Chapter 13 Introduction to Networking

108
© 2011 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of The Complete A+ Guide to PC Repair 5/e Chapter 13 Introduction to Networking

description

The Complete A+ Guide to PC Repair 5/e. Chapter 13 Introduction to Networking. Chapter Objectives. Differentiate between peer-to-peer and server-based networks Identify commonly used network topologies Compare and contrast types of network cabling - PowerPoint PPT Presentation

Transcript of Chapter 13 Introduction to Networking

© 2011 Pearson Addison-Wesley. All rights reserved.

Addison Wesley is an imprint of

The Complete A+ Guideto PC Repair 5/e

Chapter 13Introduction to Networking

Chapter 13Introduction to Networking

© 2011 Pearson Addison-Wesley. All rights reserved.

Differentiate between peer-to-peer and server-based networks

Identify commonly used network topologies

Compare and contrast types of network cabling

Explain the differences between various network access methods

Explain how Ethernet works

Identify OSI model layers and the network devices that work at each layer

Chapter ObjectivesChapter Objectives

© 2011 Pearson Addison-Wesley. All rights reserved.

Articulate commonly used network protocols

Define the purpose and identification of a MAC address and an IP address

Apply IP addressing concepts

Define the purpose of DHCP and DNS

Configure a computer for network connectivity

Use common network troubleshooting tools

Access a network printer

Define common networking terms

Chapter ObjectivesChapter Objectives

© 2011 Pearson Addison-Wesley. All rights reserved.

Identify and define the function of the basic parts of a wireless network

Distinguish between ad hoc and infrastructure wireless NICs

List the different types of wireless NICs

Explain the purpose of an SSID and channel ID

List the three non-overlapping channel IDs used in wireless networks

Contrast dBd with dBi

Chapter ObjectivesChapter Objectives

© 2011 Pearson Addison-Wesley. All rights reserved.

Define and explain how to perform a basic wireless site survey

Compare and contrast the 802.11a, 802.11b, 802.11g, and 802.11n wireless standards

After completing this chapter you will be able to:

Explain the basic protocols used with email

Describe how to be a proactive technician

Chapter ObjectivesChapter Objectives

© 2011 Pearson Addison-Wesley. All rights reserved.

Networking OverviewNetworking Overview

• Many networks are found all around us. - The network of roads and interstate

highways- The telephone network- The electrical network that provides

electricity to our homes- The cellular network that allows cell phones to connect

to one another as well as connectivity between cell phones and the wired telephone network and the Internet

- Air traffic control network- Our network of friends and family

© 2011 Pearson Addison-Wesley. All rights reserved.

Networking OverviewNetworking Overview

Network – Two or more devices capable of communicating and sharing resources between them.

-Types of networks

PAN – Personal devices such as PDAs, keyboards, mice, headsets, communicate in close proximity through a wired or wireless network.

1

2 LAN – A group of devices sharing resources in a single area such as a room or a building.

3 MAN – Connectivity of sites within a city.

4 WAN – Communication between LANs on a larger geographic scale—the Internet is the largest.

© 2011 Pearson Addison-Wesley. All rights reserved.

Types of Local Area NetworksTypes of Local Area Networks

• There are two basic types of LANs, a server-based network and a peer-to-peer network.

• Server-based network - Users login to a server, that knows who is authorized to connect to the LAN and what resources the user is authorized to access. • Usually found in businesses comprising of 10 or more

computers.

• Also known as a client/server network.

• Collectively, these servers and client computers are part of one or more domains.

© 2011 Pearson Addison-Wesley. All rights reserved.

Server-Based NetworkServer-Based Network

© 2011 Pearson Addison-Wesley. All rights reserved.

Types of Local Area NetworksTypes of Local Area Networks

• Peer-to-Peer Network - A type of LAN wherein each computer user acts as a server. - Each computer stores password and sharing information for

its own resources. - Usually has fewer than 10 computers- The more resources that are shared on peer-to-peer

network, the more passwords and more cumbersome password management will be.

• Workgroup - A term given to a peer-to-peer Windows network. • A workgroup does not use a server to authenticate users

during the login process.

© 2011 Pearson Addison-Wesley. All rights reserved.

Peer-to-Peer NetworkPeer-to-Peer Network

© 2011 Pearson Addison-Wesley. All rights reserved.

Ethernet LANsEthernet LANs

Ethernet adapters are the most common network cards.

Ethernet is the most common type of LAN

The RJ-45 jack is the most common type of Ethernet port.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network Topologies Network Topologies

• Star Topology

• Extended Star Topology

• Hierarchical Topology

• Ring Topology

• Bus Topology

• Mesh Topology

Network topology is how the network is wired.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TopologiesNetwork Topologies

• Hub- A device used with the universal serial bus or in a star network topology that allows multiple device connections. • A network hub cannot look at each data frame coming

through its ports like a switch does.

• Switch- In star networks, a Layer two central controlling device. • Looks like a hub• Looks at each data frame as it comes through each port.

© 2011 Pearson Addison-Wesley. All rights reserved.

Tech Tip – Ethernet LANs are wired in a starTech Tip – Ethernet LANs are wired in a star

• The most common network topology used today is the star topology because it is used with Ethernet networks.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TopologiesNetwork TopologiesTopologyBus

Hierarchical

Mesh

Ring

DescriptionNot common anymore; takes less cable (cheaper); but with a break in the bus, the network is down.

A common design model for businesses with quite a few computers.

With a break in the cable, the network still works (very fault tolerant), but it takes a lot of cabling. Expensive and complex—hard to configure.

Each network device connects to two adjacent network devices. It is easy to install, but requires expensive parts. A ring topology is used with fiber.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TopologiesNetwork TopologiesTopologyStar

Extended Star

DescriptionThe easiest to install, is the most common (because of it being used with Ethernet), and a break in a workstation cable does not affect the rest of the network. More cable is used in wiring a star topology, but the type of cable used is comparatively cheap star topologies are easy to troubleshoot.

The Extended Star topology contains multiple hubs or switches. If one hub or switch goes down, only those devices connected to that hub or switch will fail to work. A network cable will connect the device to hub or switch.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network Media OverviewNetwork Media Overview

- Networks require some type of medium to transmit data.

- This medium is normally some type of cable or air.

- The most common types of cable are twisted-pair copper and fiber-optic, although some very old networks used coax cable and video networks use coax.

© 2011 Pearson Addison-Wesley. All rights reserved.

PlasticEncasement Vinyl Insulator

MediumTo

Transmit Data

Copper Conductor

Unshielded Twisted-Pair

© 2011 Pearson Addison-Wesley. All rights reserved.

Copper MediaCopper Media

Twisted-Pair Cable – Network cable of eight copper

wires twisted into four pairs. Comes shielded and

unshielded.

UTP (Unshielded Twisted-Pair) – Most common

network cable. Comes in different categories for different

uses.

STP (Shielded Twisted-Pair) – Network cable with extra

foil to prevent outside noise form interfering with data on

the cable.

Crosstalk – A type of EMI where signals from one wire

interfere with the data on an adjacent wire.

© 2011 Pearson Addison-Wesley. All rights reserved.

UTP CableUTP Cable

Figure 13.6

© 2011 Pearson Addison-Wesley. All rights reserved.

Copper MediaCopper Media

Plenum cable - A type of cable that is treated with fire retardant materials so it is less of a fire risk.

PVC (polyvinyl chloride) – Cable that has a plastic insulation or jacket that is cheaper and easier to install than plenum cable.

It can have flame-retardant added.

© 2011 Pearson Addison-Wesley. All rights reserved.

UTP Wiring StandardsUTP Wiring Standards

Figure 13.7

© 2011 Pearson Addison-Wesley. All rights reserved.

RJ-45 pin 1 AssignmentsRJ-45 pin 1 Assignments

Figure 13.8

© 2011 Pearson Addison-Wesley. All rights reserved.

UTP Cable CategoriesUTP Cable Categories

© 2011 Pearson Addison-Wesley. All rights reserved.

Coaxial CableCoaxial Cable

Coaxial cable - Type of network cabling used in video networks, older Ethernet networks, as well as mainframe and minicomputer connections.

Has a copper core, surrounded by insulation and shielding from EMI.

© 2011 Pearson Addison-Wesley. All rights reserved.

Coax Cable with ConnectorCoax Cable with Connector

Figure 13.9

© 2011 Pearson Addison-Wesley. All rights reserved.

Fiber MediaFiber Media

• Fiber-optic cable is made of glass or a type of plastic fiber and is used to carry light pulses.• Fiber-optic cable can be used to connect a

workstation to another device, but in industry, the most common use of fiber-optic cable is to connect networks together forming the network backbone.

• Fiber-optic cabling has many advantages including security, long distance transmission, and bandwidth.

© 2011 Pearson Addison-Wesley. All rights reserved.

Fiber MediaFiber Media

• Single-mode- A type of fiber-optic cabling that sends one light beam down the cable.

• Multi-mode- A type of fiber-optic cabling that allows multiple light signals to be sent along the same cable.

• Which fiber should I use?– Multi-mode fiber is cheaper and more commonly used

than single-mode fiber and is good for shorter distance applications; but single-mode fiber can transmit a signal farther than multi-mode and supports the highest bandwidth.

© 2011 Pearson Addison-Wesley. All rights reserved.

Fiber ConnectorsFiber Connectors

© 2011 Pearson Addison-Wesley. All rights reserved.

Protecting Your Network and Cable InvestmentProtecting Your Network and Cable Investment

Professional cable management systems keep cables organized.

A secure room or cabinet should be used to store network devices.

If possible network cabling should be installed in conduit or raceways.

© 2011 Pearson Addison-Wesley. All rights reserved.

Ethernet Issues and ConceptsEthernet Issues and Concepts

• Half-duplex - A serial device setting that allows either the sending or the receiving device to send data, one device at a time. - On a cable, half-duplex is the ability to transmit in

both directions but not at the same time.

• Full-duplex - A serial device setting that allows the sending and receiving device to send data simultaneously. - On a cable, full-duplex is the ability to transmit data in

both directions simultaneously.

© 2011 Pearson Addison-Wesley. All rights reserved.

Ethernet Issues and ConceptsEthernet Issues and Concepts

• Ethernet networks were originally designed for half-duplex transmission on a 10Mbps bus topology. - The more workstations on the same network, the

more collisions occur and the more network slows down.

- In addition, with half-duplex Ethernet, less than 50 percent of the 10Mbps available bandwidth could be used because of the collisions and the time it takes for a network frame to transmit across the wire.

© 2011 Pearson Addison-Wesley. All rights reserved.

Ethernet Issues and ConceptsEthernet Issues and Concepts

• Full-duplex more than doubles the amount of throughput on a network because of the lack of collisions and transmitting both directions simultaneously.

• Full-duplex is used when a switch is used to connect network devices together.

© 2011 Pearson Addison-Wesley. All rights reserved.

Tech Tip – Why a switch is better than a hubTech Tip – Why a switch is better than a hub

When a workstation sends data to a hub, the hub broadcasts the data out all ports except for the port the data came in on.

A switch, on the other hand, keeps a table of addresses. When a switch receives data, the switch looks up the destination MAC address in the switch table and forwards the data out the port for which it is destined. A switch looks very similar to a hub and it is sometimes hard to distinguish between the two.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network StandardsNetwork Standards

IEEE committees create network stands called the 802 standards.

© 2011 Pearson Addison-Wesley. All rights reserved.

OSI ModelOSI Model

• OSI Model (Open Systems Interconnect Model) – A standard for information transfer across a network by the ISO. • The model has seven layers – each layer uses the

layer below it, and each layer provides some function to the one above it.

© 2011 Pearson Addison-Wesley. All rights reserved.

OSI ModelOSI Model

• The model sets several guidelines or describes− how the different transmission media are arranged and

interconnected

− how network devices that use different languages communicate with one another

− how a network device goes about contacting another network device

− how and when data gets transmitted across the network

− how data is sent to the correct device

− how a receiving device knows if the network data was received properly

© 2011 Pearson Addison-Wesley. All rights reserved.

OSI Model LayersOSI Model Layers

© 2011 Pearson Addison-Wesley. All rights reserved.

Encapsulated Data in the OSI Model Encapsulated Data in the OSI Model

• Bits – encapsulated data found at Layer 1• Frame - encapsulated data found at Layer 2• Packet- encapsulated data found at Layer 3• Segment – encapsulated data found at Layer 4• Data – any encapsulated info at Layers 5 through 7

© 2011 Pearson Addison-Wesley. All rights reserved.

OSI Model TermsOSI Model Terms

• ISP (Internet service provider)- A vendor that provides connection to the Internet.

• Authentication- The process of determining that a network device or person has permission to access a network.

The OSI model is very confusing when you are first learning about networking, but it is very important. Understanding the model helps when troubleshooting a network.

© 2011 Pearson Addison-Wesley. All rights reserved.

Tech Tip – OSI MnemonicTech Tip – OSI Mnemonic

• A mnemonic to help remember the OSI layers. − A

− Person

− Seldom

− Takes

− Naps

− During

− Parties

• For example, A in the phrase is to remind you of the application layer. • P in Person is to remind you of the presentation layer, and so

on.

© 2011 Pearson Addison-Wesley. All rights reserved.

The TCP/IP ModelThe TCP/IP Model

• A network protocol is a data communication language. − A set of rules for communication between two end

devices

• A protocol suite is a group of protocols that are designed to work together.

• TCP/IP (Transmission Control Protocol/Internet Protocol) – the protocol suite used in networks today. − It is the most common network protocol and is required

when accessing the Internet.

© 2011 Pearson Addison-Wesley. All rights reserved.

TCP/IP ModelTCP/IP Model

TCP/IP Model

• Application

• Transport

• Internet

• Network Access

• The TCP/IP model consists of four layers.

© 2011 Pearson Addison-Wesley. All rights reserved.

The TCP/IP ModelThe TCP/IP Model

• The TCP/IP protocol suite consists of many protocols

TCP (Transmission Control Protocol)

IP (Internet Protocol)

DHCP (Dynamic Host Configuration Protocol)

FTP (File Transfer Protocol)

HTTP (HyperText Transfer Protocol)

© 2011 Pearson Addison-Wesley. All rights reserved.

The TCP/IP Model LayersThe TCP/IP Model Layers

TCP/IP-based application-layer protocols format data specific for the

purpose. Is equivalent to the application, presentation, and

session layers of the OSI model. Protocols include HTTP, Telnet, DNS, HTTPS, FTP, TFTP, TLS,

SSL, POP, SNMP, IMAP, NNTP, and SMTP.

Application Transport

Network accessInternet

The TCP/IP model is a real model. The OSI model is theoretical.

Transport-layer protocols add port numbers in the header so the computer can identify which application is sending the data. When data returns, this port number allows the computer to determine into whichwindow on the screen to place the data. Protocols include TCP and UDP.

Sometimes called the internetwork layer. IP is the most common Internet

layer protocol. IP adds a source and destination IP address to uniquelyidentify the source and destination

network devices.

Called link layer in the original RFC. Defines how to format the data for the type of network being used. Defines the type of connector used and puts the data onto the network, whether it be voltage levels for 1s and 0s on the copper cable or pulses of light for fiber.

© 2011 Pearson Addison-Wesley. All rights reserved.

The TCP/IP Model LayersThe TCP/IP Model Layers

© 2011 Pearson Addison-Wesley. All rights reserved.

Tech Tip – Use netstat to view current connectionsTech Tip – Use netstat to view current connections

• To see current connections and associated port numbers, bring up a command prompt and type netstat.

© 2011 Pearson Addison-Wesley. All rights reserved.

Networking AddressingNetworking Addressing

Ethernet network adapters normally have two types of addresses assigned to them – a MAC address and an IP address.

MAC address (media access control address) – One of two types of addresses assigned to network adapters, used when two devices on the same network communicate.

Known as a Layer two address.

© 2011 Pearson Addison-Wesley. All rights reserved.

MAC AddressMAC Address

Network adapter has this address burned into a ROM chip

48-bit address shown in hexadecimal

Also known as a Layer 2 address

© 2011 Pearson Addison-Wesley. All rights reserved.

IP AddressIP Address

© 2011 Pearson Addison-Wesley. All rights reserved.

IP Addressing Basic TermsIP Addressing Basic Terms

An IP address is broken into two major parts: the network number and the host number.

Host – A network device. It also represents the part of an IP address that identifies a unique network device.

Network Number- Portion of an IP address that represents which network the computer is on.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network AddressNetwork Address

© 2011 Pearson Addison-Wesley. All rights reserved.

IP Addressing (network and host portions) IP Addressing (network and host portions)

Figure 13.18

• Class A IP address – 0-127 in the first octet.

• Only the first octet is the network part.

• Class B IP address – 128-191 in the first octet.

• The first two octets are the network part.

• Class C IP address – 192-223 in the first octet.

• The first three octets are the network part.

© 2011 Pearson Addison-Wesley. All rights reserved.

IP Addressing TermsIP Addressing Terms

Broadcast AddressBroadcast Address

Subnet MaskSubnet Mask

A number the computer uses to determine which part of an IP address represents the network and which portion represents the host.

An IPv4 address used to communicate with all devices on a specific network.

© 2011 Pearson Addison-Wesley. All rights reserved.

IP Addressing (two network example)IP Addressing (two network example)

© 2011 Pearson Addison-Wesley. All rights reserved.

Subnetting BasicsSubnetting Basics

• In business, the subnet mask used does not usually correspond to the class of IP address being used.

• For example, at the college, the IP address 10.104.10.88 and subnet mask 255.255.255.0 are assigned to a computer. − The 10 in the first octet shows that this is a class An IP

address with a default mask of 255.0.0.0. − The 255 in the subnet mask is made up of eight 1s in

binary in the first octet (11111111) followed by all 0s in the remaining octets (00000000.00000000.00000000).

© 2011 Pearson Addison-Wesley. All rights reserved.

Important Rules in SubnettingImportant Rules in Subnetting

The network number cannot be assigned to any device on the network.

The network number contains all 0s in the host portion of the address.

Note that this does not mean that the number will be 0 in decimal. This is explained next.

The broadcast address (the number used to send a message to all devices on the network) cannot be assigned to any device on the network.

The broadcast address contains all 1s in the host portion of the address.

Note that this does not mean that the number will be 255 in decimal.

© 2011 Pearson Addison-Wesley. All rights reserved.

Tech Tip-Mask in prefix notationTech Tip-Mask in prefix notation

Subnet masks in network documentation are commonly shown in prefix notation, using a slash with the number of consecutive 1s found in the subnet mask. For example, 10.104.10.88 255.255.255.0 is shown as 10.104.10.88/24 and 192.168.10.213/27 is the same as a 255.255.255.224 subnet mask.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network Connection TypesNetwork Connection Types

© 2011 Pearson Addison-Wesley. All rights reserved.

DUN (Dial-Up-Networking)DUN (Dial-Up-Networking)

• DUN is used when a remote computer that dials into the Internet or into a company network device uses a modem.

• The type of connection, protocol, and settings that you configure on the remote computer depends on the company to which you are connecting.

• A connection protocol used with dial-up networking is PPP. • PPP (Point-to-Point Protocol) is connection-oriented, layer

two protocol that encapsulates data for transmission over various connection types.

© 2011 Pearson Addison-Wesley. All rights reserved.

Wireless Network OverviewWireless Network Overview

• Wireless networks are networks that transmit data over air using either infrared or radio frequencies. • Most wireless networks in home and businesses use

radio frequencies.

• Wireless networks normally operate at layers one and two of the OSI model.

• Wireless networks are very popular in home and business computer environments and are great in places that are not conducive to having cabling, such as outdoor centers, convention centers, bookstores, coffee shops and hotels.

© 2011 Pearson Addison-Wesley. All rights reserved.

BluetoothBluetooth

Bluetooth is a wireless technology for PANs (personal area networks).

Bluetooth devices include PDAs (personal digital assistants), audio/visual products, automotive accessories, keyboards, mice, phones, printer adapters, cameras, wireless cell phone headset, sunglasses with a radio and wireless speakers, and other small wireless devices.

© 2011 Pearson Addison-Wesley. All rights reserved.

BluetoothBluetooth

Bluetooth works in the 2.4GHz range similar to business wireless networks, has three classes of devices (1, 2, and 3) that have a range of approximately 6 meters (19.6 feet), 22 meters (72.1 feet), and 100 meters (328 feet), respectively, and a maximum transfer rate of 3Mbps.

Bluetooth supports both data and voice transmissions.

© 2011 Pearson Addison-Wesley. All rights reserved.

Tech Tip-Missing Bluetooth Control Panel Tech Tip-Missing Bluetooth Control Panel

© 2011 Pearson Addison-Wesley. All rights reserved.

Bluetooth TroubleshootingBluetooth Troubleshooting

Move aroundMove around

Change the location of the Bluetooth device – try moving it closer to and further from the computer.

BatteriesBatteries

If the Bluetooth device has batteries, ensure that they are installed correctly and are functioning.

Ensure that no other devices that could interfere in the 2.4GHz range are in the area.

Watch out for 2.4GhzWatch out for 2.4Ghz

Remove all other Bluetooth devices.

Remove Bluetooth Remove Bluetooth

Remove any unused USB devices.

Remove USBRemove USB

© 2011 Pearson Addison-Wesley. All rights reserved.

Bluetooth – More TroubleshootingBluetooth – More Troubleshooting

Service started?Service started?

Use the Administrative Tools control panel to access Computer Management tool. Select Services and Applications in the list on the left. Click Services in the right panel. Locate and double-click Bluetooth Support Service. Ensure that the service is set to automatic and is started.

Transceiver used?Transceiver used?

If a Bluetooth transceiver is used, move the transceiver to another USB port.

© 2011 Pearson Addison-Wesley. All rights reserved.

Wireless Network TypesWireless Network Types

• There are two main types of wireless networks: ad hoc and infrastructure.

Ad hocAd hoc InfrastructureInfrastructure

A type of wireless network that contains an access point for wireless devices to be connected together.

Used in wireless networks where no access point is used. Instead, wireless devices connect to one another.

© 2011 Pearson Addison-Wesley. All rights reserved.

Wireless NICsWireless NICs

PC Card

USB PCI PCIe

• Wireless NICs communicate with an access point in infrastructure mode.

• Wireless NICs can be connected in many ways.

© 2011 Pearson Addison-Wesley. All rights reserved.

Wireless Network TermsWireless Network Terms

Access point

SSID (Service

Set Identifier)

© 2011 Pearson Addison-Wesley. All rights reserved.

Tech Tip – Channel must matchTech Tip – Channel must match

Frequency

The channel ID (frequency) must be the same between the access point and the wireless NIC for communication to occur between any wireless devices on the same wireless network.

© 2011 Pearson Addison-Wesley. All rights reserved.

Non-overlapping ChannelsNon-overlapping Channels

© 2011 Pearson Addison-Wesley. All rights reserved.

Antenna BasicsAntenna Basics

• An antenna is used to radiate or receive radio waves.

• Two major categories of antennas

– Omnidirectional – Radiates energy in all directions

– Directional – Radiates energy in a specific direction

© 2011 Pearson Addison-Wesley. All rights reserved.

Antenna BasicsAntenna Basics

• Attenuation – The amount of signal loss of a radio wave as it travels through the air.

• Antenna gain is measure in dBi, which is a measurement of decibels in relationship to an isotropic antenna. (The “i” is for isotropic). • Some antennas are shown with a measurement of dBd

instead of dBi. This measurement is referenced to a dipole antenna. (the “d” at the end is for dipole).

• Site Survey – Used in wireless networks design to determine the best wireless hardware placement for the optimum coverage area.

© 2011 Pearson Addison-Wesley. All rights reserved.

Wireless Network StandardsWireless Network Standards

• The IEEE 802.11 committees define standards for wireless networks and these can be quite confusing.

• 802.11-based wireless networks use CSMA/CA as an access method. - Network devices listen on the cable for conflicting

traffic. - The workstation then waits a small amount of time for

all other workstations to hear the jam signal, and then the workstation begins transmission.

© 2011 Pearson Addison-Wesley. All rights reserved.

IEEE 802.11 StandardsIEEE 802.11 Standards

© 2011 Pearson Addison-Wesley. All rights reserved.

Wired or Wireless NIC InstallationWired or Wireless NIC Installation

Determine that an appropriate slot, port, or integrated wireless NIC is available.

1

2 In a corporate environment, the computer must have a unique name.

4 Configure TCP/IP parameters.

3 Obtain and install the appropriate NIC driver.

© 2011 Pearson Addison-Wesley. All rights reserved.

TCP/IP ConfigurationTCP/IP Configuration

• DHCP (Dynamic Host Configuration Protocol) – A method to automatically assign IP addresses to network devices from a pool of IP addresses.

• Default Gateway - The IP address of the Layer three device, such as a router, that is directly connected to its immediate network. • It tells a device on its network where to send a packet

destined for a remote network.

© 2011 Pearson Addison-Wesley. All rights reserved.

Tech Tip-How to assign a default gatewayTech Tip-How to assign a default gateway

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TermsNetwork Terms

URLURL

Uniform Resource Locator – A method of accessing Internet resources

DNSDNS

Domain Name System server – translates Internet names into IP addresses

Windows Internet Naming Service server – Keeps track of IP addresses assigned to a specific computer name.

WINSWINS

© 2011 Pearson Addison-Wesley. All rights reserved.

Default GatewayDefault Gateway

Figure 13.41

© 2011 Pearson Addison-Wesley. All rights reserved.

Tech Tip-Newer DNS servers provide name resolutionTech Tip-Newer DNS servers provide name resolution

© 2011 Pearson Addison-Wesley. All rights reserved.

Access Point/Router InstallationAccess Point/Router Installation

• Many wireless access points have the ability to route. • The router connects

the wired network and the wireless network together. A router is also good to have so that DHCP can be provided for both the wired and the wireless networks and to provide a firewall for network security.

© 2011 Pearson Addison-Wesley. All rights reserved.

Access Point/Router InstallationAccess Point/Router Installation

• The following list helps with access point installation:- What is the SSID to be used?- Is WEP, WPA, WPA-PSK, WPA2-PSK, TKIP,

AES, or any other security option enabled?*- What security key lengths, security keys, or

passphrases are used?*- Is MAC address filtering enabled?*- Is there power available for the access point? *Note that these options are discussed in Chapter 14.

© 2011 Pearson Addison-Wesley. All rights reserved.

Access Point/Router InstallationAccess Point/Router Installation

• The following list helps with access point installation:- How will the access point be mounted?- Where should the access point be mounted for

best coverage of the wireless network area?- What channel ID will be used?- Will the access point connect to the wired

network, if so, is there connectivity available where the access point will be mounted?

© 2011 Pearson Addison-Wesley. All rights reserved.

Configuring a Networked PrinterConfiguring a Networked Printer

• There are three ways to network a printer

Connect a printer to a port on a computer that is connected to the network and share the printer.

1

2 Setup a computer or device that is designated as a print server. Connect the print server to the network.

3 Connect a printer with a network connector installed directly on the network.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TroubleshootingNetwork Troubleshooting

• One way to troubleshoot a network is to determine how many devices are affected.

• The ping command can be used to check connectivity all around the network.- Ping - A network troubleshooting command used to

test TCP/IP communications and determine if a network path is available, whether any delays exist along the path, and if a remote network device is reachable.

- Use ping with the private IP address 127.0.0.1 to test a NIC’s basic network setup.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TroubleshootingNetwork Troubleshooting

Command to view the current IP settingsipconfig

nslookupCommand that displays network domain names and associated IP addresses

tracertCommand that displays the path a packet takes through a network (to see where a fault occurs)

latencyDelay experienced as packets travel from source to destination. Use ping and tracert to view.

© 2011 Pearson Addison-Wesley. All rights reserved.

Sample Network Troubleshooting ScenarioSample Network Troubleshooting Scenario

Figure 13.47

© 2011 Pearson Addison-Wesley. All rights reserved.

IPCONFIG and IPCONFIG/ALLIPCONFIG and IPCONFIG/ALL

Figure 13.48

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TroubleshootingNetwork Troubleshooting

• The following list contains methods that can help with NIC troubleshooting:- From a command prompt window, ping

127.0.0.1 to test the NIC.- Ping another device on the same network.- Ping the default gateway.- Ping a device on a remote network.- Use the tracert command to see if the fault is

inside or outside the company.

© 2011 Pearson Addison-Wesley. All rights reserved.

Networking TroubleshootingNetworking Troubleshooting

• The following list contains methods that can help with NIC troubleshooting:- Check the status light on the NIC to see if the physical

connection is good.- Check the status light on the hub or switch that is

used to connect the workstation NICV to the network.- Check cabling.- Update the device driver by obtaining a newer one

from the NIC manufacturer Web site.- Check the IP addressing used.- If on a laptop, ensure that the wireless NIV is enabled.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TerminologyNetwork Terminology

In the networking field, there are many acronyms and terms with which you must be familiar.

Backbone - The part of the network that connects multiple buildings, floors, networks, and so on together.

Bandwidth – The width of communications channel that defines its capacity for data.

Baseband – The entire cable bandwidth is used to transmit a digital signal.

Broadband – Cable bandwidth is divided into multiple channels.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TerminologyNetwork Terminology

CDMA (Code Division Multiple Access) – A protocol used in cellular networks as an alternative to GSM.

FastEthernet – An extension of the original Ethernet standard that permits data transmission of 100Mbps.

FDDI (Fiber Distributed Data Interface) - A high-speed fiber network that uses the ring topology and the token passing method of access.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TerminologyNetwork Terminology

FTP (File Transfer Protocol) – A protocol used when transferring files from one computer to another across a network.

GMS (Global System Mobile) – The most widely used digital technology for cellular networks.

HTML (Hypertext Markup Language) – The programming language used on the Internet for creating Web pages.

HTTP (Hypertext Transfer Protocol) – A protocol used when communicating across the Internet.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TerminologyNetwork Terminology

HTTPS (Hypertext Transfer Protocol over Secure Socket Layer or HTTP over SSL) – Encrypted HTTP communication through an SSL session.

Infrared – A few laptop computers have infrared ports that allow them to communicate with other devices (such as another computer or printer) across a wireless network.

LPR (Line Printer Remote) – A protocol used to send print jobs to non-Windows clients.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TerminologyNetwork Terminology

NAT/PAT (Network Address Translation/Port Address Translation) – A method of conserving IP addresses.

NAT uses private IP addresses that become translated to public IP addresses.

PAT does the same thing except uses fewer public IP addresses by “overloading” one or more public IP addresses by tracking port numbers.

POP (Point of Presence)- A POP is an Internet access point.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TerminologyNetwork Terminology

POP (Post Office Protocol) – POP is used to retrieve email from a network server.

SNMP (Simple Network Management Protocol) - A protocol that supports network monitoring and management.

SSH (Secure Shell) – A protocol used to exchange data securely between two network device.

SSL (Secure Sockets Layer) – A protocol used to transmit Internet messages securely.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TerminologyNetwork Terminology

TCP (Transmission Control Protocol) – A layer four connection-oriented protocol that ensures reliable communication between two devices.

Telnet – An unsecure application that allows connection to a remote network device.

UDP (User Datagram Protocol)- A layer four connectionless protocol that applications use to communicate with a remote device.

© 2011 Pearson Addison-Wesley. All rights reserved.

Network TerminologyNetwork Terminology

VoIP (Voice over IP) – Sending a phone conversation over a TCP/IP-based network instead of traditional telephone circuits and wiring.

© 2011 Pearson Addison-Wesley. All rights reserved.

SharingSharing

Network share – A folder or network device that has been shared and is accessible from a remote computer.

UNC (universal naming convention) – Used at the command prompt to obtain network shares.

\\Cschmidt\tests - Goes to a computer named Cschmidt and accesses a share names “tests.”

A teacher computer called ATC-227-01 has a share called NetFundamentals. To access the files on this computer, from a command prompt, the Run utility, or the Search programs and files textbox, type the following: \\ATC-227-01\NetFundamentals.

© 2011 Pearson Addison-Wesley. All rights reserved.

EmailEmail

Another common Internet software application is an email (electronic mail) package to send messages across the Internet.

When you send an email to someone, your email client software formats the message and sends it to an email server.

© 2011 Pearson Addison-Wesley. All rights reserved.

EmailEmail

The email server has the following functions:

Has a database of email accounts

Stores messages (email) sent and received

Communicates with other email servers

Uses the DNS protocol to locate the other servers

© 2011 Pearson Addison-Wesley. All rights reserved.

EmailEmail

SMTP (simple network management protocol) - A standard used for email or for transferring messages across a network from one device to another.

POP3 (soon to be POP4) – Post Office Protocol or Point of Presence. Post Office Protocol is used to retrieve email form a mail server. Point of Presence is an Internet access point.

© 2011 Pearson Addison-Wesley. All rights reserved.

EmailEmail

IMAP (Internet Mail Access Protocol) – Used to receive email through the Internet.

MAPI (Messaging Application Programming Interface) – A Microsoft-proprietary protocol used with email.

© 2011 Pearson Addison-Wesley. All rights reserved.

Tech Tip-Forwarding EmailTech Tip-Forwarding Email

To configure a particular application such as Google Gmail to be forwarded to another application such as Outlook, key information must be gathered.

The technician must then go into the email application and configure an incoming mail server and an outgoing mail server settings, based on the gathered information.

the supported list of protocols used to send and receive email such as IMAP, SMTP, POP, and SSL

1

2 the particular port numbers used with the previously obtained supported protocols

© 2011 Pearson Addison-Wesley. All rights reserved.

Soft Skills – Being ProactiveSoft Skills – Being Proactive

A good technician is proactive, which means that the technician thinks of ways to improve a situation or anticipates problems and fixes them before being told to do a particular task.

A proactive technician follows up after a service call to ensure that a repair fixed the problem rather than waits for another help desk ticket that states that the problem is unresolved.

© 2011 Pearson Addison-Wesley. All rights reserved.

Addison Wesley is an imprint of

Questions???Questions???