Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber...

38
Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21 Chapter 21 Local Area Networking Learning Objectives In this lesson, you will learn how to set up and use a basic network. At the end of the lesson, you should be able to do the following: Explain network technologies Explain network operating systems Understand how to install and configure wired networks Understand how to install and configure wireless networks Troubleshoot networks Pre-Test 1. In the most basic terms, what is a computer network? 2. What is a router? 3. How fast is Bluetooth? 4. What is peer-to-peer networking? What is a client/server network? 5. At what layer of the OSI model does MAC addressing occur? At what layer, does the link light occur? Lecture Outline Discussion Point Networking Copyright © 2007 by The McGraw-Hill Companies Page 1 of 38

Transcript of Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber...

Page 1: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

Chapter 21

Local Area Networking

Learning ObjectivesIn this lesson, you will learn how to set up and use a basic network. At the end of the lesson, you should

be able to do the following:

Explain network technologies

Explain network operating systems

Understand how to install and configure wired networks

Understand how to install and configure wireless networks

Troubleshoot networks

Pre-Test1. In the most basic terms, what is a computer network?

2. What is a router?

3. How fast is Bluetooth?

4. What is peer-to-peer networking? What is a client/server network?

5. At what layer of the OSI model does MAC addressing occur? At what layer, does the link light

occur?

Lecture Outline

Discussion Point

Networking

This chapter is long and includes complicated topics, even though it covers only some

networking concepts. There are entire courses designed around networking

technologies, such as CompTIA’s Network+. There are advanced certifications such as

the Microsoft Certified System Engineer (MCSE) and Certified Novell Engineer (CNE)

courses. There are entire courses for single networking topics such as TCP/IP. This

Copyright © 2007 by The McGraw-Hill Companies Page 1 of 24

Page 2: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

chapter will only familiarize you with the networking concepts and help you set up

simple networks, as per the requirements of the CompTIA A+ certification.

Historical/Conceptual

I. Networking technologies

A. The Big Questions. When network designers first sat down to design a system where two or

more PCs could share data and peripherals, they had to resolve many issues.

1. How will each computer be identified?

2. What kind of wire and connectors will be used? What are their limitations?

3. How can files be protected?

4. How can access to data and peripherals be controlled?

B. A few basics

1. A client machine is used to request information or services.

2. A network interface card (NIC) is used to identify the network client and break files into

smaller units called packets. The NIC sends data across the network and helps to

reassemble the data into whole files.

3. A medium is needed for delivering the packets: cable or wireless method.

4. A PC operating system is required to communicate with its own networking hardware and

other machines on the network.

5. A server machine needs to provide information and services.

C. Topology. The computers need to be connected in some logical or ordered way.

1. Bus topology. All computers connect to the network via a main line called a bus cable.

2. Ring topology. All computers connect to a central ring of cable.

3. Star topology. Computers on the network connect to a central wiring point (often a hub or

switch).

4. Mesh topology. Each computer has a dedicated line to every other computer.

Essentials

Copyright © 2007 by The McGraw-Hill Companies Page 2 of 24

Page 3: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

D. Packets/frames and NICs

1. PCs transfer data in the form of chunks called packets or frames.

2. Every network interface card (NIC) has a built-in identifier called the Media Access

Control (MAC) address. This address is unique to the specific network card.

3. The MAC is a 48-bit long identifier (provides more than 281 trillion MAC addresses). The

sender and recipient MAC addresses are added to the packet so each packet knows where it

came from and where it needs to go.

4. A packet contains the MAC address of the NIC for the recipient and the MAC address of

the sender, the data itself, and some kind of data check or cyclic redundancy check (CRC).

5. Networks must use the same hardware protocol to define everything necessary to transfer

data from one computer to another. The dominant hardware protocol today is Ethernet,

although Token Ring contended for many years.

a) Ethernet. Ethernet is a set of standards developed in the mid 1970s by Digital

Equipment, Intel, and Xerox. The standards included everything needed to get data

from one computer to another computer.

(1) The standard was released to the IEEE standards body, which named Ethernet the

IEEE 802.3 standard in 1980.

(2) Ethernet comes in three main flavors defined by cabling type: coaxial, unshielded

twisted pair, and fiber optic.

b) Token Ring. Developed in the 1980s by IBM. Has some limited use today, but

Ethernet has a far larger market share. Token Ring requires special equipment.

E. Coaxial Ethernet. Previously, Ethernet networks used coaxial (coax) cable. Coax consists of a

solid copper-core wire surrounded by an insulator. A shield of braided wire is wrapped around

the insulator. Another insulator is wrapped around the shielding. There are two different types

of coaxial cable used in networks: Thick Ethernet and Thin Ethernet.

3. Thick Ethernet—10Base5

a) Original Xerox Ethernet specification, also known as Thicknet. This coax cable called

RG-8 (Radio Grade) is about ½ inch in diameter.

Copyright © 2007 by The McGraw-Hill Companies Page 3 of 24

Page 4: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

b) The standard 10Base5 indicates a 10 Mbps transfer speed and a maximum segment

length of 500 meters. (All PCs attach to a single cable called a segment or bus. The

10Base5 standard supports up to 100 devices on each segment.)

(1) Bus topology. Thick Ethernet uses a bus topology or a physical layout that

consists of a single cable running to all PCs in the network, meaning they all

share the same bandwidth or transfer capacity as the wire.

(2) Ethernet uses carrier sense multiple access/collision detection (CSMA/CD). When

two cards talk (send packets at the same time), a collision occurs. This is also

called a contention-based network, which indicates collisions are possible.

(3) Reflection and termination. At each end of the segment, a 50-ohm terminator

must be used to prevent the signal from bouncing back or reflecting and

destroying the data. If a cable breaks, the network is no longer available and the

data transfer stops.

(4) Connections. Thicknet connections are marked every 2.5 meters showing where

to connect devices. Devices connect to Thicknet with a vampire connector

(actually a transceiver) that pierces the cable. Thicknet also requires an external

transceiver, often called an access unit interface (AUI)—a 15-pin DB connector

called an AUI port on the NIC.

(5) Disadvantages of Thicknet. It is expensive and difficult to work with. A single

break can bring down the entire network.

4. Thin Ethernet—10Base2

a) Also known as Thinnet or Cheapernet. It uses a thinner kind of Coax cable, the RG-58

cable (similar in size to the RG-6 used for cable TV).

b) Thin Ethernet also runs at 10 Mbps, but supports only 30 devices per segment. Each

segment can be a maximum of 185 meters long. (The “2” in 10Base2 originally meant

200 meters, but the actual length was reduced to only 185 meters.)

c) Each network card is connected to a bus cable with a T connector. Thinnet has twist-

on connectors, called BNC connectors, that attach to the T connector. Each end of the

Copyright © 2007 by The McGraw-Hill Companies Page 4 of 24

Page 5: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

network must have a terminator. Again, a break in the wire brings down the entire

network.

d) Thinnet is cheaper and easier to work with than Thicknet. Thinnet was popular for

small office/home office (SOHO) networks, but is rarely used with modern networks.

F. UTP Ethernet—10/100/1000BaseT

1. Modern Ethernet networks are likely to be 10BaseT, 100BaseT, or 1000BaseT. The “10”

stands for 10 Mbps, “100” for 100 Mbps, and “1000” for Gigabit Ethernet running at 1000

Mbps or 1 Gbps.

2. 10/100/1000BaseT networks use a star bus topology and connect via unshielded twisted

pair (UTP) cable.

3. Star bus. The 10BaseT network uses a star bus topology and unshielded twisted pair (UTP)

cable. Sometimes a switch, a far superior alternative, is used instead of a hub. This

topology looks like a star, but logically it acts like a bus because of the central hub or

switch that allows 4 to 32 devices to attach to it.

4. While the hub does not solve bandwidth problems, the switch does by making each port a

separate Ethernet network, and as a result, each network gets full bandwidth. A switch also

eliminates many collisions.

5. Another advantage of the star bus topology is that a single break in the wire does not bring

down the network. The central point of failure, the hub or the switch, will bring down the

network, but it rarely occurs.

6. Unshielded twisted pair (UTP) cables are rated by categories that fall under the

Telecommunication Industry Association/Electronics Industries Alliance (TIA/EIA).

Currently, most networks use CAT5e or CAT6 to take advantage of the faster transfer

speeds. These cables use an RJ-45 connector that is similar to but wider than the RJ-11

connector that phones use. The wires in UTP are numbered and color-coded.

Discussion Point

Building Cables

When building network cables, it is important to follow the 568 standards all the time. Even

though 10BaseT uses only two pairs of cables (you can actually omit the other two

Copyright © 2007 by The McGraw-Hill Companies Page 5 of 24

Page 6: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

pair), it is a good practice to build the cable the right way all the time. Doing this is

useful for two reasons: first, you will always be in the habit of making cables the right

way; and second, if the network upgrades to 100BaseT, you will not have to rebuild all

those cables.

Discussion Point

Crossover Cables

If you want to connect two computers, but do not have a hub, you can connect them directly

with a crossover cable. The crossover cable “crosses over” the transmission and

receiving wires to enable two computers to be directly connected. The crossover cable

will work only if connected to two NIC cards directly and will not work if connected to a

hub. A normal cable will not work when connecting two computers directly. You can

purchase a crossover cable, or you can build one

7. Implementing 10/100/1000BaseT network. This network can run on Cat3, Cat4, or Cat5

cable. Cables use an RJ-45 connector. RJ-11 is used for the telephone with two pairs of

wires (though most phones use only one pair). RJ-45 has four pairs of wires.

8. Combo cards. Some NICs are specifically for 10BaseT while others are for 100BaseT and

others for 1000BaseT. Some combo cards are 10/100 and are able to sense speed

automatically. These cards are referred to as autosensing cards.

9. Hubs and switches. Each PC connects to a hub or a switch with a 10/100/1000BaseT

network. The maximum distance from the hub to any device is 100 meters. Only one PC

may attach to each segment with a theoretical maximum of 1,024 devices attached to a

single hub. Most hubs have 24 or fewer ports. 10BaseT hubs are powered hubs that act as

repeaters, amplifying the signals between devices.

10. Duplex and half-duplex. All modern NICs can run in full-duplex mode; that is, they are

able to send and receive data at the same time. Some older devices ran in half-duplex

mode, meaning they were able to send or receive data, but not at the same time. However,

you will rarely find a half-duplex device today.

G. Fiber optic Ethernet

Copyright © 2007 by The McGraw-Hill Companies Page 6 of 24

Page 7: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

1. Uses light instead of electricity to send signals. Fiber optic cables are immune to

electromagnetic interference (EMI). The fiber optic signal travels much farther, up to 2000

meters with some standards. Most fiber optic Ethernet networks use 62.5/125 multimode

fiber optic cable.

2. Uses SC and ST connectors. Fiber connectors are half-duplex (data flows only one way),

so you need two cables.

3. Two common fiber optic standards are 10BaseFL and 100BaseFX.

4. Fiber optic cable is expensive and difficult to work with, so it is usually reserved for data

centers.

H. Token Ring. Developed by IBM, Token Ring networks use a combination of ring and star

topologies.

1. Ring topology. The ring topology connects all PCs together in a circle and uses a

transmission method called token passing. The token is an electronic packet that circulates

from one NIC to the other around the ring. A PC may transmit only when it has a free

token—that is, one that does not have data packets attached to it.

2. Implementing Token Ring. Older Token Ring ran at 4 Mbps or 16 Mbps, depending on the

equipment. Token Ring can use STP or UTP cabling. Like UTP, STP cables are also

divided into categories or types defined by IBM.

3. A Token Ring connector is a unique hermaphroditic connector called an IBM-type Data

Connector (IDC) or a Universal Data Connector (UDC). These cables are neither male nor

female and can plug into each other. Token Ring uses a multistation access unit (MSAU or

MAU) instead of a hub.

4. Token Ring can support up to 260 PCs using STP and up to 72 PCs using UTP. The

maximum distance from the MAU to the PC is 45 meters with UTP and 100 meters with

STP. A repeater can increase the functional distance between MAUs to 360 meters with

UTP and 720 meters with STP.

I. Parallel/serial. You can directly connect two computers using a crossover version of the IEEE

1284 cable for parallel and the RS-232 cable for serial.

Copyright © 2007 by The McGraw-Hill Companies Page 7 of 24

Page 8: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

J. FireWire. FireWire was designed to be network aware so plugging in two computers allows

them to recognize each other.

K. USB. You can also connect two computers with USB though it doesn’t work as easily as with

FireWire.

IT Technician

II. Network operating system (NOS)

A. A network operating system (NOS) communicates with the PC hardware and makes the

connections among multiple machines on a network.

B. The NOS enables one or more PCs to act as a server machine and share data and services over

a network. You then need to run software on client computers to enable those computers to

access the shared resources on the server machine.

C. Network organization. Networks are broken into three organizational groups: client/server,

peer-to-peer, and domain-based.

1. Client/server networks have a hierarchical design with at least one PC dedicated as a

server. All the other computers are called clients or workstations. Servers require special

network operating system software, such as Novell NetWare or Windows 2000 Server.

2. Peer-to-peer networks do not have dedicated servers. All computers connected to the

network can act as servers to the connected resources. Each computer controls access to its

resources. Peer-to-peer networks are very inexpensive but have are limitations. A peer-to-

peer network can connect not more than 10 or 15 PCs and is not too secure. All versions of

Windows include the capabilities to set up a peer-to-peer network.

3. Domain-based networks allow users to log on to the entire network at once, instead of one

server at a time as in the client/server model. A domain-based network has one or more

dedicated servers called domain controllers that contain the security database for all

systems.

a) Modern domain-based networks use a common database of information called a

directory service to store user and computer account information.

(1) Novell NetWare uses NetWare Directory Services (NDS).

Copyright © 2007 by The McGraw-Hill Companies Page 8 of 24

Page 9: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

(2) Windows 2000 and 2003 use Active Directory (AD).

b) Domain-based networks provide a central point of administration. Windows

NT/2000/XP sets up an administrator account automatically with absolute power over

the entire system.

Discussion Point

Administrator

All NOSs have a special account called Administrator. Some NOSs may have a different name

for that account, such as Root, but they all have one thing in common: they have

access to anything and everything on the network. These super accounts control the

entire network. Anyone who has access to this account can bring down an entire

network. If you have an account with this privilege, you must not disclose the password

to others. If you forget the password, you will need to reinstall the NOS completely.

D. Protocols

1. Each packet adds the sending and receiving MAC addresses to the data. This is how each

computer knows if a packet belongs to it or not. In addition to the MAC address, a unique

machine name is identified with the MAC address. This way, if a MAC address is changed

(NIC card replaced), the network still knows where to send the packets. Devices on the

network (all or some) maintain a list of all the MAC addresses and machine names on the

network.

2. A network protocol is a set of common rules that all devices on the network follow

regarding how computers are named and identified and how data is organized, sent, and

received.

3. To communicate, all devices on the network must use the same protocol, but there are

some main protocols in use.

a) NetBIOS Extended User Interface or NetBEUI (Microsoft). Relatively small and fast

and the default networking protocol for Windows systems. NetBEUI is self-

configuring, but it cannot be used for routing. Therefore, NetBEUI can be used only

on small peer-to-peer networks.

Copyright © 2007 by The McGraw-Hill Companies Page 9 of 24

Page 10: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

b) Internetwork Packet Exchange/Sequenced Packet Exchange or IPX/SPX (Novell).

Relatively small and fast, uses few resources, and works well with routers. While

IPX/SPX is used exclusively by NetWare, Microsoft implements a version called

NWLink.

c) Transmission Control Protocol/Internet Protocol or TCP/IP (UNIX/Internet).

Originally designed for the predecessor to the Internet, the Advanced Research

Projects Agency Network (ARPANET). TCP/IP then became the standard for UNIX

systems and for networks with more than 200 devices. (You can use TCP/IP on all

sized networks, even networks with two or three devices.) It is the standard for the

Internet. Although it is not as fast as other protocols and uses more RAM, TCP/IP is

more robust and universally supported.

d) AppleTalk (Apple). Similar to IPX, AppleTalk is a small and fast proprietary protocol

that Apple computers use to communicate. Except for small Macintosh-only networks,

it is rarely used anymore. Most Apple computers easily use Ethernet and TCP/IP to

connect to multiplatform networks using other protocols. Windows NT and 2000

provide native support for AppleTalk. Windows 9x can provide AppleTalk support

with third-party add-ons.

F. Client software. A PC must have client software to communicate with a server. Windows

installs Client for Microsoft Networks when you install a NIC and drivers. If you are using

NetWare, you need to add Client Service for NetWare.

G. Server software. By enabling sharing of files, folders, and printers, you can turn a

Windows PC into a server. To share your files, you need to enable Microsoft’s File and

Print Sharing

III. Installing and configuring a wired network

A. For network connectivity, you need three things:

1. Network interface card

2. Protocol

3. Network client

Copyright © 2007 by The McGraw-Hill Companies Page 10 of 24

Page 11: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

B. Installing a NIC first requires that you select a NIC appropriate to the specific media and

network type. With Windows 2000 or XP, all recent NICs install easily with plug and play by

using the Add Hardware Wizard. Other OSs may require special drivers from the NIC’s

manufacturer.

C. Configuring a network client. You need a client for each type of server NOS you connect to.

The two most commonly used network clients are Client for Microsoft Networks and Client

Service for NetWare.

D. Configuring simple protocols. To enable communication between two computers, they must

use the same protocol. If the computers are part of an existing network, the network

administrator will determine which protocol to use. Windows supports NetBEUI (except for

Windows XP), NWLink (IPX/SPX), and TCP/IP.

1. NetBEUI is easy to configure because it does not require network or logical addresses. In

Windows 2000, select Start | Settings | Network and Dial-up Connections. Double-click

the Local Area Connection Status icon in the Network and Dial-up Connections dialog

box. The Local Area Connection Status dialog box appears. You can now configure

NetBEUI.

2. NWLink (IPX/SPX) can be installed using the same steps as NetBEUI. You will need to

specify the internal network number and the frame type, but usually the default values

work fine.

E. Configuring TCIP/IP. TCP/IP is the primary protocol of modern networks and is required for

access to the Internet. This powerful protocol is a challenge to set up. The basic sections of

TCP/IP include the following:

1. Network addressing involves two pieces of information: the IP address identifies the PC,

and the subnet mask helps determine the subnet within the network where the machine

resides.

a) IP addresses. TCP/IP uses a dotted-decimal notation. It consists of four sets of binary

numbers (octets), each set separated by a period (dot). You will recognize the address

by its form: four sets of digits (numbered 0 to 255) separated by dots (i.e.,

207.46.230.229), otherwise called an IP address.

Copyright © 2007 by The McGraw-Hill Companies Page 11 of 24

Page 12: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

(1) Class A networks use the first octet to identify the network address and the

remaining three octets to identify the host. The address range will be from 1–126.

(2) Class B networks use the first two octets to identify the network address and the

last two to identify the host. The address range will be from 128–191.

(3) Class C networks use the first three octets to identify the network and the last to

identify the host. The address range will be from 192–223.

(4) The address 127.0.0.1 is reserved for network testing (loopback) operations.

(5) Certain ranges within each class are reserved for private networks that do not get

routed to the Internet. These ranges are 10.0.0.1 to 10.255.255.254 for Class A

and 172.16.0.1 to 172.16.255.254 for Class B. Class C has two ranges of private

addresses, 192.168.0.0 to 192.168.255.254 for manually configured addresses and

169.254.0.1 to 169.254.255.254 for the Automatic Private IP Addressing

(APIPA) function.

b) Subnet mask. Distinguishes which part of the IP address is the network address and

which part is the host address. Some subnet masks are defined by default. There are

three main classes of IP addresses: Class A (with a subnet mask of 255.0.0.0), Class B

(with a subnet mask of 255.255.0.0), and Class C (with a subnet mask of

255.255.255.0).

Discussion Point

Octets

The root of the word “octet” is “oct” meaning eight. Why is a three-digit number called an

octet? Because each octet is a representation of an 8-bit binary number consisting of

1s or 0s. Starting from the right, the first digit has a value of 1, the next digit to the left

has a value of 2, the next digit has a value of 4, and so on. Each number is double the

previous one. You merely add the values of the digits together for the octet number.

Value: 128 64 32 16 8 4 2 1

Binary: 0 1 0 0 1 1 1 0

Now add the value of each 1: 2 + 4 + 8 + 64 = 78

Copyright © 2007 by The McGraw-Hill Companies Page 12 of 24

Page 13: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

So, 01001110 equals 78. By converting each octet (1s and 0s) to its decimal form, you get a

recognizable IP number such as 207.46.230.229. By adding the values of the 1s and

0s, you can quickly see that if you have all 1s, you have 255 (128 + 64 + 32 + 16 + 8 +

4 + 2 + 1 = 255) and if you have all 0s, you have 0.

2. TCP/IP services. Another way of viewing TCP/IP is as a suite of protocols, instead of as a

single protocol. Services include the following:

a) Hypertext Transfer Protocol (HTTP), which allows the display of Web pages

b) File Transfer Protocol (FTP), which allows a computer to connect to a server to

upload or download files and others services

c) TCP/IP is able to link together hosts (computers), local area networks (LANs), and

wide area networks (WANs) by using routers.

3. TCP/IP settings. You must configure a number of TCP/IP settings for proper network

functioning. Windows 2000/XP unifies them under My Network Places properties.

a) The default gateway, usually a local router, is the device all computers on the network

use to contact the outside world—any place outside the LAN..

b) TCP/IP on the Internet requires a domain name service (DNS) to provide a database

of computer names and their corresponding IP addresses (www.microsoft.com equals

207.46.230.229).

(1) DNS provides name resolution for host names. Host names are a part of a fully

qualified domain name. For example, in www.microsoft.com, the host name is

www (the World Wide Web server) and www.microsoft.com is the fully qualified

domain name.

(2) Domain names are regulated. A top level domain (TLDs) identifies the basic

function of the organization. The first TLDs

included .com, .edu, .mil, .int, .org, .gov, and .net. There are also domain names

for countries, such as .uk for United Kingdom or .us for United States. Because of

the tremendous growth of the Internet, the Internet Corporation for Assigned

Names and Numbers (ICANN) has announced new domains,

including .name, .biz, and .info.

Copyright © 2007 by The McGraw-Hill Companies Page 13 of 24

Page 14: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

c) TCP/IP networks require Windows Internet Name Service (WINS) and dynamic host

configuration protocol (DHCP).

d) Windows Internet Naming Service (WINS). WINS is much like DNS, except WINS

maps Windows computer names (also known as NetBIOS names), instead of network

computer names (also known as host names), to an IP address. Many Windows 2000

and XP networks do not use WINS; instead, they use an improved “dynamic” DNS

that supports both Internet and Windows names. However, the death of WINS has

been greatly exaggerated. It still exists in many networks today to support applications

that rely on NetBIOS name resolution.

e) DHCP provides for automatic assigning of an IP address and other TCP/IP

configuration information such as a default gateway, subnet mask, DNS server, WINS

server, and more to a network computer.

(1) IP addresses may be assigned statically (manually by a tech) or dynamically via

DHCP.

(2) A DHCP server draws from a pool of IP addresses and assigns one to a PC

temporarily and then reassigns that IP address when it is no longer being used.

This is handy for laptops that only connect temporarily.

(3) Additionally, manually assigning all systems IP addresses can be very time

consuming and costly (in terms of manpower) for many networks. DHCP

automates the process.

4. TCP/IP tools. A wide variety of tools are available for diagnosing and maintaining the

TCP/IP network.

a) Ping. A small utility that sends out a small packet to a targeted addressed computer.

The packet is received by the target computer and sent back to the sending computer.

The time it takes is measured and reported. You can ping an IP address or a DNS

(207.46.230.229 or www.microsoft.com), and you can even ping yourself using a

loopback address (127.0.0.1). At a DOS prompt or command prompt, type ping /? to

find the correct usage.

Discussion Point

Copyright © 2007 by The McGraw-Hill Companies Page 14 of 24

Page 15: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

Ping

It is widely believed that Ping (an important network utility) is an acronym for Packet Internet

Groper. This is not so. According to the author of Ping, Mike Muuss (who died in a car

crash on November 21, 2000), he wrote the Ping program in 1983 to help track down a

network disconnect. The computer he was working on would send out a small packet,

and when it reached the destination, it would bounce back. He named it Ping because it

reminded him of the ping sound of a submarine’s sonar.

(Source: http://ftp.arl.mil/~mike/ping.html)

b) IPCONFIG (Windows 2000). Displays network information. You can use the /all

switch to see all of your TCP/IP settings.

c) NSLOOKUP. Enables you to determine the name of a DNS server and verify much of

the information on the DNS server. From a very basic perspective, you can enter

nslookup www.microsoft.com at a command prompt to get the IP address. Many

more sophisticated commands will determine a lot more information from the DNS

server.

d) TRACERT. Shows the route a packet takes to get to its destination

5. Configuring TCP/IP

a) By default, a DHCP server will automatically assign an IP address and subnet mask.

To configure TCP/IP in Windows XP, use the Network Connections applet. In

Windows 2000, use Network and Dial-up Connections to get to the network settings.

b) You will need to enter the IP address, the subnet mask, and the default gateway. You

may also enter the address of a primary and secondary DNS server.

6. Automatic Private IP Addressing (APIPA) is a feature that is available with Windows

2000 and Windows XP. It helps assign an IP address automatically to the system when the

client cannot obtain an IP address automatically. APIPA addresses are always in the range

of 169.254.0.1 to 169.254.255.254, with a subnet mask of 255.255.0.0 and with no other

TCP/IP settings entered. The network ID is 169.254.0.0.

F. Sharing and security

Copyright © 2007 by The McGraw-Hill Companies Page 15 of 24

Page 16: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

1. Windows systems can share all kinds of resources including files, folders, drives, printers,

faxes, and Internet connections.

2. To share a drive or folder, right-click the drive or folder, click Properties, and then click

the Sharing tab. When you share a drive, you need to set a share name, without spaces.

Discussion Point

Share Names

Simply naming a shared drive with C is usually not a good idea because a network user could

confuse your C with someone else’s C. Give the drive a unique name. You can name it

for the person using that computer all the time (Dave), by content (MP3s), the desk

position (Desk4), or anything else, so long as network users can easily figure out what

drive it is.

a) You then need to determine the permissions. Windows 2000/XP provides for two sets

of permissions: Network permissions and NTFS permissions. Network permissions

offer Full Control, Change, and Read settings. If you are on NTFS and want to control

the permissions even further, you need to configure the NTFS permissions in addition

to the network permissions.

b) Once you share the drive, a small hand appears on the icon.

3. To access shared drives/directories, you have a few choices.

a) You can browse to them through My Network Places (though this involves a lot of

clicking).

b) You can map a network drive to your system. This means the network drive shows up

in My Computer as a drive. The icon will look different, and it will have a letter, but

the letter is not part of the network drive.

c) Universal naming convention (UNC). All computers have a name, and all shared

resources have a name. The UNC name uses the computer name and the share name

as \\serverName\shareName. All files and folders have a pathname. For example,

C:\FREDC\INSTALL-FILES\SETUP.EXE

Copyright © 2007 by The McGraw-Hill Companies Page 16 of 24

Page 17: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

All network drives and their shared resources also have a pathname beginning with

double backslashes, the server name, a single backslash, the share name, and the rest

of the path. For example,

\\SERVER\FREDC\INSTALL-FILES\SETUP.EXE

4. Sharing printers

a) Sharing a printer is similar to sharing a drive. Right-click the printer, select Properties,

and then Sharing. Select Share As and give the printer a name.

b) To access a shared printer, install a network printer on a workstation. Use the Add

Printer Wizard and select Network Printer when prompted. Browse to the network

printer using the UNC. Usually, setup will just copy the printer drivers from the

network computer. If not, it will prompt you for the driver disk.

Essentials

IV. Installing and configuring a wireless network

A. Wireless networks are growing in popularity. Instead of cables, wireless networks use either

radio waves or beams of infrared light to communicate with each other.

B. Wireless networking components

1. Infrared transceiver ports have been around on portable PCs, PDAs, and high-end printers

for years.

2. Wireless networking adapters can be Ethernet or Bluetooth. They can be PCs or handheld

computers or PDAs.

3. Wireless Ethernet networks use a wireless access point (WAP) to connect wireless network

nodes. They can also connect to a wired network or a high-speed Internet connection.

IT Technician

C. Wireless networking software

1. Wireless devices use CSMA/CA. The CA stands for collision avoidance. The wireless

node listens to make sure no other node is communicating. If a node is communicating, it

waits for a random amount of time and tries again. By using the Request to Send/Clear to

Copyright © 2007 by The McGraw-Hill Companies Page 17 of 24

Page 18: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

Send (RTS/CTS) protocol, it avoids collisions, but it adds significant overhead to the

process and can impede performance.

2. Wireless adapters are plug and play and may be installed in a PCI, PCMCIA slot, or a

USB port. You will need a utility to set parameters such as the Service Set Identifier

(SSID), also called a network name. Windows XP has built-in tools for configuring these,

but if you are using any other Windows versions, you will need to use the tools provided

by the wireless network adapter vendor.

D. Wireless networks work in two different modes: Ad-hoc mode and infrastructure mode.

1. Ad-hoc mode, also called peer-to-peer mode, allows each wireless node to have direct

contact with each other node. When two or more nodes communicate in an ad-hoc manner,

it is called an Independent Basic Service Set (IBSS). Limited to less than a dozen

computers, this mode is good for temporary networks.

2. Infrastructure mode involves one or more WAPs that connect the wireless network nodes

to a wired network segment. A single WAP that provides services to a specific area is

called a Basic Service Set (BSS), and when the service is extended using two or more

WAPS, it is called an Extended Basic Service Set (EBSS). Infrastructure mode is better

suited for business networks because it enables the wireless node to access the wired

network.

E. Wireless networking security has been a serious concern. To secure access to the network and

its data, wireless networks use three methods, though all of these are beatable with off-the-shelf

software.

1. SSID. Although wireless nodes and access points may be assigned a default SSID name,

this still makes them vulnerable. It is better to configure a unique SSID name. The SSID

name is included in the packet header, and if the SSID name is not correct, the packets will

be discarded. Turning off SSID broadcasting makes it harder for people to determine your

SSID name.

2. MAC filtering lets you limit access to your wireless network based on the MAC address or

the physical address of the wireless NIC.

3. WEP encryption uses a 40-bit encryption to scramble data packets. Some use 104-bit

encryption and a few even advertise 128-bit encryption. Note, however, that WEP does not

Copyright © 2007 by The McGraw-Hill Companies Page 18 of 24

Page 19: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

provide end-to-end encryption because it works at only the two lowest layers of the OSI

model, the Data Link and the Physical layers. The encryption is stripped from the data as it

travels up the subsequent network layers.

4. WPA (Wi-Fi Protected Access) is more secure than WEP. It uses the encryption key

integrity-checking feature and user authentication through the Extensible Authentication

Protocol (EAP). Even this technique, however, is not a complete security solution. WPA

was considered an interim security solution until the IEEE 802.11i was formulated.

5. WPA2. Also known as IEEE 802.11i, WPA2 is an improvement over WPA. It uses

Advanced Encryption Standard (AES) and other security features to protect data

transmission.

F. Speed and range issues

1. Depending on the wireless standard used, throughput speeds range from 2 Mbps to 54

Mbps. Speed decreases as distance between the wireless nodes and centralized access

points increases. Other wireless devices may interfere, blocking the signal or interfering

with it. Best speed is achieved with a limited range of 25 feet or less.

2. Under ideal circumstances, wireless networks range from about 150 feet to 300 feet.

G. Wireless networking standards

1. The IEEE 802.11 standard defines wireless Ethernet using spread-spectrum radio waves.

This technique broadcasts in discrete chunks over different frequencies within a certain

frequency range.

2. All 802.11-based wireless technologies can broadcast and receive data at 2.4 GHz (except

for 802.11a that uses 5 GHz.) The original 802.11 standard has been extended to include

three variations.

a) 802.11a was developed after 802.11b. It offers speeds up to 54 Mbps with a top range

of about 150 feet. It uses the 5-GHz range and is different from other 802.11-based

standards. Although it is faster than 802.11b, it has not been widely used.

b) 802.11b is the most widely used. It supports data throughput up to 11 Mbps with a

range of 300 feet. 802.11b can be secured using WEP and WPA encryption. Its 2.4-

GHz frequency is already crowded and other wireless devices interfere with it.

Copyright © 2007 by The McGraw-Hill Companies Page 19 of 24

Page 20: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

c) 802.11g is the newest standard that offers transfer speeds up to 54 Mbps with a 300-

feet range. It is backward-compatible with 802.11b and also uses the 2.4-GHz range.

3. Infrared wireless networking is an easy way to transfer data, but it is slow. Using the

Infrared Data Association (IrDA) protocol, data is transferred at 4 Mbps for a maximum

distance of 1 meter. It requires direct line of sight. IrDA devices communicate in half-

duplex mode, and it offers no encryption or authentication.

4. Bluetooth. Designed to create small wireless personalized area networks (PAN) that link

PCs to peripheral devices, such as PDAs and printers, and input devices, such as keyboards

and mice.

a) Poised to replace infrared as a means to connect PCs to peripherals. Not meant to be a

full-functioning network or compete with Wi-Fi

b) Uses the FHSS spread-spectrum broadcast method and 79 frequencies available in the

2.45-GHZ range

c) Transfers data between 723 Kbps to 1 Mbps. High-powered Bluetooth devices can

reach 2 Mpbs and a maximum range of up to 300 feet.

d) Maximum range of 10 meters

e) Hardware is integrated into the devices and requires very little setup.

f) Can be networked using access points to bridge the LAN segments with the Bluetooth

PAN segments

5. Cellular. Enable you to connect to the Internet through a network-aware PDOA or cell

phone. By adding PC cards, you can connect any laptop to a cellular network.

H. Configuring wireless networking is similar to setting up a wired network.

1. Install the wireless adapter, and let PnP handle the resource allocation. Windows XP

includes a wireless configuration utility, while the previous versions of Windows do not,

so you will need to use the utility that comes with the adapter.

2. When configuring wireless devices, ensure that only specific wireless nodes use it and

secure the data being sent through the air.

3. Wi-Fi supports ad-hoc and infrastructure mode.

Copyright © 2007 by The McGraw-Hill Companies Page 20 of 24

Page 21: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

a) Ad-hoc mode does not need WAP. Instead each wireless node is configured using the

same network name (SSID) but a unique IP address.

b) Infrastructure mode connects one or more wireless network WAPs to a wired network

segment. All nodes and WAPs must use the same SSID, and the feature that

broadcasts the SSID should be disabled. By enabling MAC filtering and turning on

encryption, you can make it even more secure.

4. Wireless networking security

a) SSID. All nodes and WAPs must use the same SSID. Several systems ship with

default SSIDS; these should always be changed. The SSID is automatically broadcast,

allowing any wireless NIC to identify the name of the SSID; disable this feature.

However, the SSID is still included in each packet, so if packets are captured, the

SSID can be discovered.

b) MAC address filtering. By enabling MAC filtering, you can limit access to computers

that can connect. However, because the MAC addresses are included in each packet,

the MAC address can be discovered, and packets altered to impersonate the authorized

MAC.

c) Encryption. By enabling encryption, you have a better chance of stopping intruders,

however…

(1) WEP. Initial attempt at wireless encryption with significant security flaws

(2) WPA. Interim measure as WPA2 (802.11i) was being developed

(3) WPA2. Significant improvements and strongly recommended as an upgrade to

WPA

5. Although infrared is fully supported in the latest versions of Windows, it offers limited

choices for networking. It is designed to connect only two systems in an ad-hoc mode for

simple file transfer.

a) Infrared can also be used as direct-connection mode (similar to a crossover cable) to

allow an Ethernet LAN access using IrDA. IrDA requires line of sight. An infrared

access point combines an infrared transceiver with an Ethernet NIC to translate the

IrDA protocol into an Ethernet signal.

Copyright © 2007 by The McGraw-Hill Companies Page 21 of 24

Page 22: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

b) Transferring files via infrared. Once connected, simply point and shoot.

c) Networking via infrared. Similar to using a null-modem cable to connect two

computers via the serial port. Devices set up to use this feature typically have a

wizard.

d) Bluetooth configuration is completely plug and play. If required, install the drivers.

(1) Bluetooth devices automatically seek other Bluetooth devices and establish a

master/slave relationship without any intervention.

(2) Bluetooth vendors have specialized software that can be used to connect between

Bluetooth PANs.

IV. Troubleshooting networks

A. Networks add an additional layer of complexity with their network hardware and resource

sharing. Compare a problem of not being able to print with a non-networked PC.

1. Non-networked situation

a) Printer not connected

b) Printer out of ink

c) Doesn’t have the proper driver loaded

d) PC using different printer

2. Networked situation. All the previous possible problems, plus the following:

a) Print server is down.

b) Printer is locked by another user.

c) Client PC doesn’t have network connectivity.

d) NIC driver is bad.

e) Client PC doesn’t have print drivers for networked printer.

f) One of the network cables is bad.

g) Port is bad.

h) Switch or hub failed.

Copyright © 2007 by The McGraw-Hill Companies Page 22 of 24

Page 23: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

B. Some steps to take when troubleshooting a PC or a network include the following:

1. Verify the symptoms.

2. Check when it happened.

3. Check what has changed.

4. Check the environment.

5. Reproduce the problem.

6. Isolate the symptom.

7. Separate hardware from software.

a) Replace suspected hardware with known good hardware.

b) Uninstall/reinstall.

c) Download patches and upgrade drivers.

d) Check for viruses and keep the antivirus up-to-date.

8. Research the problem. (Hint: Type the error into a search engine and you may get an

automatic fix.)

9. Make the fix and test. Before you fix a problem, create a backup or warn the user about

any risks. After you fix it, test the system to check whether or not it is working properly.

C. OSI seven-layer model. The OSI model is intended as a model or guideline to help technicians

isolate problems.

There a couple of popular mnemonics to help people remember the seven layers of the OSI

model. Please Do Not Throw the Sausage Pizza Away is one that starts at Layer 1 and

goes to Layer 7. All People Seem To Need Data Processing is another that starts at

Layer 7 and goes to Layer 1.

1. Layer 1, Physical. Defines format of data on the cable and through devises such as NICs

(link light), hubs, and switches. Ones and zeroes used here.

2. Layer 2, Data Link. Defines rules for accessing and using the Physical layer. MAC

addresses and CSMA/CD operate here.

Copyright © 2007 by The McGraw-Hill Companies Page 23 of 24

Page 24: Chapter 21 Fall 2007... · Web viewMost fiber optic Ethernet networks use 62.5/125 multimode fiber optic cable. 2. Uses SC and ST connectors. Fiber connectors are half-duplex (data

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Instructor’s Manual Chapter 21

3. Layer 3, Network. Defines rules for adding information to the data packet. The IP protocol

works here.

4. Layer 4, Transport. Breaks up data into smaller pieces. TCP and UDP protocols operate

here.

5. Layer 5, Session. Manages connections between machines

6. Layer 6, Presentation. Presents data in format the receiving system can understand and

often done with same software-handling Layer 7 functions

7. Layer 7, Application. This is the layer where the user interacts with the system.

D. Mike’s Four-Layer Model defines four categories to help isolate symptoms and make the right

fix:

1. Hardware. Make sure the hardware is connected and operating correctly.

2. Protocols. Make sure protocols are installed and configured correctly.

3. Network. Look at both servers and clients and try to determine which is causing the

problem.

4. Shared resources. Resources need to be shared to be accessible over the network.

Permissions need to be set to allow access.

Copyright © 2007 by The McGraw-Hill Companies Page 24 of 24