tunnel mode is most often used for site-to-site VPN connections Transport mode is most often used for securing IP traffic on private networks IPSec Protocol Types Protocol Requirement Authentication The data and the header need Header (AH) to be protected from modification and authenticated, but remain

readable. Usage Use for data integrity in situations where data is not secret but must be authenticated for example, where access is enforced by IPSec to trusted computers only, or where network intrusion detection, QoS, or firewall filtering requires traffic inspection. Encapsulating Security Payload (ESP) Only the data needs to be

Use when data must be kept secret, such as file protected by encryption so it is sharing, database traffic, RADIUS protocol data, unreadable, but the IP or internal Web applications that have not been addressing can be left adequately secured by SSL. unprotected Both AH and ESP The header and data, respectively, need to be protected while data is encrypted.

Use for the highest security. However, there are very few circumstances in which the packet must be so strongly protected. When possible, use ESP alone instead. DNS Domain Name System (DNS) is a worldwide service that resolves host names to IP addresses DNS architecture is a hierarchical distributed database and an associated set of protocols that define: A mechanism for querying and updating the database A mechanism for replicating the information in the database among servers A schema of the database

DNS is part of the application layer of the TCP/IP reference model DNS servers use inbound port 53 to accept name resolution requests WINS Windows Internet Name Service (WINS) is a service that resolves NetBIOS names to IP addresses WINS is required for any environment in which users access resources that have NetBIOS names It is Microsofts version of the NetBIOS Name Service (NBNS) combined with a name server

If you do not use WINS in such a network, you cannot connect to a remote network resource by using its NetBIOS name unless you use Lmhosts files, and you might be unable to establish file and print sharing connections WINS and DNS are both name resolution services for TCP/IP networks Summary Be able to install and configure DHCP to hand out IP

addresses to client computers. You have learned the four-step DHCP process known as DORA. Be able to install and configure Remote Desktop Services so that client computers can connect remotely to a server. Understand how to install and configure Routing and Remote Access Service (RRAS) as a LAN router. You have learned how to define IPsec and the various protocols that can be used. Understand how DNS and WINS function, how the services are installed and configured and when WINS is needed on your network.

Additional Resources & Next Steps Instructor-Led Courses 40033A: Windows Operating System and Windows Server Fundamentals: Training 2Pack for MTA Exams 98-349 and 98-365 (5 Days) 40349A: Windows Operating System Fundamentals: MTA Exam 98-349 (3 Days) 40032A: Networking and Security Fundamentals: Training 2-Pack for MTA Exams 98-366 and 98-367 (5 Days) 40366A: Networking Fundamentals: MTA Exam 98-366 Exam 98-366: MTA

Networking Fundamentals (Microsoft Official http:// Exam 98-366: Academic Course) www.microsoft.com/en-us/downl Networking oad/confirmation.aspx?id=3262 Fundamentals Books Remote Desktop

Poster Exams & Certification s 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Recently Viewed Presentations

  • Introduction to Chemistry, A Conceptual Approach, 2nd Edition

    Introduction to Chemistry, A Conceptual Approach, 2nd Edition

    To name molecular compounds, we: Name the leftmost element as we would a main-group metal - according to the periodic table. Name the rightmost element as we would a monatomic anion - drop the ending of the element name and...
  • Foreign Trade Policy (Ftp)

    Foreign Trade Policy (Ftp)

    RTAs (Regional Trade Agreements, also known as FTAs) have proliferated over the last two decades. As of 1 February 2016, 625 notifications of RTAs (counting goods, services and accessions separately) had been received by the WTO. Of these, 419 are...
  • Status of Fusion Nuclear Data Development Mohamed Sawan

    Status of Fusion Nuclear Data Development Mohamed Sawan

    Tim Bohm. U. Wisconsin-Madison. Fusion Neutronics Team. M. Sawan. Revision to FENDL-2.0 (1995/96) 71 elements/isotopes. Working libraries prepared by IAEA/NDS, INDC(NDS)-467 (2004) Reference data library for nuclear analysis of ITER and other fusion systems.
  • AJCC 7th Edition of Gastric Cancer: good enough?

    AJCC 7th Edition of Gastric Cancer: good enough?

    Alter Our Staging Process? Ca Stomach - M stage The new M staging is better in predicting prognosis and possibly alter our staging process AJCC 7th Edition of Gastric Cancer: good enough? Conclusion: This new TNM Staging is superior in...
  • Chapter 1: Introduction to Statistics

    Chapter 1: Introduction to Statistics

    Chapter 1: Introduction to Statistics Variables A variable is a characteristic or condition that can change or take on different values. Most research begins with a general question about the relationship between two variables for a specific group of individuals.
  • Integraalse loenduri projekt Hannes Tammet 25. veebruar 2009. a.

    Integraalse loenduri projekt Hannes Tammet 25. veebruar 2009. a.

    CL CC Example for positive ions: Z0 = 250, Z1 = 2.5, Z2 = 0.5 Recommended project F IC V εa = 8.86 pF/m e = 1.602×10-19 C IL Z0 Z1 Z2 Assumptions: Cluster ion mobility is in the range...
  • 2010 IEEE-SA Corporate Membership - Health Level Seven ...

    2010 IEEE-SA Corporate Membership - Health Level Seven ...

    Ballots in Progress P11073-30400 Standard for Health Informatics-POC Medical Device Communication-Interface profile-Cable Ethernet (ISO/IEEE) Comment resolution (ballot closed 6 Mar 2008) Malcolm Clarke elected LL WG Chair P11073-10472 Standard for Health informatics - Personal health device communication -Device specialization ...
  • Ft Bliss Renewable Energy Rodeo - SAME DC Post

    Ft Bliss Renewable Energy Rodeo - SAME DC Post

    Partner with the Installation Management Community at all echelons to deliver and maintain enduring installations and contingency basing. Support the Nation and the Army in achieving energy security and sustainability goals . Pictures: Primary School Laos - 2012. Child Development...