Understanding TCP/IP

Course

In Bath

Price on request

Description

  • Type

    Course

  • Location

    Bath

  • Duration

    3 Days

To understand what network protocols are, why internetworking is important and the basics of TCP/IP in Internets and Intranets. To understand the functions of the different layers of a network architecture, where TCP/IP fits within a network architecture and what functions it performs. Suitable for: Network implementation personnel, network designers and managers, developers of distributed applications and those interested in learning more about networking. The course also provides the pre-requisite knowledge for our Implementing TCP/IP on z/OS course.

Facilities

Location

Start date

Bath (Somerset)
See map
11 Kingsmead Square, BA1 2AB

Start date

On request

About this course

It is assumed that all delegates will have some basic knowledge of networking and LAN environments.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

AUDIENCE: Network implementation personnel, network designers and managers, developers of distributed applications and those interested in learning more about networking. The course also provides the pre-requisite knowledge for our Implementing TCP/IP on z/OS course.
PREREQUISITES: It is assumed that all delegates will have some basic knowledge of networking and LAN environments.
DURATION: 3 days. Hands on.
OBJECTIVES: To understand what network protocols are, why internetworking is important and the basics of TCP/IP in Internets and Intranets. To understand the functions of the different layers of a network architecture, where TCP/IP fits within a network architecture and what functions it performs.
COURSE CONTENT:
TCP/IP History
Explosive History of Network
The Internet Expands
The Internet Today
Major Standards Organisations
Local Area Networks
Wide Area Networks
TCP Applications
What is a Protocol
What is a Network Architecture

Organisation and Standards
The OSI Reference Model
The OSI Layers
IEEE Project 802
TCP/IP Architecture
Layered Protocols
Data Flow in TCP/IP Environments

Network Infrastructures in TCP/IP
Ethernet Networks
Ethernet Frame
Characteristics of Bus Based LAN Structures
Ethernet Frame
Ring Networks
Fibre Networks
ISDN Networks
ADSL Networks
X.25 Networks
Frame Relay Networks
ATM Networks
Internet Addressing
IP Stack
IP Labelling Formats
IP Classes
Private Addresses
IPv4 Special and Reserved Addresses
IPv4 Multicast Addresses

Subnet Addressing
Subnet Addressing
Subnet Addressing Implementation
Subnetting more than one Octet
Practice: Subnetting
Defining a Subnet IDs
Practice: Defining a Subnet IDs
Defining Host IDs Range per Subnet
Practice: Defining Host IDs Range per Subnet
Supernetting
CIDR
Practice: Supernetting

IP Routing
TCP/IP Routing
Direct versus Indirect routing
Static Versus dynamic Routing
Advanced IP Routing
Autonomous Systems
Routing protocol Locations
Exterior Gateway Protocol
Border Gateway Protocol
Example : External and Interior Border Gateway Protocol
Integrated IS-IS
Inter Domain Routing Protocol (IDRP)
OSFP Terminology
Sub-allocation of class C addresses
Further consideration
Practice

Transport Components of TCP/IP (TCP/UDP)
TCP Transport
Connection Orientated and Connectionless Protocol Services
TCPIP Stack
TCP
Ports
Sockets
UDP/TCP Header Format
Review

IP Version 6
IP Version 6
IP Version 6 Addressing
IPv4 and IPv6 Compatibility
IP Version 6 Packet Format
IP Version 6 and Domain names
IP Version 6 Development
IP Version 6 Transition Mechanisms
Dual Stack
Tunnelling
Quality of Service Definition and Introduction
Quality of Service Concepts
Quality of Service Architecture
QoS Identification and Marking
QoS Within a Single Network Element
QoS Traffic Shaping and Policy
IP Precedence: Differential QoS (Type of Service -ToS)
Cisco QoS
Link Efficiency
Class of Servcie CoS

IP related protocols (RIP & RI 2)
RIP & RIP 2
Split Horizon
IP Packet Formats
RIP 2 Packet Formats
Review

IP related protocols (IPSec)
IPSec Introduction
IP Security Protocol
IP Security in a windows 2003 Environment
Secure Server
Configuring IPSec (Prerequisites)
Collecting Information
Preparing for Test
Configuring the IP Security Monitor
Impact of IPSec Security Policy on a Windows Computer
Allowing non-IPSec computers to communicate
Building a Custom IPSec Policy
Configuring an IKE Authentication Method
Configuring an IPsec Filter List
Configuring an IPsec Filter Action
Testing a custom IPSec Policy
IPSec Rule editor
Certificate revocation
Understanding IKE Negotiation
Toubleshooting

IP related protocols (L2TP)
Layer 2 tunnelling Protocol
L2TP Architecture
LT2P Overview
Configuration Tasks
L2TP Data Format
Attribute Pair Value (APV)
Monitor and troubleshoot VPDN & L2TP
LAC Configuration Example
LNS Configuration Example
LAC Debug Example
Command reference

IP related protocols (OSFP)
OSFP Intro
OSFP versus RIP
Link States
Link State Packets
Shortest path Algorithm
Area and Border Routers
Enabling OSFP on the Router
OSFP Authentication
Message Digest Authentication
The backbone and Area 0
Virtual Links
Partitioning the backbone
Neighbours
Adjacencies
DR election
Examples

Implementing DNS in Windows 2003
Domain Name Space
DNS in Windows 2003 Environment
Installing the DNS Server Service
Creating Active Directory Integrated Zones
Creating Forward and Reverse Lookup Zones for Windows 2003
Zones Information transfer
Converting to an Active Directory Integrated Zone
Configuring Zones for Dynamic Updates
Testing the DNS Server Service
LAB: Installing and Configuring the DNS Server Service

TCP/IP Services: Supporting DHCP and WINS
TCP/IP Configuration parameters
TCP/IP Test utilities
New DHCP Functionality
Authorising a DHCP Server In Active Directory
Dynamic Updates of DNS Servers
Configuring DHCP Scopes in Windows 2003
Creating a Superscope
Configuring a Multiscope
DHCP Process
Examining Option Classes
Automatic Private IP Addressing
Disabling Automatic Private IP
Lab Supporting DHCP and WINS
New WINS Functionality
WINS Server Functionality
WINS Client Functionality
Review

Multiprotocol Label Switching
Definition
How MPLS Works
Comparison of MPLS and IP
Comparison of MPLS and ATM
Comparison of MPLS and Traditional Routing
MPLS and its Components
Label Switching routers and Label Edge Routers
Label and Label Bindings
Label Creation and Label Distribution
Label Switched Paths and Label Spaces
Label Control
Signalling Mechanisms
Label Distribution Protocols
Traffic Engineering
Constraint Based Routing
MPLS Operations
Tunnelling in MPLS
Multicast operations
MPLS Applications
Review Questions (Self Test)

Firewalls
Introduction to Firewalls
The Different Firewall Types
Packet Layer Filtering Firewalls
Application Layer Firewalls
Firewall Policies
Connecting Firewalls
Screened Router
Dual Homed Gateway
Tri-Homed Gateway
Screened Host
Screened Subnet
Virtual Private Network
Data Encryption and Authentication
Terminal Access Control Access Control System (TACACS)
Remote Access Dial In User Service (RADIUS)
Data Encryption and Authentication

TCP/IP Applications
TCP/IP Applications
Client Server Model
TCP/IP Servers
Telnet, ftp, SMTP,MIME
R(remote) Commands
Line Printer Service PLS
NFS and Architecture
Browsers
Review Questions
TCP/IP Commands
Configuration Files
SNMP
Review Questions
LAB ftp

Remote Access Dial-In User Service (RADIUS)
Extensible Authentication Protocol
Radius
Layer 2 Tunnelling protocol
Bandwidth Allocation protocol
Configuring Outbound Connections
Creating a Dial-up Connection
Configuring a Virtual Private Network
Connecting Directly
Configuring Inbound Connections
Configuring an Internet Connection Server
Configuring a remote Access server
Configuring a Virtual Private Network Server
Module Lab: Configuring a VPN Connection
Examining Remote Access Policies
Understanding the Logic of Policy Evaluation
Enabling Caller ID
Configuring Remote Access Policy Conditions
Configuring Remote Access Policy Settings
Module Lab: Configuring and Testing Remote Access Policies
Implementing Demand Dial Routing
Configuring Routing and remote Access
Creating a Demand Dial Interface
Configuring Static IP Routes
Enabling the Role of connection Sharing
Using DHCP, DNS and WINS for small Remote Access Networks
Configuring Network Address Translation

Securing a Windows IP Environment
Analysing security
Module Lab: Implementing security
Securing Network Traffic by Using IPSec
Using IPSec to Counter Security Attacks
IPSec Security Features
Examining IPSec Process
Configuring IPSec Policies
Default Response Rule
Module Lab: Implementing IPSec between two systems
Securing Files by using IPSec
Review

JR07/01

Understanding TCP/IP

Price on request