A+ Breakout Ralph D Nyberg

Slides:



Advertisements
Similar presentations
Understanding Internet Protocol
Advertisements

Resolving IP Connectivity Issues Lesson 2. Objectives 2.
Hands-On Microsoft Windows Server 2003 Networking Chapter Two Networking Protocols.
Why create a subnet mask? Tells device which part of an address is the network # including the subnet and which part is the host Filters the node IP address.
30/11/ Q & A on Networking. Question No. 1 What is Networking? Two or more computers that are linked in order to share – Resources (such as printers.
1 Chapter Overview Network devices. Hubs Broadcast For star topology Same as a repeater Operate at the physical layer 2.
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
EECP 0442 V2.0 Computer Network. Week 1 – Introduction to Networking Overview of Network and Internet.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Computer Networks: Hands On Experience
1 Understanding the TCP/IP Protocol Suite Industry standard Enables enterprise networking and connectivity.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
PC Maintenance: Preparing for A+ Certification Chapter 22: Setting Up a Windows Network.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 2: Configuring Network Protocols.
S305 – Network Infrastructure Chapter 6 Local Area Network.
Network Addresses, Switches and Routing Bob Bradley IS361 Fall 2005 Chapter 1 Part 2.
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
1/28/2010 Network Plus IP Addressing Review. IP Address Classes.
© Cengage Learning 2014 How IP Addresses Get Assigned A MAC address is embedded on a network adapter at a factory IP addresses are assigned manually or.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Microsoft Windows XP Professional
LANS A Overview (also a Review). NICS  Could be Ethernet, FDDI, Token Ring or Wireless.  Multiple Protocols can be bound to a NIC.  In WinDoze all.
Ethernet Advanced Chapter 5. Release 16/7/2009 Chapter Objectives Explain 10Base-T network Explain 10Base-FL Explain the rule Identify different.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 18 PCs on a Network.
Wrapping up subnetting, mapping IPs to physical ports BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 3 Networking with Windows Server 2008.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Unit 7: DHCP, APIPA and NTP. Static versus dynamic IP addressing Dynamic IP addresses can change each time you connect to the Internet, while static IP.
Understand IPv6 Part 2 LESSON 3.3_B Networking Fundamentals.
Networking and firewall
Chapter 5 Exploring IPv4.
LESSON Networking Fundamentals Understand IPv4.
Chapter Objectives In this chapter, you will learn:
Introduction to Networks v6.0
OSI Model IP address.
Network Protocols Transmission Control Protocol/Internet Protocol (TCP/IP) Asynchronous Transfer Mode (ATM) NWLink NetBIOS Enhanced User Interface (NetBEUI)
The Ethernet Cable CAT5 CAT6 Fiber Speed 10 ~ 100 Mbps 1000 Mbps
Troubleshooting a Network
Networking for Home and Small Businesses – Chapter 5
Instructor Materials Chapter 5: Ethernet
Chapter 3 Computer Networking Hardware
Chapter 9 Ethernet Part II
Basic Computer Network
Introduction to Networking
Introduction to Computers
Introducing To Networking
Introduction to Computers
Introduction To Computers
Net 323: NETWORK Protocols
Chapter 9 Objectives Understand TCP/IP Protocol.
Computer Technology Notes #4
Networking for Home and Small Businesses – Chapter 5
e-business and Information Systems
Why Use a Computer Network?
Intro To Computer Networks
IPv4 Addresses A Quick Guide.
IPv4 Addresses A Quick Guide.
Basic Computer Network
Examining IP Addressing
Ethernet: A Multi-access Network
Lesson 8: Configuring IP Settings MOAC : Configuring Windows Devices.
Chapter 2: Scaling VLANs
Planning the Addressing Structure
Review of Important Networking Concepts K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry – LECTURE 2 COMS 525:
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
Chapter 9 Ethernet Part II.
AbbottLink™ - IP Address Overview
Network Addressing.
Presentation transcript:

A+ Breakout Ralph D Nyberg Networking

Addressing Physical/Mac Address/Hardware Address 12 digit hex 1st 6 digits Vendor ID Associated with NIC Can be viewed with ipconfig /all

Addressing (cont) Network/Software/Logical/IP Address Required Elements IP Address :192.168.1.100 Subnet Mask :255.255.255.0 Required to reach other networks Default Gateway :192.168.1.250 Required to Resolve Names DNS Server :192.168.20.5 Does not have to be local

Addressing (cont) Role of the Subnet Mask The Subnet Mask defines which portion of the IP address defines the network and which portion defines the host. Computers use binary(base 2) numbering to store values. IP addresses and subnet masks are 32 bits or 4 bytes. For example, a subnet mask of 255.255.255.0 written in binary looks like: 11111111.11111111.11111111.00000000 An on bit (1) in the subnet mask indicates that it is part of the network portion of the address and an off (0) bit indicates that it is part of the host address. Take the following example: IP Address :192.168.1.100 Subnet Mask :255.255.255.0 The network portion of this address is 192.168.1 and the host portion is .100. All hosts on the same subnet must share a common network address and must have a unique host address. By looking at the example you know that all the other hosts on the same subnet will have an address that begins with 192.168.1 and cannot end with 100.

Addressing (cont) CIDR Notation Sometimes CIDR notation is used to represent an IP address. CIDR notation represents the subnet mask by indicating the number of on (1) bits in the mask. For example, the address 192.168.1.100 with a mask of 255.255.255.0 would be written 192.168.1.100/24 . The 24 represents the 3 bytes of on bits (8+8+8). Another example would be, the address 172.16.4.2 with a mask of 255.255.0.0 would be written 172.16.4.2/16 .

Private Address Ranges Addressing (cont) Private Address Ranges   Certain address ranges have been reserved for use on private networks. They are sometimes referred to as non-routable address because internet router will not forward them because they are reserved for private networks. The ranges are as follows: 10.0.0.0 172.16.0.0 – 172.31.0.0 192.168.0.0 -192.168.255.0 It is always best to use these ranges when setting up a private network to avoid conflict with an existing network on the internet. When using these private ranges technology has to be implemented to allow hosts access to the internet (NAT or PROXY).

Addressing (cont) Address Assignment Static Dynamic Manual Dynamic requires a DHCP server   On the exam if you run into a question where a host address is 169.254.x.x that indicates a problem. The 169.254.x.x address range is used by APIPA (Automatic Private IP Addressing). It is an indication that the host is set to receive an address dynamically but was unable to contact the DHCP server. To answer this question you have to consider the address assignment method that is being used in the environment. If the environment uses static addressing then you need to manually assign the host an address. If the environment uses dynamic addressing then the first step is the make another attempt to acquire an address using the commands ipconfig /release and ipconfig /renew .

Bandwidth Bandwidth is a measure of available or consumed data communication resources expressed in bit/s or multiples of it (kbit/s, Mbit/s etc).

Status Indicators NICs have status indicators or link lights that show activity and indicate an active connection. If the exam question indicates that you have inspected the cabling and have link light then they are telling you that the problem is software based and not hardware based. If you do not have link light then the most common causes of this are: cabling (most common) NIC Dead port on Switch/Hub Switch/Hub is off

Other Protocols IPX/SPX was used by older Novell Netware environments. NWLINK is Microsoft’s implementation of IPX/SPX. NETBEUI is a non-routable protocol used on old Microsoft networks. It has not been included with Microsoft operating systems since Windows 2000.

Full Duplex vs Half Duplex Ethernet switching gave rise to another advancement, full-duplex Ethernet. Full-duplex is a data communications term that refers to the ability to send and receive data at the same time.   Legacy Ethernet is half-duplex, meaning information can move in only one direction at a time. In a totally switched network, nodes only communicate with the switch and never directly with each other. Switched networks also employ either twisted pair or fiber optic cabling, both of which use separate conductors for sending and receiving data. In this type of environment, Ethernet stations can forgo the collision detection process and transmit at will, since they are the only potential devices that can access the medium. This allows end stations to transmit to the switch at the same time that the switch transmits to them, achieving a collision-free environment.

UTP UTP is the most common cabling used in modern LANS. PVC vs. Plenum Rated PVC stands for Poly Vinyl Chloride, which is the insulation used around the copper wires. When it burns, it emits a poisonous gas. Plenum Rated, which is a TEFLON (copyright Dupont) or FEP coating burns at a much higher temperature and is not as toxic. When should I use PVC and when should I use Plenum Rated?  Well it depends. PVC cable is about 1/2 to 1/3 the price of Plenum Rated cable. Plenum rated cables is used in air plenum ceilings where the return air is forced through the ceiling, rather than being ducted through air conditioning tubes. You should check with the Building and Safety Department of your City. Different cities have different regulations. In general, Plenum Rated cable must be used in an air plenum ceiling.

UTP (cont) TYPE USE Speed CAT 1 Voice CAT 2 DATA 4 Mb/s CAT 3 Ethernet Fast Ethernet 100 Mb/s CAT 5E Fast/Gig Ethernet 1000 Mb/s @ 350 Mb/s CAT 6 Gig Ethernet 1000 Mb/s

RJ45

RJ11

F-Type

SC Connector

ST Connector

MT-RJ

LAN/WAN LAN WAN Private Public (telco) High Speed Low Speed Single Location Multi Location

Questions