Download presentation
Presentation is loading. Please wait.
1
Connecting Desktops and Laptops to Networks
10 Connecting Desktops and Laptops to Networks
2
Essay in Scientific American, November 22, 2010
Several principles are key to assuring that the Web becomes ever more valuable. The primary design principle underlying the Web’s usefulness and growth is universality. When you make a link, you can link to anything. That means people must be able to put anything on the Web, no matter what computer they have, software they use or human language they speak and regardless of whether they have a wired or wireless Internet connection. Tim Berners-Lee Essay in Scientific American, November 22, 2010
3
Learning Outcomes Configure a client for a TCP/IP network.
Connect to the Internet. Work with basic Internet clients. Configure File and Printer clients. Troubleshoot common network client problems.
4
Configuring a Network Connection
LO 10.1
5
Introduction Protocol Set of rules formalized in a standard
Protocols define software used to communicate over networks Software must work together Software bundled together in a protocol stack TCP/IP is the most important protocol stack
6
Understanding the TCP/IP Protocol Suite
Suite of many protocols that work together Protocol suite of the Internet and private networks Two core protocols: Transmission Control Protocol (TCP) Internet Protocol (IP)
7
Transmission Control Protocol (TCP)
Manages the accurate delivery of messages Verifies and resends pieces that fail to reach the destination TCP has several sub-protocols
8
Internet Protocol (IP)
Delivers packets to destination host based on IP address Allows for routing IP has several subprotocols Two versions IPv4 – the standard since 1983 IPv6 – greatly improved standard gradually adopted by the Internet
9
Internet Protocol (IP)
Why IPv6 is better than IPv4 It has many more addresses It works better with mobile devices using Mobile IP It automatically assigns addresses to devices in a very reliable way It manages addresses better It has subprotocols that support better security
10
Internet Protocol (IP)
IP Addressing Fundamentals An IP address is assigned to a network adapter A modem (cable, DSL, or analog) has an address Each network adapter in a computer must have an address An IP address with a subnet mask applied identifies host and network Routing protocols determine how to send packets to destinations Globally unique IP address for each device on the Internet
11
Viewing the Internet Protocol Settings in Windows
The Windows 7 Local Area Connection Properties dialog box
12
Internet Protocol (IP)
IPv4 Addresses In use for three decades 32-bit addressing (232) 4.3 billion possible IP addresses Allocation methods reduced the usable addresses Four parts in dotted-decimal format [ ] Each part is within 0 to 255 Last IPv4 block assigned on February 1, 2011
13
IP Settings in Windows 7
14
IP Settings in OS X
15
IP Settings in the Ubuntu Linux Unity GUI
16
Internet Protocol (IP)
IPv6 Addresses Internet transitioning to Internet Protocol version 6 (IPv6) New addressing scheme with many more addresses Manufacturers and standards organizations preparing 128-bit addressing (2128) Eight groups of hexadecimal numbers separated by colons
17
IPv6 Due to lack of space, the figure in the book shows the binary representation breaking in the middle. This slide shows it as it appears in the book and without the break.
18
Internet Protocol (IP)
Which addresses can you use? Public Addresses Assigned to hosts on the Internet Must be unique on the entire Internet Internet Assigned Numbers Authority (IANA) Private Addresses
19
Private IP Addresses
20
Internet Protocol (IP)
How does a NIC get an address? Static Address Assignment Automatic Address Assignment Automatic IP Addressing (Using Dynamic Host Configuration Protocol (DHCP) Automatic Private IP Address Assignment (APIPA)
21
Internet Protocol (IP)
IP Configuration Settings Subnet Mask Default Gateway DNS Server
22
The Internet Protocol Version 4 Properties
23
Subnet Mask A subnet mask identifies the net ID and host ID portions of an IP address This image is a corrected version of Figure 10-7.
24
The Network and Sharing Center
25
Network Connections
26
Local Area Connection Status
27
Local Area Connection Properties
28
The ipconfig /all command in the Windows Command Prompt
29
The ifconfig –a command in the OS X Terminal
30
The ifconfig –a command in Ubuntu Linux
31
Connecting to the Internet
LO 10.2
32
A Connection to the Internet
Wide Area network (WAN) Internet Service Provider (ISP) Computer-to-Internet versus LAN-to-Internet
33
Connecting to the Internet
Connecting from a computer or though a LAN
34
Wired Connectivity Technologies
Dial-up Connections Using Analog Modems Use traditional phone system Inexpensive WAN option 56Kbps Need ISP service Cannot use voice and data on same line
35
Wired Connectivity Technologies
High-Speed Wired Access Integrated services digital network (ISDN) Digital Subscriber Line (DSL) Cable
36
Wireless Connectivity Technologies
Wireless WAN (WWAN) Connections Digital wireless network that covers a large geographical area Digital Subscriber Line (DSL) Uses radio signals over cellular sites and satellites
37
Wireless Wide Area Network (WWAN)
A WWAN includes devices that retransmit the wireless signal
38
Satellite Communications
Accessing the Internet using a satellite WWAN connection
39
Wireless Connectivity Technologies
Wireless LAN (WLAN) Connections Local area network using a Wi-Fi standard IEEE a, b, g, n, and ac Maximum distance a few hundred feet Does not connect directly to an ISP For Internet access connect to a router that also has a WAN connection Device is usually a combined wireless access point (WAP) and Internet router Newer standards faster and more secure Latest standard ac
40
Using a Virtual Private Network (VPN)
Simulated private network running inside a “tunnel” over a WAN Connect a computer or mobile device to a remote access VPN Connect two sites for a site-to-site VPN Encapsulate each data packet at the sending end Remove data from encapsulation at the receiving end Secure by encrypting the data before encapsulating Secure by requiring authentication at both ends of the tunnel
41
Using a Virtual Private Network (VPN)
A remote access VPN
42
Using Internet Clients
LO 10.3
43
Web Browsers HTTP client software for browsing Web servers
Translates code on Web servers to display pages on local computer Versions for OS X, Windows, and Linux (as well as for mobile OSs) Free Google Chrome Mozilla Firefox Microsoft Internet Explorer Apple Safari
44
Common Browser Features
Add-ons Autofill Automatic updates Bookmarks Integrated search engine Password manager RSS feeds Save tabs Search within page Synchronization Tabbed browsing Zoom
45
Google Chrome Clean look Tabs No menu bar Chrome button on right Online Help
46
Mozilla Firefox Clean look Tabs Hide or display menu bar Online Help
47
Mozilla Firefox View menu Tools menu
48
Microsoft Internet Explorer
Tools button opens menu Clean look Tabs Hide or display menu bar Many options on Tools menu Online Help
49
Other Browsers Opera ( Safari (
50
Security and Web Browsers
Cookies Browsing History Private Browsing Passwords Pop-Ups
51
Security and Web Browsers
The Chrome Content Settings page includes settings for Cookies
52
Security and Web Browsers
The Firefox Privacy page with settings for Cookies
53
Security and Web Browsers
The Internet Explorer Privacy page with settings for Cookies, Pop-up Blocker, location, and InPrivate Browsing
54
Security and Web Browsers
The Chrome History page
55
Security and Web Browsers
The Internet Explorer History page in the Website Data Settings dialog box
56
Security and Web Browsers
Chrome incognito Firefox Private Browsing Internet Explorer InPrivate Browsing
57
Security and Web Browsers
The Search results after searching on password in Chrome settings
58
Security and Web Browsers
The Firefox Change Master Password dialog box
59
Security and Web Browsers
The AutoComplete Settings for Internet Explorer
60
Email Clients Types of Email Clients Outlook Windows Live Mail POP
IMAP Web Mail Outlook Windows Live Mail
61
Email Clients Configuring and Using an Email Client
Type of mail server Account name and password DNS name of incoming mail server DNS name of outgoing mail server
62
Clients Configure an client
63
Clients Using an client
64
FTP Clients File Transfer Protocol (FTP)
Transfer files between client and server computers Anonymous FTP allows anonymous connection FTP site with security requires account login
65
FTP Clients Configuring an FTP Client Host name of FTP server
User ID and Password Passive mode connection Secure SSL connection
66
FTP Clients FireFTP client – an add-on to Firefox
67
Sharing Files and Printers
LO 10.4
68
The Server Side of File and Printer Sharing
File and printer server runs sharing service A share is a shared folder or printer Share is a separate entity form a disk folder Share is a separate entity from a physical printer Installed and enabled by default in Windows
69
The Server Side of File and Printer Sharing
The Windows File and Printer Sharing service is enabled
70
The Client Side of File and Printer Sharing
File and printer client for each file-sharing service Client for Microsoft installed and enabled by default Can see computers with Microsoft file and printer sharing enabled See both Windows servers and desktop computers Connecting to shares depends on permissions
71
The Client Side of File and Printer Sharing
A Windows File and Printer Sharing client detects four servers
72
Sharing Files and Printers in Windows 7 and Windows 8 with HomeGroups
Create HomeGroups Windows 8, Windows 8 Pro, and Windows RT Windows 7 Home Premium, Professional, Ultimate, and Enterprise Clients to HomeGroups Windows 7 all editions
73
Sharing Files and Printers in Windows 7 and Windows 8 with HomeGroups
Requirements and Restrictions Only Windows 7 and Windows 8 can participate in HomeGroups A member of a Windows Active Directory Domain cannot create a HomeGroup A member of a Windows Active Directory Domain can join a HomeGroup Windows 7 computer must connect to a Home network Windows 8 computer must connect to a Private network IPv6 must be enabled and all firewalls must support IPv6 File and Printer sharing must be turned on for each computer participating User at each computer determines what libraries and printers are shared
74
Sharing Files and Printers in Windows 7 and Windows 8 with HomeGroups
This Windows 7 computer is connected to a Home network
75
Creating a HomeGroup in Windows 7
Click Create a HomeGroup
76
Creating a HomeGroup in Windows 7
Select what you want to share
77
Creating a HomeGroup in Windows 7
Use this password at other Windows 7 or Windows 8 computers to join them to this HomeGroup
78
Sharing the Public Folder in Windows 7
Public folder is under Users and contains Public folders for each Library
79
Sharing the Public Folder in Windows 7
Copy data into Public folders in Libraries
80
Troubleshooting Common Network Client Problems
LO 10.5
81
Built-In Network Diagnostics
Windows 7 Network Diagnostics tool Similar tool in Windows 8
82
Built-In Network Diagnostics
OS X Network Utility with tabs for several tools
83
Testing IP Configurations and Connectivity
Verifying IP Configuration with ipconfig Troubleshooting Connection Errors with the ping Command
84
Two networks connected by a router
85
Testing an IP Configuration
Ipconfig /all Local IP address
86
Testing an IP Configuration
Ping your computer Then ping a nearby computer (not shown)
87
Testing an IP Configuration
Ping the Gateway
88
Troubleshooting Connection Problems with Tracert
Look for the router with the greatest delay
89
Troubleshooting DNS Errors Using Ping
Ping domain name to see IP address
90
Troubleshooting DNS Errors Using Netstat
The netstat command displays the information about current connections to the local computer
91
Using Nslookup to Troubleshoot DNS
The nslookup command reveals a DNS problem
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.