A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e

Slides:



Advertisements
Similar presentations
Resolving IP Connectivity Issues Lesson 2. Objectives 2.
Advertisements

A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 11 Windows on a Network.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
A+ Guide to Software, 4e Chapter 9 Windows on the Internet.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
A+ Guide to Managing and Maintaining Your PC, 7e
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
Wi-Fi Structures.
Chapter 9 Connecting to and Setting up a Network
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
A+ Guide to Software, 4e Chapter 8 Windows on a Network.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Chapter 8: Configuring Network Connectivity. 2/24 Objectives Learn how to configure a network adapter Learn about the Network and Sharing Center Learn.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 18 Networking Practices.
Networking protocols Unit objective: Identify TCP/IP properties, and identify common ports and protocols.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 17 Networking Essentials.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
Chapter 7 Connecting to and Setting up a Network
A+ Guide to Managing & Maintaining Your PC, 8th Edition
Connecting to and Setting up a Network
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
A+ Guide to Managing and Maintaining your PC, 6e Chapter 10….. PCs on the Internet.
WXES2106 Network Technology Semester /2005 Chapter 4 TCP/IP CCNA1: Module 9, 10.3 and 11.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 12 Windows on the Internet.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
C HAPTER 9 Supporting TCP/IP, DNS using Windows XP.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, Sixth Edition Chapter 7 Connecting to and Setting up a Network.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
© Cengage Learning 2014 How IP Addresses Get Assigned A MAC address is embedded on a network adapter at a factory IP addresses are assigned manually or.
NetTech Solutions Common Connectivity Problems Lesson Eight.
Using the Communications Program Chapter Thirteen.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 9 Networking Practices.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Guide to Parallel Operating Systems with Windows 7 and Linux Chapter 11 Networking.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
A+ Guide to Managing & Maintaining Your PC Chapter 15 Connecting to and Setting up a Network.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
A+ Guide to IT Technical Support, 9th Edition
Windows Vista Configuration MCTS : Advanced Networking.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Chapter Objectives In this chapter, you will learn:
Connecting Desktops and Laptops to Networks
Instructor Materials Chapter 5 Providing Network Services
Level 2 Diploma Unit 10 Setting up an IT Network
Network Wiring and Reference
Chapter 9 Objectives Understand TCP/IP Protocol.
Chapter 9 Windows on the Internet
Network Addressing.
Presentation transcript:

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials

Windows on a Network Client/server applications Two computers and two applications involved Communication occurs three levels Hardware, operating system, application Dependent on one computer addressing the other Figure 8-1 A Web browser (client software) requests a Web page from a Web server (server software); the Web server returns the requested data to the client Courtesy: Course Technology/Cengage Learning A+ Guide to Software

Layers of Network Communication Level 1: Hardware level Root level of communication Wireless or network cables Phone lines or TV cable lines Includes the network adapter and MAC address Communication protocols used A+ Guide to Software

Figure 8-2 Network communication happens in layers Courtesy: Course Technology/Cengage Learning A+ Guide to Software

Layers of Network Communication (cont’d.) Level 2: Operating system level Manages communication between itself and another computer using TCP/IP Uses IP addressing Figure 8-4 Computers on the same LAN use MAC addresses to communicate, but computers on different LANs use IP addresses to communicate over the Internet Courtesy: Course Technology/Cengage Learning A+ Guide to Software

Layers of Network Communication (cont’d.) Level 3: Application level Client communicates with another Internet application Port number Uniquely identifies computer application Socket IP address followed by a colon and port number E-mail example: 36.60.30.5:25 Web server example: 136.60.30.5:80 A+ Guide to Software

Table 8-1 Common TCP/IP port assignments for client/server applications A+ Guide to Software

Understanding IP Addresses and How They Are Used IP address: 32 bits long, made up of 4 bytes, each 8 bits long Four decimal numbers separated by periods 190.180.40.120 Largest possible 8-bit number 11111111 (255 decimal) Largest possible decimal IP address 255.255.255.255 11111111.11111111.11111111.11111111 binary Octet: each of the four decimal numbers 0 to 255, 4.3 billion potential IP addresses A+ Guide to Software

Understanding IP Addresses and How They Are Used (cont’d.) IP address identifies network and host Classes are based on the number of possible IP addresses in each network within each class Table 8-2 Classes of IP addresses A+ Guide to Software

Understanding IP Addresses and How They Are Used (cont’d.) Class D addresses: octets 224 through 239 Multicasting Class E addresses: octets 240 through 254 Research Figure 8-7 The network portion and host portion for each class of IP addresses Courtesy: Course Technology/Cengage Learning A+ Guide to Software

Understanding IP Addresses and How They Are Used (cont’d.) Subnet masks Group of ones followed by a group of zeros Classful subnet masks: all ones, all zeros in an octet Classless subnet mask: mix of zeros and ones Table 8-3 Default subnet masks for classes of IP addresses A+ Guide to Software

Understanding IP Addresses and How They Are Used (cont’d.) Public IP addresses: available to the Internet Private IP addresses: used on private intranets Use router with NAT redirection for Internet access IEEE recommendations 10.0.0.0 through 10.255.255.255 172.16.0.0 through 172.31.255.255 192.168.0.0 through 192.168.255.255 Table 8-4 Reserved IP addresses A+ Guide to Software

Understanding IP Addresses and How They Are Used (cont’d.) Dynamic IP address Assigned for current connection only (lease) Managed by DHCP server DHCP client: workstations working with DHCP server DHCP software resides client and server Configuring a DHCP server IP address ranges available for clients Automatic Private IP Address (APIPA) service Used if attempt fails Address range 169.254.x.y A+ Guide to Software

Figure 8-10 A DHCP server has a range of IP addresses it can assign to clients on the network. Courtesy: Course Technology/Cengage Learning A+ Guide to Software

Character-based Names Identify Computers and Networks Character-based names: substitute for IP addresses Host name: name of a computer NetBIOS name: 15 character name used on legacy system Workgroup name: identifies a workgroup Domain name: identifies a network Fully qualified domain name (FQDN): identifies computer and network to which it belongs Uses name resolution DNS server finds IP address when FDQN known Windows uses a host file A+ Guide to Software

TCP/IP Protocol Layers Figure 8-13 How software, protocols, and technology on a TCP/IP network relate to each other. Courtesy: Course Technology/Cengage Learning A+ Guide to Software

TCP/IP Protocol Layers (cont’d.) HTTP (Hypertext Transfer Protocol) HTTPS (HTTP secure) protocol Encrypts and decrypts data before sent and processed FTP (File Transfer Protocol) Transfer files between two computers SMTP (Simple Mail Transfer Protocol) Used to send e-mail message SMTP AUTH (SMTP Authentication) POP and IMAP Delivery of email message A+ Guide to Software

TCP/IP Protocol Layers (cont’d.) Telnet Remotely control a computer TCP (Transmission Control Protocol) Connection-oriented protocol Used by Web browsers and e-mail UDP (User Datagram Protocol) Connectionless protocol (best-effort) Used for broadcasting and streaming video TCP uses IP to establish client/server session Uses a series of acknowledgements A+ Guide to Software

PING, IPCONFIG, and TELNET Ping (Packet InterNet Groper) command Tests connectivity by sending echo request to a remote computer Ipconfig command Displays TCP/IP configuration information and refreshes the IP address Telnet Allows user connection to a remote computer Remote Assistance and Remote Desktop Becoming more popular than Telnet A+ Guide to Software

PING, IPCONFIG, and TELNET (cont’d.) Telnet Tips Client/server application User account must belong to TelnetClients group Application must be running on remote computer Telnet client and server applications installed on Windows XP by default (not on Vista) Telnet disadvantage: lack of security Better protocol: Secure Shell (SSH) Supported by Windows Requires third-party SSH applications A+ Guide to Software

Virtual Private Networks Secures private data traveling over a public network Encrypts data packets Managed by client/server software VPN security User accounts and passwords required for connection One of four tunneling protocols used Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP) SSL (Secure Sockets Layer) IPsec (IP security) A+ Guide to Software

How to Connect a Computer to a Network Connecting a computer to a network Quick and easy in most situations Topics covered Connecting using wired and wireless connections Fixing connection problems A+ Guide to Software

Connect to a Network Using an Ethernet Connection Steps Install network adapter Connect network cable to Ethernet RJ-45 port and network port (wall jack, router, switch) Verify lights Windows assumes dynamic IP addressing Automatically configures the network connection Check in Network places folder Verify Internet connectivity A+ Guide to Software

Connect to a Network Using an Ethernet Connection (cont’d.) Troubleshooting Verify Device Manager recognizes adapter without errors Verify network is listed in Start menu Connect to a network Network and Sharing Center window (Vista) Network Connections window (XP) Vista: click Diagnose why Windows can’t find any networks XP: repair connection using Local Area Connection icon A+ Guide to Software

Connect to a Network Using an Ethernet Connection (cont’d.) Static IP addressing information: Computer IP address Subnet mask Group of four dotted decimal numbers Default gateway Device allowing computer on one network to communicate with computer on another network IP addresses of one or more DNS servers Verify TCP/IP settings A+ Guide to Software

Connect to a Network Using a Wireless Connection Wireless networks types Public, unsecured hotspots or private, secured hotspots Public wireless hotspot connection steps Install wireless adapter Embedded wireless: turn on wireless device Connect to network Save network if comfortable with Vista configuration Verify firewall settings and check for errors Test the connection and be aware of rogue hotspots A+ Guide to Software

Connect to a Network Using a Wireless Connection (cont’d.) Private wireless connection steps Provide information proving right to use the network Enter encryption key Enter SSID name if necessary Check for MAC address filtering Provide MAC address if necessary MAC address is found on the adapter, in documentation, or though Ipconfig command A+ Guide to Software

Connect to a Network Using a Wireless Connection (cont’d.) Windows XP: connect to public or private hot spot Within Network Connections window Right-click the Wireless Network Connection icon Select View Available Wireless Networks Select an unsecured network and click Connect Enter the key the resulting dialog box Troubleshoot within Wireless Network Connection Properties dialog box Click the Wireless Networks tab and Click Add Enter SSID, ensure Network Authentication set to Open and Data encryption set to Disabled, and click OK A+ Guide to Software