MTA Network Fundamental Cram Sesion

Slides:



Advertisements
Similar presentations
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Advertisements

Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Wi-Fi Structures.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
Networking Protocols and the OSI Model. OSI Model Overview The Open Systems Interconnection (OSI) reference model is an industry standard framework that.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Networks CSCI-N 100 Dept. of Computer and Information Science.
MTA Networking Fundamentals
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
Network Theory Review for Final Exam ©Richard L. Goldman June 17, 2003 from: Network+ Guide to Networks, Dean.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Chapter2 Networking Fundamentals
NetTech Solutions Common Connectivity Problems Lesson Eight.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Windows Vista Configuration MCTS : Advanced Networking.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Understanding Local Area Networking Lesson 1. Objectives.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Overview of E- Business Technologies Irwan Sembiring.
Some Network Commands n Some useful network commands –ping –finger –nslookup –tracert –ipconfig.
Discovery Internetworking Module 9 JEOPARDY K. Martin.
Defining Network Infrastructure and Network Security Lesson 8.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Networking and firewall
LESSON Networking Fundamentals Understand IPv4.
Exam Prep: Microsoft Technology Associate : Networking Fundamentals
Chapter Objectives In this chapter, you will learn:
Click to edit Master subtitle style
Connecting Desktops and Laptops to Networks
Virtual Private Networks
A+ Guide to Managing and Maintaining Your PC, 7e
NETWORK Unit 1 Module: 2 Objective: 7.
Understand Wide Area Networks (WANs)
Module 8: Networking Services
CONNECTING TO THE INTERNET
Network Infrastructure
Planning and Troubleshooting Routing and Switching
Installing and Troubleshooting Networks
Lecture 6: TCP/IP Networking By: Adal Alashban
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Chapter 9 Objectives Understand TCP/IP Protocol.
e-business and Information Systems
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Module 2: Understanding Local Area Networks
Goals Introduce the Windows Server 2003 family of operating systems
Computing Over Distance
NETWORK Unit 1 Module: 2 Objective: 7.
NETWORK Unit 1 Module: 2 Objective: 7.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Cengage Learning: Computer Networking from LANs to WANs
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
COMPUTER NETWORKING Presented by Pushpanjali Associate professor
Presentation transcript:

MTA Network Fundamental Cram Sesion Mark Rawlings

Network Topology A network topology defines the physical connections of hosts in a computer network. There are several types of physical topologies including: Bus Ring Star Mesh Tree

Star Topology Most Common topology Each computer is individually wired to a central connecting device (hub, switch or SOHO router) with twisted-pair cabling.

Mesh Topology Every computer connects to every other computer; no central connecting device is needed.

Ring Topology In a LAN environment, each computer is connected to the network using a closed loop. Used by Token Ring and FDDI.

Token Ring A Token Ring network sends data logically in a ring fashion, meaning that a token goes to each computer, one at a time, and continues on in cycles. However, Token Ring computers are physically connected in a star fashion. Namely, all computers in a Token Ring network are connected to a central connecting device known as a Multistation Access Unit (MAU or MSAU).

Ethernet Ethernet is a group of networking technologies that define how information is sent and received between network adapters, hubs, switches, and other devices. Ethernet is the de facto standard and has the largest share of networks in place today. Ethernet is standardized by the Institute of Electrical and Electronics Engineers (IEEE) as 802.3.

Ports

Ports It is important to understand the difference between inbound and outbound ports: Inbound ports Outbound ports

Ports

NetStat Command This will display a list of all the connections to and from your computer in numeric format

OSI Model Revisited

WLAN Standards

Wireless Encryption Options

Classful Network Architecture

Loopback Testing The range for Class A is 0–127. The 127 network number isn’t used by hosts as a logical IP address. Instead, this network is used for loopback IP addresses, which allow for testing.

Private Addresses

APIPA APIPA is an acronym for Automatic Private IP Addressing. It uses a single Class B network number: 169.254.0.0. If a Windows client cannot get an IP address from a DHCP server and has not been configured statically, it will auto-assign a number on this network.

IPConfig Command Displays IP Configuration

IPConfig /All Command

IPConfig /Release

Ping Command Used to test network connectivity Users ICMP

Tracert Command W

PathPing Command

NetStat Command

NSLookup Nslookup displays information about DNS names and their corresponding IP addresses, and it can be used to diagnose DNS servers.

IPSec Internet Protocol Security (IPSec) is a protocol within the TCP/IP suite that encrypts and authenticates IP packets. It is designed to secure any application traffic because it resides on the network layer (or Internet layer, as TCP/IP programmers refer to it). This protocol is used in conjunction with virtual private networks and is an integral part of IPv6.

WINS Windows Internet Name Service (WINS) is a service that resolves NetBIOS names to IP addresses. It is Microsoft’s version of the NetBIOS Name Service (NBNS) combined with a name server.

T-Carriers The two most common T-carrier systems are as follows: T1: It is considered 1.544 Mbps, but only 1.536 Mbps of that is for data. The 1.536 Mbps is broken into 24 equal 64 Kbps channels and can be used with a multiplexor. T3: Stands for trunk Carrier 3. Equivalent of 28 T1s. It is considered 44.736 Mbps, using 672 64 Kbps B channels.

DSL Digital subscriber line (DSL) is a family of technologies that provides data transmissions over local telephone networks. xDSL is the standard for the various digital subscriber lines. ADSL (asymmetrical digital subscriber lines) can run on your home telephone line so that you can talk on the phone and access the Internet at the same time. SDSL (symmetrical digital subscriber line) is installed (usually to companies) as a separate line and is more expensive. The upload and download speed are the same or symmetrical.

VPN Popular VPN Protocols are: PPTP: generally includes security mechanisms, and no additional software or protocols need to be loaded. L2TP with IPSec: L2TP not normally encrypted – IP Sec added for encryption Site to Site VPN: Establishes a secure connection over public web SSL VPN: Used with standard web browser – no install needed

Point-to-Point Tunneling Protocol Point-to-Point Tunneling Protocol (PPTP) is the more commonly used protocol, but it is also the less secure option. PPTP generally includes security mechanisms, and no additional software or protocols need to be loaded. A VPN device or server that allows incoming PPTP connections must have inbound port 1723 open. PPTP works within the point-to-point protocol (PPP), which is also used for dial-up connections.

L2TP with IPSec Layer 2 Tunneling Protocol (L2TP) is quickly gaining popularity due to the inclusion of IPsec as its security protocol. Although this is a separate protocol and L2TP doesn’t have any inherent security, L2TP is considered the more secure solution because IPsec is required in most L2TP implementations. A VPN device or server that allows incoming L2TP connections must have inbound port 1701 open.

DMZ