Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 8 Applied Networking

Similar presentations


Presentation on theme: "Chapter 8 Applied Networking"— Presentation transcript:

1 Chapter 8 Applied Networking
PC Support & Repair Chapter 8 Applied Networking

2 Objectives After completing this chapter, you will meet these objectives: Configure devices to connect to LANs, the Internet, and Cloud services. Connect a computer to wired and wireless networks. Explain the purpose and characteristics of ISP connection technologies. Explain Cloud concepts and networked-host services. Goals/Objectives Explain how to perform preventive maintenance on networks using common techniques. Explain how to troubleshoot networks. You will learn how to install and configure network interface cards (NICs), connect devices to a wireless router, and configure a wireless router for network connectivity. You will also learn how to configure domain memberships in Windows and share files through network shares and drive mapping. A large part of your networking skills includes the ability to decide which Internet Service Provider (ISP) to use for home or small office networks. Networks and the Internet provide many important services. You will learn about data centers and the benefits of Cloud computing. You will also explore some of the more important network applications including web, , file, proxy, and security services. Finally, you will learn how to apply a systemic method for troubleshooting.

3 Computer to network connection
8.1

4 Selecting a NIC Connects you to network Type of NIC Connection type
Wired (Fast or Gigabit Ethernet) Wireless (802.11n or ac) Connection type Expansion slot (PCI or PCIe) USB Advanced features Wake on LAN (WoL) Quality of Service (QoS) Cost Most NICs in desktop computers are integrated into the motherboard or connected to an expansion slot. You must be able to upgrade, install, and configure components when a customer asks for increased speed or new functionality to be added to a network. Update NIC drivers.

5 Configure a NIC’s IP Address
Manual- you statically assign Dynamic- requests IP from DHCP server Network & Sharing Center >> Change adapter settings TCP/IPv4 or v6 >> Properties DHCP also assigns the subnet mask and default gateway, as well as the DNS info. Default gateway is the IP of the router port you connect to and is your way out of the network. If you don’t have this, you’ll never get outside your network. Note: Most computers today come with an onboard NIC. If you are installing a new NIC, it is considered a best practice to disable the onboard NIC in BIOS settings.

6 Advanced NIC Settings Speed & Duplex Wake on LAN
MUST MATCH what you’re connected to Auto Negotiate** Mismatch slows down transfer rates Wake on LAN Wakes PC up with a magic packet Quality of Service (QoS or 802.1q) Improves flow Can prioritize traffic Change adapter settings >> right-click on the adapter and select Properties >> Configure >> Advanced tab Defaults are usually fine. WoL: Magic packet has the MAC address of the NIC. If it matches, it signals the power supply or mobo to wake up and power on.

7 Connecting the NIC Check the LEDs Link & Activity
Can have varying meaning on different NICs One of the first things you should check if you have no connection.

8 Connecting Router to Internet
Internet port/WAN port Connects to cable modem

9 Setting Type of Network
First time connecting to a network, choose: Home Network discovery on & trusts them Work Network discovery on; no Homegroup Public Network discovery off; no HomeGroup; most protected Domain To join a network/Active Directory; profile is controlled by network admin Note: If there is only one computer on a network and file or printer sharing is not needed, the most secure choice is Public. Public means you won’t see anything shared on the network like drives/folders or printers.

10 Logging into Wireless Router
Most work out of the box To log in: Web browser Enter given IP “ or ” Enter username/password “admin”

11 Review- 4Q What happens if there is a duplex mismatch between a PC and a switch? SLOW transfer of data What do the 2 LEDs on a NIC indicate? Connection and data transfer What is usually a wireless router’s default IP out of the box? or When connecting to a network, you want to be part of the HomeGroup. What profile should you select? Home

12 Basic Network Setup Change default password Change default router IP
NOTE: after saving it, you’ll have to renew your PC IP address & log back in to router SECURITY!!

13 Basic Wireless Settings
Network Mode Mixed (Default), N, G, B, Disabled SSID Name of wireless network Keep disabled so people can’t see it Channel Can change to 1, 6 or 11 if getting interference on 2.4GHz Interference can be caused by other nearby wireless routers, or home electronic devices, such as cordless phones and baby monitors, using the same frequency range. Channel 1, 6 or 11 is for 2.4GHz only. There’s plenty of channels and space on 5GHz.

14 Basic Wireless Security
WPA2 with AES encryption is BEST WPA, WEP, None are others and weaker Parental controls, content filtering, available times, etc. can be set

15 Test Connectivity in Windows
Network & Sharing Center Change adapter settings Double-click on the wired or wireless adapter Click details to see IP information

16 Test Connectivity in CLI
Ipconfig /all; /release; /renew Ping Tests connectivity Ping –n (n= a number) Ping –t (ping until stopped) Tracert Shows path to destination Tracert Nslookup Checks for DNS Nsloopkup cisco.com Ping an IP address or a domain name When you ping, try destination first, If it fails, start by pinging close to far to try and narrow down where the problem is. DEMO: IPCONFIG and IPCONFIG /ALL Have each student ping another See if tracert works in class Do an nslookup for a website

17 CLI Tests

18 Review- 4Q What wireless channels could you choose if you are getting interference from nearby wireless devices? 1,6 or 11 What 2 things can you do to prevent someone from accessing your Wi-Fi router? Change default password & change router IP What command will show the path from source to destination? Tracert What command will let go of an IP address? Ipconfig /release

19 Activity Packet Tracer Lab- Connect to a Wireless Router, Configure Basic Settings and Connect Computers to It Real Lab Option

20 Domains & Workgroups Workgroup Domain
Collection of PC’s & servers designed to communicate with each other Each computer has its own accounts, security & access to data/resources PC set up that way after OS install Domain Logical grouping of computers, may be far away Domain controller server manages them You can log into any computer in the domain To change it: right-click on Computer, Properties, Change or in System (Control Panel) All computers on a network must be part of either a domain or a workgroup. When Windows is first installed on a computer, it is automatically assigned to a workgroup, as shown in the figure. Before computers can share resources, they must share the same domain name or workgroup name. Older operating systems have more restrictions for naming a workgroup. If a workgroup is made up of newer and older operating systems, use the workgroup name from the computer with the oldest operating system. Note: Before changing a computer from a domain to a workgroup, you need the username and the password for an account in the local administrator group.

21 HomeGroup Only 1 HomeGroup per Workgroup
Can only be member of 1 HomeGroup at a time 1 person in workgroup creates the Homegroup Others join with password If your network profile is: Home- can create or join HomeGroup Work- not allowed to create or join HomeGroup but can see/share with others Public- HomeGroup not available When a computer joins a homegroup, all user accounts on the computer, except the Guest account, become members of the homegroup. Being part of a homegroup makes it easy to share pictures, music, videos, documents, libraries, and printers with other people in the same homegroup. Users control access to their own resources. Users can also create or join a homegroup with a virtual machine. Admin & Standard user can choose these. Guest account cannot.

22 Map a Drive Access a network drive or folder a lot? Example:
Map it to a drive letter! Shows up as a drive in This PC Example: Network HD attached to router The Mapped Network Drive will then appear in This PC as a Network Location. If the drive is not available, you will see an X emblem on the icon. If at any time you want to remove it, just right click the icon and click Disconnect. Reconnect at sign-in: Will map the drive when you sign in, otherwise it will disconnect when you log out. NOTE: These are administrator tasks! Must be logged in as admin to set it up.

23 Network File Sharing Set permissions for files or folders
Read- view only Change- add/change/delete Full Control- change PLUS change permissions

24 Administrative Shares
Created in a network setting so admins can have shared access to your drives or folders Can only be seen with admin access $ at end means admin share C$ C:\AdminOnly$

25 Review- 3Q How can an admin tell if they are in the shared access of your drive or folder? $ at end To create a HomeGroup, what must your network profile be? Home At GCIT you can log into any computer with your credentials and have access to the network. What kind of network is this? Domain

26 Activity Lab- Share folder & map it

27 VPN Using the Internet to connect to remote sites
Accessing your corporate network Dedicated, secure connection You have access to all services & resources on that network like you were actually there You need a VPN client installed on your PC Data gets encrypted Connects to VPN gateway

28 Setup a VPN

29 Remote Desktop View & control remotely Remote must allow Full control
Connect to IP address Need login credentials RDP- Remote Desktop Protocol Port 3389

30 Remote Assistance They need to request your help
Must enable it if you need help You need the connection password Customer can see what’s going on; share control; partial control

31 Activity Lab 8.1.4.3- Remote Assistance in Windows
Lab Remote Desktop in Windows

32 Isp connection technologies
8.2

33 Telephone Tech Analog ISDN POTS Dial-up
56k slow, no voice calls & Internet at same time ISDN Digital, slightly faster than POTS Voice, video, data over analog phone lines BRI/PRI services (channels) “B” channels for voice/data “D” channel for signaling

34 Broadband So what is it? Cable, DSL, Satellite, Fiber Broadband (FiOS)
Sending multiple signals using different frequencies over one cable Cable & Internet to house on one cable Cable, DSL, Satellite, Fiber Broadband (FiOS)

35 DSL/ADSL Always on, high speed over phone lines
Distance limits, filters needed ADSL “Asynchronous” = different Download/upload speeds differ

36 More Broadband Cable Satellite Fiber
Always on, high-speed over coaxial cables in house (may be fiber down streets) Satellite Always on, high-speed over satellite dish Latency; not good for gaming, VoIP Fiber Always on, high-speed over fiber optic cables down street (through coax in house)

37 Choosing an ISP

38 Activity- ID the Connection

39 Activity- ANSWERS

40 Review- 3Q In order to use a VPN, what is needed on the remote computer? VPN client software installed Which connection is broadband over phone lines & has different upload/download speeds? ADSL ISDN has B & D channels. What is on each? B- data; D- control info

41 Internet technologies
8.3

42 Data Center Companies rely on data & are collecting more of it
Need more storage space Large companies often have their own data centers Also they utilize 3rd party services

43 Cloud Computing vs Data Center
On-premise hardware for data storage run by an in- house IT department or leased offsite Very costly to build Very costly to add on storage Cloud computing Off-premise service that offers on-demand access to data and services They use data centers Easily add on or decrease storage as needed Only pay for what you need

44 DHCP DHCP is used by ISPs, network adminis & wireless routers to automatically assign IP addressing information to hosts Addresses are leased for a time period THIS IS THE FIRST SERVER ACCESSED AFTER BOOTING. YOU HAVE TO GET AN IP ADDRESS FIRST. Discover: where you at? BROADCAST* of all 255’s goes to everyone but only the DHCP server responds Offer: wanna use this? Request: I’m accepting this offer. BROADCAST* ACK: Thanks, I’m using it! DORA!!!!!

45 DNS Servers that translates names to IP addresses
DNS servers know some, forward rest to other DNS servers Go to command prompt & type: ipconfig /displaydns displays all cached DNS If a web admin changes the IP address of a server, it gets set in DNS server, and the user has no idea the IP address changed.

46 HTTP HTTP: Rules for transferring web pages HTTPS: Adds encryption
Port 80 HTTPS: Adds encryption Port 443 Uses TSL or SSL HTTP is the protocol Cisco.com is the server name Index.html is the document you requested HTML is the coding for the web page Secure Sockets Layer (SSL) protocol or the newer Transport Layer Security (TLS) protocol.

47 Proxy Server Storage/cache for web pages frequently used within the network You request a web page Request goes to your proxy server It checks to see if there’s an updated version of site If not, you get the web page fast Can filter content for users (block or flags sites/words in sites) Proxy server also hides IPs of internal devices since all requests go through it So it can hide YOU

48 Authentication Services
Access to network devices is controlled through authentication, authorization, and accounting services Referred to as AAA Control who is permitted to access a network (authenticate) What they can do while they are there (authorize) Track what actions they perform while accessing the network (accounting) This is like a credit card.

49 Intrusion Detection & Prevention
IDS (Passive) Intrusion Detection System Monitors network for threats Alert if threat is found ONLY DETECTS - DOES NOT TRY TO STOP THREAT IPS (Active) Intrusion Prevention System (IPS) Detects attack – Takes action! Example: A port is attacked; it closes the port until the attack stops

50 Universal Threat Management
All-in-one security appliance IDS/IPS & Firewall Protects against many types of typical attacks BEST PROTECTION WITH A SINGLE DEVICE

51 Activity- Identify the Service

52 Activity- ANSWERS

53 Basic troubleshooting for networks
8.4

54 Preventive Maintenance
Check cables Not worn Properly labeled Heat in server room is no good Dust is no good for server or devices Listen for strange sounds PREVENT UNNECESSARY DOWNTIME

55 Common Problems & Solutions

56 Common Problems & Solutions

57 Common Problems & Solutions

58 Chapter 8 Applied Networking
PC Support & Repair Chapter 8 Applied Networking


Download ppt "Chapter 8 Applied Networking"

Similar presentations


Ads by Google