Você está na página 1de 25

Office 365

OSS Training
Cristina Mrmureanu
OSS Trainer

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Agenda

IP addresses

Network components

OSI Layer

Ports and Protocols

DNS records
2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Networking
IP addresses

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

IP v4
It is an addresses used to identify a device in a network
Format:
32 bits, divided in network portion and host portion
It is formed out of 4 octets (4x8 bits): 172.16.81.100

Class

Subnet Mask
decimal

No. of Hosts
per network

No. of
Networks

Star-End of IP address

255.0.0.0

16 millions

127

1.0.0.0 - 126.255.255.255

255.255.0.0

65000

16000

128.0.0.0 - 191.255.255.255

255.255.255.0

254

2 millions

192.0.0.0 - 223.255.255.255

Reserved

224.0.0.0 - 239.255.255.255

Reserved

224.0.0.0 - 239.255.255.255
2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Private IPv4 addresses

IP Class

Start

End

10.0.0.0

10.255.255.255

172.16.0.0

172.31.255.255

192.168.0.0

192.168.255.255

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Network Mask

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

DHCP
Dynamic Host Configuration Protocol
Computers request IP addresses and networking
parameters automatically from a DHCP server
Dynamic allocation
Static allocation
Uses UDP

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

IPv6
It is the replacement of IPv4
Format:
128 bits, divided in network portion and host portion
It is formed of 8 portions x:x:x:x:x:x:x:x x= 4
hexadecimal digits:
2001:0DA8:E800:0000:0260:3EFF:FE47:0001
Advantages
Simplified header format for efficient packet handling
Elimination of need for network address translation
(NAT)
8

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

VPN
It is a secure channel
Headers are not interpreted until they reach the destination

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Network components
Hub, switch, router

10

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Hubs

Used for device for connecting


multiple devices together in a network

It has multiple inputs/outputs (I/O) ports,


Incoming data on 1 port is repeated an all the other ports

Works at the Physical layer - 1 of the OSI model


Cannot manage or examine traffic

11

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Switches

Used for device for connecting


multiple devices together in a network
Identifies connected devises by the MAC addresses
Forwards data only to one or multiple devices that need
to receive it
Works at the data link layer (layer 2) of the OSI model.

12

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Routers

Receives/Forwards packages
from/towards other networks
Can be connected to 1 or more networks
Most commonly is connects to the internet through the ISP
Internet service provider

Works at the Network (layer 3) of the OSI model

13

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

How the information is sent over the Internet?

Is divided and sent as packets


The information is sent as 0 and 1
1

0 0 1

1 0

It is sent in electric impulse / radio waves


103

14

01100111

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Bits and bytes

Each number/ letter has its own 0 and 1 representation:

15

27

26

25

24

23

22

21

20

128

64

32

16

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

OSI Layer

16

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Packet headers

17

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Transport Protocols
TCP

UDP

The message is split


into packets

The message is split


into packets

All packets are


numbered and verified at
the recipient side

The content is
delivered, even if a
packet is missing

If a packet is not
received, it is asked for
again

Is used most often in live


delivery it is faster
i.e. audio/video
streaming

It is used when the


content needs to be
delivered as a whole,
like in e-mails
18

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Encryption Protocols
SSL

TLS

Uses X.509certificates

Uses X.509certificates

Uses public key

Uses public key

It is applied to e-mails,
Web browsing, instant
messaging, voiceover
IP

It is applied to e-mails,
Web browsing, instant
messaging, voiceover
IP

It is initiated in layer 5
Session, but works on
layer 6 - presentation

It is initiated in layer 5
Session, but works on
layer 6 - presentation

Is the newer version of


SSL
19

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Ports and Protocols

20

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

E-mail Protocols
POP

IMAP

Receive e-mails

Receive e-mails

Uses TCP/IP

Users TCP/IP

Ports 110 and 995 (SSL)

Ports 143 and 993 (SSL)

Messages are stored


locally

Messages are stored on the


server

One user accessing the


mailbox on the server at a
time

Allows access from multiple


users

Receives the entire e-mail


once

Flags can be used : read,


delete

No folder concepts
21

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

SMTP Protocols
Simple Mail Transfer Protocol
Ports 25 , 465 and 587 (SSL)
Sending e-mails
Used by most of the e-mail providers

22

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Exchange e-mail protocols


RPC/HTTP

MAPI

Uses HTTP ports

Exchange 2013 and

Secure connection
Users UDP/TCP

Ports 80 and 443 (SSL)


Level 5 in OSI Layer

Outlook 2007, 2010 and


2013.
Outlook submits remote
operations to access and
modify the mailbox on the
server
Allows a faster connection

23

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

DNS records

24

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

DNS records overview


MX - specifies a mail server responsible for accepting
email messages
A - Returns the IP Address of a domain
CNAME - Alias/ canonical domain used if we want to access
a site also through another name

TXT - associate text with a host or other name, such as


information about a server, network, data center, and other
accounting information.

25

2014 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Você também pode gostar