Download presentation
Presentation is loading. Please wait.
Published byIrene Borden Modified over 10 years ago
2
Chapter 7 Networking: Connecting Computing Devices
Technology in Action Chapter 7 Networking: Connecting Computing Devices This chapter discusses connecting computing devices via a computer network. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
3
Chapter Topics Networking fundamentals Network architectures
Network components Home Ethernet networks Home Ethernet equipment Connecting other devices to networks Securing wireless networks Configuring software for your home network Chapter topics include: Networking fundamentals Network architectures Network components Home Ethernet networks Home Ethernet equipment Connecting other devices to networks Securing wireless networks Configuring software for your home network Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
4
Networking Fundamentals
Computer network: Two or more connected computers Node: Any device connected to a network Benefits of computer networking Facilitates resource sharing High-speed Internet connections Peripheral devices such as printers Files A computer network is simply two or more computers that are connected via software and hardware so that they can communicate with each other. Each device connected to a network is referred to as a node. A benefit of computer networking is sharing resources such as high-speed Internet connections, peripheral devices like printers, and files. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
5
Networking Fundamentals (cont.)
Disadvantages of computer networking Network administration Installing new computers and devices Monitoring the network’s performance Updating and installing new software Configuring network security A disadvantage of computer networking is the need for network administration, which includes installing new computers and devices, monitoring the performance of the network, updating and installing new software, and configuring the security of the network. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
6
Network Architectures
Architecture: Design of the network Peer-to-peer network Local administration Each node can communicate directly with every other node Client/server Central administration Clients: Used to accomplish tasks Server: Administers network functions The design of the network is referred to as the network architecture. Local administration means that the configuration and maintenance of the network must be performed on each individual computer attached to the network. A peer-to-peer (P2P) network is the most common example of a locally administered network. In a P2P network, each node connected to the network can communicate directly with every other node on the network. Central administration means that tasks can be performed from one computer and affect the other computers on the network. The most common type of centrally administered network is a client/server network. A client is a computer on which users accomplish specific tasks and make specific requests. The server is the computer that provides information or resources to the client computers on the network. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
7
Networks Based on Distance
LAN: Local area network HAN: Home area network WAN: Wide area network MAN: Metropolitan area network The distance between nodes on a network is another way to describe a network. A local area network (LAN) is a network in which the nodes are located within a small geographic area. A home area network (HAN) is a network located in a home. HANs are used to connect all of a home’s digital devices, such as computers, peripherals, phones, gaming devices, digital video recorders (DVRs), and televisions. A wide area network (WAN) is made up of LANs connected over long distances. When a network is designed to provide access to a specific geographic area, such as an entire city, the network is usually called a metropolitan area network (MAN). Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
8
Network Components Transmission media
Wireless networks connect nodes with radio waves Wired networks use cables to connect nodes Twisted-pair cable Coaxial cable Fiber-optic cable Transmission media establishes a communications channel between the nodes on a network and can either be wireless or wired. Wireless networks use radio waves to connect nodes. Wired networks use various types of cable (wires) to connect nodes. Twisted-pair cable is made up of copper wires that are twisted around each other and surrounded by a plastic jacket. Coaxial cable consists of a single copper wire surrounded by layers of plastic. Fiber-optic cable is made up of plastic or glass fibers that transmit data at extremely fast speeds. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
9
Data Transfer Data transfer rate Throughput Bandwidth
Speed of data transmission Throughput Actual speed of data transfer achieved Always less than or equal to the data transfer rate Data transfer rate, or bandwidth, is the maximum speed at which data can be transmitted between two nodes on a network. Throughput is the actual speed of data transfer that is achieved. Throughput is always less than or equal to the data transfer rate. Data transfer rate and throughput are usually measured in megabits per second (Mbps). Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
10
Network Adapters Devices connected to or installed in network nodes
Enable nodes to communicate with each other and access the network Network adapters are devices connected to or installed in network nodes that enable the nodes to communicate with each other and to access the network. All desktop and notebook computers (and many peripherals) sold today contain network adapters installed inside the device. This type of adapter is referred to as a network interface card (NIC). Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
11
Wireless Signals Might have decreased throughput
Interference from magnetic and electrical sources Interference with other wireless networks Building materials and metal Distance from networking equipment Coded signals Wireless signals might have decreased throughput, requiring wireless devices to use a wired connection at times. Wireless signals are more susceptible to interference from magnetic and electrical sources. Other wireless networks (such as your neighbor’s network) can interfere with the signals on your network. Certain building materials (such as concrete and cinderblock) and metal (a refrigerator) can decrease throughput. Throughput varies depending on the distance from your networking equipment. Wireless networks usually use specially coded signals to protect their data, whereas wired connections don’t protect their signals. This process of coding signals can slightly decrease throughput, although once coded, data travels at usual speeds. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
12
Network Navigation Devices
Control the flow of data through a network Data sent in bundles called packets Routers Transfer packets between two or more networks Switches Send packets to intended nodes on same network Network navigation devices facilitate and control the flow of data through a network. Data is sent over transmission media in bundles called packets. The two most common navigation devices are routers and switches. A router transfers packets of data between two or more networks. A switch is a “traffic cop” on a network. Switches receive data packets and send them to their intended nodes on the same network (not between different networks). All routers sold for home use have switches integrated into them. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
13
Networking Software Home networks Client/server networks
P2P supporting operating system Windows OS X Linux Client/server networks Network operating system (NOS) software Windows Server 2008 R2 SUSE Linux Enterprise Server Home networks need operating system (OS) software that supports P2P networking. The Windows, OS X, and Linux operating systems all support P2P networking. Client/server networks are controlled by centralized servers that have specialized network operating system (NOS) software installed on them. This software handles requests for information, Internet access, and the use of peripherals for the rest of the network nodes. Examples of NOS software include Windows Server 2008 R2 and SUSE Linux Enterprise Server. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
14
Home Ethernet Networks
Use Ethernet protocol as standard for network communication Wireless Wired 802.3 Routers and network adapters Translate electronic data into radio waves Broadcast radio waves to other nodes Receive signals from other nodes An Ethernet network is so named because it uses the Ethernet protocol as the means (or standard) by which the nodes on the network communicate. The Ethernet protocol was developed by the Institute of Electrical and Electronics Engineers (IEEE). Each standard the IEEE develops is numbered, with (wireless, also known as Wi-Fi) and (wired) being the Internet Protocol standards for Ethernet networks. The current standard that governs wireless networking for Ethernet networks is the n standard. Wireless routers and network adapters contain transceivers, devices that translate the electronic data that needs to be sent along the network into radio waves and then broadcasts these radio waves to other network nodes; they also receive the signals from other network nodes. 802.11n standard uses Multiple Input Multiple Output (MIMO), the technology designed to use multiple antennas for transmitting and receiving data. The multiple antennas break the data into multiple data streams and allow for faster transmission of the data. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
15
Throughput Speeds Can be measured using utilities like Net Meter
Wired connections provide best throughput Wi-Gig will be faster than current wired or wireless standards Won’t be available for several years Utilities, such as Net Meter, will measure a computer’s throughput. If you don’t achieve acceptable throughput on a wireless connection, you might want to consider a wired Ethernet connection, which is much less susceptible to interference and can achieve higher rates of throughput. The next generation of wireless standards, a joint effort between the Wireless Gigabit Alliance and the Wi-Fi Alliance, is called Wi-Gig and will be designed to provide up to 7 Gbps of throughput. This should prevent many of the interference issues that Wi-Fi users currently experience, but will take several years to develop. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16
Network Cabling Unshielded twisted-pair (UTP) cable
Most popular cable for Ethernet networks Composed of four pairs of wires that are twisted around each other to reduce electrical interference RJ-45 connectors used on cable ends Cat 6 cable best UTP for home networks Signal degrades after 100 m (328 ft) The most popular transmission media option for wired Ethernet networks is unshielded twisted-pair (UTP) cable that is composed of four pairs of wires that are twisted around each other to reduce electrical interference. RJ-45 or Ethernet connectors resemble standard phone connectors but are slightly larger and have contacts for eight wires (four pairs). Cat 6 cable is designed to achieve data transfer rates that support a gigabit Ethernet network, and is probably the best choice for home networking cable. Do not put sharp bends into the cable when running it around corners because this can damage the copper wires inside and lead to breakage. Also, run the cable around the perimeter of the room to prevent damage to wires from foot traffic. Runs for UTP cable can’t exceed 100 meters (328 feet) or the signal starts to degrade. One Ethernet network can support nodes with both wireless and wired connections. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
17
Home Ethernet Network Equipment
Router (broadband router) Includes integrated switches Most have wireless capability Can contain broadband modem Wireless devices need wireless network interface cards (NICs) Network-ready devices can connect directly to router A router and a switch are required for a home Ethernet network. Most routers include a switch and have wireless capability. Broadband modems obtained from Internet service providers can be combined with a router. A network-ready (or Internet-ready) device can be connected directly to a router instead of to a computer on the network. Network-ready devices usually contain wireless and/or wired network adapters inside them. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
18
NAS Devices Network attached storage (NAS) devices Home network server
Store and manage data Home network server More sophisticated NAS device Performs only a limited set of functions performed on client/server networks Network attached storage (NAS) devices are specialized computing devices designed to store and manage your data. A more sophisticated type of NAS device is a home network server, a specialized device that is designed to provide a specific set of services to computers on a home network. Home servers do not convert a home peer-to-peer network into a client/server network because these servers only perform only a limited set of functions instead of all the functions performed on client/server networks. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
19
Digital Entertainment Devices
Connect to network to access and share digital content Use gaming devices to play multiplayer games with players all over the world Network-ready TVs and home theater systems Blu-ray players DVRs The main reason to connect digital entertainment devices to a network is to access and share digital content. You can use network-connected gaming devices to play multiplayer games with players all over the world. Network-ready televisions and home theater systems allow for direct connection to your home network (wireless or wired). These devices are configured to receive streaming media directly from the Internet. Blu-ray disc players offer high-definition resolution and the capability to display 3D video. They feature integrated wireless connectivity for connection to your network as well as the ability to receive streaming media from various Internet providers. Digital video recorders (DVRs), like the TiVo Premiere, are often used in the home to record high-definition television programs. Connecting your TiVo to your network makes it possible to receive downloads of movies directly to your TiVo. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
20
Specialized Devices Internet appliances Digital picture frames
Used to access Internet Apple iPad Digital picture frames Security monitoring cameras The main function of an Internet appliance is easy access to the Internet, social networking sites, , video, news, and entertainment. Now digital picture frames come with built-in wireless adapters for easy connection to home networks. Security monitoring software allows you to view real-time images from the cameras at your home and monitoring cameras, both for indoor and outdoor use, are now available for the home and feature wireless connectivity. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
21
Securing Wireless Networks
Piggybacking Connecting to a wireless network other than your own without permission of the user Can be unintentional Most wireless adapters are set up to access the strongest wireless signal detected Hackers can intercept packets of information broadcast on a wireless network All computers that connect to the Internet (whether or not they are on a network) need to be secured from intruders. A firewall is a hardware or software solution that helps shield your network from computers outside of your network. A wireless network is more vulnerable than a wired network because the wireless signal extends outside your house. Some use of other people’s wireless is unintentional; most wireless network adapters are set up to access the strongest wireless network signal detected. Piggybacking is connecting to a wireless network (other than your own) without the permission of the owner. Packets of information on a wireless network are broadcast through the airwaves. Savvy hackers can intercept and decode information from your transmissions that might allow them to bypass any standard protections, such as a firewall, which you have set up on your network. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
22
Securing Wireless Networks (cont.)
Precautions to secure a wireless network Change your network name (SSID) Disable SSID broadcast Change the default password on your router Turn on security protocols Implement media access control Limit your signal range Apply firmware upgrades To secure a wireless network, you should take these additional precautions. Change your network name (SSID). Each wireless network has its own name to identify it, which is known as the service set identifier (SSID). If you haven’t changed the SSID, it’s advertising the fact that you probably haven’t changed any of the other default settings for your router, either. Disable SSID broadcast. Most routers are set up to broadcast their SSIDs so that other wireless devices can find them. If your router supports disabling SSID broadcasting, turn it off. This makes it more difficult for a hacker to detect your network and nearly impossible for a neighbor to inadvertently connect to your network. Change the default password on your router. Hackers know the default passwords of most routers, and if they can access your router, they can probably break into your network. Turn on security protocols. Most routers ship with security protocols such as Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA). Both use encryption (a method of translating your data into code) to protect data in your wireless transmissions. Implement media access control. Each network adapter on your network has a unique number (like a serial number) assigned to it by the manufacturer. This is called a media access control (MAC) address, and it is a number printed right on the network adapter. Limit your signal range. Many routers allow you to adjust the transmitting power to low, medium, or high. Cutting down the power to low or medium could prevent your signal from reaching too far away from your home, making it tougher for interlopers to poach your signal. Apply firmware (the router’s read-only memory that has software written to it) upgrades. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
23
Configuring a Home Network
Windows 7 automates setting up networks Before running the automated wizards: Make sure there are network adapters on each node For any wired connections, plug all the cables into the router, nodes, and so on Make sure your broadband modem is connected to your router and that the modem is connected to the Internet Windows 7 automates setting up networks with wizards. Make sure there are network adapters on each node. For any wired connections, plug all the cables into the router, nodes, and so on. Make sure your broadband modem is connected to your router and that the modem is connected to the Internet. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
24
Configuring a Home Network (cont.)
Turn on your equipment in the following order (allowing the modem and the router about one minute each to power up and configure) Broadband modem Router All computers and peripherals (printers, scanners, etc.) Turn on your equipment in the following order (allowing the modem and the router about one minute each to power up and configure): Broadband modem Router All computers and peripherals (printers, scanners, etc.) Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
25
Configuring a Home Network (cont.)
Access Network and Sharing Center from within the Control Panel Turn Network Discovery on Turn File and Printer Sharing on Turn Public Folder Sharing on Use Set up a New Connection Wizard Use Connect to the Internet Wizard Use Set Up a Wireless Router Wizard Open the Network and Sharing Center from the Control Panel; the network you are connected to will show on the screen. Ensure that network discovery is shown as “on,” because this allows your computer to locate other computers and peripherals on the network. Verify that the options for file and printer sharing and public folder sharing are “on” to enable file and printer sharing with other computers. From the Network and Sharing Center, select Set up a new connection or network to access the Windows networking wizards. Use the Connect to the Internet Wizard to configure your network to use your broadband modem to connect to the Internet for the first time. This wizard also configures your wired connections on your network (if any). Use the Set Up a Wireless Router Wizard to configure your wireless connectivity. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
26
Connecting Macs Wirelessly
Set up router security (like in Windows) Logging onto network requires SSID and passphrase Choose network, enter password, and join Networks with SSID broadcast turned off will not appear as an available network Click Other and enter the network name and password Connecting Macs to a wireless network is a much easier process than connecting with Windows computers. Set up the security for a router on a Mac network like on a Windows network. Logging your Mac onto the network will require knowing the SSID and its passphrase. The network login screen should appear with a list of available networks (that is, the ones the NIC in your Mac can detect). A lock next to a network name indicates a secure network, which will require a password. Enter the password for the network in the password box and click Join to connect to the network. For unsecure networks, the Join button can be clicked without entering anything in the password box. Networks with SSID broadcast turned off will not appear on the list of available networks. To join one of these secure networks, click Other in the available wireless network dialog box. This will cause the Enter the name of the network dialog box to appear. Enter the SSID name for your network in the Network name box and the security passphrase in the password box. Clicking Join will then connect you to the network. Selecting the Remember this network check box will cause the computer to automatically connect to the network when it is available (that is, it becomes one of your preferred networks). You can have multiple preferred networks such as your home, school, and local coffee shop networks. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
27
Wireless Node Configuration
Hook up devices like DVRs or gaming consoles Wired connection Plug cable into device and router Wireless connection Follow steps in device’s setup menu SSID name and security passphrase required if network is secured To hook up devices like a TiVo or gaming console as a wired connection, simply plug a cable into the device and your router. For wireless connections, there is usually a set of steps to follow in the setup menu for the device you are configuring. The SSID name of your network and the security passphrase will be required on a secure network. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
28
Test Internet Connection Speed
Internet sites allow you to test speed of downloading and uploading files Speedtest.net Broadband.gov Run test at several different times during the day over the course of a week Sites on the Internet, such as Speedtest.net and broadband.gov, allow you to test the speed of downloading files to your computer and uploading files to other computers. Many factors can influence your Internet speeds, so be sure to run the test at several different times during the day over the course of a week. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
29
Troubleshooting Network Problems
Throughput decreases as device moves farther away from router To increase throughput Move the router within the room or to another room Move the device closer to the router Amplify your wireless signal by adding a wireless range extender As you go farther away from your router, the throughput you achieve will decrease. Obstacles between wireless nodes decrease throughput. Walls, floors, and large metal objects are the most common sources of interference with wireless signals. Repositioning the node within the same room or to other rooms in your house can affect communication between nodes. Try moving the device closer to the router. A wireless range extender is a device that amplifies your wireless signal to get it out to parts of your home that are experiencing poor connectivity. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
30
Chapter 6 Summary Questions
What is a network, and what are the advantages/disadvantages of setting up one? What is a network, and what are the advantages/disadvantages of setting up one? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
31
Chapter 6 Summary Questions
What is the difference between a client/server network and a peer-to-peer network? What is the difference between a client/server network and a peer-to-peer network? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
32
Chapter 6 Summary Questions
What are the main components of every network? What are the main components of every network? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
33
Chapter 6 Summary Questions
Which type of network is most commonly found in the home? Which type of network is most commonly found in the home? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
34
Chapter 6 Summary Questions
What equipment and software do I need to build a network in my home? What equipment and software do I need to build a network in my home? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
35
Chapter 6 Summary Questions
Besides computers, what other devices would I connect to a home network? Besides computers, what other devices would I connect to a home network? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
36
Chapter 6 Summary Questions
Why are wireless networks more vulnerable than wired networks, and what special precautions are required to ensure my wireless network is secure? Why are wireless networks more vulnerable than wired networks, and what special precautions are required to ensure my wireless network is secure? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
37
Chapter 6 Summary Questions
How do I configure the software on my computer and set up other devices to get my network up and running? How do I configure the software on my computer and set up other devices to get my network up and running? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
38
Chapter 6 Summary Questions
What problems might I encounter when setting up a wireless network? What problems might I encounter when setting up a wireless network? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
39
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 39
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.