* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Ch 12 Connectivity - Cisco Networking Academy
Computer security wikipedia , lookup
Wireless security wikipedia , lookup
Deep packet inspection wikipedia , lookup
Net neutrality wikipedia , lookup
Distributed firewall wikipedia , lookup
Internet protocol suite wikipedia , lookup
Network tap wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Computer network wikipedia , lookup
Net neutrality law wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Airborne Networking wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Peer-to-peer wikipedia , lookup
Connectivity Ch 12 1 Overview The basic concepts of networking and the terminology used in networking will be introduced. Ch 12 2 Overview Will learn how to create network connections to share resources. Ch 12 3 Overview Will look at command line utilities to gather information about your network and perform other networkrelated tasks. Ch 12 4 Overview How to map a drive on a network will be discussed and then a drive will be mapped. Ch 12 5 Overview Will be introduced to the basic protocols of the Internet. Ch 12 6 Overview How Command Line Utilities can be used to troubleshoot and diagnosis problems will be discussed. Ch 12 7 Overview Will learn how to connect to and navigate the Internet. Ch 12 8 Networks (LANs and WANs) LAN (local area network): Network of computers located in one room or building Ch 12 9 Networks (LANs and WANs) Networks have: Servers - provide shared resources to network users Clients - access shared network resources Ch 12 10 Networks (LANs and WANs) Two types of networks: Server-based (> 10 users) Peer-to-peer (< 10 users) Ch 12 11 Networks (LANs and WANs) Advantages to setting up network: Share hardware All users can access current files Can update information as needed Set up local e-mail Laptops can be attached and detached If away from office can dial in to network to access needed resources Ch 12 12 Networks (LANs and WANs) WAN (wide area network): Network of computers connected over long distances Ch 12 13 Networks (LANs and WANs) All networks need a NIC (network interface card) installed into each computer. Ch 12 14 Networks (LANs and WANs) Cabled network - card must support type of cable used to connect computers Wireless network - each computer has wireless network card Allows computers to communicate by radio waves, infrared , power wires in walls, or by phone. Ch 12 15 Networks (LANs and WANs) Need to decide appropriate network design (topology). Ch 12 16 Networks (LANs and WANs) Popular topologies for peer-to-peer network: Bus topology Star topology Ch 12 17 Networks (LANs and WANs) Bus - common topology for workgroup: Uses single coaxial cable (Thinnet) Need T-connectors and terminator plugs All computers connect to a single cable Ch 12 18 Networks ( LANs and WANs) Fig 12.1 A Peer-to-Peer Network with Bus Topology p. 635 Ch 12 19 Networks (LANs and WANs) Bus topology: Advantages Ease of installation Relatively inexpensive Easy to expand Disadvantage One segment of cable fails - entire network down Becoming less common Ch 12 20 Networks ( LANs and WANs) Fig 12.2 A Peer-to-Peer Network with Star Topology p. 636 Ch 12 21 Networks (LANs and WANs) Star topology: Uses a hub Advantage Single point of failure Disadvantages More expensive Wiring can be unwieldy Wireless network - no need to run wires Ch 12 22 Networks (LANs and WANs) Fig 12.3 A Wireless and Wired Network p. 637 Ch 12 23 Networks (LANs and WANs) Either topology can use any resource by connecting it to cable or hub. Ch 12 24 Networks (LANs and WANs) Most users prefer a hub: Instead of hub can use: Switch Router Firewall may be selected Ch 12 25 Networks (LANs and WANs) Server-based networks need NOS (network operating system) that tell computers how to communicate with one another. Ch 12 26 Networks (LANs and WANs) To work, a network needs: Hardware Software Network Administrator Ch 12 27 Networks (LANs and WANs) Network administrator: Decides how hardware and software used Decides who will have access to what devices and resources on network Manages day-to-day operation of hardware, network operating system, and resources of network Ch 12 28 Looking at Your Network When Windows XP Professional is installed, it will detect network card and installs default components. Can add network later using New Connection Wizard or Network Setup Wizard Ch 12 29 Looking at Your Network When setting up peer-to-peer network: Need to name computer Provide administrator password Most important password in Windows XP Professional Each user needs log on name and password Ch 12 30 Looking at Your Network My Network Places is map to network. Ch 12 31 Looking at Your Network Activities that follow are based on specific computer configuration. Do not attempt to do activities in a lab environment unless instructed by your instructor Ch 12 32 Activity - Looking at Your Network KEY CONCEPTS: Local Area Connection Properties sheet General, Authentication and Advanced tabs What various icons represent Terms: Client, Service, Protocol Firewall, Gateway, ICF, ICS, Browser Computer and workgroup names Universal naming convention Ch 12 33 Sharing Printers on a Network Two parts to sharing resources: Server - computer with resources you wish to share Client - computer that wishes to access resources Ch 12 34 Sharing Printers on a Network On large network one computer is the print server. On small network the print server is any computer that is connected to a printer. Ch 12 35 Sharing Printers on a Network Fig 12.4 Printer Sharing on a Network p. 645 Ch 12 36 Sharing Printers on a Network If a printer is attached to a computer, you could use the printer “locally”. Ch 12 37 Activity—Sharing Printers on the Network Fig 12.5 The Connect to Printer Dialog Box p. 652 Ch 12 38 Activity—Sharing Printers on a Network KEY CONCEPTS: Can run different OS for each computer on network Must use same name across network Icons Identifying network and shared printer icons Two printer icons (“Hung Off” and “Local”) Ch 12 39 Activity—Sharing Printers on a Network KEY CONCEPTS: Choose Local printer if printer on hub Network path always begins with double backslash Format - \\computer name\share name Ch 12 40 Sharing Hard Drive and a Folder on a Network File server: Computer with drive that is shared Large network - often one computer designated at file server Small network - usually no dedicated file server Ch 12 41 Sharing Hard Drive and a Folder on a Network Can share entire drive or selected folders. Ch 12 42 Permissions and Rights In lab environment local computer part of domain: Administered by network administrator Includes access control Ch 12 43 Permissions and Rights Using NTFS: Can set permissions on files/folders Users can be assigned to groups When object created owner assigned to it Objects inherit permissions Ch 12 44 Permissions and Rights Using FAT32: Can provide some security on folders when shared on network Cannot assign permissions on a file-by-file basis as you can with NTFS Ch 12 45 Activity—Sharing Drives on a Network KEY CONCEPTS: Flashlight icon - Windows looking for a network connection Ramifications of “Simple File Sharing” Administrator share Authenticated Users Naming shared device How to identify computer you are on Deny permissions takes precedence over allow Ch 12 entries 46 Using Net Commands See list of net commands by keying in net help at command line. Ch 12 47 Using Net Commands Figure 12.6 List of NET Commands p. 668 Ch 12 48 Using Net Commands For detailed help on a command use syntax net help command Ch 12 49 Using Net Commands Figure 12.7 Using Help with the Net Command p. 668 Ch 12 50 Using Net Commands For brief help use net command /? Three net commands answer questions regarding network setup needed when seeking Tech support. Ch 12 51 Activity - Gathering Information with NET Command on Domain KEY CONCEPTS: Gathered information about workstation No limit to # of users that can be logged onto network Function of “Net localgroup” Messaging name Commands - NET NAME, NET USER, NET VIEW, NET ACCOUNTS, NET STATISTICS Reason for having hard copy of above information Ch 12 52 Activity - Gathering Information with NET Command on Domain Figure 12.9 Windows 2000 Server Using the NET USER p. 672 Ch 12 53 Activity - Gathering Information with NET Command on Domain Figure 12.10 Windows 2000 Domain Server Using the NET STATISTICS SERVER p. 675 Ch 12 54 Mapping Drives and the NET USE command Mapped drive: Shared network drive or folder that has been assigned a local drive letter Ch 12 55 Mapping Drives and the NET USE command Mapped drive/folder: Appears as a drive on client computer Can be accessed (My Computer) using assigned/mapped letter. Ch 12 56 Mapping Drives and the NET USE command NET USE: Command line utility used to map drives, gives info and allows shares to be manipulated Connects/disconnects computer to shared resource Used to set up network printer to act as a “local” printer Drive alias assigned with NETUSE may or may not be “persistent” Ch 12 57 Activity—Using the NET USE Command KEY CONCEPTS: Drive alias assigned with NET USE may/may not be “persistent” Know before issuing NET USE connection Place drive mapping commands into batch file and place shortcuts to batch files on Desktop PAUSE holds batch file for user intervention Use drive letter mappings to shared devices in many ways Make backups of critical data “on the fly” Graphic with two CD’s Ch 12 58 Activity—Using the NET USE Command Fig 12.11 Use of Persistent on a Domain Server p. 679 Ch 12 59 Activity—Using the NET USE Command Fig 12.12 Net Use on a Domain p. 685 Ch 12 60 Activity—Using the NET USE Command Fig 12.13 Using NET USE on a Domain p. 685 Ch 12 61 Mapping Drives Using Windows Explorer and My Computer Can also use GUI to map drives: Right-click My Computer/or My Network Places from Start menu and choose Map Network Drive If available - right click icons Use Tools menu Ch 12 62 Activity - Mapping Drives with Windows Explorer and My Computer KEY CONCEPTS: Can identify network drive by icon Access mapped network drive as any drive on system Sharing drive - sharing all folders on drive Ch 12 63 The Internet Internet: Worldwide network of computers Part of information superhighway Referred to as cyberspace Ch 12 64 The Internet Internet is used to connect to various public and private institutions in order to: Communicate with other computer users Gather information Do research To learn Purchase/sell goods Ch 12 65 The Internet Internet - actual network used to transport information. Web - Collection of standards and protocols used to access information on the Internet. Interconnected collection of millions of Web sites Ch 12 66 The Internet Web uses three standards: URL’s - location of document HTML - programming language used to create documents HTTP - protocol used to transfer data Ch 12 67 The Internet To retrieve a document, URL needs: Protocol to be used Server address with which to connect Path to the information Ch 12 68 The Internet URL syntax: protocol://server name/path Ch 12 69 The Internet HTTP is major protocol used to transfer information within the World Wide Web. Ch 12 70 The Internet Web site: Resides on a server Has an address (URL) Virtual/physical location of Web page (person/org) Ch 12 71 The Internet Web page: Single screen of text and/or graphics Usually has hypertext links to other pages Ch 12 72 The Internet “Dot” part of address denotes type of web site: .com .edu .gov .mil .org Ch 12 73 The Internet Search engine: Category of sites developed to find needed information Helps you find what you want Index to indexes Ch 12 74 The Internet Search engines: http://www.yahoo.com http://www.altavista.com http://www.guide.infoseek.com http://www.lycos.com http://www.askjeeves.com http://www.webcrawler.com Ch 12 75 The Internet Portal - entry to Web Yahoo! and Excite are positioning themselves as portals Ch 12 76 The Internet Connect to the Internet via: Online provider ISP (Internet service providers) Also called IAP (Internet access providers) Direct cable connection ISDN (Integrated Services Digital Network) DSL Satellites Ch 12 77 An Overview of TCP/IP Data is transferred over the Internet through TCP/IP protocols. Ch 12 78 An Overview of TCP/IP Data travels through several networks until it gets to its destination Each network has a router Data sent in packets Ch 12 79 An Overview of TCP/IP TCP and IP protocols specify the rules used for creating, addressing, and sending the packets of data. Ch 12 80 An Overview of TCP/IP TCP: Divides data into packets Numbers each packet so they can be reassembled at receiving end. IP: Specifies addresses of sending/receiving computers Sends packets on their way Ch 12 81 An Overview of TCP/IP Data divided into packets. Ch 12 82 An Overview of TCP/IP Connecting to the Internet: Permanent open connection PPP (Point to Point Protocol) SSLIP (Serial Line Internet Protocol) Cable modem or DSL connection Ch 12 83 An Overview of TCP/IP Each computer connected to the Internet needs: TCP/IP protocols installed Unique IP address Can be static or dynamic. Ch 12 84 An Overview of TCP/IP IP address made up of four numbers separated by periods. Ch 12 85 An Overview of TCP/IP Fig 12.14 A Dotted Quad Address p. 696 Ch 12 86 An Overview of TCP/IP Originally, IP address divided into: Class A, Class B, or Class C Now, two additional classes: Class D or Class E Ch 12 87 An Overview of TCP/IP To not run out of IP addresses: Do not assign permanent (static) address Assign temporary (dynamic) IP address for work session Ch 12 88 An Overview of TCP/IP Each site attached to Internet belongs to a domain. Domain Name System (DNS) - provides name resolution. Numeric IP address needed to communicate across Internet. Ch 12 89 An Overview of TCP/IP Use browser to access a site on Internet, key in its URL. Ch 12 90 An Overview of TCP/IP Fig 12.14 A Dotted Quad Address p. 696 Internet name of the computer (server) Name of the protocol to use when accessing the server Name of the item to request from the server Ch 12 91 TCP/IP Utilities—Command Line Interface with the Internet Windows provides a series of commands (utility programs) that run at the command line. Ch 12 92 TCP/IP Utilities—Command Line Interface with the Internet Utility programs are TCP/IP commands: Set of tools used for troubleshooting problems Offer connections to computers not connected to web If in lab environment and going through a “firewall” some of utilities may not function Installed when TCP/IP network protocols installed Ch 12 93 TCP/IP Utilities—Command Line Interface with the Internet Table 12.1 Command Line Commands for the Internet pp.. 698-699 Ch 12 94 TCP/IP Utilities—Command Line Interface with the Internet For help with any of the commands, at the command line key in: Command name, a space, and then /? Ch 12 95 IPCONFIG IPCONFIG: Displays current TCP/IP configurations in one place Allows the request of a release or renewal of a DHCP-assigned IP address Ch 12 96 IPCONFIG Assigned address with dial-up service. Need address if trying to Telnet into restricted server. Ch 12 97 Activity—Using IPCONFIG KEY CONCEPTS: See all information on Internet adapter that has TCP/IP bound to it If not connected/logged on - no IP address reported Adding /ALL parameter - obtain more information about network and internet connections Ch 12 98 PING PING (Packet InterNet Groper): Diagnostic tool used to determine if computer you are trying to reach is up and running. Ch 12 99 PING If ping successful - see four replies on screen display. If ping not successful - see “Request timed out” message. Ch 12 100 PING Can ping yourself using loopback address (127.0.0.1). Pings are not always reliable. Some servers do not allow themselves to be “pinged”. Ch 12 101 Activity—Using PING KEY CONCEPTS: “Pinged” IP address and host name “Pinged” yourself using loopback address (127.0.0.1) Loopback address is IP address of your computer Large organizations usually have a number of servers Ch 12 102 TRACERT TRACERT: Diagnostic utility that determines and traces route on which data is moving to destination computer. Ch 12 103 TRACERT TRACERT determines data route by sending packets containing time values. When command is completed sends back five-column display. An asterisk (*) means attempt timed out. Ch 12 104 TRACERT Tracert uses pings: If server does not allow pinging - may not be able to trace a route Ch 12 105 Activity—Using TRACERT KEY CONCEPTS: Right most column indicates what computers packets are traveling on Not always easy to know where route actually goes Ch 12 106 FTP FTP (File Transfer Protocol): Communications protocol that computer uses to transfer files FTP servers store files that Internet users can download Ch 12 107 FTP Advantage of FTP: Ability to transfer files to and from computers running different operating systems Can transfer files in either text or binary mode Ch 12 108 FTP FTP has many commands: To get help within FTP, key in “HELP command” For list of commands, key in HELP Ch 12 109 Activity—Using FTP KEY CONCEPTS: Some servers allow anonymous logins Password - any word can be used For command syntax - key in “HELP” plus command name ASCII files have extensions of .txt Directories have a dr on far left. Compressed files have .ZIP extensions Need utility (PKZIP) to unpack file Ch 12 110 Activity—Using FTP KEY CONCEPTS: Command Line Interface borrows from Unix Key in: “get filename” - transfer file to default directory Key in: “get filename” - (file name followed by hyphen) acts like TYPE command To transfer binary file (.EXE) key in: binary get file.exe ASCII Key in ASCII to return to text-file mode Ch 12 111 Telnet Telnet is connection to a remote computer: You become user on remote computer, and Your monitor becomes monitor for remote computer. Ch 12 112 Telnet 1. 2. 3. 4. Example You key in 3 + 4 Your computer transmits keystrokes to remote computer. Remote computer receives keystrokes and does the work. Your monitor becomes monitor for remote computer and results of work displayed on your computer. Ch 12 113 Telnet Technically, Telnet is protocol and terminal handler portion of the TCP/IP protocol suite. Ch 12 114 Telnet To use Telnet: Both computers must support Telnet protocol Incoming user must have permission to use remote computer Ch 12 115 Telnet Telnet used: By system administrator (or other professional) to log on to your computer and troubleshoot problems on your computer Most commonly, for connecting to libraries and other public databases Ch 12 116 Activity—Using Telnet KEY CONCEPTS: For list of commands in Telnet environment, key in ?/help Became a user on a remote computer Used Telnet to connect to Library catalog Ch 12 117