Ch 12 Connectivity - Cisco Networking Academy
Download
Report
Transcript Ch 12 Connectivity - Cisco Networking Academy
Connectivity
Ch 12
1
Overview
The basic concepts of networking
and the terminology used in
networking will be introduced.
Ch 12
2
Overview
Will learn how to create
network connections to share
resources.
Ch 12
3
Overview
Will look at command line
utilities to gather information
about your network and
perform other networkrelated tasks.
Ch 12
4
Overview
How to map a drive on a
network will be discussed
and then a drive will be
mapped.
Ch 12
5
Overview
Will be introduced to the basic
protocols of the Internet.
Ch 12
6
Overview
How Command Line Utilities
can be used to troubleshoot
and diagnosis problems will
be discussed.
Ch 12
7
Overview
Will learn how to connect to
and navigate the Internet.
Ch 12
8
Networks (LANs and WANs)
LAN (local area network):
Network of computers located
in one room or building
Ch 12
9
Networks (LANs and WANs)
Networks have:
Servers - provide shared resources
to network users
Clients - access shared network
resources
Ch 12
10
Networks (LANs and WANs)
Two types of networks:
Server-based (> 10 users)
Peer-to-peer (< 10 users)
Ch 12
11
Networks (LANs and WANs)
Advantages to setting up network:
Share hardware
All users can access current files
Can update information as needed
Set up local e-mail
Laptops can be attached and detached
If away from office can dial in to network to
access needed resources
Ch 12
12
Networks (LANs and WANs)
WAN (wide area network):
Network of computers
connected over long distances
Ch 12
13
Networks (LANs and WANs)
All networks need a NIC
(network interface card) installed
into each computer.
Ch 12
14
Networks (LANs and WANs)
Cabled network - card must support type
of cable used to connect computers
Wireless network - each computer has
wireless network card
Allows computers to communicate by
radio waves, infrared , power wires in
walls, or by phone.
Ch 12
15
Networks (LANs and WANs)
Need to decide appropriate
network design (topology).
Ch 12
16
Networks (LANs and WANs)
Popular topologies for peer-to-peer
network:
Bus topology
Star topology
Ch 12
17
Networks (LANs and WANs)
Bus - common topology for workgroup:
Uses single coaxial cable (Thinnet)
Need T-connectors and terminator
plugs
All computers connect to a single
cable
Ch 12
18
Networks
(
LANs and WANs)
Fig 12.1 A Peer-to-Peer Network with Bus Topology p. 635
Ch 12
19
Networks (LANs and WANs)
Bus topology:
Advantages
Ease of installation
Relatively inexpensive
Easy to expand
Disadvantage
One segment of cable fails - entire
network down
Becoming less common
Ch 12
20
Networks
(
LANs and WANs)
Fig 12.2 A Peer-to-Peer Network with Star Topology p. 636
Ch 12
21
Networks (LANs and WANs)
Star topology:
Uses a hub
Advantage
Single point of failure
Disadvantages
More expensive
Wiring can be unwieldy
Wireless network - no need to run wires
Ch 12
22
Networks (LANs and WANs)
Fig 12.3 A Wireless and Wired Network p. 637
Ch 12
23
Networks (LANs and WANs)
Either topology can use any resource
by connecting it to cable or hub.
Ch 12
24
Networks (LANs and WANs)
Most users prefer a hub:
Instead of hub can use:
Switch
Router
Firewall may be selected
Ch 12
25
Networks (LANs and WANs)
Server-based networks need NOS
(network operating system) that
tell computers how to
communicate with one another.
Ch 12
26
Networks (LANs and WANs)
To work, a network needs:
Hardware
Software
Network Administrator
Ch 12
27
Networks (LANs and WANs)
Network administrator:
Decides how hardware and software used
Decides who will have access to what
devices and resources on network
Manages day-to-day operation of hardware,
network operating system, and resources of
network
Ch 12
28
Looking at Your Network
When Windows XP Professional is
installed, it will detect network card
and installs default components.
Can add network later using New
Connection Wizard or Network Setup
Wizard
Ch 12
29
Looking at Your Network
When setting up peer-to-peer network:
Need to name computer
Provide administrator password
Most important password in Windows
XP Professional
Each user needs log on name and
password
Ch 12
30
Looking at Your Network
My Network Places
is map to network.
Ch 12
31
Looking at Your Network
Activities that follow are based
on specific computer configuration.
Do not attempt to do activities in
a lab environment unless instructed
by your instructor
Ch 12
32
Activity - Looking at Your
Network
KEY CONCEPTS:
Local Area Connection Properties sheet
General, Authentication and Advanced tabs
What various icons represent
Terms:
Client, Service, Protocol
Firewall, Gateway, ICF, ICS, Browser
Computer and workgroup names
Universal naming convention
Ch 12
33
Sharing Printers
on a Network
Two parts to sharing resources:
Server - computer with resources
you wish to share
Client - computer that wishes to
access resources
Ch 12
34
Sharing Printers
on a Network
On large network one computer
is the print server.
On small network the print
server is any computer that is
connected to a printer.
Ch 12
35
Sharing Printers
on a Network
Fig 12.4 Printer Sharing on a Network p. 645
Ch 12
36
Sharing Printers
on a Network
If a printer is attached to a
computer, you could use the
printer “locally”.
Ch 12
37
Activity—Sharing
Printers
on
the
Network
Fig 12.5 The Connect to Printer Dialog Box p. 652
Ch 12
38
Activity—Sharing
Printers on a Network
KEY CONCEPTS:
Can run different OS for each computer
on network
Must use same name across network
Icons
Identifying network and shared printer icons
Two printer icons (“Hung Off” and “Local”)
Ch 12
39
Activity—Sharing
Printers on a Network
KEY CONCEPTS:
Choose Local printer if printer on hub
Network path always begins with
double backslash
Format - \\computer name\share
name
Ch 12
40
Sharing Hard Drive and
a Folder on a Network
File server:
Computer with drive that is shared
Large network - often one computer
designated at file server
Small network - usually no dedicated
file server
Ch 12
41
Sharing Hard Drive and
a Folder on a Network
Can share entire drive
or selected folders.
Ch 12
42
Permissions and Rights
In lab environment local computer
part of domain:
Administered by network administrator
Includes access control
Ch 12
43
Permissions and Rights
Using NTFS:
Can set permissions on
files/folders
Users can be assigned to groups
When object created owner
assigned to it
Objects inherit permissions
Ch 12
44
Permissions and Rights
Using FAT32:
Can provide some security on
folders when shared on network
Cannot assign permissions on a
file-by-file basis as you can with
NTFS
Ch 12
45
Activity—Sharing
Drives on a Network
KEY CONCEPTS:
Flashlight icon - Windows looking for a network
connection
Ramifications of “Simple File Sharing”
Administrator share
Authenticated Users
Naming shared device
How to identify computer you are on
Deny permissions takes precedence over allow
Ch 12
entries
46
Using Net Commands
See list of net commands
by keying in net help at
command line.
Ch 12
47
Using Net Commands
Figure 12.6 List of NET Commands p. 668
Ch 12
48
Using Net Commands
For detailed help on a
command use syntax net
help command
Ch 12
49
Using Net Commands
Figure 12.7 Using Help with the Net Command p. 668
Ch 12
50
Using Net Commands
For brief help use net command /?
Three net commands answer questions
regarding network setup needed when
seeking Tech support.
Ch 12
51
Activity - Gathering Information
with NET Command on Domain
KEY CONCEPTS:
Gathered information about workstation
No limit to # of users that can be logged onto network
Function of “Net localgroup”
Messaging name
Commands - NET NAME, NET USER, NET VIEW,
NET ACCOUNTS, NET STATISTICS
Reason for having hard copy of above information
Ch 12
52
Activity - Gathering Information
with NET Command on Domain
Figure 12.9 Windows 2000 Server
Using the NET USER p. 672
Ch 12
53
Activity - Gathering Information
with NET Command on Domain
Figure 12.10 Windows 2000 Domain Server
Using the NET STATISTICS SERVER p. 675
Ch 12
54
Mapping Drives and the
NET USE command
Mapped drive:
Shared network drive or folder
that has been assigned a local
drive letter
Ch 12
55
Mapping Drives and the
NET USE command
Mapped drive/folder:
Appears as a drive on client
computer
Can be accessed (My Computer)
using assigned/mapped letter.
Ch 12
56
Mapping Drives and the
NET USE command
NET USE:
Command line utility used to map drives,
gives info and allows shares to be manipulated
Connects/disconnects computer to shared
resource
Used to set up network printer to act as a
“local” printer
Drive alias assigned with NETUSE may or
may not be “persistent”
Ch 12
57
Activity—Using the
NET USE Command
KEY CONCEPTS:
Drive alias assigned with NET USE may/may not
be “persistent”
Know before issuing NET USE connection
Place drive mapping commands into batch file and
place shortcuts to batch files on Desktop
PAUSE holds batch file for user intervention
Use drive letter mappings to shared devices in
many ways
Make backups of critical data “on the fly”
Graphic with two CD’s
Ch 12
58
Activity—Using the
NET USE Command
Fig 12.11 Use of Persistent on a Domain Server p. 679
Ch 12
59
Activity—Using the
NET USE Command
Fig 12.12 Net Use on a Domain p. 685
Ch 12
60
Activity—Using the
NET USE Command
Fig 12.13 Using NET USE on a Domain p. 685
Ch 12
61
Mapping Drives Using Windows
Explorer and My Computer
Can also use GUI to map drives:
Right-click My Computer/or My Network
Places from Start menu and choose Map
Network Drive
If available - right click icons
Use Tools menu
Ch 12
62
Activity - Mapping Drives with
Windows Explorer and My
Computer
KEY CONCEPTS:
Can identify network drive by icon
Access mapped network drive as any
drive on system
Sharing drive - sharing all folders on
drive
Ch 12
63
The Internet
Internet:
Worldwide network of computers
Part of information superhighway
Referred to as cyberspace
Ch 12
64
The Internet
Internet is used to connect to various public
and private institutions in order to:
Communicate with other computer users
Gather information
Do research
To learn
Purchase/sell goods
Ch 12
65
The Internet
Internet - actual network used to
transport information.
Web -
Collection of standards and protocols used
to access information on the Internet.
Interconnected collection of millions of
Web sites
Ch 12
66
The Internet
Web uses three standards:
URL’s - location of document
HTML - programming language used
to create documents
HTTP - protocol used to transfer data
Ch 12
67
The Internet
To retrieve a document, URL needs:
Protocol to be used
Server address with which to connect
Path to the information
Ch 12
68
The Internet
URL syntax:
protocol://server name/path
Ch 12
69
The Internet
HTTP is major protocol used to
transfer information within the
World Wide Web.
Ch 12
70
The Internet
Web site:
Resides on a server
Has an address (URL)
Virtual/physical location of Web
page (person/org)
Ch 12
71
The Internet
Web page:
Single screen of text and/or
graphics
Usually has hypertext links to
other pages
Ch 12
72
The Internet
“Dot” part of address denotes type of
web site:
.com
.edu
.gov
.mil
.org
Ch 12
73
The Internet
Search engine:
Category of sites developed to find
needed information
Helps you find what you want
Index to indexes
Ch 12
74
The Internet
Search engines:
http://www.yahoo.com
http://www.altavista.com
http://www.guide.infoseek.com
http://www.lycos.com
http://www.askjeeves.com
http://www.webcrawler.com
Ch 12
75
The Internet
Portal - entry to Web
Yahoo! and Excite are positioning
themselves as portals
Ch 12
76
The Internet
Connect to the Internet via:
Online provider
ISP (Internet service providers)
Also called IAP (Internet access providers)
Direct cable connection
ISDN (Integrated Services Digital Network)
DSL
Satellites
Ch 12
77
An Overview of TCP/IP
Data is transferred over
the Internet through
TCP/IP protocols.
Ch 12
78
An Overview of TCP/IP
Data travels through several networks
until it gets to its destination
Each network has a router
Data sent in packets
Ch 12
79
An Overview of TCP/IP
TCP and IP protocols specify the
rules used for creating,
addressing, and sending the
packets of data.
Ch 12
80
An Overview of TCP/IP
TCP:
Divides data into packets
Numbers each packet so they can be
reassembled at receiving end.
IP:
Specifies addresses of sending/receiving
computers
Sends packets on their way
Ch 12
81
An Overview of TCP/IP
Data divided into packets.
Ch 12
82
An Overview of TCP/IP
Connecting to the Internet:
Permanent open connection
PPP (Point to Point Protocol)
SSLIP (Serial Line Internet Protocol)
Cable modem or DSL connection
Ch 12
83
An Overview of TCP/IP
Each computer connected to the
Internet needs:
TCP/IP protocols installed
Unique IP address
Can be static or dynamic.
Ch 12
84
An Overview of TCP/IP
IP address made up of
four numbers separated
by periods.
Ch 12
85
An Overview of TCP/IP
Fig 12.14 A Dotted Quad Address p. 696
Ch 12
86
An Overview of TCP/IP
Originally, IP address divided into:
Class A, Class B, or Class C
Now, two additional classes:
Class D or Class E
Ch 12
87
An Overview of TCP/IP
To not run out of IP addresses:
Do not assign permanent (static)
address
Assign temporary (dynamic) IP
address for work session
Ch 12
88
An Overview of TCP/IP
Each site attached to Internet belongs
to a domain.
Domain Name System (DNS) -
provides name resolution.
Numeric IP address needed to communicate
across Internet.
Ch 12
89
An Overview of TCP/IP
Use browser to access a site
on Internet, key in its URL.
Ch 12
90
An Overview of TCP/IP
Fig 12.14 A Dotted Quad Address p. 696
Internet name of the
computer (server)
Name of the protocol to use
when accessing the server
Name of the item to
request from the server
Ch 12
91
TCP/IP Utilities—Command
Line Interface with the Internet
Windows provides a series of
commands (utility programs)
that run at the command line.
Ch 12
92
TCP/IP Utilities—Command
Line Interface with the Internet
Utility programs are TCP/IP commands:
Set of tools used for troubleshooting
problems
Offer connections to computers not
connected to web
If in lab environment and going through a
“firewall” some of utilities may not function
Installed when TCP/IP network protocols
installed
Ch 12
93
TCP/IP Utilities—Command Line
Interface with the Internet
Table 12.1 Command Line Commands for the Internet
pp.. 698-699
Ch 12
94
TCP/IP Utilities—Command
Line Interface with the Internet
For help with any of the commands,
at the command line key in:
Command name, a space, and then /?
Ch 12
95
IPCONFIG
IPCONFIG:
Displays current TCP/IP
configurations in one place
Allows the request of a release or
renewal of a DHCP-assigned IP
address
Ch 12
96
IPCONFIG
Assigned address with dial-up
service.
Need address if trying to Telnet into
restricted server.
Ch 12
97
Activity—Using IPCONFIG
KEY CONCEPTS:
See all information on Internet adapter that
has TCP/IP bound to it
If not connected/logged on - no IP address
reported
Adding /ALL parameter - obtain more
information about network and internet
connections
Ch 12
98
PING
PING (Packet InterNet Groper):
Diagnostic tool used to determine if
computer you are trying to reach is up
and running.
Ch 12
99
PING
If ping successful - see four replies
on screen display.
If ping not successful - see “Request
timed out” message.
Ch 12
100
PING
Can ping yourself using loopback
address (127.0.0.1).
Pings are not always reliable.
Some servers do not allow
themselves to be “pinged”.
Ch 12
101
Activity—Using PING
KEY CONCEPTS:
“Pinged” IP address and host name
“Pinged” yourself using loopback
address (127.0.0.1)
Loopback address is IP address of your
computer
Large organizations usually have a
number of servers
Ch 12
102
TRACERT
TRACERT:
Diagnostic utility that determines and
traces route on which data is moving
to destination computer.
Ch 12
103
TRACERT
TRACERT determines data route by
sending packets containing time values.
When command is completed sends
back five-column display.
An asterisk (*) means attempt timed out.
Ch 12
104
TRACERT
Tracert uses pings:
If server does not allow pinging
- may not be able to trace a route
Ch 12
105
Activity—Using TRACERT
KEY CONCEPTS:
Right most column indicates what
computers packets are traveling on
Not always easy to know where route
actually goes
Ch 12
106
FTP
FTP (File Transfer Protocol):
Communications protocol that
computer uses to transfer files
FTP servers store files that Internet
users can download
Ch 12
107
FTP
Advantage of FTP:
Ability to transfer files to and from
computers running different
operating systems
Can transfer files in either text or
binary mode
Ch 12
108
FTP
FTP has many commands:
To get help within FTP, key in “HELP
command”
For list of commands, key in HELP
Ch 12
109
Activity—Using FTP
KEY CONCEPTS:
Some servers allow anonymous logins
Password - any word can be used
For command syntax - key in “HELP” plus
command name
ASCII files have extensions of .txt
Directories have a dr on far left.
Compressed files have .ZIP extensions
Need utility (PKZIP) to unpack file
Ch 12
110
Activity—Using FTP
KEY CONCEPTS:
Command Line Interface borrows from Unix
Key in: “get filename” - transfer file to default directory
Key in: “get filename” - (file name followed by hyphen) acts like TYPE command
To transfer binary file (.EXE) key in:
binary
get file.exe
ASCII
Key in ASCII to return to text-file mode
Ch 12
111
Telnet
Telnet is connection to a remote
computer:
You become user on remote computer,
and
Your monitor becomes monitor for
remote computer.
Ch 12
112
Telnet
1.
2.
3.
4.
Example
You key in 3 + 4
Your computer transmits keystrokes to
remote computer.
Remote computer receives keystrokes
and does the work.
Your monitor becomes monitor for
remote computer and results of work
displayed on your computer.
Ch 12
113
Telnet
Technically, Telnet is protocol
and terminal handler portion
of the TCP/IP protocol suite.
Ch 12
114
Telnet
To use Telnet:
Both computers must support
Telnet protocol
Incoming user must have
permission to use remote computer
Ch 12
115
Telnet
Telnet used:
By system administrator (or other
professional) to log on to your
computer and troubleshoot problems
on your computer
Most commonly, for connecting to
libraries and other public databases
Ch 12
116
Activity—Using Telnet
KEY CONCEPTS:
For list of commands in Telnet
environment, key in ?/help
Became a user on a remote computer
Used Telnet to connect to Library
catalog
Ch 12
117