Course ILT Network adapters Unit objectives Discuss network adapter configuration Troubleshoot network adapter problems.

Slides:



Advertisements
Similar presentations
Chapter Six Networking Hardware.
Advertisements

CHAPTER Peer-to-peer Network Installation and Configuration.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 11 Windows on a Network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Chapter 22 All About SCSI.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Review on Networking Technologies Linda Wu (CMPT )
COMPUTER NETWORKS.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Understanding How Networks Communicate. Copyright © Texas Education Agency, All rights reserved.2 We Will Learn: Basic networked communications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
1 Protocol Interaction (ISO’s Open Systems Interconnection (OSI model)) the 7 layers.
Chapter 8 All About SCSI.
1 Chapter Overview Understanding the Windows 2000 Networking Architecture Using Microsoft Management Console.
Introducing Network Standards Open Systems Interconnection (OSI) Model IEEE 802.x Standard Device Drivers and OSI 1.
Course Introduction CET1600C – Cisco Networking Fundamentals Professor Yousif.
How Hardware and Software Work Together
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 22 All About SCSI.
Welcome to Cisco Academy Chapter 1. Objectives Understand Safety Rules Provide common knowledge base –PC Hardware Build bridge between understanding of.
Chapter 5 Networks Communicating and Sharing Resources
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Chapter 1-3 The Ethernet LAN. Ethernet The networking protocol used in most modern computer networks is Ethernet. Ethernet is a CSMA/CD LAN protocol.
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 43 – The Network Interface Card (NIC)
Sem 1v2 Chapter 1: The Basics of Computing. There are three reasons why it is important to be able to recognize and name the major components of a PC.
OSI Model CS363-Winter 1999 DePaul University. Group Project Info Teams formed and on the web Cases Working in Groups Last half of class tonight reserved.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained.
CHAPTER Windows NT Server Installation. Chapter Objectives Give an overview of the installation process Outline the pre-installation and post- installation.
Guide to Networking Essentials Fifth Edition Chapter 4 Network Interface Cards.
Basic Concepts of a Computer Network
Chapter 7 Low-Level Protocols
Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 2: Configuring Network Protocols.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
11 NETWORK CONNECTION HARDWARE Chapter 3. Chapter 3: NETWORK CONNECTION HARDWARE2 NETWORK INTERFACE ADAPTER  Provides the link between a computer and.
Addressing Through the Layers  Data Link Layer Address  Network Layer Address.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Course ILT Basic networking concepts Unit objectives Compare various types of networks Discuss types of servers Discuss LAN topologies Discuss planning.
Networking Technologies Presentation Presented by David Fisher June 4, 1999 West Lafayette, IN.
Chapter 4  Configuration: Client/Server Components 1 Chapter 4 Overview  Configure client/server components o Network interface card (NIC) o Windows.
TCP/IP Protocol Architecture CSE 3213 – Fall
1 Chapter Overview Network Communications The OSI Reference Model.
1 Chapter Overview Network Communications The OSI Reference Model.
Understand the Components of a Network Mrs. Whaley.
NetTech Solutions Common Connectivity Problems Lesson Eight.
Microsoft Windows XP Professional
1 Terminology. 2 Requirements for Network Printing Print server Sufficient RAM to process documents Sufficient disk space on the print server.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
LANS A Overview (also a Review). NICS  Could be Ethernet, FDDI, Token Ring or Wireless.  Multiple Protocols can be bound to a NIC.  In WinDoze all.
Semester 1 v CCNA 1 Module 1:Introduction. Semester 1 v Connecting to the Internet.
1 Chapter Overview  Network Cables  Network Interface Adapters  Network Hubs.
LAN Protocols Chapter 5. Learning Objectives Explain the following LAN protocols and how they work with network operating systems: IPX/SPX, NetBEUI, AppleTalk,
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 18 PCs on a Network.
Chapter Objectives In this chapter, you will learn:
Using MIS 2e Chapter 6 Appendix
network interface card (NIC)
TCP/IP Protocol Suite: Review
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Course ILT Network adapters Unit objectives Discuss network adapter configuration Troubleshoot network adapter problems

Course ILT Topic A Topic A: Network adapter configuration Topic B: Troubleshooting network adapter problems

Course ILT Network adapter configuration A network adapter provides a communication channel between your computer’s motherboard and the network Understanding proper network adapter configuration is essential for configuring and supporting computers on a network

Course ILT A sample NIC

Course ILT Network adapter selection criteria Network adapter cards provide the hardware interface for the data link protocols The factors that need to be considered before the purchase and installation of these hardware components –Data link protocol –System bus –Free slots –Cabling

Course ILT Network adapter settings Conflicts during physical installation of a new adapter can be located by checking settings for –IRQ –I/O address –DMA –ROM address (see Device Manager/View/Resources by Connection or by Type)

Course ILT MAC address Is your computer’s or more accurately your NIC’s unique hardware identifier Is a hexadecimal number assigned to each NIC during the manufacturing process A sample MAC address –00-A0-00-E2-8F-FA –(The first six hex numbers are assigned to a manufacturer; each maker of NICs gets a series of numbers. Each manufacturer then numbers each NIC uniquely with the next 6.)

Course ILT A MAC address

Course ILT MAC Address and Device ID Assignment Authorities IEEE web site: Public OUI and company_id Assignments Announcement These listings are updated daily. The three-octet OUI can be used to generate Universal LAN MAC addresses and Protocol Identifiers per ANSI/IEEE Std 802 for use in Local and Metropolitan Area Network applications. If your firm manufactures or plans to manufacture products using ISO/IEC 8802 standards, you should apply to IEEE for your firm's OUI. The Institute of Electrical and Electronics Engineers, Inc. has been designated by the ISO Council to act as the registration authority for the implementation of International Standards in the ISO/IEC 8802 series. This is the one world-wide source of registered OUIs. For further details contact: –IEEE Registration Authority IEEE Standards Department 445 Hoes Lane Piscataway NJ Phone: (732) Fax: (732) IEEE Registration Authority (below) –

Course ILT Boot PROMs Are add-on items to a network adapter that helps a computer to boot entirely from a network server Can be used to configure networked computers in a harsh environment, such as a factory floor, where hard or floppy drives will tend to fail

Course ILT Activity A-1 Discussing the properties of a network adapter

Course ILT Jumper/switch configuration Depending on the manufacturer and model of the NIC, you might have to set switches or jumpers on the card to set the IRQ and I/O address –(very unusual on modern NICs) Always check the documentation that was shipped with the NIC to determine the proper jumper or switch settings

Course ILT Software configuration Another way that a NIC can be configured is through the use of an installation disk provided by the manufacturer - (This is the normal way to configure a NIC. If you lose the disk, go to the manufacturer’s web site and download another copy of the configuration utility.) This software package will not only help you to set the resource settings, but also provide you diagnostic programs for your network adapter

Course ILT Plug and Play (PnP) The Plug and Play standard automatically configures the network adapter for use There are three components necessary for Plug and Play –Plug and Play BIOS - all modern (BIOSs support PnP) –Plug and Play expansion boards (must be able to communicate with the BIOS, re: PnP commands, resource assignments, etc.) –Plug and Play operating system (all modern OSs support PnP (back to Windows 95 and NT 4.0).

Course ILT Activity A-2 Discussing network adapter configuration

Course ILT Communicating with other computers For communicating with other computers in a small LAN, installing the NetBEUI protocol might be sufficient In addition, you should enable the Microsoft Client for Windows and enable file and printer sharing. (A Windows computer must run the Client for Microsoft Networks to remotely access files, printers and other shared network resources.) You’ll also need to make sure that the computer’s name is correct based on a naming scheme for all computers in the network. For a small network that doesn’t use Windows domains, you’ll have to configure each computer to belong to a workgroup.

Course ILT Activity A-3 Configuring basic networking components

Course ILT The role of network adapter drivers A separate network adapter card driver provides easier management, greater flexibility, and better support The two common implementations of the model that uses a separate network adapter card driver –Network Device Interface Specification (NDIS) – (Microsoft) –Open Datalink Interface (ODI) - (Novell)

Course ILT Monolithic protocols

Course ILT NDIS and ODI Similarities –Both are layered models –Both support the same protocols Differences –Each has a different set of specifications for compliance so that drivers for one will not work with the other Though they use the same protocols, different protocol files are needed due to differences in the interfaces

Course ILT NDIS (Network Driver Interface Specification) is a Windows specification for how communication protocol programs (such as TCP/IP) and network device drivers should contact each other. NDIS specifies interfaces for:protocolTCP/IPdrivers The program that sends and receives data by constructing or extracting it from the formatted units called frames (and sometimes packets or datagrams). This program, usually called a protocol stack, is layering and generally corresponds to layers 3 and 4 (the Network Addressing and Transport layers) of the Open Systems Interconnection (OSI) reference model. Examples are TCP/IP and IPX/SPX, i.e. Internetwork Packet Exchange/Sequenced Packet ExchangeframespacketsdatagramsprotocolstacklayeringOSIInternetwork Packet Exchange/Sequenced Packet Exchange The program, usually called a device driver, that interacts directly with the network interface card (NIC) or other adapter hardware, which sends or receives the data on the communications line in the form of electronic signals. The driver program and the NIC interact at the Media Access Control (MAC address) sublayer of layer-2 level of OSI, which is called Data-Link Control. (Putting the signal on the line is the layer-1 or the Physical layer of OSI.) Examples of MAC drivers are those for Ethernet, Fiber Distributed-Data Interface (FDDI – pronounced “ fiddi”, and Token Ring.driverNICMAC addressEthernetToken Ring

Course ILT A program called the Protocol Manager that assists the protocol stack program and the MAC driver program by telling each of them the computer location of the other when the 1. operating system is started or, in some cases, 2. when a new device is added to the computer. This is called bind. A system file called PROTOCOL.INI (see next slide) identifies which protocol stacks use which MAC drivers and where each is located. A protocol stack can be bound to more than one MAC driver where a computer is connected to multiple networks. And a single MAC driver can be bound to more than one protocol stack in a computer. operating systembind NDIS was developed by Microsoft and 3Com. Using NDIS, software developers can create protocol stacks that work with the MAC driver for any hardware manufacturer's communications adapter. By the same token, any adapter maker can write a MAC driver software that can communicate with any protocol stack program. A similar interface, called Open Data-Link Interface (ODI), is provided by Novell for its NetWare LAN operating system.ODINetWare

Course ILT Protocol.ini Locations

Course ILT Activity A-4 Discussing NDIS and ODI

Course ILT Topic B Topic A: Network adapter configuration Topic B: Troubleshooting network adapter problems

Course ILT Troubleshooting network adapter problems Troubleshooting tips –Almost all NICs have status lights that can assist you in determining the root of a problem –Prior to opening up the case of the computer, rule out user mistakes, such as mistyping a password or username –After determining the problem with the NIC, log onto the network and transfer a file to make sure that everything is functioning normally

Course ILT Activity B-1 Discussing general troubleshooting tips

Course ILT MAC address conflicts Two NICs with the same MAC address cannot be used on the same network If two computers on a network have the same MAC address, only one will be able to participate on the network at any time –(Bear in mind that a conflict of this sort is nearly impossible. A network adapter is given its address by its manufacturer. A MAC address is a 48-bit number, or 12 hex digits. Each manufacturer is give a range of addresses by ARIN (American Registry of Internet Numbers) under IEEE guidelines, each 24- bits, or 6 hex digits long – or ½ the total length of a MAC address, to use in creating unique MAC addresses. The second half of the MAC address is assigned by each manufacturer (3Com, Intel, etc.). Any duplicates therefore must both come from the same company, and the companies have a strong incentive not to create any duplicates – reputation, liability, etc.

Course ILT Diagnostic software Regardless of the manufacturer, the network adapter is shipped with some sort of diagnostic software (usually a CD with some kind of executable diagnostic programs.) Diagnostics can prove invaluable when troubleshooting problems with NICs. –You will notice a lot of “loopback” tests in these kinds of diagnostics.

Course ILT Diagnostic software (cont)

Course ILT Diagnostic hardware Diagnostic hardware assists you in determining where a problem will be found One type of diagnostic hardware that is most frequently used is an external loopback plug –The purpose of using an external loopback plug is to help the NIC to send and receive on a closed loop

Course ILT Activity B-2 Identifying network adapter problems

Course ILT Unit summary Discussed network adapter configuration Discussed troubleshooting network adapter problems