Download Ch 12 Connectivity - Cisco Networking Academy

Document related concepts

Computer security wikipedia , lookup

Wireless security wikipedia , lookup

Peering wikipedia , lookup

Deep packet inspection wikipedia , lookup

Net neutrality wikipedia , lookup

Distributed firewall wikipedia , lookup

Internet protocol suite wikipedia , lookup

Network tap wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Net neutrality law wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Airborne Networking wikipedia , lookup

Net bias wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Peer-to-peer wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
Connectivity
Ch 12
1
Overview
The basic concepts of networking
and the terminology used in
networking will be introduced.
Ch 12
2
Overview
Will learn how to create
network connections to share
resources.
Ch 12
3
Overview
Will look at command line
utilities to gather information
about your network and
perform other networkrelated tasks.
Ch 12
4
Overview
How to map a drive on a
network will be discussed
and then a drive will be
mapped.
Ch 12
5
Overview
Will be introduced to the basic
protocols of the Internet.
Ch 12
6
Overview
How Command Line Utilities
can be used to troubleshoot
and diagnosis problems will
be discussed.
Ch 12
7
Overview
Will learn how to connect to
and navigate the Internet.
Ch 12
8
Networks (LANs and WANs)
LAN (local area network):
Network of computers located
in one room or building
Ch 12
9
Networks (LANs and WANs)
Networks have:
Servers - provide shared resources
to network users
Clients - access shared network
resources
Ch 12
10
Networks (LANs and WANs)
Two types of networks:
 Server-based (> 10 users)
 Peer-to-peer (< 10 users)
Ch 12
11
Networks (LANs and WANs)
Advantages to setting up network:






Share hardware
All users can access current files
Can update information as needed
Set up local e-mail
Laptops can be attached and detached
If away from office can dial in to network to
access needed resources
Ch 12
12
Networks (LANs and WANs)
WAN (wide area network):
Network of computers
connected over long distances
Ch 12
13
Networks (LANs and WANs)
All networks need a NIC
(network interface card) installed
into each computer.
Ch 12
14
Networks (LANs and WANs)
Cabled network - card must support type
of cable used to connect computers
 Wireless network - each computer has
wireless network card
Allows computers to communicate by
radio waves, infrared , power wires in
walls, or by phone.
Ch 12
15
Networks (LANs and WANs)
Need to decide appropriate
network design (topology).
Ch 12
16
Networks (LANs and WANs)
Popular topologies for peer-to-peer
network:
 Bus topology
 Star topology
Ch 12
17
Networks (LANs and WANs)
Bus - common topology for workgroup:
 Uses single coaxial cable (Thinnet)
 Need T-connectors and terminator
plugs
 All computers connect to a single
cable
Ch 12
18
Networks
(
LANs and WANs)
Fig 12.1 A Peer-to-Peer Network with Bus Topology p. 635
Ch 12
19
Networks (LANs and WANs)
Bus topology:
 Advantages
Ease of installation
Relatively inexpensive
Easy to expand
 Disadvantage
One segment of cable fails - entire
network down
 Becoming less common
Ch 12
20
Networks
(
LANs and WANs)
Fig 12.2 A Peer-to-Peer Network with Star Topology p. 636
Ch 12
21
Networks (LANs and WANs)
Star topology:
Uses a hub
Advantage
 Single point of failure
 Disadvantages
 More expensive
 Wiring can be unwieldy
Wireless network - no need to run wires
Ch 12
22
Networks (LANs and WANs)
Fig 12.3 A Wireless and Wired Network p. 637
Ch 12
23
Networks (LANs and WANs)
Either topology can use any resource
by connecting it to cable or hub.
Ch 12
24
Networks (LANs and WANs)
Most users prefer a hub:
Instead of hub can use:
Switch
Router
Firewall may be selected
Ch 12
25
Networks (LANs and WANs)
Server-based networks need NOS
(network operating system) that
tell computers how to
communicate with one another.
Ch 12
26
Networks (LANs and WANs)
To work, a network needs:
 Hardware
 Software
 Network Administrator
Ch 12
27
Networks (LANs and WANs)
Network administrator:
 Decides how hardware and software used
 Decides who will have access to what
devices and resources on network
 Manages day-to-day operation of hardware,
network operating system, and resources of
network
Ch 12
28
Looking at Your Network
When Windows XP Professional is
installed, it will detect network card
and installs default components.
Can add network later using New
Connection Wizard or Network Setup
Wizard
Ch 12
29
Looking at Your Network
When setting up peer-to-peer network:
Need to name computer
Provide administrator password
Most important password in Windows
XP Professional
 Each user needs log on name and
password
Ch 12
30
Looking at Your Network
My Network Places
is map to network.
Ch 12
31
Looking at Your Network
Activities that follow are based
on specific computer configuration.
Do not attempt to do activities in
a lab environment unless instructed
by your instructor
Ch 12
32
Activity - Looking at Your
Network
KEY CONCEPTS:
Local Area Connection Properties sheet
General, Authentication and Advanced tabs
What various icons represent
Terms:
Client, Service, Protocol
Firewall, Gateway, ICF, ICS, Browser
Computer and workgroup names
Universal naming convention
Ch 12
33
Sharing Printers
on a Network
Two parts to sharing resources:
 Server - computer with resources
you wish to share
 Client - computer that wishes to
access resources
Ch 12
34
Sharing Printers
on a Network
 On large network one computer
is the print server.
 On small network the print
server is any computer that is
connected to a printer.
Ch 12
35
Sharing Printers
on a Network
Fig 12.4 Printer Sharing on a Network p. 645
Ch 12
36
Sharing Printers
on a Network
If a printer is attached to a
computer, you could use the
printer “locally”.
Ch 12
37
Activity—Sharing
Printers
on
the
Network
Fig 12.5 The Connect to Printer Dialog Box p. 652
Ch 12
38
Activity—Sharing
Printers on a Network
KEY CONCEPTS:
Can run different OS for each computer
on network
Must use same name across network
Icons
Identifying network and shared printer icons
Two printer icons (“Hung Off” and “Local”)
Ch 12
39
Activity—Sharing
Printers on a Network
KEY CONCEPTS:
Choose Local printer if printer on hub
Network path always begins with
double backslash
 Format - \\computer name\share
name
Ch 12
40
Sharing Hard Drive and
a Folder on a Network
File server:
Computer with drive that is shared
Large network - often one computer
designated at file server
Small network - usually no dedicated
file server
Ch 12
41
Sharing Hard Drive and
a Folder on a Network
Can share entire drive
or selected folders.
Ch 12
42
Permissions and Rights
In lab environment local computer
part of domain:
Administered by network administrator
Includes access control
Ch 12
43
Permissions and Rights
Using NTFS:
Can set permissions on
files/folders
Users can be assigned to groups
When object created owner
assigned to it
Objects inherit permissions
Ch 12
44
Permissions and Rights
Using FAT32:
 Can provide some security on
folders when shared on network
 Cannot assign permissions on a
file-by-file basis as you can with
NTFS
Ch 12
45
Activity—Sharing
Drives on a Network
KEY CONCEPTS:
 Flashlight icon - Windows looking for a network
connection
 Ramifications of “Simple File Sharing”
 Administrator share
 Authenticated Users
 Naming shared device
 How to identify computer you are on
 Deny permissions takes precedence over allow
Ch 12
entries
46
Using Net Commands
See list of net commands
by keying in net help at
command line.
Ch 12
47
Using Net Commands
Figure 12.6 List of NET Commands p. 668
Ch 12
48
Using Net Commands
For detailed help on a
command use syntax net
help command
Ch 12
49
Using Net Commands
Figure 12.7 Using Help with the Net Command p. 668
Ch 12
50
Using Net Commands
 For brief help use net command /?
 Three net commands answer questions
regarding network setup needed when
seeking Tech support.
Ch 12
51
Activity - Gathering Information
with NET Command on Domain
KEY CONCEPTS:
Gathered information about workstation
No limit to # of users that can be logged onto network
Function of “Net localgroup”
Messaging name
Commands - NET NAME, NET USER, NET VIEW,
NET ACCOUNTS, NET STATISTICS
 Reason for having hard copy of above information
Ch 12
52
Activity - Gathering Information
with NET Command on Domain
Figure 12.9 Windows 2000 Server
Using the NET USER p. 672
Ch 12
53
Activity - Gathering Information
with NET Command on Domain
Figure 12.10 Windows 2000 Domain Server
Using the NET STATISTICS SERVER p. 675
Ch 12
54
Mapping Drives and the
NET USE command
Mapped drive:
Shared network drive or folder
that has been assigned a local
drive letter
Ch 12
55
Mapping Drives and the
NET USE command
Mapped drive/folder:
 Appears as a drive on client
computer
 Can be accessed (My Computer)
using assigned/mapped letter.
Ch 12
56
Mapping Drives and the
NET USE command
NET USE:
Command line utility used to map drives,
gives info and allows shares to be manipulated
Connects/disconnects computer to shared
resource
Used to set up network printer to act as a
“local” printer
Drive alias assigned with NETUSE may or
may not be “persistent”
Ch 12
57
Activity—Using the
NET USE Command
KEY CONCEPTS:
 Drive alias assigned with NET USE may/may not
be “persistent”
Know before issuing NET USE connection
 Place drive mapping commands into batch file and
place shortcuts to batch files on Desktop
 PAUSE holds batch file for user intervention
 Use drive letter mappings to shared devices in
many ways
Make backups of critical data “on the fly”
Graphic with two CD’s
Ch 12
58
Activity—Using the
NET USE Command
Fig 12.11 Use of Persistent on a Domain Server p. 679
Ch 12
59
Activity—Using the
NET USE Command
Fig 12.12 Net Use on a Domain p. 685
Ch 12
60
Activity—Using the
NET USE Command
Fig 12.13 Using NET USE on a Domain p. 685
Ch 12
61
Mapping Drives Using Windows
Explorer and My Computer
Can also use GUI to map drives:
 Right-click My Computer/or My Network
Places from Start menu and choose Map
Network Drive
 If available - right click icons
 Use Tools menu
Ch 12
62
Activity - Mapping Drives with
Windows Explorer and My
Computer
KEY CONCEPTS:
 Can identify network drive by icon
 Access mapped network drive as any
drive on system
 Sharing drive - sharing all folders on
drive
Ch 12
63
The Internet
Internet:
 Worldwide network of computers
 Part of information superhighway
 Referred to as cyberspace
Ch 12
64
The Internet
Internet is used to connect to various public
and private institutions in order to:
 Communicate with other computer users
 Gather information
 Do research
 To learn
 Purchase/sell goods
Ch 12
65
The Internet
 Internet - actual network used to
transport information.
 Web -
Collection of standards and protocols used
to access information on the Internet.
Interconnected collection of millions of
Web sites
Ch 12
66
The Internet
Web uses three standards:
 URL’s - location of document
 HTML - programming language used
to create documents
 HTTP - protocol used to transfer data
Ch 12
67
The Internet
To retrieve a document, URL needs:
 Protocol to be used
 Server address with which to connect
 Path to the information
Ch 12
68
The Internet
URL syntax:
protocol://server name/path
Ch 12
69
The Internet
HTTP is major protocol used to
transfer information within the
World Wide Web.
Ch 12
70
The Internet
Web site:
Resides on a server
Has an address (URL)
Virtual/physical location of Web
page (person/org)
Ch 12
71
The Internet
Web page:
 Single screen of text and/or
graphics
 Usually has hypertext links to
other pages
Ch 12
72
The Internet
“Dot” part of address denotes type of
web site:
 .com
 .edu
 .gov
 .mil
 .org
Ch 12
73
The Internet
Search engine:
Category of sites developed to find
needed information
Helps you find what you want
 Index to indexes
Ch 12
74
The Internet
Search engines:
 http://www.yahoo.com
 http://www.altavista.com
 http://www.guide.infoseek.com
 http://www.lycos.com
 http://www.askjeeves.com
 http://www.webcrawler.com
Ch 12
75
The Internet
 Portal - entry to Web
 Yahoo! and Excite are positioning
themselves as portals
Ch 12
76
The Internet
Connect to the Internet via:
 Online provider
 ISP (Internet service providers)
 Also called IAP (Internet access providers)
 Direct cable connection
 ISDN (Integrated Services Digital Network)
 DSL
 Satellites
Ch 12
77
An Overview of TCP/IP
Data is transferred over
the Internet through
TCP/IP protocols.
Ch 12
78
An Overview of TCP/IP
Data travels through several networks
until it gets to its destination
Each network has a router
 Data sent in packets
Ch 12
79
An Overview of TCP/IP
TCP and IP protocols specify the
rules used for creating,
addressing, and sending the
packets of data.
Ch 12
80
An Overview of TCP/IP
 TCP:
 Divides data into packets
 Numbers each packet so they can be
reassembled at receiving end.
 IP:
 Specifies addresses of sending/receiving
computers
 Sends packets on their way
Ch 12
81
An Overview of TCP/IP
Data divided into packets.
Ch 12
82
An Overview of TCP/IP
Connecting to the Internet:
 Permanent open connection
 PPP (Point to Point Protocol)
 SSLIP (Serial Line Internet Protocol)
 Cable modem or DSL connection
Ch 12
83
An Overview of TCP/IP
Each computer connected to the
Internet needs:
 TCP/IP protocols installed
 Unique IP address
Can be static or dynamic.
Ch 12
84
An Overview of TCP/IP
IP address made up of
four numbers separated
by periods.
Ch 12
85
An Overview of TCP/IP
Fig 12.14 A Dotted Quad Address p. 696
Ch 12
86
An Overview of TCP/IP
Originally, IP address divided into:
 Class A, Class B, or Class C
Now, two additional classes:
 Class D or Class E
Ch 12
87
An Overview of TCP/IP
To not run out of IP addresses:
Do not assign permanent (static)
address
Assign temporary (dynamic) IP
address for work session
Ch 12
88
An Overview of TCP/IP
Each site attached to Internet belongs
to a domain.
Domain Name System (DNS) -
provides name resolution.
Numeric IP address needed to communicate
across Internet.
Ch 12
89
An Overview of TCP/IP
Use browser to access a site
on Internet, key in its URL.
Ch 12
90
An Overview of TCP/IP
Fig 12.14 A Dotted Quad Address p. 696
Internet name of the
computer (server)
Name of the protocol to use
when accessing the server
Name of the item to
request from the server
Ch 12
91
TCP/IP Utilities—Command
Line Interface with the Internet
Windows provides a series of
commands (utility programs)
that run at the command line.
Ch 12
92
TCP/IP Utilities—Command
Line Interface with the Internet
Utility programs are TCP/IP commands:
 Set of tools used for troubleshooting
problems
 Offer connections to computers not
connected to web
 If in lab environment and going through a
“firewall” some of utilities may not function
 Installed when TCP/IP network protocols
installed
Ch 12
93
TCP/IP Utilities—Command Line
Interface with the Internet
Table 12.1 Command Line Commands for the Internet
pp.. 698-699
Ch 12
94
TCP/IP Utilities—Command
Line Interface with the Internet
For help with any of the commands,
at the command line key in:
Command name, a space, and then /?
Ch 12
95
IPCONFIG
IPCONFIG:
 Displays current TCP/IP
configurations in one place
 Allows the request of a release or
renewal of a DHCP-assigned IP
address
Ch 12
96
IPCONFIG
 Assigned address with dial-up
service.
 Need address if trying to Telnet into
restricted server.
Ch 12
97
Activity—Using IPCONFIG
KEY CONCEPTS:
 See all information on Internet adapter that
has TCP/IP bound to it
 If not connected/logged on - no IP address
reported
 Adding /ALL parameter - obtain more
information about network and internet
connections
Ch 12
98
PING
PING (Packet InterNet Groper):
 Diagnostic tool used to determine if
computer you are trying to reach is up
and running.
Ch 12
99
PING
 If ping successful - see four replies
on screen display.
 If ping not successful - see “Request
timed out” message.
Ch 12
100
PING
 Can ping yourself using loopback
address (127.0.0.1).
 Pings are not always reliable.
 Some servers do not allow
themselves to be “pinged”.
Ch 12
101
Activity—Using PING
KEY CONCEPTS:
 “Pinged” IP address and host name
 “Pinged” yourself using loopback
address (127.0.0.1)
Loopback address is IP address of your
computer
 Large organizations usually have a
number of servers
Ch 12
102
TRACERT
TRACERT:
 Diagnostic utility that determines and
traces route on which data is moving
to destination computer.
Ch 12
103
TRACERT
 TRACERT determines data route by
sending packets containing time values.
 When command is completed sends
back five-column display.
 An asterisk (*) means attempt timed out.
Ch 12
104
TRACERT
Tracert uses pings:
 If server does not allow pinging
- may not be able to trace a route
Ch 12
105
Activity—Using TRACERT
KEY CONCEPTS:
 Right most column indicates what
computers packets are traveling on
 Not always easy to know where route
actually goes
Ch 12
106
FTP
FTP (File Transfer Protocol):
 Communications protocol that
computer uses to transfer files
 FTP servers store files that Internet
users can download
Ch 12
107
FTP
Advantage of FTP:
 Ability to transfer files to and from
computers running different
operating systems
 Can transfer files in either text or
binary mode
Ch 12
108
FTP
FTP has many commands:
 To get help within FTP, key in “HELP
command”
 For list of commands, key in HELP
Ch 12
109
Activity—Using FTP
KEY CONCEPTS:
 Some servers allow anonymous logins
 Password - any word can be used
 For command syntax - key in “HELP” plus
command name
 ASCII files have extensions of .txt
 Directories have a dr on far left.
 Compressed files have .ZIP extensions
 Need utility (PKZIP) to unpack file
Ch 12
110
Activity—Using FTP
KEY CONCEPTS:
 Command Line Interface borrows from Unix
 Key in: “get filename” - transfer file to default directory
 Key in: “get filename” - (file name followed by hyphen) acts like TYPE command
 To transfer binary file (.EXE) key in:
 binary
 get file.exe
 ASCII
 Key in ASCII to return to text-file mode
Ch 12
111
Telnet
Telnet is connection to a remote
computer:
 You become user on remote computer,
and
 Your monitor becomes monitor for
remote computer.
Ch 12
112
Telnet
1.
2.
3.
4.
Example
You key in 3 + 4
Your computer transmits keystrokes to
remote computer.
Remote computer receives keystrokes
and does the work.
Your monitor becomes monitor for
remote computer and results of work
displayed on your computer.
Ch 12
113
Telnet
Technically, Telnet is protocol
and terminal handler portion
of the TCP/IP protocol suite.
Ch 12
114
Telnet
To use Telnet:
 Both computers must support
Telnet protocol
 Incoming user must have
permission to use remote computer
Ch 12
115
Telnet
Telnet used:
 By system administrator (or other
professional) to log on to your
computer and troubleshoot problems
on your computer
 Most commonly, for connecting to
libraries and other public databases
Ch 12
116
Activity—Using Telnet
KEY CONCEPTS:
 For list of commands in Telnet
environment, key in ?/help
 Became a user on a remote computer
 Used Telnet to connect to Library
catalog
Ch 12
117