SlideShare a Scribd company logo
1 of 107
Chapter 8:
          Networks


  IT Essentials: PC Hardware and Software v4.0




ITE PC v4.0
Chapter 8                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   1
Purpose of this Presentation
          To provide to instructors an overview of Chapter 8:
           List of chapter objectives
           Overview of the chapter contents, including
              student worksheets
              student activities
              student labs

           Reflection/Activities for instructors to complete to
            prepare to teach
           Additional resources


ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   2
Chapter 8 Objectives
           8.1 Explain the principles of networking
           8.2 Describe types of networks
           8.3 Describe basic networking concepts and technologies
           8.4 Describe the physical components of a network
           8.5 Describe LAN topologies and architectures
           8.6 Identify standards organizations
           8.7 Identify Ethernet standards
           8.8 Explain OSI and TCP/IP data models
           8.9 Describe how to configure a NIC and a modem
           8.10 Identify names, purposes, and characteristics of other technologies used to
            establish connectivity
           8.11 Identify and apply common preventive maintenance techniques used for
            networks
           8.12 Troubleshoot a network
ITE PC v4.0
Chapter 8                                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   3
Chapter 8 Worksheets, Activities, and Labs
           8.1.2 Activity: Advantages and Disadvantages of Networking
           8.2.3 Activity: Network Types
           8.3.2 Worksheet: Identify IP Address Classes
           8.3.4 Activity: Network Protocols
           8.8.3 Activity: OSI Model
           8.9.1 Worksheet: Internet Search for NIC Drivers
           8.9.2 Lab: Configure an Ethernet NIC to use DHCP
           8.10.3 Worksheet: Answer Broadband Questions
           8.12.2 Worksheet: Diagnose a Network Problem

ITE PC v4.0
Chapter 8                                   © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   4
Introduction
           Chapter 8 is an overview of network principles,
            standards, and purposes
           It covers the following types of networks:
              Local Area Network (LAN)
              Wide Area Network (WAN)
              Wireless LAN (WLAN)

           These topics are covered:
              Network topologies, protocols, and logical models
              Hardware needed to create a network
              Configuration, troubleshooting, and preventive maintenance
              Network software, communication methods, and hardware
              relationships
ITE PC v4.0
Chapter 8                                 © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   5
Principles of Networking
           Networks are systems that are formed by links.
           People use different types of networks every day:
              Mail delivery system
              Telephone system
              Public transportation system
              Corporate computer network
              The Internet

           Computers can be linked by networks to share data and
            resources.
           A network can be as simple as two computers
            connected by a single cable or as complex as hundreds
            of computers connected to devices that control the flow
ITE PC v4.0
            of information.
Chapter 8                                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   6
Computer Networks
           Network devices include:
              Desktop and laptop computers
              Printers and scanners
              PDAs and Smartphones
              File and print servers
           Resources shared across networks include:
              Services, such as printing or scanning
              Storage devices, such as hard drives or optical drives
              Applications, such as databases
           Different types of network media:
              Copper cabling
              Fiber-optic cabling
              Wireless connection
ITE PC v4.0
Chapter 8                                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   7
Benefits of Networking
                                                 Fewer peripherals
                                                  needed
                                                 Increased
                                                  communication
                                                  capabilities
                                                 Avoid file duplication
                                                  and corruption
                                                 Lower cost licensing
                                                 Centralized
                                                  administration
                                                 Conserve resources
ITE PC v4.0
Chapter 8                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   8
Types of Networks
          A computer network is identified by:
           The type of media used to connect the devices
           The type of networking
            devices used
           How the resources are
            managed
           How the network is
            organized
           How the data is stored
           The area it serves

ITE PC v4.0
Chapter 8                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   9
Local Area Network (LAN)
                              A group of interconnected
                               computers that is under the
                               same administrative control.
                              Can be as small as a single
                               local network installed in a
                               home or small office.
                              Can consist of
                               interconnected local
                               networks consisting of many
                               hundreds of hosts, installed
                               in multiple buildings and
                               locations.
ITE PC v4.0
Chapter 8                   © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   10
Wide Area Network (WAN)
           A WAN connects LANs in geographically separated
            locations.
           A WAN covers a much larger
            area than a LAN.
          The Internet is a large WAN.
           Telecommunications service
            providers (TSP) are used to
            interconnect these LANs at
            different locations.



ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   11
Wireless LAN (WLAN)
               Wireless devices are used to transmit and receive
                data using radio waves.
               Wireless devices connect to access points within a
                specified area.
               Access points connect to the
                network using copper cabling.
               WLAN coverage can be limited
                to the area of a room, or can
                have greater range.
               You can share resources such
                as files and printers, and access
                the Internet on a WLAN.
ITE PC v4.0
Chapter 8                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   12
Peer-to-Peer Networking
          Share files, send messages, and print to a shared printer.
          Each computer has similar capabilities and
           responsibilities.
          Each user decides which data and devices to share.
          No central point of control in the network.
          Best if there are ten or fewer computers.




ITE PC v4.0
Chapter 8                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   13
Disadvantages of Peer-to-Peer
           Without centralized network administration, it is difficult
            to determine who controls network resources.
           Without centralized security, each computer must use
            separate security measures for data protection.
           More complex and difficult to manage as the number
            of computers on the network increases.
           Without centralized data storage, data backups must
            be performed by users.




ITE PC v4.0
Chapter 8                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   14
Client/Server Network
          Client/server network model provides security and
           control for the network.
          Client requests information or services from the server.
          Server provides the requested information or service.
          Servers are maintained by network administrators.
              Data backups and security measures
              Control of user access to network resources
          Centralized storage and services include:
              Data stored on a centralized file server
              Shared printers managed by a print server
              Users have proper permissions to access data or printers
ITE PC v4.0
Chapter 8                                   © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   15
Networking Concepts and Technologies
           A computer technician is required to configure and
            troubleshoot computers on a network.
           A computer technician should understand IP
            addressing, protocols, and other network concepts.




ITE PC v4.0
Chapter 8                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   16
Bandwidth
           amount of data that can
            be transmitted within a
            fixed time period
           measured in bits per
            second and is usually
            denoted by the following:
                bps - bits per second
                Kbps - kilobits per
              second
                Mbps - megabits per
              second


ITE PC v4.0
Chapter 8                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   17
Three Modes of Transmission
          Data is transmitted in one of three modes:
             Simplex (Unidirectional transmission) is a single, one-way
              transmission.
               Example: The signal sent from a TV station to your TV.
             Half-duplex allows data to flow in one direction at a time.
               Simultaneous transmission in two directions is not allowed.
               Example: Two-way radios, police or emergency mobile radios
             Full-duplex allows data to flow in both directions at the same
              time.
               Bandwidth is measured in only one direction. 100 Mbps full-duplex
                  means a bandwidth of 100 Mbps in each direction.
               Broadband technologies, such as digital subscriber line (DSL) and
                  cable, operate in full-duplex mode.
ITE PC v4.0
Chapter 8                                      © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   18
IP Address
           An IP address is a unique number that is used to identify a
            network device.
           An IP address is represented as a 32-bit binary number,
            divided into four octets (groups of eight bits):
              Example: 10111110.01100100.00000101.00110110
           An IP address is also represented in a dotted decimal
            format.
              Example: 190.100.5.54
           When a host is configured with an IP address, it is entered as
            a dotted decimal number, such as 192.168.1.5.
           Unique IP addresses on a network ensure that data can be
            sent to and received from the correct network device.
ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   19
IP Address Classes
           Class A
              Large networks, implemented by large companies and some
              countries
           Class B
              Medium-sized networks, implemented by universities
           Class C
              Small networks, implemented by ISP for customer subscriptions
           Class D
              Special use for multicasting
           Class E
              Used for experimental testing
ITE PC v4.0
Chapter 8                                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   20
Subnet Masks
           Used to indicate the network portion of an IP address
           Is a dotted decimal number
           Usually, all hosts within a broadcast domain of a LAN
            (bounded by routers) use the same subnet mask.
           The default subnet masks for three classes of IP addresses:
              255.0.0.0 is the subnet mask for Class A
              255.255.0.0 is the subnet mask for Class B
              255.255.255.0 is the subnet mask for Class C
           If an organization owns one Class B network but needs to
            provide IP addresses for four LANs, the organization will
            subdivide the Class B network into four smaller parts by using
            subnetting, which is a logical division of a network. The subnet
            mask specifies how it is subdivided.
ITE PC v4.0
Chapter 8                                 © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   21
IP Address Configuration
           Manual configuration
              Manually configure each device with the proper IP address and
              subnet mask.
           Dynamic configuration
              A Dynamic Host Configuration Protocol (DHCP) server
              automatically assigns IP addresses to network hosts.
           Network Interface Card (NIC) is the hardware that enables a
            computer to connect to a network and it has two addresses:
              The IP address is a logical address that can be changed.
              The Media Access Control (MAC) address is "burned-in" or
              permanently programmed into the NIC when manufactured.
              The MAC address cannot be changed.

ITE PC v4.0
Chapter 8                                 © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   22
Dynamic Host Configuration Protocol
          (DHCP)
                              DHCP automatically
                               provides computers with an
                               IP address.
                              The DHCP server can
                               assign these to hosts:
                                        IP address
                                        Subnet mask
                                        Default gateway
                                        Domain Name System (DNS)
                                        server address



ITE PC v4.0
Chapter 8                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   23
DHCP Process and Advantages
          DHCP process:
          2. DHCP server receives a request from a host.
          3. Server selects IP address information from a database.
          4. Server offers the addresses to requesting host.
          5. If the host accepts the offer, the server leases the IP
             address for a specific period of time.
          Advantages of DHCP:
             Simplifies the administration of a network
             Reduces the possibility of assigning duplicate or invalid
              addresses


ITE PC v4.0
Chapter 8                                 © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   24
Configure Host to Use DHCP
          Configure the host to "Obtain an IP address automatically"
           in the TCP/IP properties of the NIC configuration
           window




ITE PC v4.0
Chapter 8                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   25
Internet Protocols
           A protocol is a set of rules.
           Internet protocols are sets of rules governing communication
            within and between computers on a network.
           Many protocols consist of a suite (or group) of protocols
            stacked in layers. These layers depend on the operation of
            the other layers in the suite to function properly.
           The main functions of protocols:
              Identifying errors
              Compressing the data
              Deciding how data is to be sent
              Addressing data
              Deciding how to announce sent and received data
ITE PC v4.0
Chapter 8                                   © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   26
Common Network Protocols
          Protocols used for browsing the web, sending and receiving
           e-mail, and transferring data files
                                                          Description
               TCP/IP    A protocol used to transport data on the Internet.
              NETBEUI    A small, fast protocol designed for a workgroup network that
              NETBIOS    requires no connection to the Internet.
               IPX and
                         A protocol used to transport data on a Novell Netware network.
                 SPX
              HTTP and
                         A protocol that defines how files are exchanged on the Web.
                HTTPS
                 FTP     A protocol that provides services for file transfer and manipulation.
                SSH      A protocol that is used to connect computers together securely.
               Telnet    A protocol that uses a text-based connection to a remote computer.
                POP      A protocol used to download email messages from an email server.
               IMAP      A protocol used to download email messages from an email server.
               SMTP      A protocol used to send mail in a TCP/IP network.
ITE PC v4.0
Chapter 8                                       © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   27
Internet Control Message Protocol (ICMP)
           Internet Control Message Protocol (ICMP) is used by
            devices on a network to send control and error
            messages to computers and servers.
           PING (Packet Internet Groper) is a simple command
            line utility used to test connections between computers
              Used to determine whether a specific IP address is accessible.
              Used with either the hostname or the IP address.
              Works by sending an ICMP echo request to a destination
              computer.
              Receiving device sends back an ICMP echo reply message.



ITE PC v4.0
Chapter 8                                 © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   28
Ping Command Switches




          These command line switches (options) can be used
           with the ping command.
ITE PC v4.0
Chapter 8                           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   29
Output of the Ping Command
           Four ICMP echo requests (pings) are sent to the
            destination computer to determine the reliability and
            reachability of the destination computer.




ITE PC v4.0
Chapter 8                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   30
Physical Network Components
         Network devices:
              Computers
              Hubs
              Switches
              Routers
              Wireless access points
         Network media:
              Twisted-pair copper cabling
              Fiber-optic cabling
              Radio waves

ITE PC v4.0
Chapter 8                                   © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   31
Hubs




           Extend the range of a signal by receiving then
            regenerating it and sending it out all other ports
           Traffic is sent out all ports of the hub
           Allow a lot of collisions on the network segment and
            are often not a good solution
           Also called concentrators because they serve as a
            central connection point for a LAN
ITE PC v4.0
Chapter 8                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   32
Bridges and Switches
           A packet, along with its MAC address information, is
            called a frame.
           LANs are often divided into sections called segments
            bounded by bridges.
           A bridge has the intelligence to determine if an
            incoming frame is to be sent to a different segment, or
            dropped. A bridge has two ports.
           A switch (multiport bridge) has
            several ports and refers to a
            table of MAC addresses to
            determine which port to use to
            forward the frame.
ITE PC v4.0
Chapter 8                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   33
Routers




           Routers are devices that connect entire networks to
            each other.
              Use IP addresses to forward packets to other networks.
              Can be a computer with special network software installed.
              Can be a device built by network equipment manufacturers.
              Contain tables of IP addresses along with optimal routes to
              other networks.


ITE PC v4.0
Chapter 8                                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   34
Wireless Access Points
                             Provide network access to
                              wireless devices such as
                              laptops and PDAs.
                             Use radio waves to
                              communicate with radios in
                              computers, PDAs, and other
                              wireless access points.
                             Have limited range of
                              coverage.



ITE PC v4.0
Chapter 8                   © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   35
Multipurpose Devices
           Perform more than one function.
           More convenient to purchase and
            configure just one device.
           Combines the functions of a switch,
            a router and a wireless access point
            into one device.
           The Linksys 300N is an example of a
            multipurpose device.




ITE PC v4.0
Chapter 8                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   36
Twisted-Pair Cabling
           A pair of twisted wires forms a circuit that transmits data.
           The twisted wires provide protection against crosstalk
            (electrical noise) because of the cancellation effect.

                                        Pairs of copper wires are encased
                                        in color-coded plastic insulation
                                        and twisted together.
                                        An outer jacket, called poly-vinyl
                                        chloride (PVC), protects the
                                        bundles of twisted pairs.




ITE PC v4.0
Chapter 8                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   37
Two Basic Types of Twisted-Pair
          Cables
           Unshielded twisted-pair (UTP)
              Has two or four pairs of wires
              Relies on the cancellation effect for reduction of interference
              caused by electromagnetic interface (EMI) and radio
              frequency interference (RFI)
              Most commonly used cabling in networks
              Has a range of 328 ft (100 meters)
           Shielded twisted-pair (STP)
              Each pair is wrapped in metallic foil to better shield the wires
              from electrical noise and then the four pairs of wires are then
              wrapped in an overall metallic braid or foil.
              Reduces electrical noise from within the cable.
              Reduces EMI and RFI from outside the cable.
ITE PC v4.0
Chapter 8                                   © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   38
Category Rating
           UTP comes in several categories that are based on two
            factors:
              The number of wires in the cable
              The number of twists in those wires
           Category 3 is used for telephone connections.
           Category 5 and Category 5e have are the most
            common network cables used.
           Category 6 cable has higher data rate than the Cat 5
            cables.



ITE PC v4.0
Chapter 8                                 © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   39
Coaxial Cable
           A copper-cored network cable surrounded by a heavy
            shielding

           Types of coaxial cable:
              Thicknet or 10Base5 - Coax cable that was used in networks
              and operated at 10 megabits per second with a maximum
              length of 500 m
              Thinnet or 10Base2 - Coax cable that was used in networks
              and operated at 10 megabits per second with a maximum
              length of 185 m
              RG-59 - Most commonly used for cable television in the US
              RG-6 - Higher quality cable than RG-59 with more bandwidth
              and less susceptibility to interference

ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   40
Fiber-Optic Cable
                      A glass or plastic strand that transmits
                       information using light and is made up of
                       one or more optical fibers enclosed together
                       in a sheath or jacket.
                      Not affected by electromagnetic or radio
                       frequency interference.
                      Signals are clearer, can go farther, and have
                       greater bandwidth than with copper cable.
                      Usually more expensive than copper cabling
                       and the connectors are more costly and
                       harder to assemble.
                      Two types of glass fiber-optic cable:
                         Multimode and Single-mode
ITE PC v4.0
Chapter 8                         © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   41
Two Types of LAN Topologies

                            Physical topology is the
                             physical layout of the
                             components on the
                             network



                            Logical topology
                             determines how the hosts
                             access the medium to
                             communicate across the
                             network
ITE PC v4.0
Chapter 8                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   42
LAN Physical Topologies
         A physical topology defines the way in which computers,
           printers, and other
           devices are
           connected to a
           network.
          Bus
          Ring
          Star
          Hierarchical star
          Mesh


ITE PC v4.0
Chapter 8                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   43
Bus Topology
           Each computer connects
            to a common cable
           Cable connects one
            computer to the next
           Ends of the cable have a terminator installed to
            prevent signal reflections and network errors
           Only one computer can transmit data at a time or
            frames will collide and be destroyed
           Bus topology is rarely used today. Possibly suitable for
            a home office or small business with few hosts


ITE PC v4.0
Chapter 8                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   44
Ring Topology
          Hosts are connected in a physical ring or circle.
          The ring has no beginning or end, so the cable does not
           need to be terminated.
          A special frame, a token, travels
           around the ring, stopping at each
           host.
          The advantage of a ring topology
           is that there are no collisions.
          There are two types of ring
           topologies:
              Single-ring and Dual-ring

ITE PC v4.0
Chapter 8                                 © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   45
Star Topology
           Has a central connection point:
            a hub, switch, or router
           Hosts connect directly to the
            central point with a cable
           Costs more to implement than
            the bus topology because more
            cable is used, and a central
            device is needed
           Easy to troubleshoot, since each host is connected to
            the central device with its own wire.


ITE PC v4.0
Chapter 8                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   46
Hierarchical or Extended Star Topology
           A star network with an additional networking device
            connected to the main networking device to increase
            the size of the network.
           Used for larger networks




ITE PC v4.0
Chapter 8                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   47
Mesh Topology
           Connects all devices to each other
           Failure of any cable will not affect the network
           Used in WANs that interconnect LANs
           Expensive and difficult to install
            because of the amount of cable
            needed
           The Internet is an example of
            a mesh topology
           Often used by governments
            when data must be available
            in the event of a partial network
            failure
ITE PC v4.0
Chapter 8                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   48
Logical Topologies
          The two most common types of logical topologies are
           broadcast and token passing.
           In a broadcast topology, there is no order that the
            hosts must follow to use the network – it is first come,
            first served for transmitting data on the network.
           Token passing controls network access by passing an
            electronic token sequentially to each host. When a host
            receives the token, it can send data on the network. If
            the host has no data to send, it passes the token to the
            next host and the process repeats itself.


ITE PC v4.0
Chapter 8                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   49
LAN Architecture
           Is the overall structure of a computer or communication
            system.
           Designed for a specific use and have different speeds
            and capabilities.
           Describes both the physical and logical topologies used
            in a network.
           The three most common LAN architectures:
              Ethernet
              Token Ring
              Fiber-Distributed
              Data Interface (FDDI)

ITE PC v4.0
Chapter 8                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   50
Ethernet
           Based on the IEEE 802.3 standard, which specifies
            that a network use the Carrier Sense Multiple Access
            with the Collision Detection (CSMA/CD) access control
            method.
              Hosts access the network using the first come, first served
              broadcast topology method to transmit data.
           Standard transfer rates
              10 Mbps (Ethernet) “10Base-T”
              100 Mbps (FastEthernet) “100Base-T”
              1000 Mbps = 1 Gbps (Gigabit Ethernet) “1000Base-T”



ITE PC v4.0
Chapter 8                                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   51
Token Ring
          Reliable network architecture
          Originally developed by IBM
          Based on the token-passing
           access control method
          Often integrated with IBM
           mainframe systems
          Used with smaller computers and mainframes
          Physically, a star-wired ring because the outer appearance
           of the network design is a star
          Inside the device, wiring forms a circular data path,
           creating a logical ring
ITE PC v4.0
Chapter 8                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   52
Fiber Distributed Data Interface (FDDI)
           A type of Token Ring network
           Often used for LANs, connecting several buildings in an
            office complex or on a university campus
           Runs on fiber-optic cable
           High-speed performance combined with token-passing
            advantage
           Runs at 100 Mbps with a primary and secondary ring
            topology
           Normally, traffic flows only on the primary ring and uses
            a secondary ring is a backup.
           FDDI dual ring supports up to 500 computers per ring
ITE PC v4.0
Chapter 8                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   53
Standards Organizations
                       Name                           Type                                  Standards                     Established

              ITU Telecommunication         one of the three Sectors of             Standards covering all
                                                                                                                         Became ITU-T in
  ITU-T        Standardization Sector            the International                         fields of
                                                                                                                             1992
                    (formerly CCITT)        Telecommunication Union                  telecommunications


                                                                                    Standards for the
              Institute of Electrical and     A non-profit, technical
   IEEE         Electronics Engineers        professional association
                                                                                 computer and electronics                         1884
                                                                                        industry

                   International             A network of the national           Promote the development
    ISO           Organization for          standards institutes of 157          of international standards                       1947
                  Standardization                   countries                            agreements
                                                                                    Oversees the technical
                Internet Architecture       A committee; an advisory                  and engineering                   1979; first named
    IAB                Board                         body                            development of the                       ICCB
                                                                                          Internet
                    International                                                     Standards for all
    IEC           Electrotechnical             Global organization               electrical, electronic, and                      1906
                    Commission                                                      related technologies

                 American National              Private, non-profit                 Seeks to establish
   ANSI          Standards Institute               organization                  consensus among groups
                                                                                                                                  1918

                Telecommunications                                                                                          After the
               Industry Association /                                              Standards for voice and             deregulation of the
TIA/EIA         Electronic Industries
                                               Trade associations
                                                                                    data wiring for LANs                 U.S. telephone
ITE PC v4.0           Alliance                                                                                          industry in 1984
Chapter 8                                                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public              54
Ethernet Standards
              Ethernet protocols describe the rules that control how
               communication occurs on an Ethernet network.
               The 802.2 standard defines how a device addresses
                other devices on the medium.
               The 802.3 standard defines
                the methodology that devices
                must use when they use the
                media.
               The 802.11x standards define
                how wireless devices
                communicate using radio
                waves.
ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   55
Cabled Ethernet Standards
          IEEE 802.3 Ethernet standard specifies that a network implement
           the CSMA/CD access control method.
          In CSMA/CD operation:
              All end stations "listen" to the network wire for clearance to send data.
              When the end station detects that no other host is transmitting, the
              end station will attempt to send data.
              If no other station sends any data at the same time, this transmission
              will arrive at the destination computer successfully.
              If another end station transmits at the same time, a collision will occur
              on the network media.
              The first station that detects the collision, sends out a jam signal to tell
              all stations to stop transmitting and to run a backoff algorithm.
              All stations stop transmitting and re-try after a random period of time.

ITE PC v4.0
Chapter 8                                        © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   56
10BASE-T
         10BASE-T is an Ethernet technology that uses a star topology.
              The ten (10) represents a speed of 10 Mbps.
              BASE represents baseband transmission.
              The T represents twisted-pair cabling.
         Advantages of 10BASE-T:
              Installation is inexpensive compared to fiber-optic installation.
              Cables are thin, flexible, and easier to install than coaxial
              cabling.
              Equipment and cables are easy to upgrade.
         Disadvantages of 10BASE-T:
              The maximum length for a 10BASE-T segment is 328 ft (100 m).
              Cables are susceptible to Electromagnetic Interference (EMI).
ITE PC v4.0
Chapter 8                                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   57
100BASE-TX “FastEthernet”
          Has a theoretical bandwidth of 100 Mbps.
          The "X" indicates different types of copper and fiber-optic
           can be used.
          Advantages of 100BASE-TX:
              Transfer rates of 100BASE-TX are ten times that of 10BASE-T
              100BASE-X uses twisted-pair, inexpensive and easy to install
          Disadvantages of 100BASE-TX:
              Maximum length for a 100BASE-TX segment is 329 ft (100 m).
              Cables are susceptible to Electromagnetic Interference (EMI).



ITE PC v4.0
Chapter 8                                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   58
1000BASE-TX “Gigabit Ethernet”
           Advantages of 1000BASE-T:
              1 Gbps is ten times faster than Fast Ethernet and 100 times
              faster than Ethernet.
              Increased speed makes it possible to implement bandwidth-
              intensive applications, such as live video.
              The 1000BASE-T architecture has interoperability with 10BASE-
              T and 100BASE-TX.
           Disadvantages of 1000BASE-T:
              Maximum length for a 1000BASE-T segment is 328 ft (100 m).
              It is susceptible to interference.
              Gigabit NICs and Switches are expensive.
              Additional equipment is required.
ITE PC v4.0
Chapter 8                                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   59
Wireless Ethernet Standards
           IEEE 802.11 is the standard that specifies connectivity
            for wireless networks.
           Wi-Fi (wireless fidelity), refers to the 802.11 family
                       802.11 (the original specification)
                       802.11b
                       802.11a
                       802.11g
                       802.11n
              These protocols specify the frequencies, speeds, and other
              capabilities of the different Wi-Fi standards.



ITE PC v4.0
Chapter 8                                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   60
IEEE 802.11a WLAN Standard
               Allows data rates as high as 54 Mbps
               Devices operate in the 5 GHz radio frequency range
               Avoids some interference issues of 802.11b
               802.11a is not backward compatible to 802.11b
               Dual mode wireless NICs are available
               802.11a has a range of approximately 100 ft (30 m)




ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   61
IEEE 802.11b WLAN Standard
           Operates in the 2.4 GHz frequency range
           Maximum theoretical data rate of 11 Mbps, but typically
            about 6.5 Mbps
           Average range of approximately 100 ft (30 m) at 11
            Mbps and 295 ft (90 m) at 1 Mbps
           Range fluctuates depending on the operational speed.
           Signal quality dictates the operational speed of 802.11b.
           Bluetooth devices, cordless phones, and even
            microwave ovens operate in the 2.4 GHz band, possibly
            causing interference.


ITE PC v4.0
Chapter 8                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   62
IEEE 802.11g and 802.11n
          802.11g
              Allows data rates as high as 54 Mbps
              Operates in the same 2.4 GHz spectrum as 802.11b
              802.11g is backward compatible with 802.11b
              Interoperability among all speeds (a, b, g) exists
              Average range of approximately 100 ft (30 m)
          802.11n
              Has a theoretical bandwidth of 540 Mbps
              Operates in either the 2.4 GHz or 5 GHz frequency range
              Maximum range of 164 ft (50 m)
              Expected approval for 802.11n is April 2008 or earlier
ITE PC v4.0
Chapter 8                                   © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   63
Wireless Ethernet Standards
                    Bandwidth       Frequency                Range                             Interoperability

                                                                                              Not interoperable with
                                                          100 feet
   802.11a          Up to 54 Mbps   5 GHz band
                                                         (30 meters)
                                                                                               802.11b, 802.11g, or
                                                                                                      802.11n

                                                          100 feet                              Interoperable with
   802.11b          Up to 11 Mbps   2.4 GHz band
                                                         (30 meters)                                 802.11g


                                                          100 feet                              Interoperable with
   802.11g          Up to 54 Mbps   2.4 GHz band
                                                         (30 meters)                                 802.11b


   802.11n                                                164 feet                             Interoperable with
                    Up to 540 Mbps 2.4 GHz band
   (Pre-standard)                                        (50 meters)                          802.11b and 802.11g

                                    2.4 GHz band
   802.15.1          Up to 2 Mbps     or 5 GHz
                                                  30 feet                                     Not interoperable with
   Bluetooth                                     (10 meters)                                    any other 802.11
                                        band
ITE PC v4.0
Chapter 8                                   © 2007 Cisco Systems, Inc. All rights reserved.          Cisco Public      64
OSI and TCP/IP Data Models
           Architectural model
              Separates functions of protocols into manageable layers
              Each layer performs a specific function in network
              communication
           TCP/IP model
              A four-layer model that explains the TCP/IP suite of protocols
              TCP/IP is the dominant standard for transporting data across
              networks
           Open Systems Interconnect (OSI) model
              Standards defining how devices communicate on a network
              Ensures interoperability between network devices

ITE PC v4.0
Chapter 8                                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   65
The TCP/IP Reference Model
          Frame of reference used to develop the Internet's protocols
          Consists of layers that perform functions necessary to
           prepare data for transmission over a network

                                  Description                                                   Protocols
                                                                                               HTTP, HTML,
              Provides network services to user
  Application applications                                                                  Telnet, FTP, SMTP,
                                                                                                    DNS
                   Provides end-to-end management of data
  Transport        and divides data into segments
                                                                                                   TCP, UDP

                   Provides connectivity between hosts in the
  Internet         network
                                                                                            IP, ICMP, RIP, ARP

  Network          Describes the standards that hosts use to
  Access           access the physical media
ITE PC v4.0
Chapter 8                                 © 2007 Cisco Systems, Inc. All rights reserved.     Cisco Public       66
The OSI Model
          The OSI model is an industry standard framework that is
           used to divide network communications into seven
           layers.
          Although other models exist, most network vendors
           today build their products using this framework.
          A protocol stack is a system that implements protocol
           behavior using a series of layers.
              Protocol stacks can be implemented either in hardware or
              software, or in a combination of both.
              Typically, only the lower layers are implemented in hardware,
              and the higher layers are implemented in software.


ITE PC v4.0
Chapter 8                                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   67
The OSI Model
                     Layer                                   Description
     Application       7     Responsible for network services to applications
                             Transforms data formats to provide a standard interface
     Presentation      6     for the Application layer
                             Establishes, manages and terminates the connections
     Session           5     between the local and remote application
                             Provides reliable transport and flow control across a
     Transport         4     network
                             Responsible for logical addressing and the domain of
     Network           3     routing
                             Provides physical addressing and media access
     Data Link         2     procedures
                             Defines all the electrical and physical specifications for
     Physical          1     devices

              Remember the OSI layers with this mnemonic:
ITE PC v4.0
                   "Please Do Not Throw Sausage Pizza Away"
Chapter 8                                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   68
Compare OSI and TCP/IP Models




ITE PC v4.0
Chapter 8                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   69
Configuring a NIC and a Modem
           Install the NIC and the driver.
                                                                           NIC
              If necessary, download an updated driver from the
              manufacturer.
           Connect the computer to
            the network.
           Also, you may need to
            install a modem to
            connect to the Internet.
                                                                                            Modem



ITE PC v4.0
Chapter 8                                 © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   70
Install or Update a NIC Driver
           Manufacturers publish new driver software for NICs
              May enhance the functionality of the NIC
              May be needed for operating system compatibility
           Install a new driver
              Disable virus protection software
              Install only one driver at a time
              Close all applications that are running so that they are not
              using any files associated with the driver update.
              Visit the manufacturer's website and download a self-
              extracting executable driver file that will automatically
              install or update the driver

ITE PC v4.0
Chapter 8                                 © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   71
Install or Update a NIC Driver
                              Alternatively, you can click the
                               Update Driver button in the
                               toolbar of the Device
                               Manager.
                              After updating the driver,
                               reboot the computer.
                              If a new NIC driver does not
                               perform as expected after it
                               has been installed, the driver
                               can be uninstalled, or rolled
                               back, to the previous driver.

ITE PC v4.0
Chapter 8                     © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   72
Attach Computer to Existing Network
           Plug a network cable into the
            network port on the computer.
           Plug the other end into the
            network device or wall jack.
           After connecting the network
            cable, look at the LEDs, or link
            lights, next to the Ethernet port
            on the NIC.
           If there is no activity, you may
            have to replace a faulty cable,
            a faulty hub port, or even a
            faulty NIC to correct the
            problem.
ITE PC v4.0
Chapter 8                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   73
Configure the NIC
           The computer will now need an IP address.
              If the computer does not acquire an IP address from a DHCP
              server, you will need to enter a unique IP address in the TCP/IP
              properties of the NIC.
              Click Start > Control Panel > Network Connections > Local
              Area Connection
           Every NIC must be configured with the following information:
              The same protocol must be implemented between any two
              computers that communicate on the same network.
              The IP address must be unique to each device and can be
              configured manually or dynamically.
              The MAC address is a unique address assigned by the
              manufacturer and cannot be changed.
ITE PC v4.0
Chapter 8                                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   74
What is the Assigned IP Address?
          If you do not know your IP address yet, use the ipconfig
             program, to find it.




ITE PC v4.0
Chapter 8                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   75
Test Connectivity Using Ping
           Ping your own IP address to make sure your NIC is
            working properly.
           Ping your default gateway or another computer on your
            network.
           Ping a popular website.
           If you cannot ping one
            of these items, you may
            need to begin
            troubleshooting.




ITE PC v4.0
Chapter 8                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   76
Modem Installation
          A modem is an electronic device that transfers data
           between one computer and another using analog signals
           over a telephone line.
              A transmitting modem converts digital data to analog signals,
              called modulation.
              The receiving modem reconverts the analog signals back to
              digital data, called demodulation.
          An internal modem plugs into an expansion slot on the
           motherboard and a software driver is installed.
          External modems connect to a computer through the
           serial and USB ports and also require a software driver.


ITE PC v4.0
Chapter 8                                  © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   77
Dial-up Networking (DUN)
           When computers use the public telephone system to
            communicate, it is called dial-up networking (DUN).
           Modems communicate with each other using audio tone
            signals. DUN creates a Point-to-Point Protocol (PPP)
            connection between two computers over a phone line.
           After the line connection has been established, a
            "handshaking sequence" takes place between the two
            modems and the computers.
           The digital signals from the computers must be converted to
            an analog signal to travel across telephone lines. They are
            converted back to the digital form, 1s and 0s, by the
            receiving modem so that the receiving computer can process
            the data.
ITE PC v4.0
Chapter 8                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   78
AT Commands
               AT (“Attention”) Commands - commands for modems
                            Function
                   AT
                   Most modem software uses precedes all modem action commands
                            Attention code that the Hayes-compatible command
                   set.
                   AP       Dial the phone number, xxxxxxx, using pulse dialing

               The AT commandphoneis usedxxxxxxx, using tonehang up,
              ATDT xxxxxxx Dial the set number, to issue dial, dialing
                reset, and other instructions to the modem.
                  ATA       Answer the phone immediately
                  ATHO modem user manuals list the AT command set.
                   Most    Hang up the phone immediately
                   ATZ     Reset the modem to its power up settings
               The Standard Hayes compatible code to dial is
                  ATF
                ATDxxxxxxxReset modem parameters and settings to the factory defaults
                 AT+++         Break the signal, change from data mode to command mode
                   Usually no spaces in an AT string.
                    P         Signifies pulse dialing
                   The "x" signifies thetone dialing
                                         number dialed.
                    T         Signifies
                   Seven digits for a local callmodem will wait for long-distance.
                    W         Indicates that the and 11 digits

ITE PC v4.0
Chapter 8                                         © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   79
Other Types of Connectivity
           Phone, cable, satellite, and private telecommunications
            companies provide Internet connections.
           In the 1990s, low-speed modems used the plain old
            telephone system (POTS) to send and receive data.
           Today, many businesses and home users have switched
            to high-speed Internet connections, which allows for
            transmission of data, voice and video.




ITE PC v4.0
Chapter 8                            © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   80
Integrated Services Digital Network (ISDN)
           A standard for sending voice, video, and data over telephone
            wires.
           Provides higher-quality voice and higher-speed data transfer
            than traditional analog telephone service.
           Three services offered by ISDN digital connections: Basic
            Rate Interface (BRI), Primary Rate Interface (PRI), and
            Broadband ISDN (BISDN).
           ISDN uses two different types of communications channels:
              "B" channel is used to carry the information - data, voice, or
              video.
              "D" channel is usually used for controlling and signaling, but can
              be used for data.

ITE PC v4.0
Chapter 8                                   © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   81
ISDN Types
              Type   Description
                     ISDN Basic Rate Interface offers a dedicated 128 Kbps
                     connection using two 64 Kbps B channels. ISDN BRI also
              BRI
                     uses on 16 Kbps D channel for call setup, control, and
                     teardown.
                     ISDN Primary Rate Interface offers up to 1.544 Mbps over
                     23 B channels in North America and Japan or 2.048 Mbps
              PRI
                     over 30 B channels in Europe and Australia. ISDN PRI also
                     uses one D channel for call maintenance.
               Broadband ISDN manages different types of service all at
         BISDN the same time. BISDN is mostly used only in network
               backbones.


ITE PC v4.0
Chapter 8                                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   82
Digital Subscriber Line (DSL)
               An "always-on" technology; there is no need to dial up
                each time to connect to the Internet.
               Uses the existing copper telephone lines to provide
                high-speed data communication between end users
                and telephone companies.
               Asymmetric DSL (ADSL) is currently the most
                commonly used DSL technology.
                  Has a fast downstream speed, typically 1.5 Mbps.
                  Upload rate of ADSL is slower.
                  Not the best solution for hosting a web server or FTP server.



ITE PC v4.0
Chapter 8                                      © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   83
DSL Types
        Type    Description
                Asymmetric DSL is most common. Downstream speed from
       ADSL     384 Kbps to 6 Mbps. Upstream speeds lower than downstream
                speeds.

                High Data Rate DSL provides equal bandwidth in both
       HDSL
                directions.

                Symmetric DSL provides the same speed, up to 3 Mbps, for
        SDSL
                uploads and downloads

                Very High Data Rate DSL is capable of bandwidths between 13
        VDSL
                and 52 Mbps downstream, and 16 Mbps upstream.

                ISDN DSL is DSL over ISDN lines. Uses ordinary phone lines.
         IDSL
                Requires ISDN adapters
ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   84
Power Line Communication (PLC)
           Uses power distribution wires (local electric grid) to
            send and receive data.
           May be available in areas without any other service.
           Is faster than an analog modem.
           May cost less than other high-speed connections.
           Will become more common in time.
           Can be used in a home or office environment through
            an electrical outlet.
           Can control lighting and appliances.


ITE PC v4.0
Chapter 8                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   85
Broadband Connectivity
           Broadband is a technique used to transmit and receive
            multiple signals using multiple frequencies over one
            cable.
           Broadband uses a wide range of frequencies that may
            be further divided into channels.
           Some common broadband network connections
            include:
              Cable
              Digital Subscriber Line (DSL)
              Integrated Services Digital Network (ISDN)
              Satellite

ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   86
Cable Modem
               A cable modem connects your computer to the cable
                company using the same coaxial cable that connects to
                your cable television.
                  You can connect the computer directly into the cable modem.
                  You can connect a router, switch, hub, or multipurpose network
                  device so multiple computers can share the Internet connection.




ITE PC v4.0
Chapter 8                                     © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   87
DSL Modem and Filter
           Voice and data signals are carried
            on different frequencies on the
            copper telephone wires.
           A filter is used to prevent DSL signals from interfering
            with phone signals. Plug the filter into a phone jack and
            plug the phone into the filter.
           The DSL modem does not need a filter. A DSL modem
            can connect directly to your computer,
            or it can be connected to a networking device to share
            the Internet connection between multiple computers.



ITE PC v4.0
Chapter 8                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   88
A Typical ISDN Connection
               ISDN uses multiple channels and can carry voice,
                video, and data;
                therefore, it is
                considered a type
                of broadband.




ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   89
Broadband Satellite
                        Uses a satellite dish for two-way
                         communication.
                        Download speeds are typically up to
                         500 Kbps, while uploads are closer
                         to 56 Kbps.
                        People in rural areas often use
                         satellite broadband because it is a
                         faster connection than dial-up and no
                         other broadband connection may be
                         available.


ITE PC v4.0
Chapter 8                       © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   90
Voice over IP (VoIP)
           Is a method used to carry telephone calls over data
            networks and the Internet.
           Converts the analog signals of voices into digital
            information that is transported in IP packets.
           Can also use an existing IP network to provide access
            to the public switched telephone network (PSTN).
           Depends on a reliable Internet connection. When a
            service interruption occurs the user cannot make phone
            calls.



ITE PC v4.0
Chapter 8                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   91
Preventive Maintenance for Networks
           Common preventive maintenance techniques should
            continually be performed for a network to operate properly.
           Keep network rooms clean and change air filters often.
           Checking the various components of a network for wear.
           Check the condition of network cables because they are often
            moved, unplugged, and kicked.
           Label the cables to save troubleshooting time later. Refer to
            wiring diagrams and always follow your company's cable
            labeling guidelines.
           AC power adapters should be checked regularly.
           The uninterruptible power supply (UPS) should be tested
            to ensure that you have power in the case of an outage.

ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   92
Troubleshooting Process
                         Step 1 Gather data from the
                          customer
                         Step 2 Verify the obvious issues
                         Step 3 Try quick solutions first
                         Step 4 Gather data from the
                          computer
                         Step 5 Evaluate the problem
                          and implement the solution
                         Step 6 Close with the customer

ITE PC v4.0
Chapter 8                   © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   93
1. Gather Data from the Customer
           Customer information
              Company name, contact name, address, phone number

           Computer configuration
              Operating system, protection software, network environment,
              connection type

           Use a work order to collect information
           Description of problem
              Open-ended questions
              What type of network connection is your computer using?
              Closed-ended questions
              Can you access the Internet?
ITE PC v4.0
Chapter 8                                 © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   94
2. Verify the Obvious Issues
              Examine the most obvious causes of a problem.
           Check that the network cables are properly connected.
           If a cable is not connected properly or if a NIC is
            improperly installed or configured, the LED link lights
            on the NIC will not light.
           Check the wireless access point signal strength in your
            network client software.
           Use the ipconfig tool to make sure that the computer
            has a valid, unique IP address. Check for errors in the
            subnet mask and default gateway address.


ITE PC v4.0
Chapter 8                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   95
3. Try Quick Solutions First
           Check that all cables are connected to the proper
            locations.
           Unseat and then reconnect cables and connectors.
           Reboot the computer or network device.
           Login as a different user.
           Repair or re-enable the network connection.
           Contact the network administrator.




ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   96
4. Gather Data from the Computer
           Ping is used to check network connectivity. It sends a
            packet to the specified address and waits for a reply.
           Nslookup is used to query Internet domain name
            server. It returns a list of hosts in a domain or the
            information for one host.
           Tracert is used to determine the route taken by packets
            when they travel across the network. It shows where
            communications between your computer and another
            computer are having difficulty.
           Net View is used to display a list of computers in a
            workgroup. It shows the available shared resources on
            a network.
ITE PC v4.0
Chapter 8                               © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   97
5. Evaluate Problem & Implement Solution
          You may need to conduct further research
           Problem solving experience
           Other technicians
           Internet search and technical websites
           News groups and online forums
           Manufacturer FAQs
           Computer and device manuals



ITE PC v4.0
Chapter 8                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   98
6. Close with the Customer
          When you are confident that the problem is resolved:
           Document the customer information, problem description,
            and steps to resolve the issue in the work order.
           Explain to the customer how you solved the problem .
           Let the customer verify that the problem has been solved.
           Complete all documentation including sales orders, time
            logs, and receipts.
           Complete the work order.
           Update the repair journal. You can use the notes from the
            journal for future reference.


ITE PC v4.0
Chapter 8                              © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   99
Common Problems and Solutions
              Problem Symptom                        Possible Solution

   Computer is not able to       Check DNS settings, hardware
   connect to a popular website. and/or software firewall settings.
                                   Check to make sure the DHCP
   Computer has an IP address
                                   server is operational and can be
   of 169.254.x.x.
                                   pinged.
   Computer is not able to
                                   Check for loose network cables.
   connect to the network.

   Computer is not able to print   Check user permissions and status
   using the network printer.      of network printer.

ITE PC v4.0
Chapter 8                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   100
Chapter 8 Summary
           The fundamentals of networking
           The benefits of a network
           The ways to connect computers to a network
           The different aspects of troubleshooting a network
           How to analyze problems and implement simple solutions




ITE PC v4.0
Chapter 8                             © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   101
Instructor Training
          Activities




ITE PC v4.0
Chapter 8                       © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   102
Activities for Instructor Training
          1. Take the Quiz provided in Chapter 8 course content.
          2. Complete the four worksheets, four activities, and the
             lab included in Chapter 8. Make notes of potential
             issues and questions that students may have.
          3. Conduct Internet research to pre-screen online
             resources for students to use in completing the student
             worksheets, 8.9.1 Internet Search for NIC Drivers.
          4. Brainstorm a list of at least 4 troubleshooting scenarios
             to provide students more opportunities to practice this
             skill.
              Refer to the student worksheet, 8.12.2 Diagnose a Network
                 Problem.
ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   103
Instructor Training Discussion
           Share with the other instructors the list of online
            resources found that students might use in completing
            the research.
           Share with the other instructors the list of additional
            troubleshooting scenarios.
           Participate in a role-playing activity of one of the
            troubleshooting scenarios.
           Following the role-playing activity, discuss the different
            ways you might incorporate role-playing activities into
            your classroom. Share ideas of how to make the
            student successful in these activities.
ITE PC v4.0
Chapter 8                                © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   104
Additional Resources
           Telecommunication Standardization Sector of the International
            Telecommunications Union (ITU-T) http://www.itu.int/ITU-T/
           Institute of Electrical and Electronics Engineers (IEEE)
            http://www.ieee.org/
           International Organization for Standardization (ISO)
            http://www.iso.ch/iso/
           Internet Architecture Board (IAB) http://www.iab.org/
           International Electrotechnical Commission (IEC) http://www.iec.ch/
           American National Standards Institute (ANSI) http://www.ansi.org/
           Telecommunications Industry Association (TIA)
            http://www.tiaonline.org/
           Electronic Industries Alliance (EIA) http://www.eia.org/
ITE PC v4.0
Chapter 8                                    © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   105
Q and A




ITE PC v4.0
Chapter 8           © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   106
ITE PC v4.0
Chapter 8     © 2007 Cisco Systems, Inc. All rights reserved.   Cisco Public   107

More Related Content

What's hot

A Brief History of MidoNet
A Brief History of MidoNetA Brief History of MidoNet
A Brief History of MidoNetMidoNet
 
CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3Irsandi Hasan
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignmentBijay Bista
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignmentKavitha Dhanesh
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingZaeem Hassan
 
CCNA Discovery 1 - Chapter 5
CCNA Discovery 1 - Chapter 5CCNA Discovery 1 - Chapter 5
CCNA Discovery 1 - Chapter 5Irsandi Hasan
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)Mehar Arslan
 
КЛМ_Урок 5
КЛМ_Урок 5КЛМ_Урок 5
КЛМ_Урок 5RaynaITSTEP
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheamaruthi vardhan
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaPrema Bahadur
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 networkRana Muzffar
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4Irsandi Hasan
 
Abdulla mohmmed 10d
Abdulla mohmmed 10dAbdulla mohmmed 10d
Abdulla mohmmed 10dshames2013
 
Intro To Networking
Intro To NetworkingIntro To Networking
Intro To NetworkingPhil Ashman
 

What's hot (20)

A Brief History of MidoNet
A Brief History of MidoNetA Brief History of MidoNet
A Brief History of MidoNet
 
CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3
 
Networking
NetworkingNetworking
Networking
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
Actualización del CCNA 6.0
Actualización del CCNA 6.0Actualización del CCNA 6.0
Actualización del CCNA 6.0
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignment
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
CCNA Discovery 1 - Chapter 5
CCNA Discovery 1 - Chapter 5CCNA Discovery 1 - Chapter 5
CCNA Discovery 1 - Chapter 5
 
Ieee 802 standards
Ieee 802 standardsIeee 802 standards
Ieee 802 standards
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)
 
CCNA Icnd110 s00
CCNA Icnd110 s00CCNA Icnd110 s00
CCNA Icnd110 s00
 
КЛМ_Урок 5
КЛМ_Урок 5КЛМ_Урок 5
КЛМ_Урок 5
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinshea
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinshea
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 network
 
CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4CCNA Discovery 1 - Chapter 4
CCNA Discovery 1 - Chapter 4
 
Abdulla mohmmed 10d
Abdulla mohmmed 10dAbdulla mohmmed 10d
Abdulla mohmmed 10d
 
Networking
NetworkingNetworking
Networking
 
Computer network
Computer networkComputer network
Computer network
 
Intro To Networking
Intro To NetworkingIntro To Networking
Intro To Networking
 

Viewers also liked

Introduction to Polyglot Persistence
Introduction to Polyglot Persistence Introduction to Polyglot Persistence
Introduction to Polyglot Persistence Antonios Giannopoulos
 
첫번째 과제.Pptx
첫번째 과제.Pptx첫번째 과제.Pptx
첫번째 과제.Pptx병용 오
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hDave Arvin
 
Antonios Giannopoulos Percona 2016 WiredTiger Configuration Variables
Antonios Giannopoulos Percona 2016 WiredTiger Configuration VariablesAntonios Giannopoulos Percona 2016 WiredTiger Configuration Variables
Antonios Giannopoulos Percona 2016 WiredTiger Configuration VariablesAntonios Giannopoulos
 
Ite pc v40_chapter10
Ite pc v40_chapter10Ite pc v40_chapter10
Ite pc v40_chapter10Dave Arvin
 
Sat & mob commn lizy
Sat & mob commn lizySat & mob commn lizy
Sat & mob commn lizyLizy Abraham
 
Лучко Василий: Эффективное достижение целей и управление временем
Лучко Василий: Эффективное  достижение целей и управление временемЛучко Василий: Эффективное  достижение целей и управление временем
Лучко Василий: Эффективное достижение целей и управление временемtucha_ua
 
Speech signal processing lizy
Speech signal processing lizySpeech signal processing lizy
Speech signal processing lizyLizy Abraham
 

Viewers also liked (11)

Introduction to Polyglot Persistence
Introduction to Polyglot Persistence Introduction to Polyglot Persistence
Introduction to Polyglot Persistence
 
첫번째 과제.Pptx
첫번째 과제.Pptx첫번째 과제.Pptx
첫번째 과제.Pptx
 
Learn Education for FIT
Learn Education for FITLearn Education for FIT
Learn Education for FIT
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_h
 
Antonios Giannopoulos Percona 2016 WiredTiger Configuration Variables
Antonios Giannopoulos Percona 2016 WiredTiger Configuration VariablesAntonios Giannopoulos Percona 2016 WiredTiger Configuration Variables
Antonios Giannopoulos Percona 2016 WiredTiger Configuration Variables
 
Ite pc v40_chapter10
Ite pc v40_chapter10Ite pc v40_chapter10
Ite pc v40_chapter10
 
Sat & mob commn lizy
Sat & mob commn lizySat & mob commn lizy
Sat & mob commn lizy
 
MongoDB Sharding Fundamentals
MongoDB Sharding Fundamentals MongoDB Sharding Fundamentals
MongoDB Sharding Fundamentals
 
Tech.ppt2
Tech.ppt2Tech.ppt2
Tech.ppt2
 
Лучко Василий: Эффективное достижение целей и управление временем
Лучко Василий: Эффективное  достижение целей и управление временемЛучко Василий: Эффективное  достижение целей и управление временем
Лучко Василий: Эффективное достижение целей и управление временем
 
Speech signal processing lizy
Speech signal processing lizySpeech signal processing lizy
Speech signal processing lizy
 

Similar to Ite pc v40_chapter8

Similar to Ite pc v40_chapter8 (20)

Ite pc v40_chapter8
Ite pc v40_chapter8Ite pc v40_chapter8
Ite pc v40_chapter8
 
Exploration_Network_Chapter_1.ppt
Exploration_Network_Chapter_1.pptExploration_Network_Chapter_1.ppt
Exploration_Network_Chapter_1.ppt
 
Chapter1 rev1.0
Chapter1   rev1.0Chapter1   rev1.0
Chapter1 rev1.0
 
VOICE
VOICEVOICE
VOICE
 
NetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptxNetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptx
 
ccna lec 1.pdf
ccna lec 1.pdfccna lec 1.pdf
ccna lec 1.pdf
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
Networking / Internet and Web Technologies
Networking / Internet and Web TechnologiesNetworking / Internet and Web Technologies
Networking / Internet and Web Technologies
 
Basic-networking-hardware
Basic-networking-hardwareBasic-networking-hardware
Basic-networking-hardware
 
Chapter 1 services in a converged wan
Chapter 1   services in a converged wanChapter 1   services in a converged wan
Chapter 1 services in a converged wan
 
MyNFChapter5
MyNFChapter5MyNFChapter5
MyNFChapter5
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptx
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Itn6 instructor materials_chapter1
Itn6 instructor materials_chapter1Itn6 instructor materials_chapter1
Itn6 instructor materials_chapter1
 
Discovery routing switching_chapter1_part1
Discovery routing switching_chapter1_part1Discovery routing switching_chapter1_part1
Discovery routing switching_chapter1_part1
 
CCNA Icnd110 s01l03
CCNA Icnd110 s01l03CCNA Icnd110 s01l03
CCNA Icnd110 s01l03
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Ite pc v40_chapter8

  • 1. Chapter 8: Networks IT Essentials: PC Hardware and Software v4.0 ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Purpose of this Presentation To provide to instructors an overview of Chapter 8:  List of chapter objectives  Overview of the chapter contents, including student worksheets student activities student labs  Reflection/Activities for instructors to complete to prepare to teach  Additional resources ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Chapter 8 Objectives  8.1 Explain the principles of networking  8.2 Describe types of networks  8.3 Describe basic networking concepts and technologies  8.4 Describe the physical components of a network  8.5 Describe LAN topologies and architectures  8.6 Identify standards organizations  8.7 Identify Ethernet standards  8.8 Explain OSI and TCP/IP data models  8.9 Describe how to configure a NIC and a modem  8.10 Identify names, purposes, and characteristics of other technologies used to establish connectivity  8.11 Identify and apply common preventive maintenance techniques used for networks  8.12 Troubleshoot a network ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Chapter 8 Worksheets, Activities, and Labs  8.1.2 Activity: Advantages and Disadvantages of Networking  8.2.3 Activity: Network Types  8.3.2 Worksheet: Identify IP Address Classes  8.3.4 Activity: Network Protocols  8.8.3 Activity: OSI Model  8.9.1 Worksheet: Internet Search for NIC Drivers  8.9.2 Lab: Configure an Ethernet NIC to use DHCP  8.10.3 Worksheet: Answer Broadband Questions  8.12.2 Worksheet: Diagnose a Network Problem ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Introduction  Chapter 8 is an overview of network principles, standards, and purposes  It covers the following types of networks: Local Area Network (LAN) Wide Area Network (WAN) Wireless LAN (WLAN)  These topics are covered: Network topologies, protocols, and logical models Hardware needed to create a network Configuration, troubleshooting, and preventive maintenance Network software, communication methods, and hardware relationships ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Principles of Networking  Networks are systems that are formed by links.  People use different types of networks every day: Mail delivery system Telephone system Public transportation system Corporate computer network The Internet  Computers can be linked by networks to share data and resources.  A network can be as simple as two computers connected by a single cable or as complex as hundreds of computers connected to devices that control the flow ITE PC v4.0 of information. Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Computer Networks  Network devices include: Desktop and laptop computers Printers and scanners PDAs and Smartphones File and print servers  Resources shared across networks include: Services, such as printing or scanning Storage devices, such as hard drives or optical drives Applications, such as databases  Different types of network media: Copper cabling Fiber-optic cabling Wireless connection ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Benefits of Networking  Fewer peripherals needed  Increased communication capabilities  Avoid file duplication and corruption  Lower cost licensing  Centralized administration  Conserve resources ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Types of Networks A computer network is identified by:  The type of media used to connect the devices  The type of networking devices used  How the resources are managed  How the network is organized  How the data is stored  The area it serves ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Local Area Network (LAN)  A group of interconnected computers that is under the same administrative control.  Can be as small as a single local network installed in a home or small office.  Can consist of interconnected local networks consisting of many hundreds of hosts, installed in multiple buildings and locations. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Wide Area Network (WAN)  A WAN connects LANs in geographically separated locations.  A WAN covers a much larger area than a LAN. The Internet is a large WAN.  Telecommunications service providers (TSP) are used to interconnect these LANs at different locations. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Wireless LAN (WLAN)  Wireless devices are used to transmit and receive data using radio waves.  Wireless devices connect to access points within a specified area.  Access points connect to the network using copper cabling.  WLAN coverage can be limited to the area of a room, or can have greater range.  You can share resources such as files and printers, and access the Internet on a WLAN. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Peer-to-Peer Networking  Share files, send messages, and print to a shared printer.  Each computer has similar capabilities and responsibilities.  Each user decides which data and devices to share.  No central point of control in the network.  Best if there are ten or fewer computers. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Disadvantages of Peer-to-Peer  Without centralized network administration, it is difficult to determine who controls network resources.  Without centralized security, each computer must use separate security measures for data protection.  More complex and difficult to manage as the number of computers on the network increases.  Without centralized data storage, data backups must be performed by users. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Client/Server Network  Client/server network model provides security and control for the network.  Client requests information or services from the server.  Server provides the requested information or service.  Servers are maintained by network administrators. Data backups and security measures Control of user access to network resources  Centralized storage and services include: Data stored on a centralized file server Shared printers managed by a print server Users have proper permissions to access data or printers ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Networking Concepts and Technologies  A computer technician is required to configure and troubleshoot computers on a network.  A computer technician should understand IP addressing, protocols, and other network concepts. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Bandwidth  amount of data that can be transmitted within a fixed time period  measured in bits per second and is usually denoted by the following: bps - bits per second Kbps - kilobits per second Mbps - megabits per second ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Three Modes of Transmission Data is transmitted in one of three modes:  Simplex (Unidirectional transmission) is a single, one-way transmission. Example: The signal sent from a TV station to your TV.  Half-duplex allows data to flow in one direction at a time. Simultaneous transmission in two directions is not allowed. Example: Two-way radios, police or emergency mobile radios  Full-duplex allows data to flow in both directions at the same time. Bandwidth is measured in only one direction. 100 Mbps full-duplex means a bandwidth of 100 Mbps in each direction. Broadband technologies, such as digital subscriber line (DSL) and cable, operate in full-duplex mode. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. IP Address  An IP address is a unique number that is used to identify a network device.  An IP address is represented as a 32-bit binary number, divided into four octets (groups of eight bits): Example: 10111110.01100100.00000101.00110110  An IP address is also represented in a dotted decimal format. Example: 190.100.5.54  When a host is configured with an IP address, it is entered as a dotted decimal number, such as 192.168.1.5.  Unique IP addresses on a network ensure that data can be sent to and received from the correct network device. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. IP Address Classes  Class A Large networks, implemented by large companies and some countries  Class B Medium-sized networks, implemented by universities  Class C Small networks, implemented by ISP for customer subscriptions  Class D Special use for multicasting  Class E Used for experimental testing ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. Subnet Masks  Used to indicate the network portion of an IP address  Is a dotted decimal number  Usually, all hosts within a broadcast domain of a LAN (bounded by routers) use the same subnet mask.  The default subnet masks for three classes of IP addresses: 255.0.0.0 is the subnet mask for Class A 255.255.0.0 is the subnet mask for Class B 255.255.255.0 is the subnet mask for Class C  If an organization owns one Class B network but needs to provide IP addresses for four LANs, the organization will subdivide the Class B network into four smaller parts by using subnetting, which is a logical division of a network. The subnet mask specifies how it is subdivided. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
  • 22. IP Address Configuration  Manual configuration Manually configure each device with the proper IP address and subnet mask.  Dynamic configuration A Dynamic Host Configuration Protocol (DHCP) server automatically assigns IP addresses to network hosts.  Network Interface Card (NIC) is the hardware that enables a computer to connect to a network and it has two addresses: The IP address is a logical address that can be changed. The Media Access Control (MAC) address is "burned-in" or permanently programmed into the NIC when manufactured. The MAC address cannot be changed. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
  • 23. Dynamic Host Configuration Protocol (DHCP)  DHCP automatically provides computers with an IP address.  The DHCP server can assign these to hosts: IP address Subnet mask Default gateway Domain Name System (DNS) server address ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23
  • 24. DHCP Process and Advantages DHCP process: 2. DHCP server receives a request from a host. 3. Server selects IP address information from a database. 4. Server offers the addresses to requesting host. 5. If the host accepts the offer, the server leases the IP address for a specific period of time. Advantages of DHCP:  Simplifies the administration of a network  Reduces the possibility of assigning duplicate or invalid addresses ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24
  • 25. Configure Host to Use DHCP Configure the host to "Obtain an IP address automatically" in the TCP/IP properties of the NIC configuration window ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 25
  • 26. Internet Protocols  A protocol is a set of rules.  Internet protocols are sets of rules governing communication within and between computers on a network.  Many protocols consist of a suite (or group) of protocols stacked in layers. These layers depend on the operation of the other layers in the suite to function properly.  The main functions of protocols: Identifying errors Compressing the data Deciding how data is to be sent Addressing data Deciding how to announce sent and received data ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 26
  • 27. Common Network Protocols Protocols used for browsing the web, sending and receiving e-mail, and transferring data files Description TCP/IP A protocol used to transport data on the Internet. NETBEUI A small, fast protocol designed for a workgroup network that NETBIOS requires no connection to the Internet. IPX and A protocol used to transport data on a Novell Netware network. SPX HTTP and A protocol that defines how files are exchanged on the Web. HTTPS FTP A protocol that provides services for file transfer and manipulation. SSH A protocol that is used to connect computers together securely. Telnet A protocol that uses a text-based connection to a remote computer. POP A protocol used to download email messages from an email server. IMAP A protocol used to download email messages from an email server. SMTP A protocol used to send mail in a TCP/IP network. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 27
  • 28. Internet Control Message Protocol (ICMP)  Internet Control Message Protocol (ICMP) is used by devices on a network to send control and error messages to computers and servers.  PING (Packet Internet Groper) is a simple command line utility used to test connections between computers Used to determine whether a specific IP address is accessible. Used with either the hostname or the IP address. Works by sending an ICMP echo request to a destination computer. Receiving device sends back an ICMP echo reply message. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 28
  • 29. Ping Command Switches These command line switches (options) can be used with the ping command. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 29
  • 30. Output of the Ping Command  Four ICMP echo requests (pings) are sent to the destination computer to determine the reliability and reachability of the destination computer. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 30
  • 31. Physical Network Components  Network devices: Computers Hubs Switches Routers Wireless access points  Network media: Twisted-pair copper cabling Fiber-optic cabling Radio waves ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 31
  • 32. Hubs  Extend the range of a signal by receiving then regenerating it and sending it out all other ports  Traffic is sent out all ports of the hub  Allow a lot of collisions on the network segment and are often not a good solution  Also called concentrators because they serve as a central connection point for a LAN ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 32
  • 33. Bridges and Switches  A packet, along with its MAC address information, is called a frame.  LANs are often divided into sections called segments bounded by bridges.  A bridge has the intelligence to determine if an incoming frame is to be sent to a different segment, or dropped. A bridge has two ports.  A switch (multiport bridge) has several ports and refers to a table of MAC addresses to determine which port to use to forward the frame. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 33
  • 34. Routers  Routers are devices that connect entire networks to each other. Use IP addresses to forward packets to other networks. Can be a computer with special network software installed. Can be a device built by network equipment manufacturers. Contain tables of IP addresses along with optimal routes to other networks. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 34
  • 35. Wireless Access Points  Provide network access to wireless devices such as laptops and PDAs.  Use radio waves to communicate with radios in computers, PDAs, and other wireless access points.  Have limited range of coverage. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 35
  • 36. Multipurpose Devices  Perform more than one function.  More convenient to purchase and configure just one device.  Combines the functions of a switch, a router and a wireless access point into one device.  The Linksys 300N is an example of a multipurpose device. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 36
  • 37. Twisted-Pair Cabling  A pair of twisted wires forms a circuit that transmits data.  The twisted wires provide protection against crosstalk (electrical noise) because of the cancellation effect. Pairs of copper wires are encased in color-coded plastic insulation and twisted together. An outer jacket, called poly-vinyl chloride (PVC), protects the bundles of twisted pairs. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 37
  • 38. Two Basic Types of Twisted-Pair Cables  Unshielded twisted-pair (UTP) Has two or four pairs of wires Relies on the cancellation effect for reduction of interference caused by electromagnetic interface (EMI) and radio frequency interference (RFI) Most commonly used cabling in networks Has a range of 328 ft (100 meters)  Shielded twisted-pair (STP) Each pair is wrapped in metallic foil to better shield the wires from electrical noise and then the four pairs of wires are then wrapped in an overall metallic braid or foil. Reduces electrical noise from within the cable. Reduces EMI and RFI from outside the cable. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 38
  • 39. Category Rating  UTP comes in several categories that are based on two factors: The number of wires in the cable The number of twists in those wires  Category 3 is used for telephone connections.  Category 5 and Category 5e have are the most common network cables used.  Category 6 cable has higher data rate than the Cat 5 cables. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 39
  • 40. Coaxial Cable  A copper-cored network cable surrounded by a heavy shielding  Types of coaxial cable: Thicknet or 10Base5 - Coax cable that was used in networks and operated at 10 megabits per second with a maximum length of 500 m Thinnet or 10Base2 - Coax cable that was used in networks and operated at 10 megabits per second with a maximum length of 185 m RG-59 - Most commonly used for cable television in the US RG-6 - Higher quality cable than RG-59 with more bandwidth and less susceptibility to interference ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 40
  • 41. Fiber-Optic Cable  A glass or plastic strand that transmits information using light and is made up of one or more optical fibers enclosed together in a sheath or jacket.  Not affected by electromagnetic or radio frequency interference.  Signals are clearer, can go farther, and have greater bandwidth than with copper cable.  Usually more expensive than copper cabling and the connectors are more costly and harder to assemble.  Two types of glass fiber-optic cable: Multimode and Single-mode ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 41
  • 42. Two Types of LAN Topologies Physical topology is the physical layout of the components on the network Logical topology determines how the hosts access the medium to communicate across the network ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 42
  • 43. LAN Physical Topologies A physical topology defines the way in which computers, printers, and other devices are connected to a network.  Bus  Ring  Star  Hierarchical star  Mesh ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 43
  • 44. Bus Topology  Each computer connects to a common cable  Cable connects one computer to the next  Ends of the cable have a terminator installed to prevent signal reflections and network errors  Only one computer can transmit data at a time or frames will collide and be destroyed  Bus topology is rarely used today. Possibly suitable for a home office or small business with few hosts ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 44
  • 45. Ring Topology  Hosts are connected in a physical ring or circle.  The ring has no beginning or end, so the cable does not need to be terminated.  A special frame, a token, travels around the ring, stopping at each host.  The advantage of a ring topology is that there are no collisions.  There are two types of ring topologies: Single-ring and Dual-ring ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 45
  • 46. Star Topology  Has a central connection point: a hub, switch, or router  Hosts connect directly to the central point with a cable  Costs more to implement than the bus topology because more cable is used, and a central device is needed  Easy to troubleshoot, since each host is connected to the central device with its own wire. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 46
  • 47. Hierarchical or Extended Star Topology  A star network with an additional networking device connected to the main networking device to increase the size of the network.  Used for larger networks ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 47
  • 48. Mesh Topology  Connects all devices to each other  Failure of any cable will not affect the network  Used in WANs that interconnect LANs  Expensive and difficult to install because of the amount of cable needed  The Internet is an example of a mesh topology  Often used by governments when data must be available in the event of a partial network failure ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 48
  • 49. Logical Topologies The two most common types of logical topologies are broadcast and token passing.  In a broadcast topology, there is no order that the hosts must follow to use the network – it is first come, first served for transmitting data on the network.  Token passing controls network access by passing an electronic token sequentially to each host. When a host receives the token, it can send data on the network. If the host has no data to send, it passes the token to the next host and the process repeats itself. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 49
  • 50. LAN Architecture  Is the overall structure of a computer or communication system.  Designed for a specific use and have different speeds and capabilities.  Describes both the physical and logical topologies used in a network.  The three most common LAN architectures: Ethernet Token Ring Fiber-Distributed Data Interface (FDDI) ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 50
  • 51. Ethernet  Based on the IEEE 802.3 standard, which specifies that a network use the Carrier Sense Multiple Access with the Collision Detection (CSMA/CD) access control method. Hosts access the network using the first come, first served broadcast topology method to transmit data.  Standard transfer rates 10 Mbps (Ethernet) “10Base-T” 100 Mbps (FastEthernet) “100Base-T” 1000 Mbps = 1 Gbps (Gigabit Ethernet) “1000Base-T” ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 51
  • 52. Token Ring  Reliable network architecture  Originally developed by IBM  Based on the token-passing access control method  Often integrated with IBM mainframe systems  Used with smaller computers and mainframes  Physically, a star-wired ring because the outer appearance of the network design is a star  Inside the device, wiring forms a circular data path, creating a logical ring ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 52
  • 53. Fiber Distributed Data Interface (FDDI)  A type of Token Ring network  Often used for LANs, connecting several buildings in an office complex or on a university campus  Runs on fiber-optic cable  High-speed performance combined with token-passing advantage  Runs at 100 Mbps with a primary and secondary ring topology  Normally, traffic flows only on the primary ring and uses a secondary ring is a backup.  FDDI dual ring supports up to 500 computers per ring ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 53
  • 54. Standards Organizations Name Type Standards Established ITU Telecommunication one of the three Sectors of Standards covering all Became ITU-T in ITU-T Standardization Sector the International fields of 1992 (formerly CCITT) Telecommunication Union telecommunications Standards for the Institute of Electrical and A non-profit, technical IEEE Electronics Engineers professional association computer and electronics 1884 industry International A network of the national Promote the development ISO Organization for standards institutes of 157 of international standards 1947 Standardization countries agreements Oversees the technical Internet Architecture A committee; an advisory and engineering 1979; first named IAB Board body development of the ICCB Internet International Standards for all IEC Electrotechnical Global organization electrical, electronic, and 1906 Commission related technologies American National Private, non-profit Seeks to establish ANSI Standards Institute organization consensus among groups 1918 Telecommunications After the Industry Association / Standards for voice and deregulation of the TIA/EIA Electronic Industries Trade associations data wiring for LANs U.S. telephone ITE PC v4.0 Alliance industry in 1984 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 54
  • 55. Ethernet Standards Ethernet protocols describe the rules that control how communication occurs on an Ethernet network.  The 802.2 standard defines how a device addresses other devices on the medium.  The 802.3 standard defines the methodology that devices must use when they use the media.  The 802.11x standards define how wireless devices communicate using radio waves. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 55
  • 56. Cabled Ethernet Standards  IEEE 802.3 Ethernet standard specifies that a network implement the CSMA/CD access control method.  In CSMA/CD operation: All end stations "listen" to the network wire for clearance to send data. When the end station detects that no other host is transmitting, the end station will attempt to send data. If no other station sends any data at the same time, this transmission will arrive at the destination computer successfully. If another end station transmits at the same time, a collision will occur on the network media. The first station that detects the collision, sends out a jam signal to tell all stations to stop transmitting and to run a backoff algorithm. All stations stop transmitting and re-try after a random period of time. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 56
  • 57. 10BASE-T  10BASE-T is an Ethernet technology that uses a star topology. The ten (10) represents a speed of 10 Mbps. BASE represents baseband transmission. The T represents twisted-pair cabling.  Advantages of 10BASE-T: Installation is inexpensive compared to fiber-optic installation. Cables are thin, flexible, and easier to install than coaxial cabling. Equipment and cables are easy to upgrade.  Disadvantages of 10BASE-T: The maximum length for a 10BASE-T segment is 328 ft (100 m). Cables are susceptible to Electromagnetic Interference (EMI). ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 57
  • 58. 100BASE-TX “FastEthernet”  Has a theoretical bandwidth of 100 Mbps.  The "X" indicates different types of copper and fiber-optic can be used.  Advantages of 100BASE-TX: Transfer rates of 100BASE-TX are ten times that of 10BASE-T 100BASE-X uses twisted-pair, inexpensive and easy to install  Disadvantages of 100BASE-TX: Maximum length for a 100BASE-TX segment is 329 ft (100 m). Cables are susceptible to Electromagnetic Interference (EMI). ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 58
  • 59. 1000BASE-TX “Gigabit Ethernet”  Advantages of 1000BASE-T: 1 Gbps is ten times faster than Fast Ethernet and 100 times faster than Ethernet. Increased speed makes it possible to implement bandwidth- intensive applications, such as live video. The 1000BASE-T architecture has interoperability with 10BASE- T and 100BASE-TX.  Disadvantages of 1000BASE-T: Maximum length for a 1000BASE-T segment is 328 ft (100 m). It is susceptible to interference. Gigabit NICs and Switches are expensive. Additional equipment is required. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 59
  • 60. Wireless Ethernet Standards  IEEE 802.11 is the standard that specifies connectivity for wireless networks.  Wi-Fi (wireless fidelity), refers to the 802.11 family 802.11 (the original specification) 802.11b 802.11a 802.11g 802.11n These protocols specify the frequencies, speeds, and other capabilities of the different Wi-Fi standards. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 60
  • 61. IEEE 802.11a WLAN Standard  Allows data rates as high as 54 Mbps  Devices operate in the 5 GHz radio frequency range  Avoids some interference issues of 802.11b  802.11a is not backward compatible to 802.11b  Dual mode wireless NICs are available  802.11a has a range of approximately 100 ft (30 m) ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 61
  • 62. IEEE 802.11b WLAN Standard  Operates in the 2.4 GHz frequency range  Maximum theoretical data rate of 11 Mbps, but typically about 6.5 Mbps  Average range of approximately 100 ft (30 m) at 11 Mbps and 295 ft (90 m) at 1 Mbps  Range fluctuates depending on the operational speed.  Signal quality dictates the operational speed of 802.11b.  Bluetooth devices, cordless phones, and even microwave ovens operate in the 2.4 GHz band, possibly causing interference. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 62
  • 63. IEEE 802.11g and 802.11n  802.11g Allows data rates as high as 54 Mbps Operates in the same 2.4 GHz spectrum as 802.11b 802.11g is backward compatible with 802.11b Interoperability among all speeds (a, b, g) exists Average range of approximately 100 ft (30 m)  802.11n Has a theoretical bandwidth of 540 Mbps Operates in either the 2.4 GHz or 5 GHz frequency range Maximum range of 164 ft (50 m) Expected approval for 802.11n is April 2008 or earlier ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 63
  • 64. Wireless Ethernet Standards Bandwidth Frequency Range Interoperability Not interoperable with 100 feet 802.11a Up to 54 Mbps 5 GHz band (30 meters) 802.11b, 802.11g, or 802.11n 100 feet Interoperable with 802.11b Up to 11 Mbps 2.4 GHz band (30 meters) 802.11g 100 feet Interoperable with 802.11g Up to 54 Mbps 2.4 GHz band (30 meters) 802.11b 802.11n 164 feet Interoperable with Up to 540 Mbps 2.4 GHz band (Pre-standard) (50 meters) 802.11b and 802.11g 2.4 GHz band 802.15.1 Up to 2 Mbps or 5 GHz 30 feet Not interoperable with Bluetooth (10 meters) any other 802.11 band ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 64
  • 65. OSI and TCP/IP Data Models  Architectural model Separates functions of protocols into manageable layers Each layer performs a specific function in network communication  TCP/IP model A four-layer model that explains the TCP/IP suite of protocols TCP/IP is the dominant standard for transporting data across networks  Open Systems Interconnect (OSI) model Standards defining how devices communicate on a network Ensures interoperability between network devices ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 65
  • 66. The TCP/IP Reference Model  Frame of reference used to develop the Internet's protocols  Consists of layers that perform functions necessary to prepare data for transmission over a network Description Protocols HTTP, HTML, Provides network services to user Application applications Telnet, FTP, SMTP, DNS Provides end-to-end management of data Transport and divides data into segments TCP, UDP Provides connectivity between hosts in the Internet network IP, ICMP, RIP, ARP Network Describes the standards that hosts use to Access access the physical media ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 66
  • 67. The OSI Model  The OSI model is an industry standard framework that is used to divide network communications into seven layers.  Although other models exist, most network vendors today build their products using this framework.  A protocol stack is a system that implements protocol behavior using a series of layers. Protocol stacks can be implemented either in hardware or software, or in a combination of both. Typically, only the lower layers are implemented in hardware, and the higher layers are implemented in software. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 67
  • 68. The OSI Model Layer Description Application 7 Responsible for network services to applications Transforms data formats to provide a standard interface Presentation 6 for the Application layer Establishes, manages and terminates the connections Session 5 between the local and remote application Provides reliable transport and flow control across a Transport 4 network Responsible for logical addressing and the domain of Network 3 routing Provides physical addressing and media access Data Link 2 procedures Defines all the electrical and physical specifications for Physical 1 devices Remember the OSI layers with this mnemonic: ITE PC v4.0 "Please Do Not Throw Sausage Pizza Away" Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 68
  • 69. Compare OSI and TCP/IP Models ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 69
  • 70. Configuring a NIC and a Modem  Install the NIC and the driver. NIC If necessary, download an updated driver from the manufacturer.  Connect the computer to the network.  Also, you may need to install a modem to connect to the Internet. Modem ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 70
  • 71. Install or Update a NIC Driver  Manufacturers publish new driver software for NICs May enhance the functionality of the NIC May be needed for operating system compatibility  Install a new driver Disable virus protection software Install only one driver at a time Close all applications that are running so that they are not using any files associated with the driver update. Visit the manufacturer's website and download a self- extracting executable driver file that will automatically install or update the driver ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 71
  • 72. Install or Update a NIC Driver  Alternatively, you can click the Update Driver button in the toolbar of the Device Manager.  After updating the driver, reboot the computer.  If a new NIC driver does not perform as expected after it has been installed, the driver can be uninstalled, or rolled back, to the previous driver. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 72
  • 73. Attach Computer to Existing Network  Plug a network cable into the network port on the computer.  Plug the other end into the network device or wall jack.  After connecting the network cable, look at the LEDs, or link lights, next to the Ethernet port on the NIC.  If there is no activity, you may have to replace a faulty cable, a faulty hub port, or even a faulty NIC to correct the problem. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 73
  • 74. Configure the NIC  The computer will now need an IP address. If the computer does not acquire an IP address from a DHCP server, you will need to enter a unique IP address in the TCP/IP properties of the NIC. Click Start > Control Panel > Network Connections > Local Area Connection  Every NIC must be configured with the following information: The same protocol must be implemented between any two computers that communicate on the same network. The IP address must be unique to each device and can be configured manually or dynamically. The MAC address is a unique address assigned by the manufacturer and cannot be changed. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 74
  • 75. What is the Assigned IP Address? If you do not know your IP address yet, use the ipconfig program, to find it. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 75
  • 76. Test Connectivity Using Ping  Ping your own IP address to make sure your NIC is working properly.  Ping your default gateway or another computer on your network.  Ping a popular website.  If you cannot ping one of these items, you may need to begin troubleshooting. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 76
  • 77. Modem Installation  A modem is an electronic device that transfers data between one computer and another using analog signals over a telephone line. A transmitting modem converts digital data to analog signals, called modulation. The receiving modem reconverts the analog signals back to digital data, called demodulation.  An internal modem plugs into an expansion slot on the motherboard and a software driver is installed.  External modems connect to a computer through the serial and USB ports and also require a software driver. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 77
  • 78. Dial-up Networking (DUN)  When computers use the public telephone system to communicate, it is called dial-up networking (DUN).  Modems communicate with each other using audio tone signals. DUN creates a Point-to-Point Protocol (PPP) connection between two computers over a phone line.  After the line connection has been established, a "handshaking sequence" takes place between the two modems and the computers.  The digital signals from the computers must be converted to an analog signal to travel across telephone lines. They are converted back to the digital form, 1s and 0s, by the receiving modem so that the receiving computer can process the data. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 78
  • 79. AT Commands  AT (“Attention”) Commands - commands for modems Function AT Most modem software uses precedes all modem action commands Attention code that the Hayes-compatible command set. AP Dial the phone number, xxxxxxx, using pulse dialing  The AT commandphoneis usedxxxxxxx, using tonehang up, ATDT xxxxxxx Dial the set number, to issue dial, dialing reset, and other instructions to the modem. ATA Answer the phone immediately ATHO modem user manuals list the AT command set. Most Hang up the phone immediately ATZ Reset the modem to its power up settings  The Standard Hayes compatible code to dial is ATF ATDxxxxxxxReset modem parameters and settings to the factory defaults AT+++ Break the signal, change from data mode to command mode Usually no spaces in an AT string. P Signifies pulse dialing The "x" signifies thetone dialing number dialed. T Signifies Seven digits for a local callmodem will wait for long-distance. W Indicates that the and 11 digits ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 79
  • 80. Other Types of Connectivity  Phone, cable, satellite, and private telecommunications companies provide Internet connections.  In the 1990s, low-speed modems used the plain old telephone system (POTS) to send and receive data.  Today, many businesses and home users have switched to high-speed Internet connections, which allows for transmission of data, voice and video. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 80
  • 81. Integrated Services Digital Network (ISDN)  A standard for sending voice, video, and data over telephone wires.  Provides higher-quality voice and higher-speed data transfer than traditional analog telephone service.  Three services offered by ISDN digital connections: Basic Rate Interface (BRI), Primary Rate Interface (PRI), and Broadband ISDN (BISDN).  ISDN uses two different types of communications channels: "B" channel is used to carry the information - data, voice, or video. "D" channel is usually used for controlling and signaling, but can be used for data. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 81
  • 82. ISDN Types Type Description ISDN Basic Rate Interface offers a dedicated 128 Kbps connection using two 64 Kbps B channels. ISDN BRI also BRI uses on 16 Kbps D channel for call setup, control, and teardown. ISDN Primary Rate Interface offers up to 1.544 Mbps over 23 B channels in North America and Japan or 2.048 Mbps PRI over 30 B channels in Europe and Australia. ISDN PRI also uses one D channel for call maintenance. Broadband ISDN manages different types of service all at BISDN the same time. BISDN is mostly used only in network backbones. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 82
  • 83. Digital Subscriber Line (DSL)  An "always-on" technology; there is no need to dial up each time to connect to the Internet.  Uses the existing copper telephone lines to provide high-speed data communication between end users and telephone companies.  Asymmetric DSL (ADSL) is currently the most commonly used DSL technology. Has a fast downstream speed, typically 1.5 Mbps. Upload rate of ADSL is slower. Not the best solution for hosting a web server or FTP server. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 83
  • 84. DSL Types Type Description Asymmetric DSL is most common. Downstream speed from ADSL 384 Kbps to 6 Mbps. Upstream speeds lower than downstream speeds. High Data Rate DSL provides equal bandwidth in both HDSL directions. Symmetric DSL provides the same speed, up to 3 Mbps, for SDSL uploads and downloads Very High Data Rate DSL is capable of bandwidths between 13 VDSL and 52 Mbps downstream, and 16 Mbps upstream. ISDN DSL is DSL over ISDN lines. Uses ordinary phone lines. IDSL Requires ISDN adapters ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 84
  • 85. Power Line Communication (PLC)  Uses power distribution wires (local electric grid) to send and receive data.  May be available in areas without any other service.  Is faster than an analog modem.  May cost less than other high-speed connections.  Will become more common in time.  Can be used in a home or office environment through an electrical outlet.  Can control lighting and appliances. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 85
  • 86. Broadband Connectivity  Broadband is a technique used to transmit and receive multiple signals using multiple frequencies over one cable.  Broadband uses a wide range of frequencies that may be further divided into channels.  Some common broadband network connections include: Cable Digital Subscriber Line (DSL) Integrated Services Digital Network (ISDN) Satellite ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 86
  • 87. Cable Modem  A cable modem connects your computer to the cable company using the same coaxial cable that connects to your cable television. You can connect the computer directly into the cable modem. You can connect a router, switch, hub, or multipurpose network device so multiple computers can share the Internet connection. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 87
  • 88. DSL Modem and Filter  Voice and data signals are carried on different frequencies on the copper telephone wires.  A filter is used to prevent DSL signals from interfering with phone signals. Plug the filter into a phone jack and plug the phone into the filter.  The DSL modem does not need a filter. A DSL modem can connect directly to your computer, or it can be connected to a networking device to share the Internet connection between multiple computers. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 88
  • 89. A Typical ISDN Connection  ISDN uses multiple channels and can carry voice, video, and data; therefore, it is considered a type of broadband. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 89
  • 90. Broadband Satellite  Uses a satellite dish for two-way communication.  Download speeds are typically up to 500 Kbps, while uploads are closer to 56 Kbps.  People in rural areas often use satellite broadband because it is a faster connection than dial-up and no other broadband connection may be available. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 90
  • 91. Voice over IP (VoIP)  Is a method used to carry telephone calls over data networks and the Internet.  Converts the analog signals of voices into digital information that is transported in IP packets.  Can also use an existing IP network to provide access to the public switched telephone network (PSTN).  Depends on a reliable Internet connection. When a service interruption occurs the user cannot make phone calls. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 91
  • 92. Preventive Maintenance for Networks  Common preventive maintenance techniques should continually be performed for a network to operate properly.  Keep network rooms clean and change air filters often.  Checking the various components of a network for wear.  Check the condition of network cables because they are often moved, unplugged, and kicked.  Label the cables to save troubleshooting time later. Refer to wiring diagrams and always follow your company's cable labeling guidelines.  AC power adapters should be checked regularly.  The uninterruptible power supply (UPS) should be tested to ensure that you have power in the case of an outage. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 92
  • 93. Troubleshooting Process Step 1 Gather data from the customer Step 2 Verify the obvious issues Step 3 Try quick solutions first Step 4 Gather data from the computer Step 5 Evaluate the problem and implement the solution Step 6 Close with the customer ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 93
  • 94. 1. Gather Data from the Customer  Customer information Company name, contact name, address, phone number  Computer configuration Operating system, protection software, network environment, connection type  Use a work order to collect information  Description of problem Open-ended questions What type of network connection is your computer using? Closed-ended questions Can you access the Internet? ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 94
  • 95. 2. Verify the Obvious Issues Examine the most obvious causes of a problem.  Check that the network cables are properly connected.  If a cable is not connected properly or if a NIC is improperly installed or configured, the LED link lights on the NIC will not light.  Check the wireless access point signal strength in your network client software.  Use the ipconfig tool to make sure that the computer has a valid, unique IP address. Check for errors in the subnet mask and default gateway address. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 95
  • 96. 3. Try Quick Solutions First  Check that all cables are connected to the proper locations.  Unseat and then reconnect cables and connectors.  Reboot the computer or network device.  Login as a different user.  Repair or re-enable the network connection.  Contact the network administrator. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 96
  • 97. 4. Gather Data from the Computer  Ping is used to check network connectivity. It sends a packet to the specified address and waits for a reply.  Nslookup is used to query Internet domain name server. It returns a list of hosts in a domain or the information for one host.  Tracert is used to determine the route taken by packets when they travel across the network. It shows where communications between your computer and another computer are having difficulty.  Net View is used to display a list of computers in a workgroup. It shows the available shared resources on a network. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 97
  • 98. 5. Evaluate Problem & Implement Solution You may need to conduct further research  Problem solving experience  Other technicians  Internet search and technical websites  News groups and online forums  Manufacturer FAQs  Computer and device manuals ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 98
  • 99. 6. Close with the Customer When you are confident that the problem is resolved:  Document the customer information, problem description, and steps to resolve the issue in the work order.  Explain to the customer how you solved the problem .  Let the customer verify that the problem has been solved.  Complete all documentation including sales orders, time logs, and receipts.  Complete the work order.  Update the repair journal. You can use the notes from the journal for future reference. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 99
  • 100. Common Problems and Solutions Problem Symptom Possible Solution Computer is not able to Check DNS settings, hardware connect to a popular website. and/or software firewall settings. Check to make sure the DHCP Computer has an IP address server is operational and can be of 169.254.x.x. pinged. Computer is not able to Check for loose network cables. connect to the network. Computer is not able to print Check user permissions and status using the network printer. of network printer. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 100
  • 101. Chapter 8 Summary  The fundamentals of networking  The benefits of a network  The ways to connect computers to a network  The different aspects of troubleshooting a network  How to analyze problems and implement simple solutions ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 101
  • 102. Instructor Training Activities ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 102
  • 103. Activities for Instructor Training 1. Take the Quiz provided in Chapter 8 course content. 2. Complete the four worksheets, four activities, and the lab included in Chapter 8. Make notes of potential issues and questions that students may have. 3. Conduct Internet research to pre-screen online resources for students to use in completing the student worksheets, 8.9.1 Internet Search for NIC Drivers. 4. Brainstorm a list of at least 4 troubleshooting scenarios to provide students more opportunities to practice this skill. Refer to the student worksheet, 8.12.2 Diagnose a Network Problem. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 103
  • 104. Instructor Training Discussion  Share with the other instructors the list of online resources found that students might use in completing the research.  Share with the other instructors the list of additional troubleshooting scenarios.  Participate in a role-playing activity of one of the troubleshooting scenarios.  Following the role-playing activity, discuss the different ways you might incorporate role-playing activities into your classroom. Share ideas of how to make the student successful in these activities. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 104
  • 105. Additional Resources  Telecommunication Standardization Sector of the International Telecommunications Union (ITU-T) http://www.itu.int/ITU-T/  Institute of Electrical and Electronics Engineers (IEEE) http://www.ieee.org/  International Organization for Standardization (ISO) http://www.iso.ch/iso/  Internet Architecture Board (IAB) http://www.iab.org/  International Electrotechnical Commission (IEC) http://www.iec.ch/  American National Standards Institute (ANSI) http://www.ansi.org/  Telecommunications Industry Association (TIA) http://www.tiaonline.org/  Electronic Industries Alliance (EIA) http://www.eia.org/ ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 105
  • 106. Q and A ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 106
  • 107. ITE PC v4.0 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 107

Editor's Notes

  1. Cisco Networking Academy Program IT Essentials: PC Hardware and Software v4.0 Chapter 8: Networks
  2. Slide 2 – Purpose of this Presentation The purpose of this PowerPoint is to provide to instructors an overview of ITE PC v4.0 Chapter 8, including the following: List of chapter objectives Overview of the chapter contents, including student activities, worksheets, and labs included in the course content Reflection/Activities for instructors to complete to prepare to teach Additional resources
  3. Slide 3 - Chapter 8 Objectives The purpose of this chapter is to provide an overview of network principles, standards, and purposes. After completing this chapter, students will meet these objectives: Explain the principles of networking Describe types of networks Describe basic networking concepts and technologies Describe the physical components of a network Describe LAN topologies and architectures Identify standards organizations Identify Ethernet standards Explain OSI and TCP/IP data models Describe how to configure a NIC and a modem Identify names, purposes, and characteristics of other technologies used to establish connectivity Identify and apply common preventive maintenance techniques used for networks Troubleshoot a network
  4. Slide 4 – Chapter 8 Worksheets, Activities, and Labs There are four worksheets, four activities, and one lab included in Chapter 8. These worksheets, activities and labs are available at the bottom of associated pages of course content. 8.1.2 Activity: Advantages and Disadvantages of Networking (Complete the network matching activity.) 8.2.3 Activity: Network Types (Complete the network type matching activity.) 8.3.2 Worksheet: Identify IP Address Classes (Given an IP address and a mask, specify the IP Address Class.) 8.3.4 Activity: Network Protocols (Complete the matching activity.) 8.8.3 Activity: OSI Model (Complete the OSI model matching activity.) 8.9.1 Worksheet: Internet Search for NIC Drivers (Research the latest NIC drivers for various network cards.) 8.9.2 Lab: Configure an Ethernet NIC to use DHCP (Configure an Ethernet NIC to use DHCP to obtain an IP address.) 8.10.3 Worksheet: Answer Broadband Questions (Answer questions about broadband connectivity options.) 8.12.2 Worksheet: Diagnose a Network Problem (Participate in a role-playing activity as a technician gathering information from a customer reporting a network problem.)
  5. Slide 5 - Introduction 8.0 Chapter Introduction The following types of networks will be discussed in this chapter: Local Area Network (LAN) Wide Area Network (WAN) Wireless LAN (WLAN) The different types of network topologies, protocols, and logical models and the hardware needed to create a network will also be discussed in this chapter. Configuration, troubleshooting, and preventive maintenance will be covered. You will also learn about network software, communication methods, and hardware relationships.
  6. Slide 6 - Principles of Networking 8.1 Explain the principles of networking Networks are systems that are formed by links. Websites that allow individuals to link to each other’s pages are called social networking sites. A set of related ideas can be called a conceptual network. The connections you have with all your friends can be called your personal network. People use networks everyday. Examples of networks are a mail delivery system, a telephone system, a public transportation system, a corporate computer network, and the Internet. Computers can be linked by networks to share data and resources. A network can be as simple as two computers connected by a single cable or as complex as hundreds of computers connected to devices that control the flow of information. Converged data networks can include general purpose computers, such as PCs and servers, as well as devices with more specific functions, including printers, phones, televisions, and game consoles. All data, voice, video, and converged networks share information and use various methods to direct how this information flows. The information on the network goes from one place to another, sometimes via different paths, to arrive at the appropriate destination. The public transportation system is similar to a data network. The cars, trucks, and other vehicles are like the messages that travel within the network. Each driver defines a starting point (source) and an ending point (destination). Within this system, there are rules such as stop signs and traffic lights that control the flow from the source to the destination. After completing this section, students will meet these objectives: Define computer networks Explain the benefits of networking Teaching Strategy: The mail system allows messages to travel between any place that can be reached. The telephone system allows worldwide voice, fax, and Internet connections. Public transportation moves people and packages from source to destination. Each of these has a way of getting into and out of the network and a means of directing traffic. It is much the same with computer networks.
  7. Slide 7 – Computer Networks 8.1.1 Define computer networks A computer data network is a collection of hosts connected by networking devices. A host is any device that sends and receives information on the network. Peripherals are devices that are connected to hosts. Some devices can serve either as hosts or peripherals. Computer networks are used globally in businesses, homes, schools, and government agencies. Many of the networks are connected to each other through the Internet. Network devices include: Desktop and laptop computers Printers and scanners PDAs and Smartphones File and print servers Resources shared across networks include: Services, such as printing or scanning Storage space on removable devices, such as hard drives or optical drives Applications, such as databases Network uses include: Access information stored on other computers Print documents using shared printers Synchronize the calendar between your computer and your smart phone Different types of network media: Copper cabling uses electrical signals to transmit data between devices Fiber-optic cabling uses glass or plastic wire, also called fiber, to carry information as light pulses Wireless connection uses radio signals, infrared technology (laser), or satellite transmissions
  8. Slide 8 - Benefits of Networking 8.1.2 Explain the benefits of networks The benefits of networking computers and other devices include lower costs and increased productivity. With networks, resources can be shared, which results in less duplication and corruption of data. Fewer peripherals needed – Printers, scanners, and backup devices can be shared among the network users. Increased communication capabilities - Collaboration tools facilitate communicate between users; Examples: e-mail, forums and chats, voice and video, and instant messaging Avoid file duplication and corruption - Servers store data and share it with network users. Confidential or sensitive data can be protected and shared with the users who have permission to access that data. Document tracking software can be used to prevent users from changing files that others are accessing at the same time. Lower cost licensing – The site license allows a group of people or an entire organization to use the application for a single fee. Centralized administration - Fewer people needed to manage the network. Lower cost to the company. Easier data backup to a central location. Conserve resources - Data processing is distributed across many computers to prevent overloading one computer with processing tasks. Student Activity: The student course content includes a matching activity, 8.1.2 Advantages and Disadvantages of Networking. To complete this activity, students will identify each phrase as an advantage or a disadvantage.
  9. Slide 9 - Types of Networks 8.2 Describe types of networks Data networks continue to evolve in complexity, use, and design. To communicate about networks, different types of networks are given different descriptive names. A computer network is identified by the following specific characteristics: The type of media used to connect the devices The type of networking devices used How the resources are managed How the network is organized How the data is stored The area it serves After completing this section, students will meet these objectives: Describe a LAN Describe a WAN Describe a WLAN Explain peer-to-peer networks Explain client/server networks
  10. Slide 10 – Local Area Network (LAN) 8.2.1 Describe a LAN Local Area Network (LAN) refers to a group of interconnected computers that is under the same administrative control. In the past, LANs were considered to be small networks that existed in a single physical location. Although LANs can be as small as a single local network installed in a home or small office, over time, the definition of LANs has evolved to include interconnected local networks consisting of many hundreds of hosts, installed in multiple buildings and locations. All the local networks within a LAN are under one administrative control group that governs the security and access control policies that are in force on the network. In this context, the word “Local” in Local Area Network refers to local consistent control rather than being physically close to each other. Devices in a LAN may be physically close, but it is not a requirement.
  11. Slide 11 – Wide Area Network (WAN) 8.2.2 Describe a WAN Wide Area Networks (WANs) are networks that connect LANs in geographically separated locations. A WAN covers a much larger area than a LAN. The most common example of a WAN is the Internet. The Internet is a large WAN that is comprised of millions of interconnected LANs. All of these networks are connected together using WAN connections, such as a phone company, cable company, or Internet Service Provider (ISP). Telecommunications service providers (TSP) are used to interconnect these LANs at different locations.
  12. Slide 12 – Wireless LAN (WLAN) 8.2.3 Describe a WLAN Traditionally, in a LAN, devices are connected together using copper cabling. In some environments, installing copper cabling may not be practical, desirable, or even possible. In these situations, wireless devices are used to transmit and receive data using radio waves. These networks are called wireless LANs, or WLANs. In a WLAN, wireless devices connect to access points within a specified area. Access points are typically connected to the network using copper cabling. WLAN coverage can be limited to the area of a room or can have greater range. As with LANs, you can share resources such as files and printers, and access the Internet on a WLAN. Student Activity: The student course content includes a matching activity, 8.2.3 Network Types. To complete this activity, students will match each description to its network type. Teaching Strategy: The physical cables that connect devices in a LAN can be replaced by radio waves. In this case, a LAN becomes a Wireless Local Area Network (WLAN). A hotspot is the area where wireless access is available around a wireless access point. Hotspots can overlap, causing them to interconnect.
  13. Slide 13 – Peer-to-Peer Networking 8.2.4 Explain peer-to-peer networks In a peer-to-peer network, devices are connected directly to each other without any additional networking devices between them. Each device has equivalent capabilities and responsibilities. Individual users are responsible for their own resources and can decide which data and devices to share. There is no central point of control or administration in the network. Peer-to-peer networks work best in environments with ten or fewer computers. Teaching Strategy: In a peer-to-peer network, networked computers act as equal partners, or peers, to each other. Individual users control their own resources. They may decide to share certain files with other users and may require passwords before they allow others to access their resources. Since individual users make these decisions, there is no central point of control or administration in the network. In addition, individual users must back up their own systems to be able to recover from data loss in case of failures. Peer-to-peer networks are relatively easy to install and operate. No additional equipment is necessary beyond a suitable operating system in each computer. Since users control their own resources, no dedicated administrators are needed. A peer-to-peer network works well with ten or fewer computers.
  14. Slide 14 – Disadvantages of Peer-to-Peer 8.2.4 Explain peer-to-peer networks Peer-to-peer networks have several disadvantages: There is no centralized network administration which makes it difficult to determine who controls resources on the network. There is no centralized security. Each computer must use separate security measures for data protection. The network becomes more complex and difficult to manage as the number of computers on the network increases. There may be no centralized data storage. Separate data backups must be maintained. This responsibility falls on the individual users. Peer-to-peer networks still exist inside larger networks today. Even on a large client network, users can still share resources directly with other users without using a network server. In your home, if you have more than one computer, you can set up a peer-to-peer network.
  15. Slide 15 – Client Server Network 8.2.5 Explain client/server networks In a client/server model, the client requests information or services from the server. The server provides the requested information or service to the client. Servers on a client/server network commonly perform some of the processing work for client machines; for example, sorting through a database before delivering only the records requested by the client. In a client/server model, the servers are maintained by network administrators. Data backups and security measures are implemented by the network administrator. The network administrator also controls user access to the network resources. All of the data on the network is stored on a centralized file server. Shared printers on the network are managed by a centralized print server. Network users with the proper permissions can access both the data and shared printers. Each user must provide an authorized username and password to gain access to network resources that they are permitted to use. For data protection, an administrator performs a routine backup of all the files on the servers. If a computer crashes, or data is lost, the administrator can easily recover the data from a recent backup. Teaching Strategy: As networks grow larger, peer-to-peer relationships become increasingly difficult to coordinate. They do not scale well, since their efficiency decreases rapidly as the number of computers on the network increases. Since individual users control access to the resources on their computers, security may be difficult to maintain. Client/server networks address these limitations of the peer-to-peer arrangement.
  16. Slide 16 - Networking Concepts and Technologies 8.3 Describe basic networking concepts and technologies As a computer technician, you will be required to configure and troubleshoot computers on a network. To effectively configure a computer on the network, you should understand IP addressing, protocols, and other network concepts. After completing this section, students will meet these objectives: Explain bandwidth and data transmission Describe IP addressing Define DHCP Define Internet protocols and applications Define ICMP Teaching Strategy: A computer technician needs to understand the type of network they are working on and how to configure a computer for that network. Networking concepts and technologies encompass the software, configuration methods, and protocols involved in the communication between devices.
  17. Slide 17 - Bandwidth 8.3.1 Explain bandwidth and data transmission Data is sent in small chunks called packets. A packet has a header, containing the source and destination of the packet. A header has sequencing information so that the packets can be assembled at the destination. Bandwidth is the amount of data that can be transmitted within a fixed time period. Bandwidth is measured in bits per second and is usually denoted by the following: bps - bits per second Kbps - kilobits per second Mbps - megabits per second Bandwidth can be compared to highway traffic flow On a highway, cars represent the data. Number of lanes represents the number of cars that could travel on the highway at the same time. An eight-lane highway allows four times as many cars as a two-lane highway.
  18. Slide 18 – Three Modes of Transmission 8.3.1 Explain bandwidth and data transmission Data is transmitted in one of three modes: Simplex (Unidirectional transmission) is a single, one-way transmission. Example: The signal sent from a TV station to your TV. Half-duplex allows data to flow in one direction at a time. Simultaneous transmission in two directions is not allowed. Example: Two-way radios, police or emergency mobile radios Full-duplex allows data to flow in both directions at the same time. Bandwidth is measured in only one direction. 100 Mbps full-duplex means a bandwidth of 100 Mbps in each direction. A telephone conversation is an example of full-duplex communication. Both people can talk at the same time, and can still hear each other. Broadband technologies, such as digital subscriber line (DSL) and cable, operate in full-duplex mode. Broadband allows multiple signals to travel on the same wire simultaneously. Full-duplex networking technology increases network performance because data can be sent and received at the same time. Example: With DSL, users can download data and talk on the telephone at the same time.
  19. Slide 19 – IP Address 8.3.2 Describe IP addressing An IP address is a number that is used to identify a device on the network. Each device on a network has a unique IP address. A network device is referred to as a host or node. Each host must have an IP address within the same network to be able to communicate with each other. The IP address is similar to the mailing address of a person. It is known as a logical address because it is logically assigned based on the host location. The IP address, or network address, is based on the local network and is assigned to each host by a network administrator. This process is similar to the local government assigning a street address based on the logical description of the city or village and neighborhood. An IP address consists of a series of 32 binary bits (ones and zeros). The 32 bits are grouped into four 8-bit bytes called octets. Example: 10111110.01100100.00000101.00110110 An IP address is also represented in a dotted decimal format. Example: the binary IP address shown above is 190.100.5.54 When a host is configured with an IP address, it is entered as a dotted decimal number, such as 192.168.1.5. Imagine if you had to enter the 32-bit binary equivalent of this: 11000000101010000000000100000101. If just one bit were mistyped, the address would be different and the host may not be able to communicate on the network. Unique IP addresses on a network ensure that data can be sent to and received from the correct network device.
  20. Slide 20 – IP Address Classes 8.3.2 Describe IP addressing The logical 32-bit IP address is hierarchical and is composed of two parts. The first part identifies the network and the second part identifies a host on that network. Both parts are required in an IP address. As an example, if a host has IP address 192.168.18.57, the first three octets, 192.168.18, identify the network portion of the address, and the last octet, 57 identifies the host. This is known as hierarchical addressing, because the network portion indicates the network on which each unique host address is located. Routers only need to know how to reach each network and not the location of each individual host. Class A - Large networks, implemented by large companies and some countries. First octet is from 1-127. 127.0.0.0 is a special network reserved for testing. 127.0.0.1 is a loopback address. Class B - Medium-sized networks, implemented by universities. First octet is from 128-191. Class C - Small networks, implemented by ISP for customer subscriptions. First octet is from 192-223. Class D - Special use for multicasting. First octet is from 224-240. Class E - Used for experimental testing
  21. Slide 21 – Subnet Masks 8.3.2 Describe IP addressing The subnet mask is used to indicate the network portion of an IP address. It is a dotted decimal number. Usually all hosts within a LAN (bounded by routers) use the same subnet mask. The default subnet masks for three classes of IP addresses: 255.0.0.0 - Class A, which indicates the first octet of the IP address is the network portion. 255.255.0.0 - Class B, which indicates the first two octets of the IP address is the network portion. 255.255.255.0 - Class C, which indicates the first three octets of the IP address is the network portion. If an organization owns one Class B network but needs to provide IP addresses for four LANs, the organization will subdivide the Class B network into four smaller parts by using subnetting, which is a logical division of a network. The subnet mask specifies how it is subdivided. An experienced network administrator typically performs subnetting. After the subnetting scheme has been created, the proper IP addresses and subnet masks can be configured on the hosts in the four subnetted LANs. These skills are taught in the Cisco Networking Academy courses related to CCNA level networking skills.
  22. Slide 22 – IP Address Configuration 8.3.2 Describe IP addressing Manual IP address configuration In a network with a small number of hosts, it is easy to manually configure each device with the proper IP address. A network administrator who understands IP addressing should assign the addresses and should know how to choose a valid address for a particular network. To manually enter an IP address on a host, go to the TCP/IP settings in the Properties window for the Network Interface Card (NIC). The NIC is the hardware that enables a computer to connect to a network. It has an address called the Media Access Control (MAC) address. Whereas the IP address is a logical address that is defined by the network administrator, a MAC address is "burned-in" or permanently programmed into the NIC when it is manufactured. The IP address of a NIC can be changed, but the MAC address never changes. The main difference between an IP address and a MAC address is that the MAC address is used to deliver frames on the LAN, while an IP address is used to transport frames outside the LAN. A frame is a data packet, along with address information added to the beginning and end of the packet before transmission over the network. Once a frame is delivered to the destination LAN, the MAC address is used to deliver the frame to the end host on that LAN. Dynamic IP address configuration If more than a few computers comprise the LAN, manually configuring IP addresses for every host on the network can be time-consuming and prone to errors. In this case, the use of a Dynamic Host Configuration Protocol (DHCP) server would automatically assign IP addresses and greatly simplify the addressing process. Student Activity: The student course content includes worksheet, 8.3.2 Identify IP Address Classes. To complete this worksheet, students will specify the IP Address Class for each given IP address and mask.
  23. Slide 23 – Dynamic Host Configuration Protocol (DHCP) 8.3.3 Define DHCP Dynamic Host Configuration Protocol (DHCP) is a software utility used to dynamically assign IP addresses to network devices. This dynamic process eliminates the need for manually assigning IP addresses. A DHCP server can be set up and the hosts can be configured to automatically obtain an IP address. When a computer is set to obtain an IP address automatically, all of the other IP addressing configuration boxes are dimmed. The server maintains a list of IP addresses to assign, and manages the process so that every device on the network receives a unique IP address. Each address is held for a predetermined amount of time. When the time expires, the DHCP server can use this address for any computer that joins the network. This is the IP address information that a DHCP server can assign to hosts includes: IP address Subnet mask Default gateway Optional values, such as a Domain Name System (DNS) server address
  24. Slide 24 – DHCP Process and Advantages 8.3.3 Define DHCP The DHCP server receives a request from a host. The server then selects IP address information from a set of predefined addresses that are stored in a database. Once the IP address information is selected, the DHCP server offers these values to the requesting host on the network. If the host accepts the offer, the DHCP server leases the IP address for a specific period of time. Using a DHCP server simplifies the administration of a network because the software keeps track of IP addresses. Automatically configuring TCP/IP also reduces the possibility of assigning duplicate or invalid IP addresses. For a computer on the network to take advantage of the DHCP server services, the computer must be able to identify the server on the local network. A computer can be configured to accept an IP address from a DHCP server by selecting the "Obtain an IP address automatically" option in the NIC configuration window. If your computer cannot communicate with the DHCP server to obtain an IP address, the Windows operating system will automatically assign a private IP address. If your computer is assigned an IP address in the range of 169.254.0.0 to 169.254.255.255, you computer will only be able to communicate with other computers in the same range. An example of when these private addresses would be useful is in a classroom lab where you wish to prevent access outside of your network. This operating system feature is called Automatic Private IP Addressing (APIPA). APIPA will continually request an IP address from a DHCP server for your computer.
  25. Slide 25 – Configure Host to Use DHCP 8.3.3 Define DHCP For a computer on the network to take advantage of the DHCP server services, the computer must be able to identify the server on the local network. A computer can be configured to accept an IP address from a DHCP server by selecting the "Obtain an IP address automatically" option in the NIC configuration window.
  26. Slide 26 – Internet Protocols 8.3.4 Describe Internet protocols and applications A protocol is a set of rules. Internet protocols are sets of rules governing communication within and between computers on a network. Protocol specifications define the format of the messages that are exchanged. Timing is crucial to network operation. Protocols require messages to arrive within certain time intervals so that computers will not wait indefinitely for messages that may have been lost. Therefore, systems maintain one or more timers during transmission of data. Protocols also initiate alternative actions if the network does not meet the timing rules. Many protocols consist of a suite of other protocols that are stacked in layers. These layers depend on the operation of the other layers in the suite to function properly. These are the main functions of protocols: Identifying errors Compressing the data Deciding how data is to be sent Addressing data Deciding how to announce sent and received data
  27. Slide 27 – Common Network Protocols 8.3.4 Describe Internet protocols and applications Here is a summarized list of some of the more common protocols used on networks and the Internet. These protocols are used to browse the web, send and receive e-mail, and transfer data files. TCP/IP - A protocol used to transport data on the Internet. NETBEUI and NETBIOS – A small, fast protocol designed for a workgroup network that requires no connection to the Internet. IPX and SPX – A protocol used to transport data on a Novell Netware network. HTTP and HTTPS – A protocol that defines how files are exchanged on the Web. FTP – A protocol that provides services for file transfer and manipulation. SSH – A protocol that is used to connect computers together securely. Telnet – A protocol that uses a text-based connection to a remote computer. POP – A protocol used to download email messages from an email server. IMAP – A protocol used to download email messages from an email server. SMTP – A protocol used to send mail in a TCP/IP network. Student Activity: The student course content includes a matching activity, 8.3.4 Network Protocols. To complete this matching activity, students will match the definition to the appropriate protocol.
  28. Slide 28 – Internet Control Message Protocol (ICMP) 8.3.5 Define ICMP Internet Control Message Protocol (ICMP) is used by devices on a network to send control and error messages to computers and servers. There are several different uses for ICMP, such as announcing network errors, announcing network congestion, and troubleshooting. Packet internet groper (ping) is commonly used to test connections between computers. Ping is a simple but highly useful command line utility used to determine whether a specific IP address is accessible. Ping can be used with either the hostname or the IP address to test IP connectivity. Ping works by sending an ICMP echo request to a destination computer or other network device. The receiving device then sends back an ICMP echo reply message.
  29. Slide 29 – Ping Command Switches 8.3.5 Define ICMP Ping is a troubleshooting tool used to determine basic connectivity. These command line switches that can be used with the ping command. Four ICMP echo requests (pings) are sent to the destination computer. If it is reachable, the destination computer responds with four ICMP echo replies. The percentage of successful replies can help you to determine the reliability and accessibility of the destination computer.
  30. Slide 30 – Output of the Ping Command 8.3.5 Define ICMP It is also possible to use ping to find the IP address of a host when the name is known. If you ping the name of a website, for example, www.cisco.com, the IP address of the server displays. Other ICMP messages are used to report: Undeliverable packets Data on an IP network that includes source and destination IP addresses Whether a device is too busy to handle the packet A data packet arrives at a router, which is a networking device that forwards data packets to other networks. If the router does not know where to send the packet, the router deletes it. The router then sends an ICMP message back to the sending computer. A busy router may send an ICMP message to the sending computer advising it to slow down because of network congestion.
  31. Slide 31 – Physical Network Components 8.4 Describe the physical components of a network There are many devices that can be used in a network to provide connectivity. The device you use will depend on how many devices you are connecting, the type of connections that they use, and the speed at which the devices operate. These are the most common devices on a network: Computers Hubs Switches Routers Wireless access points The physical components of a network are needed to move data between these devices. The characteristics of the media determine where and how the components are used. These are the most common media used on networks: Twisted-pair copper cabling Fiber-optic cabling Radio waves After completing this section, students will meet these objectives: Identify names, purposes, and characteristics of network devices Identify names, purposes, and characteristics of the common network cables
  32. Slide 32 – Hubs 8.4.1 Identify names, purposes, and characteristics of network devices To make data transmission more extensible and efficient than a simple peer-to-peer network, network designers use specialized network devices, such as hubs, switches, routers, and wireless access points, to send data between network devices. The type of connection that is needed determines the device that is used. Hubs are devices that extend the range of a network by receiving a signal on one port, then regenerating the signal and sending it out to all other ports. This process means that all traffic from a device connected to the hub is sent to all the other devices connected to the hub every time the hub transmits data. This causes a great amount of network traffic. Hubs are also called concentrators, because they serve as a central connection point for a LAN.
  33. Slide 33 – Bridges and Switches 8.4.1 Identify names, purposes, and characteristics of network devices Files are broken up into small pieces of data, called packets, before they are transmitted over a network. This allows for error checking and easier retransmission if the packet is lost or corrupted. Address information is added to the beginning and to the end of packets before they are transmitted over the network. The packet, along with the address information, is called a frame. LANs are often divided into sections called segments bounded by bridges. A bridge has the intelligence to determine if an incoming frame is to be sent to a different segment, or dropped. This improves traffic flow of data by keeping frames from entering the wrong segment. A bridge has two ports. Switches are sometimes called multiport bridges. A typical bridge may have just two ports, linking two segments of the same network. A switch has several ports, depending on how many network segments are to be linked. A switch is a more sophisticated device than a bridge. A switch maintains a table of the MAC addresses for computers that are connected to each port. When a frame arrives at a port, the switch compares the address information in the frame to its MAC address table. The switch then determines which port to use to forward the frame.
  34. Slide 34 – Routers 8.4.1 Identify names, purposes, and characteristics of network devices While a switch connects segments of a network, routers are devices that connect entire networks to each other. Switches use MAC addresses to forward a frame within a single network. Routers use IP addresses to forward frames to other networks. A router can be a computer with special network software installed, or a router can be a device built by network equipment manufacturers. Routers contain tables of IP addresses along with optimal destination routes to other networks.
  35. Slide 35 – Wireless Access Points 8.4.1 Identify names, purposes, and characteristics of network devices Wireless access points provide network access to wireless devices such as laptops and PDAs. The wireless access point uses radio waves to communicate with radios in computers, PDAs, and other wireless access points. An access point has limited range of coverage. Large networks require several access points to provide adequate wireless coverage.
  36. Slide 36 – Multipurpose Devices 8.4.1 Identify names, purposes, and characteristics of network devices There are network devices that perform more than one function. It is more convenient to purchase and configure one device that serves all of your needs than to purchase a separate device for each function. This is especially true for the home user. In your home, you would purchase a multipurpose device instead of a switch, a router, and a wireless access point. The Linksys 300N is an example of a multipurpose device.
  37. Slide 37 – Twisted-Pair Cabling 8.4.2 Identify names, purposes, and characteristics of common network cables Until recently, cables were the only medium used to connect devices on networks. A wide variety of networking cables are available. Coaxial and twisted-pair cables use copper to transmit data. Fiber-optic cables use glass or plastic to transmit data. These cables differ in bandwidth, size, and cost. As a technician, you need to know what type of cable to use in different situations so that you are able to install the correct cables for the job. You will also need to be able to troubleshoot and repair problems that you encounter. Twisted-pair is a type of copper cabling that is used for telephone communications and most Ethernet networks. A pair of wires forms a circuit that can transmit data. The pair is twisted to provide protection against crosstalk, which is the noise generated by adjacent pairs of wires in the cable. Pairs of copper wires are encased in color-coded plastic insulation and twisted together. An outer jacket protects the bundles of twisted pairs called poly-vinyl chloride (PVC). PVC will produce hazardous fumes when burned. Most network cables are installed in the plenum space, or areas in the ceiling, in the walls, and under the floor. If cables with the PVC jackets do burn in the plenum space, hazardous fumes can spread quickly through a building. To avoid this danger, only install plenum-grade fire resistant cabling in the plenum space. When electricity flows through a copper wire, a magnetic field is created around the wire. A circuit has two wires, and in a circuit, the two wires have oppositely charged magnetic fields. When the two wires of the circuit are next to each other, the magnetic fields cancel each other out. This is called the cancellation effect. Without the cancellation effect, your network communications become slow due to the interference caused by the magnetic fields.
  38. Slide 38 – Two Basic Types of Twisted-pair Cables 8.4.2 Identify names, purposes, and characteristics of common network cables There are two basic types of twisted-pair cables: Unshielded twisted-pair (UTP) Has two or four pairs of wires Relies on the cancellation effect for reduction of interference caused by electromagnetic interface (EMI) and radio frequency interference (RFI) Most commonly used cabling in networks Has a range of 328 ft (100 meters) Shielded twisted-pair (STP) Each pair is wrapped in metallic foil to better shield the wires from electrical noise. Four pairs of wires are then wrapped in an overall metallic braid or foil. STP reduces electrical noise from within the cable. It also reduces EMI and RFI from outside the cable. Facts about STP Prevents interference better than UTP. Primarily used outside North America. Disadvantages of STP More expensive because of extra shielding. More difficult to install because of the thickness. Metallic shielding must be grounded at both ends. If not, shield acts like an antenna picking up unwanted signals.
  39. Slide 39 – Category Rating 8.4.2 Identify names, purposes, and characteristics of common network cables UTP comes in several categories that are based on two factors: The number of wires in the cable The number of twists in those wires Category 3 is the wiring used for telephone connections. It has four pairs of wires and a maximum data transmission rate of up to 16 Mbps. Category 5 and Category 5e have four pairs of wires with a maximum data transmission rate of up to 100 Mbps. Category 5 and 5e are the most common network cables used. Category 5e has more twists per foot than Category 5 wiring. These extra twists further prevent interference from outside sources and the other wires within the cable. Category 6 cable uses a plastic divider to separate and maintain the position of the pairs of wires relative to each other. This prevents interference. The pairs also have more twists than Category 5e cable.
  40. Slide 40 – Coaxial Cable 8.4.2 Identify names, purposes, and characteristics of the common network cables Coaxial cable is a copper-cored cable surrounded by a heavy shielding. Coaxial cable is used to connect computers in a network. There are several types of coaxial cable, including the following: Thicknet or 10Base5 - Coax cable that was used in networks and operated at 10 megabits per second with a maximum length of 500 meters. Thinnet or 10Base2 - Coax cable that was used in networks and operated at 10 megabits per second with a maximum length of 185 meters. RG-59 - Most commonly used for cable television in the US RG-6 - Higher quality cable than RG-59 with more bandwidth and less susceptibility to interference
  41. Slide 41 – Fiber-Optic Cable 8.4.2 Identify names, purposes, and characteristics of common network cables A glass or plastic strand that transmits information using light and is made up of one or more optical fibers enclosed together in a sheath or jacket. Not affected by electromagnetic or radio frequency interference. All signals are converted to light pulses to enter the cable, and converted back into electrical signals when they leave it. Signals are clearer, can go farther, and have greater bandwidth than with copper cable. Signal can travel several miles or kilometers before the signal needs to be regenerated. Usually more expensive to use than copper cabling and the connectors are more costly and harder to assemble. Common connectors for fiber-optic networks are SC, ST, and LC. These three types of fiber-optic connectors are half-duplex, which allows data to flow in only one direction. Therefore, two cables are needed. Two types of glass fiber-optic cable: Multimode - Cable that has a thicker core than single-mode cable. It is easier to make, can use simpler light sources (LEDs), and works well over distances of a few kilometers or less. Single-mode - Cable that has a very thin core. It is harder to make, uses lasers as a light source, and can transmit signals dozens of kilometers with ease.
  42. Slide 42 – LAN Topologies and Architectures 8.5 Describe LAN topologies and architectures Topologies and architectures are building blocks for designing a computer network. A technician needs to understand how networks are designed in order to work on computers that are part of a network. There are two types of LAN topologies: physical and logical. A physical topology is the physical layout of the components on the network. A logical topology determines how the hosts communicate across a medium, such as a cable or the airwaves. Topologies are commonly represented as network diagrams. A LAN architecture is built around a topology. LAN architecture comprises all the components that make up the structure of a communications system. These components include the hardware, software, protocols, and sequence of operations. After completing this section, students will meet these objectives: Describe LAN topologies Describe LAN architectures
  43. Slide 43 - LAN Physical Topologies 8.5.1 Describe LAN topologies A physical topology defines the way in which computers, printers, and other devices are connected to a network. A logical topology describes how the hosts access the medium and communicate on the network. The type of topology determines the capabilities of the network, such as ease of setup, speed, and cable lengths. These are common LAN physical topologies: Bus Ring Star Hierarchical star Mesh
  44. Slide 44 – Bus Topology 8.5.1 Describe LAN topologies In a bus topology, each computer connects to a common cable. The cable connects one computer to the next, like a bus line going through a city. The cable has a small cap installed at the end of the wire, called a terminator. The terminator prevents signals from bouncing back and causing network errors. Only one computer can transmit data at a time. When multiple computers send frames at the same time, these frames collide and are destroyed. When this happens, the computers must resend the frames. This topology is rarely used and would only be suitable for a home office or small business with few hosts.
  45. Slide 45 – Ring Topology 8.5.1 Describe LAN topologies In a ring topology, hosts are connected in a physical ring or circle. The ring topology has no beginning or end, so the cable does not need to be terminated. A specially-formatted frame, called a token , travels around the ring, stopping at each host. If a host wants to transmit data, the host adds the data and the destination address to the frame. The frame then continues around the ring until the frame stops at the host with the destination address. The destination host takes the data out of the frame. The advantage of using a ring topology is that there are no collisions . When electrical signals run into each other, they cancel each other out. This is called a collision. There are no collisions because the host with the token is the only host that is allowed to transmit data. There are two types of ring topologies: Single-ring - All the devices on the network connect to a single cable and the data travels in one direction only. Each device has an opportunity to send data over the network. Dual ring - All the devices on the network connect to two cables and the data travels in both directions. Only one cable is used at a time. In the event of a failure of one ring, data is transmitted on the other ring. A Token Ring network is the most common implementation of the ring topology. A Token Ring network uses a ring topology and a token-passing methodology to prevent collisions. Some characteristics of Token Ring networks are: Token Ring was developed by IBM and conforms to the Institute of Electrical and Electronics Engineers (IEEE) 802.5 standard. Token Ring networks typically operate at 4 or 16 Mbps.
  46. Slide 46 – Star Topology 8.5.1 Describe LAN topologies The star topology has a central connection point, which is normally a device such as a hub, switch, or router. Each host on a network has a cable segment that attaches the host directly to the central connection point. A star topology costs more to implement than the bus topology because more cable is used, and a central device is needed, such as a hub, switch, or router. The advantage of a star topology is that it is easy to troubleshoot. Each host is connected to the central device with its own wire. If there is a problem with that cable, only that host is affected. The rest of the network remains operational.
  47. Slide 47 – Hierarchical Star Topology 8.5.1 Describe LAN topologies A hierarchical or extended star topology is a star network with an additional networking device connected to the main networking device. Typically, a network cable connects to one hub, and then several other hubs connect to the first hub. A hierarchical star topology can be used with network devices that filter frames or packets, such as bridges, switches, and routers. This topology, when used with these devices, significantly reduces congestion by sending packets only to the network segment of the destination host. Larger networks, such as those of corporations or universities, use the hierarchical star topology.
  48. Slide 48 – Mesh Topology 8.5.1 Describe LAN topologies The mesh topology connects all devices to each other. When every device is connected to every other device, a failure of any cable will not affect the network. The mesh topology is used in WANs that interconnect LANs. Mesh topologies are expensive and difficult to install because of the amount of cable necessary to connect every device to every other device on the network. The Internet is a good example of a mesh topology. On the Internet, if one device breaks down, the data can be routed through another device. Mesh topologies are often used by governments when data must be available even in the event of a network failure.
  49. Slide 49 – Logical Topologies 8.5.1 Describe LAN topologies The two most common types of logical topologies are broadcast and token passing. In a broadcast topology, each host addresses either data to a particular host or to all hosts connected on a network. There is no order that the hosts must follow to use the network – it is first come, first served for transmitting data on the network. Token passing controls network access by passing an electronic token sequentially to each host. When a host receives the token, it can send data on the network. If the host has no data to send, it passes the token to the next host and the process repeats itself.
  50. Slide 50 – LAN Architecture 8.5.2 Describe LAN architectures A LAN architecture is the overall structure of a computer or communication system and determines the capabilities and limitations of the system. LAN architectures are designed for a specific use and have different speeds and capabilities. LAN architecture describes both the physical and logical topologies used in a network. These are the three most common LAN architectures: Ethernet Token Ring Fiber-Distributed Data Interface (FDDI)
  51. Slide 51 – Ethernet 8.5.2 Describe LAN architectures The Ethernet architecture is based on the IEEE 802.3 standard, which specifies that a network use the Carrier Sense Multiple Access with the Collision Detection ( CSMA/CD ) access control method. In CSMA/CD, hosts access the network using the first come, first served broadcast topology method to transmit data. Ethernet uses a logical bus or broadcast topology and either a bus or star physical topology. As networks expand, most Ethernet networks are implemented using an extended star or hierarchical star topology. Standard transfer rates are 10 Mbps or 100 Mbps, but new standards outline Gigabit Ethernet, which is capable of attaining speeds up to 1000 Mbps (1 Gbps).
  52. Slide 52 – Token Ring 8.5.2 Describe LAN architectures IBM originally developed Token Ring as reliable network architecture based on the token-passing access control method. Token Ring is often integrated with IBM mainframe systems. Token Ring is used with computers and mainframes. Token Ring is an example of an architecture where the physical topology is different from its logical topology. The Token Ring topology is referred to as a star-wired ring because the outer appearance of the network design is a star. The computers connect to a central hub, called a multistation access unit (MSAU). Inside the device, however, the wiring forms a circular data path, creating a logical ring. The logical ring is created by the token traveling out of a MSAU port to a computer. If the computer does not have any data to send, the token is sent back to the MSAU port and then out the next port to the next computer. This process continues for all computers and therefore resembles a physical ring.
  53. Slide 53 – Fiber Distributed Data Interface (FDDI) 8.5.2 Describe LAN architectures FDDI is a type of Token Ring network. The implementation and topology of FDDI differ from the IBM Token Ring LAN architecture. FDDI is often used for LANs, such as those connecting several buildings in an office complex or on a university campus. FDDI runs on fiber-optic cable. FDDI combines high-speed performance with the advantages of the token-passing ring topology. FDDI runs at 100 Mbps on a dual-ring topology. The outer ring is called the primary ring and the inner ring is called the secondary ring. Normally, traffic flows only on the primary ring. If the primary ring fails, the data automatically flows onto the secondary ring in the opposite direction. A FDDI dual ring supports a maximum of 500 computers per ring. The total distance of each length of the cable ring is 62 miles (100 km). A repeater, which is a device that regenerates signals, is required every 1.2 miles (2 km). Note: ISPs have used FDDI due to the redundancy FDDI provides with its dual ring. The newer forms of Ethernet and other enhancements to Ethernet have begun to replace FDDI in this role. In recent years, many token ring networks have been replaced by faster Ethernet networks. Resources: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/fddi.htm
  54. Slide 54 - Standards Organizations 8.6 Identify standards organizations Several worldwide standards organizations are responsible for settings networking standards. Standards are used by manufacturers as a basis for developing technology, especially communications and networking technologies. Standardizing technology ensures that products will be able to communicate with any other products using the same technology. The standards groups create, examine, and update standards and technology to meet the demands for higher bandwidth, efficient communication, and reliable service. These standards are applied to the development of technology to meet the demands for higher bandwidth, efficient communication, and reliable service. Be familiar with these standards to implement and repair equipment that follows the guidelines described in the standards. If the standards are not followed during a cable installation, for example, the network may not operate at the speed needed. When you do not adhere to standards, you may also find that you have trouble updating, replacing, or upgrading network components. Resources: Telecommunication Standardization Sector of the International Telecommunications Union (ITU-T) http://www.itu.int/ITU-T/ Institute of Electrical and Electronics Engineers (IEEE) http://www.ieee.org/ International Organization for Standardization (ISO) http://www.iso.ch/iso/ Internet Architecture Board (IAB) http://www.iab.org/ International Electrotechnical Commission (IEC) http://www.iec.ch/ American National Standards Institute (ANSI) http://www.ansi.org/ Telecommunications Industry Association (TIA) http://www.tiaonline.org/ Electronic Industries Alliance (EIA) http://www.eia.org/
  55. Slide 55 – Ethernet Standards 8.7 Identify Ethernet standards Ethernet protocols describe the rules that control how communication occurs on an Ethernet network. To ensure that all Ethernet devices are compatible with each other, the IEEE developed standards for manufacturers and programmers to follow when making and programming Ethernet devices. After completing this section, students will meet these objectives: Explain cabled Ethernet standards Explain wireless Ethernet standards
  56. Slide 56 – Cabled Ethernet Standards 8.7.1 Explain cabled Ethernet standards The Ethernet architecture is based on the IEEE 802.3 standard. The IEEE 802.3 standard specifies that a network implement the CSMA/CD access control method. In CSMA/CD, all end stations "listen" to the network wire for clearance to send data. This process is similar to waiting to hear a dial tone on a phone before dialing a number. When the end station detects that no other host is transmitting, the end station will attempt to send data. If no other station sends any data at the same time, this transmission will arrive at the destination computer with no problems. If another end station observed the same clear signal and transmitted at the same time, a collision will occur on the network media. The first station that detects the collision, or the doubling of voltage, sends out a jam signal that tells all stations to stop transmitting and to run a backoff algorithm. A backoff algorithm calculates random times in which the end station will start to try network transmission again. This random time is typically in one or two milliseconds (ms), or thousandths of a second. This sequence occurs every time there is a collision on the network and can reduce Ethernet transmission by up to 40%.
  57. Slide 57 - 10BASE-T 8.7.1 Explain cabled Ethernet standards The IEEE 802.3 standard defines several physical implementations that support Ethernet. Some of the common implementations are described here. 10BASE-T is an Ethernet technology that uses a star topology. 10BASE-T is a popular Ethernet architecture whose features are indicated in its name: The ten (10) represents a speed of 10 Mbps. BASE represents baseband transmission. In baseband transmission, the entire bandwidth of a cable is used for one type of signal. The T represents twisted-pair copper cabling. Advantages of10BASE-T: Installation of cable is inexpensive compared to fiber-optic installation. Cables are thin, flexible, and easier to install than coaxial cabling. Equipment and cables are easy to upgrade. Disadvantages of 10BASE-T: The maximum length for a 10BASE-T segment is only 328 ft (100 m). Cables are susceptible to Electromagnetic Interference (EMI).
  58. Slide 58 – 100BASE-TX “FastEthernet” 8.7.1 Explain cabled Ethernet standards The high bandwidth demands of many modern applications, such as live video conferencing and streaming audio, have created a need for higher data-transfer speeds. Many networks require more bandwidth than 10 Mbps Ethernet. 100BASE-TX is much faster than 10BASE-T and has a theoretical bandwidth of 100 Mbps. The "X" indicates that you can use many different types of copper and fiber-optic cabling. Advantages of 100BASE-TX: At 100 Mbps, transfer rates of 100BASE-TX are ten times that of 10BASE-T. 100BASE-X uses twisted-pair cabling, which is inexpensive and easy to install. Disadvantages of 100BASE-TX: The maximum length for a 100BASE-TX segment is only 328 ft (100 m). Cables are susceptible to Electromagnetic Interference (EMI).
  59. Slide 59 – 1000BASE-TX “Gigabit Ethernet” 8.7.1 Explain cabled Ethernet standards 1000BASE -T is commonly known as Gigabit Ethernet. Gigabit Ethernet is a LAN architecture. Advantages of 1000BASE-T: The 1000BASE-T architecture supports data transfer rates of 1 Gbps. At 1 Gbps, it is ten times faster than Fast Ethernet, and 100 times faster than Ethernet. This increased speed makes it possible to implement bandwidth-intensive applications, such as live video. The 1000BASE-T architecture has interoperability with 10BASE-T and 100BASE-TX. Disadvantages of 1000BASE-T: The maximum length for a 1000BASE-T segment is only 328 ft (100 m). It is susceptible to interference. Gigabit NICs and switches are expensive. Additional equipment is required.
  60. Slide 60 – Wireless Ethernet Standards 8.7.2 Explain wireless Ethernet standards IEEE 802.11 is the standard that specifies connectivity for wireless networks. IEEE 802.11, or Wi-Fi (wireless fidelity), refers to the collective group of standards, 802.11 (the original specification), 802.11b, 802.11a, 802.11g, and 802.11n. These protocols specify the frequencies, speeds, and other capabilities of the different Wi-Fi standards. 802.11a - Devices conforming to the 802.11a standard allow WLANs to achieve data rates as high as 54 Mbps. IEEE 802.11a devices operate in the 5 GHz radio frequency range and within a maximum range of 150 feet (45.7 m). 802.11b operates in the 2.4 GHz frequency range with a maximum theoretical data rate of 11 Mbps. These devices operate within a maximum range of 300 feet (91 m). 802.11g provides the same theoretical maximum speed as 802.11a, which is 54 Mbps, but operates in the same 2.4 GHz spectrum as 802.11b. Unlike 802.11a, 802.11g is backward-compatible with 802.11b. 802.11g also has a maximum range of 300 feet (91 m). 802.11n is a newer wireless standard that has a theoretical bandwidth of 540 Mbps and operates in either the 2.4 GHz or 5 GHz frequency range with a maximum range of 984 feet (250 m).
  61. Slide 61 – IEEE 802.11a WLAN Standard 8.7.2 Explain wireless Ethernet standards Devices conforming to the 802.11a standard allow WLANs to achieve data rates as high as 54 Mbps. IEEE 802.11a devices operate in the 5 GHz radio frequency range. The 802.11a standard positively affects performance because of the devices operating on a higher frequency, and the combination of the coding and modulation techniques used. 802.11a is in a wider frequency, 5 GHz, to access the higher speeds, and also to avoid interference issues in the crowded 2.4 GHz band where 802.11b WLANs, HomeRF LANs, Bluetooth devices, cordless phones, and even microwave ovens operate. The benefits of using the 5 GHz spectrum may be canceled out by the lack of backward compatibility with the current generation of 802.11b LANs. This is because the frequencies do not match. Many vendors are addressing this problem by producing dual-mode products that contain two radios, one that operates in the 2.4 GHz range, and one that operates in the 5 GHz range. 802.11a has a range of approximately 100 ft (30 m).
  62. Slide 62 – IEEE 802.11b WLAN Standard 8.7.2 Explain wireless Ethernet standards Ratified in 1999, 802.11b is an extension of the original 802.11 standard. 802.11b operates in the 2.4 GHz frequency range with a maximum theoretical data rate of 11 Mbps. Because of process within the protocol, common data rates are typically reduced to 6.5 Mbps. 802.11b has an average range of approximately 100 ft (30 m) at 11 Mbps and 295 ft (90 m) at 1 Mbps. This range fluctuates depending on the operational speed. Signal quality dictates the operational speed of 802.11b.
  63. Slide 63 – IEEE 802.11g and 802.11n 8.7.2 Explain wireless Ethernet standards The IEEE 802.11g standard was published in July 2003. 802.11g provides the same theoretical maximum speed as 802.11a, which is 54 Mbps, but operates in the same 2.4 GHz spectrum as 802.11b. Unlike 802.11a, 802.11g is backward compatible with 802.11b. Interoperability among and between all speeds exists, so the entire WLAN does not need to be upgraded when moving to higher speeds. 802.11g has an average range of approximately 100 ft (30 m). 802.11n will have a theoretical bandwidth of 540 Mbps and operate in either the 2.4 GHz or 5 GHz frequency range with a maximum range of 164 ft (50 m). The IEEE 802.11 project timeline expects 802.11n to be approved in April 2008. In January 2007, the task group adjusted this timeline to ratify 802.11n earlier than April 2008.
  64. Slide 64 – Wireless Ethernet Standards 8.7.2 Explain wireless Ethernet standards An 802.11 access point has three different operating modes: Legacy - Only 802.11a, b, and g Mixed - Both 802.11a, b, g, and n Greenfield - Only 802.11n Resources: http://www.csot.com/ethernet/wireless.htm
  65. Slide 65 – OSI and TCP/IP Data Models 8.8 Explain OSI and TCP/IP data models An architectural model is a common frame of reference for explaining Internet communications and developing communication protocols. It separates the functions of protocols into manageable layers. Each layer performs a specific function in the process of communicating over a network. The TCP/IP model was created by researchers in the US Department of Defense (DoD). The TCP/IP model is a tool used to help explain the TCP/IP suite of protocols, which is the dominant standard for transporting data across networks. This model has four layers. In the early 1980s, the International Standards Organization (ISO) developed the Open Systems Interconnect (OSI) model, which was defined in ISO standard 7498-1, to standardize the way devices communicate on a network. This was a major step forward to ensuring that there would be interoperability between network devices. After completing this section, students will meet these objectives: Define the TCP/IP model Define the OSI model Compare OSI and TCP/IP
  66. Slide 66 – TCP/IP Model 8.8.1 Define the TCP/IP model The TCP/IP reference model Frame of reference used to develop the Internet's protocols Consists of layers that perform functions necessary to prepare data for transmission over a network A message moves from the top (Application) layer down the TCP/IP layers to the bottom network access layer. Header information is added to the message as it moves down through each layer and is then transmitted. After reaching the destination, the message travels back up through each layer of the TCP/IP model. The header information that was added to the message is stripped away as the message moves up through the layers toward its destination. Application protocols provide network services to user applications such as web browsers and e-mail programs Transport protocols provide end-to-end management of the data and divides the data into manageable segments for easier transport across the network Internet protocols provide connectivity between hosts in the network Network Access protocols describe the standards that hosts use to access the physical media. The IEEE 802.3 Ethernet standards and technologies, such as CSMA/CD and 10BASE-T are defined in this layer.
  67. Slide 67 - The OSI Model 8.8.2 Define the OSI model The OSI model is an industry standard framework that is used to divide network communications into seven distinct layers. Although other models exist, most network vendors today build their products using this framework. A system that implements protocol behavior consisting of a series of these layers is known as a protocol stack. Protocol stacks can be implemented either in hardware or software, or a combination of both. Typically, only the lower layers are implemented in hardware, and the higher layers are implemented in software.
  68. Slide 68 - The OSI Model 8.8.2 Define the OSI model Each layer is responsible for part of the processing to prepare data for transmission on the network. The chart shows what each layer of the OSI model does. NOTE: Mnemonics can help you remember the seven layers of the OSI. Some examples include: "All People Seem To Need Data Processing" and "Please Do Not Throw Sausage Pizza Away".
  69. Slide 69 – Compare OSI and TCP/IP Models 8.8.3 Compare OSI and TCP/IP The OSI model and the TCP/IP model are both reference models used to describe the data communication process. The TCP/IP model is used specifically for the TCP/IP suite of protocols and the OSI model is used for development of standard communication for equipment and applications from different vendors. The TCP/IP model performs the same process as the OSI model, but uses four layers instead of seven. Student Activity: The student course content includes a matching activity, 8.8.3 OSI Model. To complete this activity, students will match the OSI layers to the TCP/IP layers.
  70. Slide 70 – Configuring a NIC and a Modem 8.9 Describe how to configure a NIC and a modem A network interface card (NIC) is required to connect to the Internet. The NIC may come preinstalled or you may have to purchase one separately. Use the driver that comes with the motherboard or adapter. If necessary, download an updated driver from the manufacturer. After completing this section, students will meet these objectives: Install or update a NIC driver Attach the computer to an existing network Describe installation of modem
  71. Slide 71 – Install or Update a NIC Driver 8.9.1 Install or update a NIC driver Manufacturers will publish new driver software for a NIC. May enhance the functionality of the NIC May be needed for operating system compatibility To install a new driver Disable virus protection software Install only one driver at a time Close all applications that are running so that they are not using any files associated with the driver update. Visit the manufacturer's website and download a self-extracting executable driver file that will automatically install or update the driver
  72. Slide 72 – Install or Update a NIC Driver 8.9.1 Install or update a NIC driver Alternatively, you can click the Update Driver button in the toolbar of the Device Manager Choose Start > Control Panel > System > Hardware tab. In the Device Manager area, click Device Manager tab and click Update Driver… The " + " next to the Network adapters category allows you to expand the category and show the network adapters installed in your system To view and change the properties of the adapter, double-click the adapter In the Adapter Properties window, and select the driver After updating, reboot the computer Rebooting after driver changes will make sure that the installation has gone as planned and the new driver is working properly When installing multiple drivers, reboot the computer between each update to make sure there are no conflicts Uninstall a NIC Driver - If a new NIC driver does not perform as expected after it has been installed, the driver can be uninstalled, or rolled back, to the previous driver Double-click the adapter in the Device Manager . In the Adapter Properties window, select the Driver tab and click Roll Back Driver If there was no driver installed before the update, this option will not be available You will need to find a driver for the device and install it manually if the operating system could not find a suitable driver for the NIC. Student Activity: The student course content includes worksheet, 8.9.1 Internet Search for NIC Drivers. To complete this worksheet, students will research the latest NIC drivers for various network cards.
  73. Slide 73 – Attach Computer to Existing Network 8.9.2 Attach Computer to existing network Now that the NIC drivers are installed, connect to the network. Plug a network cable, also called an Ethernet patch or straight-through cable, into the network port on the computer. Plug the other end into the network device or wall jack. After connecting the network cable, look at the LEDs, or link lights, next to the Ethernet port on the NIC. If there is no activity, this may indicate a faulty cable, a faulty hub port, or even a faulty NIC. You may have to replace one or more of these devices to correct the problem.
  74. Slide 74 – Configure the NIC 8.9.2 Attach Computer to existing network The computer will now need an IP address. Most networks are set up so that the computer will receive an IP address automatically from a local DHCP server. If the computer does not have an IP address, you will need to enter a unique IP address in the TCP/IP properties of the NIC. Click Start > Control Panel > Network Connections > Local Area Connection Every NIC must be configured with the following information: The same protocol must be implemented between any two computers that communicate on the same network. The IP address is configurable and must be unique to each device. The IP address can be manually configured or automatically assigned by DHCP. Each device has a unique MAC address . The MAC address is assigned by the manufacturer and cannot be changed.
  75. Slide 75 – What is the Assigned IP Address? 8.9.2 Attach Computer to existing network Once the computer is connected to the network, you should test connectivity. Use the ipconfig program to find out the IP address assigned to the computer.
  76. Slide 76 – Test Connectivity 8.9.2 Attach Computer to existing network Ping your own IP address to make sure that your NIC is working properly. Once you have determined that your NIC is working, ping your default gateway or another computer on your network. A default gateway is a computer or router that serves as the entry point and exit point of your subnet. If you have an Internet connection, ping a popular website, such as www.cisco.com. If you can ping an Internet site successfully, everything is working properly with your connection. If you cannot ping one of these items, you will need to begin troubleshooting the connection. Student Activity: The student course content includes the lab, 8.9.2 Lab: Configure an Ethernet NIC to use DHCP. To complete this lab, students will configure an Ethernet NIC to use DHCP to obtain an IP address.
  77. Slide 77 – Modem Installation 8.9.3 Describe the installation of a modem A modem is an electronic device that transfers data between one computer and another using analog signals over a telephone line. A transmitting modem converts digital data to analog signals. The receiving modem reconverts the analog signals back to digital data. These processes are called modulation/demodulation. An internal modem plugs into an expansion slot on the motherboard. To configure a modem, jumpers may have to be set to select the IRQ and I/O addresses. No configuration is needed for a plug-and-play modem. A modem using a serial port that is not yet in use must be configured. Additionally, the software drivers that come with the modem must be installed for the modem to work properly. External modems connect to a computer through the serial and USB ports.
  78. Slide 78 – Dial-up Networking (DUN) 8.9.3 Describe the installation of a modem When computers use the public telephone system to communicate, it is called dial-up networking ( DUN ). Modems communicate with each other using audio tone signals. Modems can duplicate the dialing characteristics of a telephone. DUN creates a Point-to-Point Protocol (PPP) connection between two computers over a phone line. After the line connection has been established, a "handshaking sequence" takes place between the two modems and the computers. The handshaking sequence is a series of short communications that occur between the two systems. This is done to establish the readiness of the two modems and computers to engage in data exchange. Dial-up modems send data over the serial telephone line in the form of an analog signal. Analog signals can be drawn as waves because they change gradually and continuously. In this system, the digital signals are represented by 1s and 0s. The digital signals must be converted to a waveform to travel across telephone lines. They are converted back to the digital form, 1s and 0s, by the receiving modem so that the receiving computer can process the data.
  79. Slide 79 – AT Commands 8.9.3 Describe the installation of a modem All modems require software to control the communication session. Most modem software uses the Hayes-compatible command set. The Hayes command set is based on a group of instructions that always begins with a set of attention characters (AT), followed by the command characters. These are known as AT commands. The AT commands are modem control commands. The AT command set is used to issue dial, hang up, reset, and other instructions to the modem. Most user manuals that come with a modem contain a complete listing of the AT command set. The standard Hayes compatible code to dial is ATDxxxxxxx. There are usually no spaces in an AT string. If a space is inserted, most modems will ignore it. The "x" signifies the number dialed. There will be seven digits for a local call and 11 digits for a long-distance call. A W indicates that the modem will wait for an outside line, if necessary, to establish a tone before proceeding. Sometimes, a T is added to signify tone dialing or a P is added to signify pulse dialing.
  80. Slide 80 – Other types of Connectivity 8.10 Identify names, purposes, and characteristics of other technologies used to establish connectivity Phone, cable, satellite, and private telecommunications companies provide Internet connections. In the 1990s, low-speed modems used the plain old telephone system (POTS) to send and receive data. Today, many businesses and home users have switched to high-speed Internet connections, which allows for transmission of data, voice and video. A technician should understand how users connect to the Internet and the advantages and disadvantages of different connection types. After completing this section, students will meet these objectives: Describe telephone technologies Define power line communication Define broadband Define VOIP
  81. Slide 81 – Integrated Services Digital Network 8.10.1 Describe telephone technologies There are several WAN solutions available for connecting between sites or to the Internet. WAN connection services provide different speeds and levels of service. Before committing to any type of Internet connection, research all available services to determine the best solution to match the needs of your customer. Analog telephone technology uses standard voice telephone lines. This type of service uses a modem to place a telephone call to another modem at a remote site, such as an Internet Service provider. There are two major disadvantages of using the phone line with an analog modem. The first is that the telephone line cannot be used for voice calls while the modem is in use. The second is the limited bandwidth provided by analog phone service. The maximum bandwidth using an analog modem is 56 Kbps, but in reality, it is usually much lower than that. An analog modem is not a good solution for the demands of busy networks. Integrated Services Digital Network (ISDN) is a standard for sending voice, video, and data over normal telephone wires. ISDN technology uses the telephone wires as an analog telephone service. Because ISDN uses digital technology, it provides higher-quality voice and higher-speed data transfer than traditional analog telephone service. Three services are offered by ISDN digital connections: Basic Rate Interface (BRI), Primary Rate Interface (PRI), and Broadband ISDN (BISDN). ISDN uses two different types of communications channels: "B" channel is used to carry the information - data, voice, or video. "D" channel is usually used for controlling and signaling, but can be used for data.
  82. Slide 82 – ISDN Types 8.10.1 Describe telephone technologies ISDN Basic Rate Interface (BRI) offers a dedicated 128 Kbps connection using two 64 Kbps B channels. ISDN BRI also uses on 16 Kbps D channel for call setup, control, and teardown. ISDN Primary Rate Interface (PRI) offers up to 1.544 Mbps over 23 B channels in North America and Japan or 2.048 Mbps over 30 B channels in Europe and Australia. ISDN PRI also uses one D channel for call maintenance. Broadband ISDN (BISDN) manages different types of service all at the same time. BISDN is mostly used only in network backbones.
  83. Slide 83 – Digital Subscriber Line (DSL) 8.10.1 Describe telephone technologies DSL is an "always-on" technology. There is no need to dial up each time to connect to the Internet. DSL uses the existing copper telephone lines to provide high-speed data communication between end users and telephone companies. Unlike ISDN, where the digital data communications replaces the analog voice communications, DSL shares the telephone wire with analog signals. This sharing of the phone wire allows voice calls to be placed while DSL is connecting to the Internet. Two major considerations when selecting DSL: DSL has distance limitations. The voice information and the data carried by DSL must be separated at the customer site. Asymmetric DSL (ADSL) is currently the most commonly used DSL technology. Has different bandwidth capabilities in each direction, Has a fast downstream speed - typically 1.5 Mbps. Downstream is the process of transferring data from the server to the end user. Upload rate of ADSL is slower. Does not perform well when hosting a web server or FTP server, both of which involve upload-intensive Internet activities.
  84. Slide 84 – DSL Types 8.10.1 Describe telephone technologies Asymmetric DSL (ADSL) currently is the most common implementation. It has speeds that vary from 384 Kbps to more than 6 Mbps downstream. The upstream speed is typically lower than the downstream speed. High Data Rate DSL (HDSL) provides equal bandwidth in both directions. It is 1.544 Mbps in North America and 2.048 Mbps in Europe. Symmetric DSL (SDSL) provides the same speed, up to 3 Mbps, for uploads and downloads. Very High Data Rate DSL (VDSL) is capable of bandwidths between 13 and 52 Mbps downstream, and 16 Mbps upstream. ISDN DSL (IDSL) is actually DSL over ISDN lines. It is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire as well as over other media with a top speed of 144 Kbps. ISDN is available in areas that do not qualify for other DSL implementations. An ISDN adapter at both ends, user side in place of the modem and service provider, is required. ISDN is generally available in urban areas in the United States and Europe from the local phone company.
  85. Slide 85 – Power Line Communication (PLC) 8.10.2 Define power line communication Power line communication (PLC) is a communication method that uses power distribution wires (local electric grid) to send and receive data. PLC is known by other names: Power Line Networking (PLN) Mains Communication Power Line Telecoms (PLT) With PLC, an electric company can superimpose an analog signal over the standard 50 or 60 Hz AC that travels in power lines. The analog signal can carry voice and data signals. PLC may be available in areas where other high-speed connections are not. PLC is faster than an analog modem. PLC may cost much less than other high-speed connection types. As this technology matures, it will become more common to find and may increase in speed You can use PLC to network computers within your home instead of installing network cabling or wireless technology. PLC connections can be used anywhere there is an electrical outlet. You can control lighting and appliances using PLC without installing control wiring. Resources: EU launches power line Net initiative | InfoWorld | News | 2004-02-02 | By John Blau, IDG News Service http://www.infoworld.com/article/04/02/02/HNeupowerline_1.html O'Reilly Network -- An Introduction to Power Line Communications http://www.oreillynet.com/pub/a/etel/2007/02/15/an-introduction-to-power-line-communications.html ITworld.com - FCC endorses power line communications http://www.itworld.com/Man/2697/060804fcc/
  86. Slide 86 – Broadband Connectivity 8.10.3 Define broadband Broadband is a technique used to transmit and receive multiple signals using multiple frequencies over one cable. For example, the cable used to bring cable television to your home can carry computer network transmissions at the same time. Because the two transmission types use different frequencies, they do not interfere with each other. Broadband uses a wide range of frequencies that may be further divided into channels. In networking, the term broadband describes communication methods that transmit two or more signals at the same time. Sending two or more signals simultaneously increases the rate of transmission. Some common broadband network connections include cable, DSL, ISDN, and satellite.
  87. Slide 87 – Cable Modem 8.10.3 Define broadband A cable modem connects your computer to the cable company using the same coaxial cable that connects to your cable television. You can connect the computer directly into the cable modem. You can connect a router, switch, hub, or multipurpose network device so multiple computers can share the Internet connection.
  88. Slide 88 – DSL Modem and Filter 8.10.3 Define broadband With DSL, the voice and data signals are carried on different frequencies on the copper telephone wires. A filter is used to prevent DSL signals from interfering with phone signals. Plug the filter into a phone jack and plug the phone into the filter. The DSL modem does not need a filter. The DSL modem is not affected by the frequencies of the telephone. A DSL modem can connect directly to your computer, or it can be connected to a networking device to share the Internet connection between multiple computers.
  89. Slide 89 – A Typical ISDN Connection 8.10.3 Define broadband ISDN is another example of broadband. ISDN uses multiple channels and can carry different types of services; therefore, it is considered a type of broadband. ISDN can carry voice, video, and data. This slide shows a typical ISDN connection.
  90. Slide 90 – Broadband Satellite 8.10.3 Define broadband Broadband satellite is an alternative for customers who cannot get cable or DSL connections. A satellite connection does not require a phone line or cable, but uses a satellite dish for two-way communication. Download speeds are typically up to 500 Kbps, while uploads are closer to 56 Kbps. It takes time for the signal from the satellite dish to relay to your Internet Service Provider (ISP) through the satellite orbiting the Earth. People in rural areas often use satellite broadband because they need a faster connection than dial-up and no other broadband connection is available. Student Activity: The student course content includes worksheet, 8.10.3 Answer Broadband Questions. To complete this worksheet, students will answer questions about broadband connectivity options.
  91. Slide 91 – Voice over IP (VoIP) 8.10.4 Define VoIP Voice over IP (VoIP) is a method to carry telephone calls over data networks and the Internet. VoIP converts the analog signals of voices into digital information that is transported in IP packets. VoIP can also use an existing IP network to provide access to the public switched telephone network (PSTN). VoIP depends on a reliable Internet connection. This can be a disadvantage if the Internet connection experiences an interruption in service. When a service interruption occurs the user cannot make phone calls. Resources: Cisco Unified IP Phones 7900 Series - Products & Services - Cisco Systems http://www.cisco.com/en/US/products/hw/phones/ps379/index.html
  92. Slide 92 – Preventive Maintenance for Networks 8.11 Identify and apply common preventive maintenance techniques used for networks Common preventive maintenance techniques should continually be performed for a network to operate properly. Heat is a big problem for network devices, especially in the server room. Network devices, such as computers, hubs, and switches, do not perform well when over-heated. Excess heat is generated by dust and dirty air filters. Dust impedes the proper flow of cool air and sometimes even clogs fans. Keep network rooms clean and change air filters often. Preventive maintenance involves checking the various components of a network for wear. Check the condition of network cables because they are often moved, unplugged, and kicked. Many network problems can be traced to a faulty cable. You should replace any cables that have exposed wires, are badly twisted, or are bent. Label the cables. This practice will save troubleshooting time later. Refer to wiring diagrams and always follow your company's cable labeling guidelines. Test devices on a regular basis. AC power adapters should be checked regularly. The uninterruptible power supply (UPS), which provides backup power, should be tested to ensure that you have power in the case of an outage. Before installing a new UPS, plug it into a power source to charge the batteries. The initial charge time is usually 12 hours or more. Follow the manufacturer instructions for unpacking the UPS and preparing it for use.
  93. Slide 93 – The Troubleshooting Process 8.12 Troubleshoot a network Network issues can be simple or complex. To assess how complicated the problem is, you should determine how many computers on the network are experiencing the problem. If there is a problem with one computer on the network, start the troubleshooting process at that computer. If there is a problem with all computers on the network, start the troubleshooting process in the network room where all computers are connected. As a technician, you should develop a logical and consistent method for diagnosing network problems by eliminating one problem at a time. After completing this section, the students will meet these objectives Review the troubleshooting process. Identify common network problems and solutions.
  94. Slide 94 – 1. Gather Data from the Customer 8.12.1 Review the troubleshooting process Start troubleshooting by gathering data from the user. Record this information in a work order Start with open-ended questions with customers when evaluating a network problem. Open-ended questions will allow the customer to describe the problem. Examples of open-ended questions: What problems are you experiencing with your computer or network? What software has been installed on your computer recently? What were you doing when the problem was identified? What error messages have you received on your computer? What type of network connection is your computer using? Closed-ended questions will direct the customer to provide critical answers. Examples of closed-ended questions: Has anyone else used your computer recently? Can you see any shared files or printers? Have you changed your password recently? Can you access the Internet? Are you currently logged into the network? When a customer is not able to accurately describe the problem, there are other ways to evaluate the situation in subsequent steps in the troubleshooting process.
  95. Slide 95 – 2. Verify the Obvious Issues 8.12.1 Review the troubleshooting process Review the obvious network issues, with your customer. The questions should be at a level of difficulty that the customer will easily understand. Follow a step-by-step procedure and make sure to document all answers and steps you take. Some obvious issues to check: Physical connections - Check that the network cables are properly connected. To simplify the troubleshooting, connect the problem computer directly into your DSL or cable modem. Link light - If a cable is not connected properly or if a NIC is improperly installed or configured, the LED link lights on the NIC will not light. Wireless signal strength - Check the wireless access point signal strength in your network client software. If a very low signal strength is apparent, move the computer closer to the wireless access point. Move cordless telephones and microwave ovens that can cause interference with the signal. Turn off any other devices that use radio waves to reduce interference. IP address - Use the ipconfig tool to make sure that the computer has a valid, unique IP address. Check for errors in the subnet mask and default gateway address. If the problem is not fixed by a quick review of the obvious issues, then a more detailed investigation into the problem is warranted.
  96. Slide 96 – 3. Try Quick Solutions First 8.12.1 Review the troubleshooting process The next step in the troubleshooting process is to try quick solutions. If checking the obvious issues did not solve the problem, you should then attempt some quick solutions. Here are some examples of quick network solutions: Re-enable Network Connections - Sometimes a problem in the hardware or the software can cause a network connection problem. To do so, follow this path: Start > Control Panel > Network Connections Reboot - A quick solution that seems to work in many situations is a simple reboot of the network device. A simple reboot will clear the contents of RAM and give the device a clean start. If the problem goes away after a reboot, then it was probably a software problem. If the problem occurs again, it is probably a hardware problem such as a malfunctioning RAM chip. Contact the ISP/Network Administrator - If all of the equipment that the customer has is working properly, but there is still no connection to the Internet, contact the customer's ISP or the network administrator. It is not always possible to solve the problem with a quick solution. To proceed troubleshooting the problem, you will need to gather information from the computer.
  97. Slide 97 – 4. Gather Data from the Computer 8.12.1 Review the troubleshooting process The next step is to inspect the computer. Data gathered from the computer can be used to confirm the data obtained from the customer. The data can be used to provide additional insight and direction. There are several software tools available that a technician can use to test the network. Each of these utilities will provide information that can help narrow down the possible problems on the network: Ping is used to check network connectivity. It sends a packet to the specified address and waits for a reply. Nslookup is used to query Internet domain name server. It returns a list of hosts in a domain or the information for one host. Tracert is used to determine the route taken by packets when they travel across the network. It shows where communications between your computer and another computer are having difficulty. Net View is used to display a list of computers in a workgroup. It shows the available shared resources on a network.
  98. Slide 98 – 5. Evaluate Problem & Implement Solution 8.12.1 Review the troubleshooting process If the network problem still exists after quick solutions have been implemented, you must complete additional research to identify other possible solutions. You should prioritize the possible solutions from the easiest to implement to the most difficult to implement. Evaluate each solution and implement it individually. If a proposed solution doesn't correct the problem, reset the computer back to the original state and try another proposed solution. If you make two or more changes without solving the problem, you may make it more difficult to solve.
  99. Slide 99 – 6. Close with the Customer 8.12.1 Review the troubleshooting process After repairs to the network have been completed, complete the work order and close with the customer. If possible, verify the network solution with the customer. Demonstrate how the repairs have fixed the problem. Have your customer test the solution. Complete the work order and submit documentation for invoicing. Include the steps done, the solution, and the time needed for the repair in your final documentation. This documentation should be maintained by the customer in case this problem happens again. Record everything that took place in your own notes. Information from each repair is very useful for future troubleshooting.
  100. Slide 100 – Common Problems and Solutions 8.12.2 Identify common network problems and solutions Network problems can be attributed to hardware, software, connectivity issues, or some combination of the three. You will resolve some types of network problems more often than others. Common printer problems and possible causes to consider: Problem: Computer is not able to connect to a popular website. Check DNS settings, hardware and/or software firewall settings. Problem: Computer has an IP address of 169.254.x.x. Check to make sure the DHCP server is operational and can be pinged. Problem: Computer is not able to connect to the network. Check for loose network cables. Problem: Computer is not able to print using the network printer. Check user permissions and status of network printer. Student Activity: The student course content includes worksheet, 8.12.2 Diagnose a Network Problem. To complete this worksheet, students will participate in a role-playing activity as a technician gathering information from a customer reporting a network problem.
  101. Slide 101 - Chapter 8 Summary 8.13 Chapter 8 Summary This chapter introduced you to the fundamentals of networking, the benefits of having a network, and the ways to connect computers to a network. The different aspects of troubleshooting a network were discussed with examples of how to analyze and implement simple solutions. The following are some of the important concepts to remember from this chapter: A computer network is composed of two or more computers that share data and resources. A Local Area Network (LAN) refers to a group of interconnected computers that are under the same administrative control. A Wide Area Network (WAN) is a network that connects LANs in geographically separated locations. In a peer-to-peer network, devices are connected directly to each other. A peer-to-peer network is easy to install, and no additional equipment or dedicated administrator is required. Users control their own resources, and a network works best with a small number of computers. A client/server network uses a dedicated system that functions as the server. The server responds to requests made by users or clients connected to the network. A LAN uses a direct connection from one computer to another. It is suitable for a small area, such as in a home, building, or school. A WAN uses point-to-point or point-to-multipoint, serial communications lines to communicate over greater distances. A WLAN uses wireless technology to connect devices together. The network topology defines the way in which computers, printers, and other devices are connected. Physical topology describes the layout of the wire and devices, as well as the paths used by data transmissions. Logical topology is the path that signals travel from one point to another. Topologies include bus, star, ring, and mesh. Networking devices are used to connect computers and peripheral devices so that they can communicate. These include hubs, bridges, switches, routers, and multipurpose devices. The type of device implemented depends on the type of network. Networking media can be defined as the means by which signals, or data, are sent from one computer to another. Signals can be transmitted either by cable or wireless means. The media types discussed were coaxial, twisted-pair, fiber-optic cabling, and radio frequencies. Ethernet architecture is now the most popular type of LAN architecture. Architecture refers to the overall structure of a computer or communications system. It determines the capabilities and limitations of the system. The Ethernet architecture is based on the IEEE 802.3 standard. The IEEE 802.3 standard specifies that a network implement the CSMA/CD access control method. The OSI reference model is an industry standard framework that is used to divide the functions of networking into seven distinct layers. These layers include Application, Presentation, Session, Transport, Network, Data Link, and Physical. It is important to understand the purpose of each layer. The TCP/IP suite of protocols has become the dominant standard for the Internet. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. A NIC is a device that plugs into a motherboard and provides ports for the network cable connections. It is the computer interface with the LAN. A modem is an electronic device that is used for computer communications through telephone lines. It allows data transfer between one computer and another. The modem converts byte-oriented data to serial bit streams. All modems require software to control the communication session. The set of commands that most modem software uses is known as the Hayes-compatible command set. The three transmission methods to sending signals over data channels are simplex, half-duplex, and full-duplex. Full-duplex networking technology increases performance because data can be sent and received at the same time. DSL, two-way cable modem, and other broadband technologies operate in full-duplex mode. Network devices and media, such as computer components, must be maintained. It is important to clean equipment regularly and use a proactive approach to prevent problems. Repair or replace broken equipment to prevent downtime. When troubleshooting network problems, listen to what your customer tells you so that you can formulate open-ended and closed-ended questions that will help you determine where to begin fixing the problem. Verify obvious issues and try quick solutions before escalating the troubleshooting process.
  102. Slide 102 – Instructor Training Activities
  103. Slide 103 – Activities for Instructor Training These activities are suggested for use in instructor training. Take the Quiz provided in Chapter 8 course content. Complete the four worksheets, four activities, and the lab included in Chapter 8. These worksheets, activities and lab are available at the bottom of associated pages of course content. While you are completing these, make notes of potential issues and questions that students may have. Conduct Internet research to pre-screen online resources for students to use in completing the student worksheet, 8.9.1 Internet Search for NIC Drivers. Brainstorm a list of at least 4 additional troubleshooting scenarios to provide students more opportunities to practice this skill. For an example, refer to the student worksheet, 8.12.2 Diagnose a Network Problem.
  104. Slide 104 – Instructor Training Discussion Share with the other instructors the list of online resources found that students might use in completing the research. Share with the other instructors the list of additional troubleshooting scenarios. Participate in a role-playing activity of one of the troubleshooting scenarios. Following the role-playing activity, discuss the different ways you might incorporate role-playing activities into your classroom. Share ideas of how to make the student successful in these activities.
  105. Slide 105 – Additional Resources Fiber Distributed Data Interface (FDDI) http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/fddi.htm Wireless Ethernet http://www.csot.com/ethernet/wireless.htm Cisco Unified IP Phones 7900 Series - Products & Services - Cisco Systems http://www.cisco.com/en/US/products/hw/phones/ps379/index.html Telecommunication Standardization Sector of the International Telecommunications Union (ITU-T) http://www.itu.int/ITU-T/ Institute of Electrical and Electronics Engineers (IEEE) http://www.ieee.org/ International Organization for Standardization (ISO) http://www.iso.ch/iso/ Internet Architecture Board (IAB) http://www.iab.org/ International Electrotechnical Commission (IEC) http://www.iec.ch/ American National Standards Institute (ANSI) http://www.ansi.org/ Telecommunications Industry Association (TIA) http://www.tiaonline.org/ Electronic Industries Alliance (EIA) http://www.eia.org/ EU launches power line Net initiative | InfoWorld | News | 2004-02-02 | By John Blau, IDG News Service http://www.infoworld.com/article/04/02/02/HNeupowerline_1.html O'Reilly Network -- An Introduction to Power Line Communications http://www.oreillynet.com/pub/a/etel/2007/02/15/an-introduction-to-power-line-communications.html ITworld.com - FCC endorses power line communications http://www.itworld.com/Man/2697/060804fcc/ Whatis?com: IT Encyclopedia and Learning Center http://whatis.com TechTarget: The Most Targeted IT Media http://techtarget.com ZDNet: Tech News, Blogs and White Papers for IT Professionals http://www.zdnet.com HowStuffWorks: It's Good to Know http://computer.howstuffworks.com CNET.com http://www.cnet.com PC World http://www.pcworld.com ComputerWorld http://www.computerworld.com WIRED NEWS http://www.wired.com eWEEK.com http://www.eweek.com
  106. Slide 106 – Q and A