Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 76

IC3 Internet and Computing Core Certification Guide

Global Standard 4

Living
Online

Lesson 2: Getting Connected

© CCI Learning Solutions Inc. 1


Lesson Objectives
• the advantages of networking • analog and digital signaling
• common network speeds • methods for connecting to the
• common networking models Internet
• the role of TCP • the role of the domain name
system (DNS)
• local area networks (LANs)
• the need for security
• how wired and wireless
connections work • the role of firewalls and
gateways
• addresses used on the LAN
• the use of virtual private
• wide area networks (WANs)
networks (VPNs)
• basic troubleshooting techniques

© CCI Learning Solutions Inc. 2


Defining a Network
• System for moving objects or information
• In modern computing terms a network is group of two or more
computers connected so they can communicate, share resources
and exchange data with one another
− Can include small business network in one room, or worldwide network
connecting millions of users

© CCI Learning Solutions Inc. 3


Defining a Network
• Advantages of Using a Network
− Include ability to:
− share files
− use network resources
− access the Internet
− Sharing resources saves money and allows people to be productive
without being overcrowded by redundant equipment

© CCI Learning Solutions Inc. 4


Defining a Network
• Network Speeds
− Determined by capacity to move Measurement Equal to…
bps Bits per second
information measured in bits, Kbps Thousand bits per second
and data transfer rate measured Mbps Million bits per second
in bits per second (bps) Gbps Billion bits per second

− Factors affecting speed at which data travels across network:


− type of transmission media
− network standard used
− amount of traffic on the network
− speed of networking devices on network
− Capacity for transferring data also referred to as bandwidth

© CCI Learning Solutions Inc. 5


Networking Models
• Client/Server Model
− Many corporate networks use client/server model, and networks called
server‑based
− Individual computers and devices interact with one another through central
server where all connected
− Individual PCs are client systems that request services provided by server
− Server is more powerful than clients connected to it
− Server-based networks generally more secure than peer-to-peer networks
− Central server controls access to all network resources
− Users must log on to network with user name and password

© CCI Learning Solutions Inc. 6


Networking Models
• Peer-to-Peer Model
− All participating computers are more or less equal and no central server
− Each computer connected to network is called host
− Hosts can share files, Internet connection, printer, scanner or other peripheral
devices

• Web-based Model
− Can use Internet as network "backbone" to connect with others around the
globe
− Networking over Internet is called internetworking
− Need only browser and Internet connection

© CCI Learning Solutions Inc. 7


TCP/IP and Networking
• Protocol is set of rules to enable devices to communicate with
one another in agreed-upon manner
• All major operating systems support Transmission Control
Protocol/Internet Protocol (TCP/IP)
− Standard protocol for both local and wide area networking and required
for Internet access
• Collection or suite of protocols provide services for things users
do on Web
− Component protocols commonly referred to as protocol stack
− Network using this protocol called TCP/IP network

© CCI Learning Solutions Inc. 8


Local Area Networks (LANs)
• Group of computers connected within relatively small
geographic area
• Users must log on to network with recognized user name and
password
− Then gains access to network services and resources
• Majority of LANs adhere to networking standard known as
Ethernet
− Family of networking technologies for local area networks

© CCI Learning Solutions Inc. 9


Local Area Networks (LANs)
• Connecting to the LAN
− Connection to LAN requires:
− network interface card (NIC)
− transmission medium (wired or wireless)

• Network Interface Card (NIC)


− Also called network adapter card
− Interface between computer and network
− Includes port to connect network cable
• Transmission Medium
− Most common is copper wire in form of twisted pair cable

© CCI Learning Solutions Inc. 10


Local Area Networks (LANs)
• Common LAN Devices
− Cable is physical pathway for data to travel around network
− One end of cable plugs into NIC, and other plugs into port on connection
device on LAN
− Connect individual systems or separate networks to one another
− Switches/Hubs
− Hub connects computers in network to exchange information via ports
− Switch connects individual systems or multiple
networks
◦ Include multiple Ethernet ports and different sized
switches offer varying number of ports

© CCI Learning Solutions Inc. 11


Local Area Networks (LANs)
• Routers
− Within LAN, internal routers connect separate portions of LAN
− At edges of LAN, router used to connect to public carrier
− Serves as entry and exit point for each network, and referred to as
gateway
− Router that connects to public carrier's lines to access Internet called
access router
− As it acts as gateway to Internet, router is referred to as "default gateway"

© CCI Learning Solutions Inc. 12


Local Area Networks (LANs)
• Wired Connections
− Most common type of cable in Ethernet wired LAN is called twisted pair
cable
− Other names include: Ethernet cable, patch cable, straight-through cable,
network cable and RJ-45 cable
− Plug one end into NIC; plug other end to network port
− Key is that computers connect to central device that makes
communication possible
− Wired Ethernet LANs can move data at rates of 10 Mbps, 100 Mbps, 1
Gbps or even 10 Gbps
− More secure than wireless connections

© CCI Learning Solutions Inc. 13


Local Area Networks (LANs)
• Wireless Connections
− Open air is connection medium and wireless signals are radio waves sent
through air
− Computers that include wireless NIC also include standard NIC that uses
network cable
− Wireless access point is central device through which wireless systems
connect to network
− Wireless access point connects to LAN through wired connection
− Common speeds include 11 Mbps, 54 Mbps and 300 Mbps, depending on
WLAN standard in use

© CCI Learning Solutions Inc. 14


Local Area Networks (LANs)
• Addressing on the LAN
− To communicate with one another, each computer requires unique
address
− MAC Address
− Every NIC has unique address permanently burned by manufacturer
− Address is Media Access Control (MAC) address, physical or hardware
address
− Used for addressing only by devices within same LAN, not outside
− For data to be sent outside LAN, IP address used

© CCI Learning Solutions Inc. 15


Local Area Networks (LANs)
− Internet Protocol (IP) Addresses
− Each computer on TCP/IP network has Internet address to distinguish it from
all other computers on network called IP address
− Two versions: version 4 (IPv4) and version 6 (IPv6)
− All addressable devices on network must have IP address
◦ IPv4 address is 32-bit address written as series of numbers divided into four
segments with each separated by dot
◦ Leased to computers on network for a specified period of time
◦ Provides two pieces of information: identifies network where host resides, and
particular host on network
◦ Computer must have IP address to connect to Internet
◦ Must be unique within network or Internet

© CCI Learning Solutions Inc. 16


Local Area Networks (LANs)
− Network and host portions
− IP address includes two portions:
◦ Network – also called network identifier, network ID, or network prefix; indicated
by certain number of bits (starting from left-most bit).
◦ Host – remaining bits (after network prefix) identify specific host on network

− Slash notation used to indicate how many bits used for network prefix
− Networking devices use network and host portions to determine
◦ Which network particular host resides
◦ Whether network is local or remote

© CCI Learning Solutions Inc. 17


Local Area Networks (LANs)
− What determines an IP address?
◦ By network on which it resides
◦ All hosts on same network share same network address, but must have unique host
number
◦ May be manually assigned and configured by network administrator, or done
automatically through service called Dynamic Host Configuration Protocol (DHCP)
− Where do IP addresses come from?
◦ Issued by Internet Corporation for Assigned Names and Numbers (ICANN)
◦ Allocates blocks of IP addresses to Internet Service Providers (ISPs), which in turn
allocate addresses to customers

© CCI Learning Solutions Inc. 18


Local Area Networks (LANs)
− Other required addressing information
◦ In addition to an IP address, each host on a network must be configured with the
following information:
Subnet 32-bit number that networking devices use to determine whether
Mask destination system local or remote. If incorrect subnet mask
specified in system's network configuration settings, system will
not be able to communicate with other systems on network.

Default Number is IP address of networking device that provides access


Gateway outside local LAN; usually router. To access Internet, system must
know address of default gateway.

© CCI Learning Solutions Inc. 19


Local Area Networks (LANs)
• Reserved Address Ranges
− ICANN assigns and coordinates IP addresses around world
− IP addresses allocated to service providers for distribution to their customers
are public IP addresses
− Public IP addresses used to access and participate on Internet
− ICANN also reserved specific ranges as private IP addresses
− Used for communication within confines of LAN, but not routable or
addressable over Internet
◦ 10.0.0.0 to 10.255.255.255
◦ 172.16.0.0 to 172.31.255.255
◦ 192.168.0.0. to 192.168.255.255

− Most residential networks use last private addresses shown above

© CCI Learning Solutions Inc. 20


Local Area Networks (LANs)
− Private Addresses and Connecting to the Internet
− Modem/router performs several functions, including but not limited to:
◦ Assigns private network addresses to systems connected (usually 192.168.1.x), thus
establishing internal LAN
◦ Uses network address translation (NAT) to replace private IP address on LAN with
Internet-addressable IP address provided with purchase of Internet service
◦ NAT occurs in same way as for home network, although corporate LAN might use
different hardware

© CCI Learning Solutions Inc. 21


Local Area Networks (LANs)
− Connecting LANs Together
− Often useful to connect one LAN to another LAN
◦ Can be connected to one another using privately-owned communication lines, or
◦ Can be connected using communication lines provided by public carrier

− When two or more LANs connecting using public network, WAN created

© CCI Learning Solutions Inc. 22


Wide Area Networks (WANs)
• Consists of two or more LANs that cover a wide geographic area
connected using lines of public carrier
− Public Carrier is telecommunications service provider regulated by
government
• Main features that distinguish LANs from WANs are:
− LAN confined to local cabling you install in home, or IT department has
routed through office.
− In LAN, organization owns all components
− In WAN, organization leases some necessary components required to
transmit data
− LANs usually much faster than WANs

© CCI Learning Solutions Inc. 23


Public Switched Networks
• Any carrier network that provides switched services for purposes
of sending communications messages
• The Public Switched Telephone Network (PSTN)
− Provides telephone service around world and integral to wide area
networking because of infrastructure
− Basic underlying physical structure or framework needed for operation of
service or enterprise
− Internetworking depends on connections provided by infrastructure built by
telecommunications providers
− Often lease lines for private use to companies or individuals
− Leased lines offer high speed data transfer and guaranteed capacity
(bandwidth)

© CCI Learning Solutions Inc. 24


Public Switched Networks
− Analog and Digital Signals
− Two types of signals used to transfer information electronically:
◦ Analog signals are electrical signals that vary in amplitude and frequency, measured
in cycles per second, or Hertz (Hz)
◦ Digital signals are electrical signals that contain one of two values – 1 or 0,
measured in bits per second (bps)
− Digitizing is process of converting analog signals into digital signals

© CCI Learning Solutions Inc. 25


Public Switched Networks
− The Digital Phone Network
− PSTN is almost entirely digital, except for small portion that extends from
telephone company's central office (CO) to homes and offices
◦ CO is building where subscriber telephone lines connected to switching equipment
for local and long-distance calls
◦ Small portion extending from CO to users homes called local loop or "last mile" ;
usually analog line providing plain old telephone service (POTS)
− On POTS line, telephone conversation begins with analog signal as voice
information spoken into receiver
◦ Analog signal travels local loop until it reaches CO
◦ Signal then passes through switch, is digitized and sent into digital heart of
telephone network
− Information remains in digital format until it reaches CO for party receiving
call
© CCI Learning Solutions Inc. 26
Public Switched Networks
− Circuit Switching
− Technology using dedicated physical path to send and receive information;
PSTN uses circuit switching
1. Pick up receiver and open connection to local telephone switch.
2. Dial number, and switch then connects to other switches along PSTN, forming
physical pathway between the two telephones. Pathway transfers voice information
back and forth between two telephones.
3. When person answers phone, circuit established and remains open for duration of
call; no one else can use telephone line as all switches and wire pathways in
connection used. All voice information exchanged between calling party and
receiving party travels along circuit.
4. When hang up phone, circuit disconnected, and switches and wire pathways
dedicated to phone call now free again for other people.

© CCI Learning Solutions Inc. 27


Public Switched Networks
− Packet Switching
− Technology for transferring information which does not rely on a dedicated
physical path
− Information broken down into discrete units called "packets" with addressing
information included in each packet
− All packets routed through network based on their addressing information
− Data networks use packet switching to transfer information between hosts on
network
◦ Internet uses packet switching to transfer information between hosts

− Digital Subscriber Line (DSL) and cable Internet also rely on packet switching

© CCI Learning Solutions Inc. 28


Connecting to the Internet
• Dial-Up Connections
− Very slow and rarely used; least expensive for Internet access
− POTS Connection
− Modem converts digital data from computer to analog signal transmitted over
local loop
− Analog signal digitized at CO and sent through digital portion of phone
network
◦ At CO end, digitized signal modulated to analog signal and sent up local loop
◦ Analog signal passes through another modem on receiving end
◦ Receiving modem converts analog to digital signal and transmits to receiving
computer
◦ Modem type called traditional or analog modem

© CCI Learning Solutions Inc. 29


Connecting to the Internet
− Modem physically connects to telephone network using standard telephone
wire
◦ With dial-up connection, computer uses modem to dial access number required to
connect to ISP
◦ When modem at ISP "answers" call, connection (circuit) established and maintained
for duration of data transfer
◦ When done, disconnect from ISP by hanging up

− If use dial-up connection, must establish connection each time to access


Internet
− Maximum possible speed for data transfer over standard analog telephone line
(allowing for modulation and demodulation) is 56 Kbps

© CCI Learning Solutions Inc. 30


Connecting to the Internet
− Integrated Services Digital Network (ISDN)
− Digital telephone line
− Because line is digital, no conversion from analog to digital required
◦ Must still establish connection to access Internet, and then hang up when you are
done
◦ ISDN transfers data at 128 Kbps

− Has been available throughout most of the world but has largely been
superseded by cable and DSL services

© CCI Learning Solutions Inc. 31


Connecting to the Internet
• Direct Connections – Broadband
− Provide continuous access to Internet through permanent network
connections
− More desirable than dial-up connections because generally capable of
handling high bandwidth
− Referred to as broadband connections
− Technology that divides available media bandwidth into multiple channels,
and each channel carries separate signal
− Allows single wire to carry several communications simultaneously
− Generally describes any connection always "on" and provides speeds of
1.544 Mbps or higher

© CCI Learning Solutions Inc. 32


Connecting to the Internet
− Leased Lines
− Permanent connection between two or more locations that consumers can
lease from phone company
− When leasing line, do not share with other consumers – available exclusively
to you
− Used by businesses to connect offices geographically far apart
◦ Offer high bandwidth and cost-effective for heavy Internet traffic

− Provide company with way to expand its private network beyond immediate
geographic area by forming secure wide area network
− Reliable and secure but expensive

© CCI Learning Solutions Inc. 33


Connecting to the Internet
• Digital Subscriber Line (DSL)
− High-speed all-digital connection that uses digital phone lines and DSL
modem
− Service provided by phone company where several channels carried over
single wire
− Can run on existing copper telephone lines if lines are in good condition
− Divides media bandwidth into multiple channels through multiplexing
− Provides users with dedicated connection to provider’s digital network
− Do not share available bandwidth with anyone else

© CCI Learning Solutions Inc. 34


Connecting to the Internet
− DSL modem used to connect to digital telephone
circuit using telephone cable
− Includes Ethernet port that attaches modem to
computer with Ethernet cable
− DSL Availability
− Distance from provider’s central office determines whether you can receive
DSL service
◦ Distance limit is 18,000 feet (5,460 meters)
◦ Telephone company’s use of loading coils and bridge taps to provide service to
remote area can also disqualify area
◦ Check with service provider to find out if DSL available in your area

© CCI Learning Solutions Inc. 35


Connecting to the Internet
− DSL Speeds
− Different speeds available, depending on type of service you use and how far
you are from provider’s central office
◦ The farther you are, the more signal quality decreases and the slower connection
speed
◦ Quality of copper lines also affects signal quality and speed

− Two speed measurements:


◦ Data moves downstream as it reaches you from another location
◦ Data moves upstream when you send or upload information

© CCI Learning Solutions Inc. 36


Connecting to the Internet
− Asymmetric DSL (ADSL)
− Service used by most homes and small businesses
− Divides frequencies available on line in unequal manner — more for
downloading than uploading
− Can provide maximum download speed of 8 Mbps (at 6,000 feet from central
office), and maximum upload speed of 640 Kbps
◦ In general usage, download speeds closer to 1.5 Mbps, and upload speeds vary
between 64 and 640 Kbps
◦ Some enhanced services such as ADSL2 increases download to 12 Mbps and
upstream to 1 Mbps, or ADSL2+ improves downstream to as much as 24 Mbps and
upstream to 3 Mbps­
− Symmetric DSL (SDSL) service used mainly by businesses
◦ Cannot use phone at same time, but upstream/downstream speeds the same

© CCI Learning Solutions Inc. 37


Connecting to the Internet
− Cable
− Cable TV (CATV) system uses coaxial (“coax”) cables to transmit signals,
connecting to Internet with cable modem
◦ Connects to provider’s cable modem termination system (CMTS)
◦ CMTS connects group of cable subscribers in neighborhood
to Internet
◦ Cable modem attaches to cable service via coaxial cable
using Ethernet port
◦ Performance slows down as new users come online

− Theoretically support speeds of around 30 Mbps


◦ Most providers offer services between 1–6 Mbps downstream, and 128–768 Kbps
upstream

© CCI Learning Solutions Inc. 38


Connecting to the Internet
− Broadband Routers
− DSL or cable modem provides connection to service provider's network, and
to Internet
◦ Considered routers as they connect computer or network to Internet, and often
referred to as residential gateways
− Allow several users to share one Internet
connection
◦ Include more than one Ethernet port (or support wireless connections)
◦ One port designated as WAN or Internet port
◦ Other Ethernet ports are LAN ports

© CCI Learning Solutions Inc. 39


Connecting to the Internet
− Other Factors Affecting Performance
− Network traffic – if several users share Internet connection simultaneously,
then available bandwidth shared
− Wireless vs. Wired connections – most wireless LANs transmit at 54 Mbps,
substantially slower than average 100 Mbps rate for wired Ethernet
connection
◦ Some older WLANs transmit and receive data at 11 Mbps
◦ Newer Wireless N LANs or 802.11n LANs operate at 300 Mbps

− Multiple open tabs – browsers provide for tabbed browsing, to have several
web pages open at one time
◦ Each open web page represents open connection with web server, and uses certain
amount of network resources

© CCI Learning Solutions Inc. 40


Addressing on the Internet
• IP addresses required if systems on network to communicate
− Must know IP address of computer with which to communicate
• Most people type URL into browser address bar
− Typical URL consists of protocol identifier and domain name
− Use DNS to find desired web server

© CCI Learning Solutions Inc. 41


Addressing on the Internet
• Domain Name System (DNS)
− Service that maps unique domain names to specific IP addresses
− Mappings stored on records in DNS database
− Resolves IP addresses into text-based names
− DNS Servers
− Servers on Internet whose sole function is to resolve domain names into IP
addresses
− If DNS server unreachable, cannot navigate to web site by entering URL in
browser address bar
◦ Can still reach site if you know its IP address

© CCI Learning Solutions Inc. 42


The Need for Security
• LAN is private network
− Systems within LAN can communicate with one another, but cannot
communicate with any system outside LAN or vice versa
• Once connected to WAN link, LAN connected to outside
− Systems inside can communicate with systems outside LAN, and systems
outside LAN can communicate with those inside LAN
− Makes systems inside LAN vulnerable to malicious activity
− Person attempting to gain unauthorized access to computer system known
as hacker

© CCI Learning Solutions Inc. 43


The Need for Security
• Private vs. Public
− Systems within LAN part of private network, and considered trusted
systems
− Any system outside LAN or connecting to LAN over Internet is not
untrusted
− Internet is not centrally controlled or owned and referred as "the public
network"
− No one can “police” Internet to protect people who use it
− Also referred to as “the open network” or “the untrusted network”
− In network diagrams, often represented by cloud as contents unknown

© CCI Learning Solutions Inc. 44


The Need for Security
− Authentication and Access Control
− Manage network resources and keep the network secure
− Authentication is process of verifying identity of user who logs on to system
or network
− Access control is process of controlling who may access particular network
resources or services
◦ Usually accomplished by associating specific permissions to each user account

− Most network security measures focused on preventing outsiders from


accessing LAN illegitimately

© CCI Learning Solutions Inc. 45


The Need for Security
• Firewalls/Gateways
− Security barrier controlling flow of information between Internet and
private network
− Can be dedicated computer system,
specialized firewall appliance, or
implemented on networking device
− Protects against malicious activity outside
network, and provides "door" so people
can communicate between secured network and open unsecured Internet
− Network firewall most commonly placed between LAN and Internet
− No computer on LAN actually connected to Internet, and any requests for
information must pass through firewall

© CCI Learning Solutions Inc. 46


The Need for Security
• Gateways and Packet Filtering
− Router is entry point into network, and all incoming traffic comes through
router
− Gateway is router that has been configured to protect network by
examining each packet coming in (or out) network
− Gateway can check each packet against a defined list of rules for what should
be allowed in and what should be rejected
− Use process called packet filtering to determine what should be allowed
into the network, and what should be rejected.
− Inspects each data packet as it arrives and then uses simple rules to determine
if packet should be allowed to pass through to network
− Fast and inexpensive, but not particularly flexible method, nor foolproof

© CCI Learning Solutions Inc. 47


The Need for Security
• Advanced Firewall Functions
Stateful Builds upon packet filters by having firewall maintain information
Inspection about state of each active connection. When new packet arrives,
filtering mechanism first checks to determine if packet is part of
current active and previously authorized connection. If not, then
firewall checks its rules and determines whether packet should be
allowed in.

Proxy service Replaces internal network IP addresses with single IP address


which multiple systems can use. Network address translation
(NAT) can effectively hide systems connected to internal network
from outside world.

© CCI Learning Solutions Inc. 48


The Need for Security
− Desktop Firewalls
− Known as personal firewalls
◦ Offer protection for individual system instead of entire network

− Offer many firewall features such as inspecting all incoming transmissions for
security threats
− When firewall used in conjunction with antivirus software, personal computer
very secure, provided user updates frequently
− Many operating systems now include built-in desktop firewall software

© CCI Learning Solutions Inc. 49


The Need for Security
− Firewall Ports
− Determine whether specific data packets should be allowed into network by
examining source and destination port of packet
− Computers use ports for communication, and ports numbered from 0 to 65,535
◦ Specific applications and services use specific port number

− One way to secure network is to block all incoming ports on firewall, and then
open only specific ports that correspond to types of communications network
administrator wants to allow into network
◦ If LAN users allowed to view web pages, then administrator must open port 80 on
firewall and then port 53 to locate web pages using DNS
◦ Configuration of firewall ports affects all communications coming into and going
out from LAN

© CCI Learning Solutions Inc. 50


The Need for Security
− Firewall Challenges
− Firewall settings can block access to particular web sites, or block streaming
audio or video from coming into network
− If corporate system behind firewall and have difficulty connecting to specific
Internet sites or services, may need to contact network administrator to adjust
firewall configuration
◦ Service or web site may conflict with organization's security policy

© CCI Learning Solutions Inc. 51


The Need for Security
• Virtual Private Networks (VPN)
− Connecting from outside network known as remote access
− Security especially important component as communication across public
network vulnerable to interception or eavesdropping
− Authentication: process of confirming identity of user or computer system
− Encryption: process of converting data into unreadable form of text, which
then requires decryption key to be read
− Access obtained using virtual private network (VPN) connection
− Encrypted connection between two computers
− Allow secure communications across long distances using Internet as pathway
for communication instead of dedicated private line

© CCI Learning Solutions Inc. 52


The Need for Security
− Make it possible for telecommuters and traveling employees to establish
secure connection to company network from outside company premises
− Also possible for company with several satellite offices to establish
secure connections between all locations
− Using VPN
− For network to support VPN connections, VPN server must be set up to
receive incoming connections
◦ User who wants VPN connection from remote location must install and launch VPN
client software to open connection with VPN server
◦ Users must log on with valid user name and password

© CCI Learning Solutions Inc. 53


The Need for Security
• Wireless Security
− As wireless networks use radio waves to send and receive information,
they are susceptible to eavesdropping and unauthorized access
− User names and passwords should never be sent over unencrypted wireless
communications
− Unauthorized user can obtain "free" Internet access through wireless access
point if do not secure it
− Wireless Encryption
− Encryption is process of converting data into unreadable form of text
− Decryption is process of converting encrypted data back into original
readable form

© CCI Learning Solutions Inc. 54


The Need for Security
− Encryption and decryption accomplished through keys
◦ Key is mathematical algorithm
◦ The more complex the key, the harder it is to decipher encrypted message without
access to key
− When configuring encryption on wireless access point, each client who wants
access to wireless network must present appropriate passphrase when first
connecting to access point
◦ Only wireless clients configured to supply correct passphrase granted access to
network, or are authenticated
◦ During authentication process, appropriate keys exchanged so that encrypted
transmissions can take place
◦ Should always use strongest encryption mechanism supported by wireless hardware
whenever possible

© CCI Learning Solutions Inc. 55


The Need for Security
Wired Equivalent Original security mechanism for wireless networks. WEP
Privacy (WEP) encrypts all data packets sent between client and access point,
but uses unencrypted exchanges during authentication process.
Today, WEP considered obsolete and administrators use more
advanced security schemes.

WiFi Protected WPA provides better security, without requiring wireless


Access (WPA) networking hardware be updated.

WiFi Protected Provides most secure encryption, but requires modern wireless
Access 2 (WPA2) equipment. All new wireless networking hardware supports
WPA2.

© CCI Learning Solutions Inc. 56


Network Troubleshooting
• Process of resolving problems by logically eliminating possible causes, and
then finding and correcting actual cause of problem
− Understanding how network hardware, network addressing and DNS work may
help troubleshoot some common Internet connectivity problems
• If successfully eliminate possible causes of problem at your end of
connection and still cannot connect to Internet, problem may lie with service
provider
− Call ISP to see if there is service disruption, or report one if they are unaware of
problem
− If cannot verify service disruption, will be connected to Help Desk professional

© CCI Learning Solutions Inc. 57


Network Troubleshooting
• Reviewing the Basics
− For any computer to participate on network, it needs valid IP address
− IP addresses allocated to ISPs, who in turn allocate them to subscribers
− IP address may be configured on computer manually, but generally leased to
hosts automatically through DHCP
− Other required addressing information includes default subnet mask and
address of the default gateway
− Subnet mask determines which network particular host resides
− Address of default gateway is address of device (usually router) that leads
outside network

© CCI Learning Solutions Inc. 58


Network Troubleshooting
− For computer to participate on IP network, needs network interface card
and transmission medium
− Network hosts connect to one another through switch, switching hub or
port in wall jack
− In home network settings, central connection device is often broadband
modem or router
− Domain Name System (DNS) is service for you to enter user-friendly
URLs instead of IP addresses into browser address bar
− To check if connected to network, use Network Sharing Center to view
what connections available and status of networks

© CCI Learning Solutions Inc. 59


Network Troubleshooting
• Troubleshooting Hardware Issues
− Indicator Lights
− Almost all networking devices include one or more indicator lights that relay
information about how device is performing
− Every NIC includes green light emitting diode (LED) that flashes
intermittently as information transferred to and from computer
◦ If unable to access network, first visually examine NIC to see if functioning

− Most hubs and switches include LED indicator for each port, and indicator
lights up when device properly connected to port

© CCI Learning Solutions Inc. 60


Network Troubleshooting
− Most broadband routers include green LED for each wired port, and indicator
lights up when device is plugged into port
◦ If experiencing connectivity problems, trace network cable to router and ensure
LED is lit on port where connected
◦ If not, unplug cable and plug it in again to create secure connection
◦ If port LED still does not light up, try connecting to different port

− If broadband router also functions as wireless access point, WLAN indicator


light will be illuminated when wireless function on
◦ If wireless device cannot find access point, make sure access point on

− Broadband modems also include indicator lights for: power on, sending
signal, receiving signal, PC activity, and Online
◦ Visually inspect modem to ensure all appropriate lights on

© CCI Learning Solutions Inc. 61


Network Troubleshooting
− Firmware Updates
− When direct connection, not uncommon for service provider to periodically
send firmware updates to modem
− Firmware updates affect how hardware functions
− If modem does not function correctly after installation of firmware update,
power off device and restart it
− No easy way to tell when firmware update installed
◦ If modem working properly and suddenly stops, try restarting it

− When restarting broadband modem, also restart any other networking


hardware devices connected

© CCI Learning Solutions Inc. 62


Network Troubleshooting
− Signal Quality Issues
− Transmission of network signals dependent on transmission medium
◦ Connections between wires in Ethernet cable and contacts in connector can
sometimes work loose, or wire may break somewhere in cable
◦ If suspect cable is damaged, replace it

− If experiencing network connectivity issues, check connections


− Environment in which a wireless device operates limits its range
− Wireless communications also subject to interference from other devices
operating in same frequency range
− To test what may be affecting connection to Internet try to connect to LAN
using Ethernet cable only

© CCI Learning Solutions Inc. 63


Network Troubleshooting
• Troubleshooting Addressing Issues
− To participate successfully on Internet, computer must be configured with
proper IP address, subnet mask and default gateway
− End users do not normally specify these settings, and seldom make
changes to them
− In most cases, computer automatically obtains these settings from DHCP
server
− Can check network configuration settings using utility called IPCONFIG

© CCI Learning Solutions Inc. 64


Network Troubleshooting
− To use IPCONFIG utility:

1. Click Start.
2. In Search box, type: cmd and press ENTER.
3. In command prompt window, type: ipconfig and press ENTER.
4. Look for line that begins "IPv4 Address …" to find three required settings.

© CCI Learning Solutions Inc. 65


Network Troubleshooting
− Can easily recognize two IPv4 addresses that indicate problem:
− 0.0.0.0 address is special initialization address system uses when trying to
obtain IP address from DHCP server
− If system using 169.254.x.x as IP address (with subnet mask 255.255.0.0),
unable to reach DHCP server and configured with IP address using Windows
Automatic Private IP Addressing (APIPA)
◦ APIPA address range (169.254.0.1 through 169.254.255.254) is range of private IP
addresses that cannot be used on Internet
◦ If system using initialization address or APIPA address, then system unable to
contact DHCP server on network
− Check first to ensure that network cable plugged in

© CCI Learning Solutions Inc. 66


Network Troubleshooting
− Testing Connectivity with Addresses
− Can ping specific addresses to help determine where break in connectivity
may lie
◦ If NIC and network cable functioning correctly, should successfully ping your own
IP address
◦ If NIC and cable good and network configuration settings correct, should
successfully ping other computer systems on local network, and should ping default
gateway
◦ If Internet connection functioning, ping your ISP or favorite web site by IP address

© CCI Learning Solutions Inc. 67


Network Troubleshooting
− To use ping utility:

1. Click Start.
2. In the Search box, type: cmd and press ENTER.
3. In command prompt window, type: ping [ip_address] (IP address of system
you are trying to reach) and press ENTER.
4. Look for reply messages to verify connectivity.
© CCI Learning Solutions Inc. 68
Network Troubleshooting
• Troubleshooting Security Settings
− Security settings can also cause connectivity issues.
− Wireless Security
− Most use encryption scheme to protect access to network and network
resources
− If having difficulty gaining access to wireless network, make sure you know
correct passphrase and that you are entering it correctly
− Participating on encrypted wireless network requires that client and access
point using same encryption scheme

© CCI Learning Solutions Inc. 69


Network Troubleshooting
− Firewall Configuration
− If at school or workplace and cannot use particular Internet applications or
cannot view videos from Internet, ask if applications blocked
− Depending on company security policy and ability to justify need to use
blocked applications, administrator may adjust firewall settings
− On home network, you decide what is allowed through firewall
◦ When install Internet-based programs, installation procedure often opens
appropriate ports on Windows firewall
− If experience problems using Internet-based applications, look on vendor's
web site for information on known issues concerning firewall settings and
then make appropriate changes

© CCI Learning Solutions Inc. 70


Lesson Summary
• the advantages of networking • analog and digital signaling
• common network speeds • methods for connecting to the
• common networking models Internet
• the role of TCP • the role of the domain name
system (DNS)
• local area networks (LANs)
• the need for security
• how wired and wireless
connections work • the role of firewalls and
gateways
• addresses used on the LAN
• the use of virtual private
• wide area networks (WANs)
networks (VPNs)
• basic troubleshooting techniques

© CCI Learning Solutions Inc. 71


Review Questions
1. Which of the following data transfer speeds is the fastest?
a. 3 Gbps
b. 300 Mbps
c. 300 Kbps
d. 3,000,000 bps

2. Which of the following statements is true of an IP address?


a. It is permanent.
b. It is burned onto a NIC by the manufacturer.
c. It identifies the network on which a host resides, and it identifies
the particular host on the network.
d. It is not required for Internet access.

© CCI Learning Solutions Inc. 72


Review Questions
3. Which of the following statements is true of a wide area network
(WAN)?
a. A WAN is usually confined to a small geographic area.
b. A WAN is formed when two or more LANs are connected using a public network.
c. A WAN is almost always faster than a LAN.
d. A WAN is confined to the local cabling you install in your home or office.

4. What do POTS, ISDN and leased lines have in common?


a. They all use circuit switching.
b. They all use packet switching.
c. They are all dial-up connections.
d. They are all direct connections.

© CCI Learning Solutions Inc. 73


Review Questions
5. The term broadband refers to:
a. any high-speed connection that uses circuit switching.
b. any high-speed connection that is always "on".
c. any high-speed dial-up connection.
d. any type of connection that provides access to the Internet.
6. Which of the following can improve browsing performance on a dial-up
connection?
a. Suppressing the display of images.
b. Opening multiple browser tabs to distribute the page loading task.
c. Sharing the dial-up Internet connection with several computers.
d. Opening an instant messaging application while browsing.
© CCI Learning Solutions Inc. 74
Review Questions
7. Which service enables users to access web sites by domain name instead of by IP address?
a. DHCP c. DSL
b. DNS d. APIPA
8. Which of the following statements accurately describes gateways and firewalls?
a. Gateways use packet filtering to protect a network; firewalls can use
packet filtering as well as more advanced techniques for controlling
traffic flow.
b. Firewalls use packet filtering to protect a network; gateways can use
packet filtering as well as more advanced techniques for controlling
traffic flow.
c. Firewalls protect network resources while gateways protect sensitive
information.
d. Gateways protect network resources while firewalls protect sensitive
information.

© CCI Learning Solutions Inc. 75


Review Questions
9. What does a virtual private network (VPN) provide?
a. A security barrier that blocks incoming communication requests.
b. Secure access into a private network from the outside.
c. Security for wireless networks.
d. An increase in web browsing performance.
10. Which wireless encryption scheme provides the strongest level of
protection?

a. WEP
c. WPA
b. WEP2
d. WPA2

© CCI Learning Solutions Inc. 76

You might also like