TCP IP Model
TCP IP Model
TCP IP Model
The TCP/IP suite of protocols maps to a four-layer conceptual model which is based off
of the seven layer Open System Interconnection (OSI) protocol model.
The detailed function of each layer of the Open System Interconnection (OSI) protocol
model is beyond the scope of this topic, however, the 60 second overview is as follows:
Physical Layer - Defines the interface between the medium and the device. This layer
also transmits bits (ones and zeros) and defines how the data is transmitted over the
physical medium. Some examples of Network Components found at this layer are
Multiplexers, Passive Hubs, Active Hubs, Repeaters and other types of signal Amplifiers.
Data Link Layer - This layer is actually divided into to sublayers, Logical Link Control,
which mainly handles error correction and flow control and Media Access Control, which
mainly handles the communication with the network adapter card. Some examples of
Network Components found at the Data Link layer are Bridges, Switches and certain
Advanced Cable Testers.
Network Layer - This OSI layer is responsible for translating logical network address
and names such as computer names to their MAC addresses and for addressing and
routing data packets over the network. If routers at this layer can’t forward the data
frames as large as the source node has sent, this OSI layer will break down the data into
smaller units that the devices can handle. Some examples of Protocols found at the
Network Layer are IP, ARP, RARP, ICMP, RIP, OSFP, IGMP, IPX, NWLink and
NetBEUI. Some examples of Network Components found at this layer are Brouters,
Routers, some types of ATM Switches and Frame Relay hardware.
Transport Layer - The Transport Layer adds an additional connection below the Session
layer and helps manage data flow control between nodes on the network. This layer
divides the data into packets on the sending node and the transport layer of the receiving
node reassembles the message from packets. The Transport Layer provides error-
checking to guarantee error-free data delivery by requesting retransmission if some
packets don’t arrive error-free. It also sends acknowledgment of successful transmissions
back to the sending node. Some examples of Protocols found at this layer are TCP, ARP,
RARP, SPX and NWLink. Some examples of Network Components found at the
Transport Layer are Gateways and certain types of Brouters.
Session Layer - This OSI layer, as the name implies, establishes, maintains and ends
sessions between transmitting nodes across the network and manages which node can
transmit data at a certain time and for how long. Some examples of Protocols found at
this layer are Names Pipes, NetBIOS Names, RPC and Mail Slots. Some examples of
Network Components found at the Session Layer are Gateways and certain types of
Proxy Servers.
Presentation Layer - The Presentation Layer technically performs the translation of the
data from the way applications understand it to the way networks understand it on the
transmission end and then back on the receiving node. It is responsible for protocol
conversions, data encryption / decryption, and data compression / decompression where
the network is considered. Some examples of Network Components found at the
Presentation Layer are Gateways and certain types of Redirectors. There are no Protocols
that normally operate in this layer.
Application - The Application Layer of the OSI model allows access to network services
for applications specifically written to run over the network, such as email and file
transfer programs such as FTP. There are many Protocols found at the Application Layer,
some of which include FTP, TFTP, BOOTP, SNMP, SMTP, TELNET, NCP, and SMB.
Network Interface Layer - This layer effectively puts the frames on the wire from the
sending node and pulls frames off the wire at the receiving node and basically correlates
to the Physical Layer of the OSI model.
Internet Layer - Internet layer protocol of the TCP/IP suite encapsulate packets into
Internet datagrams. There are four Internet protocols that operate at this layer. The
Internet Layer basically (but not entirely) correlates to the Network Layer of the OSI
model.
Internet Protocol provides connectionless packet delivery for all other protocols
and does not guarantee packet arrival or correct packet sequence nor does it
IP
acknowledge packet delivery. IP has the main responsibility of addressing and
routing packets between nodes and it does not try to recover from network errors.
Address Resolution Protocol maps IP addresses to a physical machine addresses
(MAC addresses) that are located on the LAN. IP broadcasts a special ARP inquiry
packet containing the IP address of the destination system. The system that owns
ARP
the IP address replies by sending its physical address to the requester. The MAC
sublayer communicates directly with the network adapter card and is responsible
for delivering error-free data between network.
Internet Control Message Protocol is a message control and error-reporting
ICMP protocol used between network nodes. Higher level protocols use the information
in these datagrams to recover from any transmission or other errors.
The Internet Group Management Protocol provides a way for nodes to report
their multicast group membership to nearby multicast routers. Multicasting
allows nodes to send content to multiple other nodes within that multicast
IGMP group by sending IP multicast traffic to a single MAC address but by allowing it
to be processed by multiple nodes. IGMP is part of the Network layer of the
OSI model. Windows XP Professional supports multicast for things such as
Windows 2000 Server NetShow Services.
Transport Layer - The two Transport layer protocols provide communication sessions
between computers and these sessions can be connection oriented or connectionless, as
outlined below. The Transport Layer basically (but not entirely) correlates to the
Transport Layer of the OSI model.
Application Layer - The Application Layer is where applications that are specifically
written to operate over networks, gain their access. There are two TCP/IP services,
Winsock and the NetBIOS over TCP/IP (NetBT) interface, that network applications
most commonly use on Windows XP Professional networks. The Application Layer
basically (but not entirely) correlates to the Application Layer of the OSI model.
Winsock is the standard interface used for socket-based applications and TCP/IP
protocols. Winsock allows the network application to bind to a specific port and
Winsock
IP address on a node, initiate and accept a connection, send and receive data,
and close then close the connection.
NetBIOS over TCP/IP is the standard interface for NetBIOS services, including
name, datagram, and session services. It also provides a standard interface
between NetBIOS-based applications and TCP/IP protocols and is the network
NetBT
component that performs computer name to IP address mapping name
resolution. There are currently four NetBIOS over TCP/IP name resolution
methods: b-node, p-node, m-node and h-node.
Also, if the given system needs to communicate to other TCP/IP systems on the local
LAN or WAN it will need to utilize the TCP/IP protocol as well.
TCP/IP version 4 (IPv4) addresses are made of up four 8-bit fields (octets) and are 32-
bits in size total. Microsoft TCP/IP version 4 supports the standard classes of address,
which defines which bits are used for the network ID and which bits are used for the host
ID. There are five TCP/IP version 4 (IPv4) addresses, although for the most part, only the
A, B, and C classes are used. The system of IP address classes described here form the
basis for IP address assignment. Classless Inter-Domain Routing (CIDR) addressing is
now being used more often and I will cover that later in the article. Classless Inter-
Domain Routing is making the IP address classes in their current for "less defined", for
lack of a better term. Still, the classes form the base of any addressing scheme.
TCP/IP version 4 address are made of both a network ID and a host ID. The network ID
address identifies the physical network where the hosts exist. The host ID address
identifies the individual TCP/IP host on a network. The host ID must be unique on the
internal network, that is, no two nodes on a given network can have the same network ID
AND host ID.
[NOTES FROM THE FIELD] - You can have two hosts with the IP host name of
112.12.44 if one is on network 10 and another is on network 11. (The full IP addresses of
these hosts would be 10.112.12.44 and 11.112.12.44. The subnet mask would be
255.0.0.0.) You cannot assign both of these nodes the host address of 112.12.44 if they
are both on network 10 or both on network 11.
The "division" point between the network ID and the host ID is called the subnet mask.
The subnet mask is used to determine where the network number in an IP address ends
and the node number in an IP address begins.
The bits in a subnet mask are set consecutively from left to right and there can be no
"skips" in the setting structure. The subnet mask of 255.255.128.0 is valid because all
eight bits are set in the first two octets and the first bit of the next octet is also set.
(11111111.11111111.10000000.00000000). The subnet mask of 255.255.64.0 is not valid
because there is a "missing" bit that is not allowed.
(11111111.11111111.01000000.00000000).
[NOTES FROM THE FIELD] - The left most bit in a TCP/IP version 4 address is
called the Most Significant Bit (MSB) and has the highest value. The right most bit in a
TCP/IP version 4 address is called the Least Significant Bit (LSB) and has the lowest
value.
The value of the bits, in order from the Most Significant Bit (MSB) to the Least
Significant Bit (LSB) are 128, 64, 32, 16, 8, 4, 2, 1. These numerical designations are
what make up the TCP/IP version 4 address. Each set bit (noted by a "1") are added
together to give you the address. The TCP/IP version 4 address of 171.144.62.12 converts
to a binary number of 10101011.10010000.00111110.00001100 and a hexadecimal
number of AB.90.3E.0C
[NOTES FROM THE FIELD] - While it's important to know that the TCP/IP version 4
address converts to a binary number or a hexadecimal number it is not often used in day
to day operations of the MCSA/MCSE. It is more so for the Network Administrator. For
the 70-270 exam, concentrate on the different classes of addresses, how subnet masks
work, Classless Inter-Domain Routing (CIDR) addressing and a basic understanding of
the binary conversion of a TCP/IP version 4 address. Basically, know the Most
Significant Bit (MSB) and the Least Significant Bit (LSB) and the order of numbers.
The way I remember it was to remember that the Least Significant Bit (LSB) of each octet
was "1" and each place to the left of it doubled in value up to the end of the octet on the
far left. After the DOT I would start back to "1"
TCP/IP version 6 (IPv6) addresses are a set of specifications from the Internet
Engineering Task Force (IETF) and has been designed to overcome the current shortage
of addresses under TCP/IP version 4. TCP/IP version 6 also has some other built in
improvements that goes beyond the scope of the discussion here. The single most
important thing you will need to know for the 70-270 exam (a little more depth may be
needed for the upcoming Exam 70-275: Installing, Configuring and Administering
Microsoft .NET Server and Exam 70-276: Implementing and Administering a
Microsoft .NET Server Network Infrastructure) is that IPv6 addresses are 128 bits in
length as opposed to 32 bits under IPv4.
The original Internet Protocol defines IP addresses in five classes, Classes A through E.
Each of these classes allowed the use of one portion of the 32-bit Internet address scheme
to the network address and the remaining portion to the nodes on the network. One of the
main reason for the IP address shortage was in the situation where many companies
needed more than 254 host machines that were allowed under the Class C scheme but far
fewer than the 65,533 host addresses of the Class B scheme. They would request a unique
B Class address but often ended up not using many of the addresses within their allotted
block. This meant that many addresses with their pool were unutilized. This is one of the
main reasons the IP address pool was drying up and for this reason the big push was on
for TCP/IP version 6 (IPv6) and its 128-bit address. Because many of the Internet
authorities realized that it would be some time before IPv6 was in widespread use,
Classless Inter-Domain Routing was born.
Using Classless Inter-Domain Routing, each IP address has a network prefix that
identifies either a collection of network gateways or an individual gateway. The length of
the network prefix is also specified as part of the IP address and varies depending on the
number of bits that are needed (rather than any arbitrary class assignment structure). A
destination IP address or route that describes many possible destinations has a shorter
prefix and is said to be less specific. A longer prefix describes a destination gateway
more specifically. Routers are required to use the most specific or longest network prefix
in the routing table when forwarding packets.
201.44.112.00 is the address of the network and the "18" says that the first 18 bits are the
network part of the address, leaving the last 14 bits for the address of the node.
(Effectively, the 18 is the subnet mask from the "old" style of address classes.) Classless
Inter-Domain Routing lets one routing table entry represent a collection of networks that
exist in the forward path that don't need to be specified on that particular gateway. This
collecting of networks in a single address is sometimes referred to as a supernet as by
their definition they mean the same thing.
Subnet masks allows you to identify the network ID and the host (node) ID of an IP
address.
10011110.00010101.00111001.01101111 158.21.57.111
11111111.11111111.00000000.00000000 255.255.000.000
--------------------------------------------------------
10010110.11010111.00000000.00000000 158.21.000.000
we can determine that the network ID is 158.21 and the host ID is 57.111
Additional bits can be added to the subnet mask for a given class of addresses to subnet
networks further.
Given the following example of a B Class address using an additional bit subnet mask:
10011110.00010101.00111001.01101111 158.21.57.111
11111111.11111111.11110000.00000000 255.255.240.000 Subnet Mask
--------------------------------------------------------
10010110.11010111.00010000.00000000 150.215.016.000 Network address
we can see that rather than having the single subnet and 65534 Hosts per Subnet allowed
under the default subnet mask we are able to have up to 16 subnets with up to 4094 Hosts
per Subnet by using a Subnet Mask of 255.255.240.000.
[NOTES FROM THE FIELD] - A subnet address cannot be all 0's or all 1's.
The "A" class addressing scheme has an official start address of 0.0.0.0 and
an official last address of 127.255.255.255.
Not all of these address can be used and you will OFTEN see conflicting
information on this.
The local host will use 0.0.0.0 when it cannot reach a DHCP server when it is
set to use one and cannot assign itself an address using APIPA.
There are 126 Class A networks total, each allowed to have up to 16,777,214
hosts
There are three IP network addresses reserved for private networks. 10.0.0.0
- 10.255.255.255 with the subnet mask 255.0.0.0 is the range for Class A IP
addresses.
The "B" class addressing scheme has an official start address of 128.0.0.0 and an
official last address of 191.255.255.255.
Not all of these address can be used and you will OFTEN see conflicting information
on this.
The local host will use 0.0.0.0 when it cannot reach a DHCP server when it is set to
use one and cannot assign itself an address using APIPA.
There are three IP network addresses reserved for private networks. 172.16.0.0 -
172.31.255.255 with the subnet mask 255.240.0.0 is the range for Class B IP
addresses.
They can be used by anyone setting up internal IP networks, such as a lab or home
LAN behind a NAT or proxy server or a router. It is always safe to use these because
routers on the Internet will never forward packets coming from these addresses.
While 172.16.0.0 - 172.31.255.255 addresses with the subnet mask 255.240.0.0 are
available to only internal IP networks, they are still considered part of the Class "B"
range.
The "C" class addressing scheme has an official start address of 192.0.0.0 and an
official last address of 223.255.255.255.
Not all of these address can be used and you will OFTEN see conflicting information
on this.
The local host will use 0.0.0.0 when it cannot reach a DHCP server when it is set to
use one and cannot assign itself an address using APIPA.
There are three IP network addresses reserved for private networks. 192.168.0.0 -
192.168.255.255 with the subnet mask 255.255.0.0 is the range for Class C IP
addresses.
They can be used by anyone setting up internal IP networks, such as a lab or home
LAN behind a NAT or proxy server or a router. It is always safe to use these because
routers on the Internet will never forward packets coming from these addresses.
Class D addresses are only required if you wish to be a multicast source. You can still
receive multicast data without the need for a separate Class D address.
The IP address of 255.255.255.255 broadcasts to all hosts on the local network and
therefore, is not to be considered as part of the E class of IP addresses.
Also, if the given system needs to communicate to other TCP/IP systems on the local
LAN or WAN it will need to utilize the TCP/IP protocol as well.
PING - Ping can be used to test your TCP/IP connection by sending a message to the
remote node or gateway from a local system. (It can also be used to test the loopback
locally only to see if it is working correctly.) If the remote node or gateway receives the
message, it responds with a reply message. The reply consists of the remote's IP address,
the number of bytes in the message, how long it took to reply-given in milliseconds (ms),
the length of time-to-live (TTL) in seconds and it will also show any pack loss in terms of
percentages.
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] target_name
Switches:
-t Ping the specified host until stopped. To see statistics and continue - type
Control-Break; To stop - type Control-C.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-f Set Don't Fragment flag in packet.
-i TTL Time To Live.
-v TOS Type Of Service.
-r count Record route for count hops.
-s count Timestamp for count hops.
-j host-list Loose source route along host-list.
-k host-list Strict source route along host-list.
-w timeout Timeout in milliseconds to wait for each reply.
ARP - Displays and modifies the IP-to-Physical address translation tables used by
address resolution protocol (ARP).
Example:
> arp -s 157.55.85.212 00-aa-00-62-c6-09 .... Adds a static entry.
> arp -a .... Displays the arp table.
IPCONFIG - Use the ipconfig command to get the local system's basic IP configuration
information, including the IP address, subnet mask, and default gateway.
The IPCONFIG/all switch produces a detailed configuration report for all interfaces,
including any configured remote access adapters.
USAGE: ipconfig [/? | /all | /renew [adapter] | /release [adapter] | /flushdns | /displaydns
| /registerdns | /showclassid adapter | /setclassid adapter [classid] ]
The default is to display only the IP address, subnet mask and default gateway for each
adapter bound to TCP/IP.
For Release and Renew, if no adapter name is specified, then the IP address leases for all
adapters bound to TCP/IP will be released or renewed.
NBTSTAT [ [-a RemoteName] [-A IP address] [-c] [-n] [-r] [-R] [-RR] [-s] [-S] [interval]
]
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
-c (cache)Lists NBT's cache of remote [machine] names and their IP addresses
-n (names)Lists local NetBIOS names.
-r (resolved) Lists names resolved by broadcast and via WINS
-R (Reload) Purges and reloads the remote cache name table
-S (Sessions) Lists sessions table with the destination IP addresses
-s (sessions) Lists sessions table converting destination IP addresses to computer
NETBIOS names.
-RR(ReleaseRefresh) Sends Name Release packets to WINS and then, starts
Refresh
RemoteName - Remote host machine name.
IP address - Dotted decimal representation of the IP address.
interval - Redisplays selected statistics, pausing interval seconds between each
display. Press Ctrl+C to stop redisplaying statistics.
NETSTAT [-a] [-e] [-n] [-o] [-s] [-p proto] [-r] [interval]
ROUTE - You can use the route command line tool to display the current IP routing
table and add or delete IP routes.
ROUTE [-f] [-p] [command] [destination] [MASK netmask] [gateway] [METRIC metric]
[IF interface]
-f Clears the routing tables of all gateway entries. If this is used in conjunction
with one of the commands, the tables are cleared prior to running the command.
-p When used with the ADD command, makes a route persistent across boots of
the system. By default, routes are not preserved when the system is restarted.
Ignored for all other commands, which always affect the appropriate persistent
routes.
commands
All symbolic names used for destination are looked up in the network database file
NETWORKS. The symbolic names for gateway are looked up in the host name database
file HOSTS.
Invalid MASK generates an error, that is when (DEST & MASK) != DEST.
Example> route ADD 157.0.0.0 MASK 155.0.0.0 157.55.80.1 IF 1 The route addition
failed: The specified mask parameter is invalid. (Destination & Mask) != Destination.
Examples:
route PRINT
route ADD 157.0.0.0 MASK 255.0.0.0 157.55.80.1 METRIC 3 IF 2
destination^ mask^ gateway^ metric^ ^Interface
If IF is not given, it tries to find the best interface for a given gateway.
HOSTNAME - Hostname is used to show the local computer's host name for
authentication by the Remote Copy Protocol (RCP), Remote Shell (RSH), and Remote
Execution (REXEC) tools
TRACERT - Tracert is sometimes used to verify that IP addressing has been correctly
configured on a client. It will basically show the route taken to reach a remote system
Usage: tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name
Options:
PATHPING - Pathping also shows the route taken to reach a remote system as does
TRACERT but PATHPING does so with more detail and allows for more functionality
as well.
Usage: pathping [-g host-list] [-h maximum_hops] [-i address] [-n] [-p period] [-q
num_queries] [-w timeout] [-P] [-R] [-T] [-4] [-6] target_name
Options:
-g host-list Loose source route along host-list
-h maximum_hops Maximum number of hops to search for target.
-i address Use the specified source address.
-n Do not resolve addresses to hostnames.
-p period Wait period milliseconds between pings.
-q num_queries Number of queries per hop.
-w timeout Wait timeout milliseconds for each reply.
-P Test for RSVP PATH connectivity.
-R Test if each hop is RSVP aware.
-T Test connectivity to each hop with Layer-2 priority tags.
-4 Force using IPv4.
-6 Force using IPv6.
There are additional tools that can be used to test TCP/IP connectivity. They are standard
use tools for the TCP/IP protocol.
FTP
- FTP is the File Transfer Protocol and it is used to transfer files from system to system.
The command line FTP allows for more functionality. FTP is considered to be a
connected session using Transmission Control Protocol (TCP).
FTP [-v] [-d] [-i] [-n] [-g] [-s:filename] [-a] [-w:windowsize] [-A] [host]
-v Suppresses display of remote server responses.
-n Suppresses auto-login upon initial connection.
-i Turns off interactive prompting during multiple file transfers.
-d Enables debugging.
-g Disables filename globbing (see GLOB command).
-s:filename - Specifies a text file containing FTP commands; the commands will
automatically run after FTP starts.
-a Use any local interface when binding data connection.
-A - login as anonymous.
-w:buffersize - Overrides the default transfer buffer size of 4096.
host - Specifies the host name or IP address of the remote host to connect to.
[NOTES FROM THE FIELD] - Use mget and mput commands take y/n/q for
yes/no/quit.
Use Control-C to abort actively executing commands.
TFTP - The Trivial File Transfer Protocol allows for the connectionless transfer of files
to and from systems using User Datagram Protocol (UDP).
While TFTP is limited in functionality, there are still some command line switches that
can be used to tailor its performance.
TFTP [-i] host [GET | PUT] source [destination]
-i Specifies binary image transfer mode (also called octet). In binary image mode
the file is moved literally, byte by byte. Use this mode when transferring binary
files.
host - Specifies the local or remote host.
GET - Transfers the file destination on the remote host to the file source on the
local host.
PUT - Transfers the file source on the local host to the file destination on the
remote host.
source - Specifies the file to transfer.
destination - Specifies where to transfer the file.
-a Attempt automatic logon. Same as -l option except uses the currently logged on
user's name.
-e Escape character to enter telnet client prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system. Requires that the
remote system support the TELNET ENVIRON option.
-t Specifies terminal type. Supported term types are vt100, vt52, ansi and vtnt
only.
host - Specifies the hostname or IP address of the remote computer to connect to.
port - Specifies a port number or service name.
RCP - RCP copies files to and from computer running the RCP service. RCP uses the
Transmission Control Protocol (TCP) toutilize the connected and reliable delivery of data
between the client and the host and can be scripted in a batch file and does not require a
password. The remote host must be running the RSHD service, and the user’s username
must be configured in the remote host’s .rhosts file. RCP is one of the r-commands
available on all UNIX systems.
-a Specifies ASCII transfer mode. This mode converts the EOL characters to a
carriage return for UNIX and a carriage return/line feed for personal computers.
This is the default transfer mode.
-b Specifies binary image transfer mode.
-h Transfers hidden files.
-r Copies the contents of all subdirectories; destination must be a directory.
host Specifies the local or remote host. If host is specified as an IP address OR if
host name contains dots, you must specify the user.
.user: Specifies a user name to use, rather than the current user name.
source Specifes the files to copy.
path\destination Specifies the path relative to the logon directory on the remote
host. Use the escape characters (\ , ", or ') in remote paths to use wildcard
characters on the remote host.
RSH - RSH is a TCP/IP utility that enables clients to run commands directly on remote
hosts running the RSH service without having to log on to the remote host. RSH is one of
the UNIX r-commands that are available on all UNIX systems.
Remote Assistance configuration is accessed and settings are enabled via the System
Properties page on a Windows XP system either by selecting it from the Start Menu by
right clicking My Computer and choosing Properties or by selecting My Computer from
the Windows Explorer and right clicking My Computer and choosing Properties.
[NOTES FROM THE FIELD] - What your Start Menu options look like all depend on
how you have the menu set. If you are using the Classic Start Menu, you would not see
My Computer as a selection to right click on.
I seem to continually repeat this from article to article, but it is important to stress, the
Windows XP Professional exam rarely tests you on Classic anything. You need to know
how to get from Windows XP Professional settings to Classic and back, but in 90% of the
cases you're going to find instructions laid out in the Windows XP Professional vein. I
will do my best to point out alternatives in the [NOTES FROM THE FIELD] section as
I have done here.
Local Administrators and certain permitted individuals have the rights to make
configuration settings for the local systems to allow or prevent remote assistance
invitations. Once the system is properly configured by the Administrator, any user can
make a request for remote assistance.
After the Properties page has been brought up for a local system, it can be set to allow
Remote Assistance invitations by selecting the Allow Remote Assistance invitations to
be sent from this computer checkbox on the Remote tab.
Once this option is set the Advanced button becomes available which displays the
Remote Assistance Settings dialog box when selected.
[NOTES FROM THE FIELD] - The default settings are shown in the image above. You
can configure the Invitation settings in the drop down menu of numbers in a range from
1 to 99 and the definition box to the right can be set to MINUTES, HOURS, or DAYS.
There are many different ways to solicit help via Remote Assistance. I will outline the
main ways to ask via the local system.
You can ask for Remote Assistance via the Windows Messenger by logging in to the
Windows Messenger and going to Actions on the Menu bar and selecting Ask for
Remote Assistance.
This allows you to select a person from your list of contacts, provided they are online at
the time.
You can also select the Other tab to enter the e-mail address of another person to contact.
The invitation from the My Contacts list will show up in the conversation window.
Also, if you already have a conversation session established with the person you want to
request help from, you can simply select the Ask for Remote Assistance button from the
I want to....menu.
Once the person accepts the invitation you will see a dialog box asking you to confirm
permission. In order for the session to continue you would need to click Yes.
They can then operate on your system at whatever level of control that has been allowed.
(Either view or full control.)
[NOTES FROM THE FIELD] - The client requesting the remote session maintains
ultimate control of the session even thought they have granted temporary controlling
access to the invitee. Although you relinquish control of your computer temporarily, you
retain control over the Remote Assistance session itself. The client requesting the remote
session can end the session immediately by clicking the Stop Control button or pressing
the ESC key.
You can also initiate a session via Help and Support from the Start Menu.
This will open the Help and Support Center where you can ask for assistance from the
main menu.
Selecting Invite a friend to connect to your computer with Remote Assistance from
the Ask a friend to help section (from the Support menu on the left section of the
screen, not shown in the above image) will bring you to the next Help and Support Center
window.
From here you can select Invite someone to help you which will open the next screen to
select either a Windows Messenger user or allow you to make a solicitation by email.
You can select a user from the list and click the Invite this person button which will
bring up the Web Page Dialog box.
[NOTES FROM THE FIELD] - This box will stay open until it is accepted on the
remote end or cancelled on the requesting end.
To configure your Windows XP Professional system as a DNS client you need to either
go to the Control Panel and click Network And Internet Connections or go to My
Network Places on the start menu, right click it and choose Properties.
In the Network Connections window you would right click your Local Area Connection
(which is the default location to set the local system as a DNS client) and choose
Properties.
On the property page for the Local Area Connection you would highlight the TCP/IP
protocol on the general tab and select the Properties button.
The image below shows a client configured to use the DHCP (as the Obtain an IP address
automatically radio button is set) or APIPA service (in the event the DHCP server is
unavailable). This is also the default selection for the TCP/IP properties at operating
system installation and/or protocol installation when the Typical Settings radio button is
selected.
The client can be configured to use a static (fixed) or dynamic IP address. In either case,
configuring the system as a DNS client is exactly the same.
[NOTES FROM THE FIELD] - Windows XP Professional, like Windows 98 and
Windows 2000, uses Automatic Private IP Addressing which will provide DHCP clients
an IP address and limited network connectivity (usually the same subnet only) in the
event a DHCP server is unavailable. The Automatic Private IP Addressing feature uses
the reserved 169.254.0.0 through 169.254.255.255 IP address range and is enabled by
default, but it can be disabled by configuring the settings on the client to use an alternate
configuration if a DHCP server cannot be located.
When you select the Obtain DNS Server Address Automatically option, your
network's Dynamic Host Configuration Protocol (DHCP) server will provide the IP
address of a DNS server to the client.
When you elect to choose Use The Following DNS Server Addresses, you will
manually list the IP address of the Preferred DNS Server and the optional Alternate DNS
Server address that you want the client to use.
You can also click on the Advanced button and enter these values as well as some other
settings.
You can set the client's DNS server addresses in the upper box and arrange them in order
of use from top to bottom (the first two entries of which will be any settings you provided
on the main TCP/IP page) by entering them with the Add button and using the arrows on
the right side to change their order.
There are also other sections on this property page where more settings can be
configured. The Append Primary And Connection Specific DNS Suffixes option is
selected by default and this setting tells the DNS resolver to append the client name to the
primary domain name, as well as the domain name defined in the DNS Domain Name
field. The resolver then searches for the Fully Qualified Domain Name. If the search for
the Fully Qualified Domain Name fails, the DNS resolver will use the entry (if any)
supplied in the DNS Suffix For This Connection text box.
If the DHCP server has been enabled to configure this connection and you do not specify
a DNS suffix, the connection is assigned by the DHCP server. If you specify a DNS
suffix, it is used instead.
The Append Parent Suffixes Of The Primary DNS Suffix check box is enabled by
default and this configuration causes the DNS resolver to drop the leftmost portion of the
primary DNS suffix and attempt to use the resulting domain name. If this fails, it
continues dropping the next leftmost name and repeating this process until only two
names such as 2000Trainers and COM remain. Rather than do this, you might opt to set
the Append These DNS Suffixes (In Order) radio button which will allow you to
specify a list of domains for the DNS resolver to try. The DNS resolver will attempt each
one of these suffixes, one at a time and in the order you specified in the text box. Any
attempts are limited to the domains that you have listed in here.
You can also select the Register This Connection's Addresses In DNS check box
which will cause the client itself to attempt to dynamically register the IP addresses via
DNS with its full computer name as shown on the Computer Name tab of the System
properties page.
The last available option to set from this property page is the Use This Connection's
DNS Suffix In DNS Registration check box which uses DNS dynamic updates to
register the IP addresses and the connection-specific domain name. The connection-
specific name is the computer name, (the first label of the full computer name specified in
the Computer Name tab), and the DNS suffix of this connection. If the Register This
Connection's Addresses In DNS check box is selected, this registration enabled here is
in addition to the DNS registration of the full computer name.