Instructor Materials Chapter 8: Applied Networking

Slides:



Advertisements
Similar presentations
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Advertisements

Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 6: Broadband Solutions.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 5: Network Address Translation for IPv4.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Chapter 7: Using Windows Servers to Share Information.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
Communications and Networks © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
NetTech Solutions Common Connectivity Problems Lesson Eight.
Using the Communications Program Chapter Thirteen.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Windows Vista Configuration MCTS : Advanced Networking.
© 2015 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 8: Applied Networking IT Essentials v6.0.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Instructor Materials Chapter 8 Configuring Cisco Devices
Instructor Materials Chapter 8: Subnetting IP Networks
Chapter 8 Applied Networking
Chapter 1: Explore the Network
Instructor Materials Chapter 4: Network Addressing
Instructor Materials Chapter 1: WAN Concepts
Chapter 7: Using Windows Servers
Chapter Objectives In this chapter, you will learn:
Instructor Materials Chapter 7: Networking Concepts
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 2 Networks in Our Daily Lives
Instructor Materials Chapter 11: Printers
Instructor Materials Chapter 13: The IT Professional
Connecting Desktops and Laptops to Networks
Instructor Materials Chapter 4: Access Control Lists
Instructor Materials Chapter 5 Providing Network Services
Instructor Materials Chapter 3 Communicating on a Local Network
Instructor Materials Chapter 6 Building a Home Network
Instructor Materials Chapter 10: Application Layer
CONNECTING TO THE INTERNET
Instructor Materials Chapter 9: Testing and Troubleshooting
Installing and Troubleshooting Networks
Networks and Connecting to the Internet
Chapter 10: Application Layer
Network Services, Cloud Computing, and Virtualization
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
CompTIA Security+ Study Guide (SY0-401)
Computer Technology Notes #4
Chapter 9 Windows on the Internet
2018 Real CompTIA N Exam Questions Killtest
Unit 27: Network Operating Systems
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
ICT Computing Lesson 4: Computing Network.
Windows Server Administration Fundamentals
Firewalls Chapter 8.
Chapter 10: Advanced Cisco Adaptive Security Appliance
Designing IIS Security (IIS – Internet Information Service)
Chapter 11: Printers IT Essentials v6.0 Chapter 11: Printers
Instructor Materials Chapter 8: Applied Networking
Presentation transcript:

Instructor Materials Chapter 8: Applied Networking Cisco Networking Academy Program IT Essentials Chapter 8: Applied Networking IT Essentials v6.0

Instructor Materials - Chapter 8 Planning Guide This PowerPoint is divided in two parts: Instructor Planning Guide Information to help you become familiar with the chapter Teaching aids Instructor Class Presentation Optional slides that you can use in the classroom Begins on slide #11 Note: Remove the Planning Guide from this presentation before sharing with anyone. 2

Chapter 8: Applied Networking ITE 6.0 Planning Guide Chapter 8: Applied Networking ITE 6.0 Planning Guide Chapter 8: Applied Networking

Chapter 8: Activities What activities are associated with this chapter? Page Number Activity Type Activity Name 8.1.2.9 Video Network CLI Commands 8.1.2.10 Lab Connect to a Router for the First Time 8.1.2.11 PT Connect to a Wireless Router and Configure Basic Settings 8.1.2.12 Configure Wireless Router in Windows 8 Configure Wireless Router in Windows 7 and Vista 8.1.2.13 Connect Wireless Computers to a Wireless Router 8.1.2.14 Test the Wireless NIC in Windows 8.1.2.15 Test a Wireless Connection 4

Chapter 8: Activities (Cont.) What activities are associated with this chapter? Page Number Activity Type Activity Name 8.1.3.8 Video Share a Folder 8.1.3.9 Lab Share Resources in Windows 8.1.4.3 Remote Assistance in Windows 8.1.4.4 Remote Desktop in Windows 7 and Vista Remote Desktop in Windows 8 8.2.1.7 Interactive Activity (IA) ISP Connection Types 8.3.1.6 IA Identify Cloud Terminology 8.3.2.11 Identify the Networked Host Service The password used in the Packet Tracer activities in this chapter is: PT_ITE! 5

Chapter 8: Assessment Students should complete Chapter 8, “Assessment” after completing Chapter 8. Quizzes, labs, Packet Tracers and other activities can be used to informally assess student progress. 6

Chapter 8: Best Practices Prior to teaching Chapter 8, the instructor should complete Chapter 8, “Assessment.” The goal of this chapter is to be able to configure devices to connect to LANs, the Internet, and Cloud services. Make sure students understand the function and purpose of NICs. Students should be able to perform basic wireless router configurations in a lab and in Packet Tracer. Make sure students can configure a folder for network sharing and map a drive. Have students discuss the pros and cons of selecting an Internet service provider. Include factors such as cost, location, and availability of options. Make sure students understand the impact of data centers and cloud computing on networks. Use class lecture time to have students describe the properties and purposes of networked host services. Make sure students can identify common problems and solutions for network troubleshooting scenarios. 7

Chapter 8: Additional Help For additional help with teaching strategies, including lesson plans, analogies for difficult concepts, and discussion topics, visit the ITE Community at community.netacad.net. If you have lesson plans or resources that you would like to share, upload them to the ITE Community in order to help other instructors. 8

Chapter 8: Topics in chapter that are not found in the CompTIA A+ 220-901 Certification This slide lists content included in this chapter that is NOT listed in the CompTIA A+ 220-901 blueprint. Instructors could skip these sections; however, they should provide additional information and fundamental concepts to assist the student with the topic. All content in Chapter 8 is aligned to the certification. 9

Chapter 8: Applied Networking Cisco Networking Academy Program IT Essentials Chapter 8: Applied Networking IT Essentials v6.0

Chapter 8 - Sections & Objectives 8.1 Computer to Network Connection Connect a computer to wired and wireless networks. 8.2 ISP Connection Technologies Explain the purpose and characteristics of ISP connection technologies. 8.3 Internet Technologies Explain Cloud concepts and networked-host services. 8.4 Common Preventive Maintenance Techniques Used for Networks Explain how to perform preventive maintenance on networks using common techniques. 8.5 Basic Troubleshooting Process for Networks Explain how to troubleshoot networks. 8.6 Chapter Summary 12

8.1 Computer to Network Connection Cisco Networking Academy Program IT Essentials Chapter 8: Applied Networking

Computer to Network Connection Networking Cards A wired or wireless network interface card (NIC) is required to connect to the network. After it is installed, IP settings must be configured either manually or dynamically. You can also configure advanced settings, such as speed, duplex, Wake on LAN, and quality of service (QoS). 8.1 - Computer to Network Connection 8.1.1 - Networking Cards

For wireless connections, configure the router with the following: Computer to Network Connection Wireless and Wired Router Configurations To connect to a network, attach a straight-through Ethernet cable to the NIC port. The other end connects to a router or to a telecommunications port that is wired so that data will reach the router. For wireless connections, configure the router with the following: Network Mode (set the 802.11 standard) Network Name (SSID) Channel (important when there are multiple APs in the network) Wireless Security (should be WPA2) 8.1 - Computer to Network Connection 8.1.2 - Wireless and Wired Router Configurations

Computer to Network Connection Network Sharing All Windows computers on a network must be part of either a domain or a workgroup. Before computers can share resources, they must share the same domain name or workgroup name.  Mapping a local drive is a useful way to access a single file, specific folders, or an entire drive between different operating systems over a network. Determine which resources will be shared over the network and the type of permissions users will have to the resources. Read - user can view data in files and run programs Change - user can add files and subfolders, change the data in files, and delete subfolders and files Full Control - user can change permissions of files and folders 8.1 - Computer to Network Connection 8.1.3 - Network Sharing

Computer to Network Connection Remote Connections A virtual private network (VPN) is a private network that connects remote sites or users together over a public network, like the Internet. When connected to the corporate private network, users become part of that network and have access to all services and resources as if they were physically connected to the corporate LAN. Remote-access users must install the VPN client on their computers to form a secure connection with the corporate private network. Remote Desktop allows technicians to view and control a computer from a remote location. Remote Assistance allows technicians to assist customers with problems from a remote location.  8.1 - Computer to Network Connection 8.1.4 - Remote Connections

8.2 ISP Connection Technologies Cisco Networking Academy Program IT Essentials Chapter 8: Applied Networking

ISP Connection Technologies Broadband Technologies DSL uses the existing copper telephone lines to provide high-speed digital data communication between end users and telephone companies.  Line of sight wireless Internet is an always-on service that uses radio signals for transmitting Internet access Cellular technology enables the transfer of voice, video, and data.  Cable uses coaxial cable lines originally designed to carry cable television.  Satellite is an alternative for customers who cannot get cable or DSL connections. Fiber broadband provides faster connection speeds and bandwidth than cable and DSL. 8.2 - ISP Connection Technologies 8.2.1 - Broadband Technologies

8.3 Internet Technologies Cisco Networking Academy Program IT Essentials Chapter 8: Applied Networking

Internet Technologies Data Centers and Cloud Computing Data center is a data storage and processing facility run by an in-house IT department or leased offsite. Cloud computing is an off-premise service that offers on-demand access to a shared pool of configurable computing resources. The three main Cloud services models are: Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) The four Cloud deployment models are: Private Public Community Hybrid 8.3 - Internet Technologies 8.3.1 - Data Centers and Cloud Computing

Internet Technologies Networked Host Services Hosts need a variety of services to securely access resources on the network and the Internet. Dynamic Host Configuration Protocol (DHCP) dynamically assigns IP addressing information to hosts. Domain Name Service (DNS) is the method computers use to translate domain names into IP addresses.  Hypertext Transfer Protocol (HTTP) or the secure HTTP (HTTPS) are used by hosts to access web resources File Transfer Protocol (FTP) allows hosts to transfer data between a client and a server. Secure file transfer options include File Transfer Protocol Secure (FTPS), SSH File Transfer Protocol (SFTP), and Secure Copy (SCP) Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP), and Internet Message Access Protocol (IMAP) are the protocols hosts used to send and receive email. 8.3 - Internet Technologies 8.3.2 - Networked Host Services

Internet Technologies Networked Host Services (cont.) Hosts need a variety of services to securely access resources on the network and the Internet. Print servers enable multiple computer users to access a single printer Proxy servers are popularly used to act as storage or cache for web pages that are frequently accessed by hosts on the internal network. AAA is a way to control who is permitted to access a network (authenticate), what they can do while they are there (authorize), and track what actions they perform while accessing the network (accounting). Intrusion Detection Systems (IDSs) passively monitor traffic on the network while Intrusion Prevention Systems (IPSs) can detect and immediately address a network problem. Universal Threat Management (UTM) include all the functionality of an IDS/IPS as well as stateful firewall services.   8.3 - Internet Technologies 8.3.2 - Networked Host Services

8.4 Common Preventive Maintenance Techniques Used for Networks Cisco Networking Academy Program IT Essentials Chapter 8: Applied Networking

Common Preventive Maintenance Techniques Used for Networks Network Maintenance Preventive maintenance for networks includes the condition of cables, network devices, servers, and computers to make sure that they are kept clean and are in good working order. You should develop a plan to perform scheduled maintenance and cleaning at regular intervals. Inform the network administrator if you notice any of these issues to prevent unnecessary network downtime. 8.4 - Common Preventive Maintenance Techniques Used for Networks 8.4.1 - Network Maintenance

8.5 Basic Troubleshooting Process for Networks Cisco Networking Academy Program IT Essentials Chapter 8: Applied Networking

Establish a Theory of Probable Cause Basic Troubleshooting Process for Networks Applying the Troubleshooting Process to Networks Identify the Problem The first step in the troubleshooting process. A list of open and closed-ended questions is useful. Establish a Theory of Probable Cause Based on the answers received, establish a theory probable cause. A list of common problems can be useful. Test the Theory to Determine Cause Test your theories to determine the cause of the problem. A list of quick procedures to common problems can help. Establish a Plan of Action to Resolve the Problem and Implement the Solution A plan of action is needed to solve the problem and implement a permanent solution. 8.5 – Basic Troubleshooting Process for Networks 8.5.1 - Applying the Troubleshooting Process to Networks

Verify Full Network Functionality and Implement Preventive Measures Basic Troubleshooting Process for Networks Applying the Troubleshooting Process to Networks Verify Full Network Functionality and Implement Preventive Measures It is important to perform a full network check. If applicable, implement preventive measures to avoid future problem recurrences. Document Findings, Actions and Outcomes Findings, repairs and notes should be documented. This log can be helpful for future reference. 8.5 – Basic Troubleshooting Process for Networks 8.5.1 - Applying the Troubleshooting Process to Networks

Common networking problems include: Basic Troubleshooting Process for Networks Common Problems and Solutions for Networks Network problems can be attributed to hardware, software, or configuration issues Common networking problems include: Network cables are damaged or unplugged. Legitimate users are denied remote access. Device lacks sufficient addressing information. Users cannot access the Internet. User cannot map a drive or share a folder on the network. 8.5 – Basic Troubleshooting Process for Networks 8.5.2 - Common Problems and Solutions for Networks

8.6 Chapter Summary Cisco Networking Academy Program IT Essentials Chapter 8: Applied Networking

Chapter Summary Conclusion This chapter introduced the operation of computer networks. The following concepts from this chapter are important to remember: Each device must have appropriate addressing in order to access network resources. Wired devices are attached to a network using an Ethernet cable. Wireless devices authenticate and associate with a wireless access point. Mapping a local drive is a useful way to access a single file, specific folders, or an entire drive between different operating systems over a network. VPNs allow private connections over public networks. Remote Desktop allows network administrators to remotely control a computer. Examples of broadband technologies include DSL, cable, and cellular. Data centers are facilities that provide data storage services. Cloud computing use data centers to provide cloud services in a variety of deployment models. Networked host services include DHCP, DNS, HTTP, FTP, SMTP, proxies, AAA, IPSs, and UTMs. Networks require a systematic preventive maintenance and troubleshooting methodology. 8.6 – Chapter Summary 8.6.1 - Conclusion

Chapter 8 New Terms and Commands aaa adsl broadband broadcast cellular ddos dhcp dhcpdiscover dhcpoffer dish (antenna) dns downlink dsl duplex ftps gateway gprs gsm hsdpa html http https hypertext idss imap ipconfig ips ipv4 ipv6 isdn isp linksys microwave mimo nat netbios netgear nslookup ntfs New Terms and Commands

Chapter 8 New Terms and Commands (Cont.) phishing qos saas scp sftp sms smtp ssh ssid ssl stateful tcp tls tracert trendnet utm utms vpn wimax wol New Terms and Commands (Cont.)