ch 121 connectivity. ch 122 overview the basic concepts of networking and the terminology used in...
TRANSCRIPT
Ch 12 1
Connectivity
Ch 12 2
OverviewOverview
The basic concepts of networking and the terminology used in
networking will be introduced.
Ch 12 3
OverviewOverview
Will learn how to create network connections to share
resources.
Ch 12 4
OverviewOverview
Will look at command line utilities to gather information
about your network and perform other network-related tasks.
Ch 12 5
OverviewOverview
How to map a drive on a network will be discussed and then a drive will be
mapped.
Ch 12 6
OverviewOverview
Will be introduced to the basic protocols of the Internet.
Ch 12 7
OverviewOverview
How Command Line Utilities can be used to troubleshoot and diagnosis
problems will be discussed.
Ch 12 8
OverviewOverview
Will learn how to connect to and navigate the Internet.
Ch 12 9
Networks (Networks (LANs and WANsLANs and WANs))
LAN (local area network):Network of computers located in one room or building
Ch 12 10
Networks (Networks (LANs and WANsLANs and WANs))
Networks have:Servers - provide shared resources to network usersClients - access shared network resources
Ch 12 11
Networks (Networks (LANs and WANsLANs and WANs))
Two types of networks: Server-based (> 10 users) Peer-to-peer (< 10 users)
Ch 12 12
Networks (Networks (LANs and WANsLANs and WANs))
Advantages to setting up network: Share hardware All users can access current files Can update information as needed Set up local e-mail Laptops can be attached and detached If away from office can dial in to network to
access needed resources
Ch 12 13
Networks (Networks (LANs and WANsLANs and WANs))
WAN (wide area network): Network of computers connected over long distances
Ch 12 14
Networks (Networks (LANs and WANsLANs and WANs))
All networks need a NIC (network interface card) installed
into each computer.
Ch 12 15
Networks (Networks (LANs and WANsLANs and WANs))
Cabled network - card must support type of cable used to connect computers
Wireless network - each computer has wireless network card
Allows computers to communicate by radio waves, infrared , power wires in walls, or by phone.
Ch 12 16
Networks (Networks (LANs and WANsLANs and WANs))
Need to decide appropriate network design (topology).
Ch 12 17
Networks (Networks (LANs and WANsLANs and WANs))
Popular topologies for peer-to-peer network:
Bus topology Star topology
Ch 12 18
Networks (Networks (LANs and WANsLANs and WANs))
Bus - common topology for workgroup: Uses single coaxial cable (Thinnet) Need T-connectors and terminator
plugs All computers connect to a single cable
Ch 12 19
Networks (Networks (LANs and WANsLANs and WANs))Fig 12.1 A Peer-to-Peer Network with Bus Topology p. 635Fig 12.1 A Peer-to-Peer Network with Bus Topology p. 635
Ch 12 20
Networks (Networks (LANs and WANsLANs and WANs)) Bus topology: Advantages
Ease of installationRelatively inexpensiveEasy to expand
DisadvantageOne segment of cable fails - entire network
down Becoming less common
Ch 12 21
Networks (Networks (LANs and WANsLANs and WANs))Fig 12.2 A Peer-to-Peer Network with Star Topology p. 636Fig 12.2 A Peer-to-Peer Network with Star Topology p. 636
Ch 12 22
Networks (Networks (LANs and WANsLANs and WANs))
Star topology: Uses a hubAdvantage
Single point of failure
Disadvantages More expensive Wiring can be unwieldy
Wireless network - no need to run wires
Ch 12 23
Networks (Networks (LANs and WANsLANs and WANs))Fig 12.3 A Wireless and Wired Network p. 637Fig 12.3 A Wireless and Wired Network p. 637
Ch 12 24
Networks (Networks (LANs and WANsLANs and WANs))
Either topology can use any resource by connecting it to cable or hub.
Ch 12 25
Networks (Networks (LANs and WANsLANs and WANs))
Most users prefer a hub:
Instead of hub can use:SwitchRouter
Firewall may be selected
Ch 12 26
Networks (Networks (LANs and WANsLANs and WANs))
Server-based networks need NOS (network operating system) that
tell computers how to communicate with one another.
Ch 12 27
Networks (Networks (LANs and WANsLANs and WANs))
To work, a network needs: Hardware Software Network Administrator
Ch 12 28
Networks (Networks (LANs and WANsLANs and WANs))
Network administrator: Decides how hardware and software used Decides who will have access to what
devices and resources on network Manages day-to-day operation of hardware,
network operating system, and resources of network
Ch 12 29
Looking at Your NetworkLooking at Your Network
When Windows XP Professional is installed, it will detect network card and installs default components.
Can add network later using New Connection Wizard or Network Setup Wizard
Ch 12 30
Looking at Your NetworkLooking at Your Network
When setting up peer-to-peer network:Need to name computerProvide administrator password
Most important password in Windows XP Professional
Each user needs log on name and password
Ch 12 31
Looking at Your NetworkLooking at Your Network
My Network Places is map to network.
Ch 12 32
Looking at Your NetworkLooking at Your Network
Activities that follow are based on specific computer configuration.
Do not attempt to do activities in a lab environment unless instructed by your instructor
Ch 12 33
Activity - Looking at Your Activity - Looking at Your NetworkNetwork
KEY CONCEPTS:Local Area Connection Properties sheet
General, Authentication and Advanced tabsWhat various icons representTerms:
Client, Service, ProtocolFirewall, Gateway, ICF, ICS, Browser
Computer and workgroup namesUniversal naming convention
Ch 12 34
Sharing Printers Sharing Printers on a Networkon a Network
Two parts to sharing resources: Server - computer with resources
you wish to share Client - computer that wishes to
access resources
Ch 12 35
Sharing Printers Sharing Printers on a Networkon a Network
On large network one computer is the print server.
On small network the print server is any computer that is connected to a printer.
Ch 12 36
Sharing Printers Sharing Printers on a Networkon a Network
Fig 12.4 Printer Sharing on a Network p. 645Fig 12.4 Printer Sharing on a Network p. 645
Ch 12 37
Sharing Printers Sharing Printers on a Networkon a Network
If a printer is attached to a computer, you could use the
printer “locally”.
Ch 12 38
Activity—Sharing Activity—Sharing Printers on the NetworkPrinters on the Network
Fig 12.5 The Connect to Printer Dialog Box p. 652Fig 12.5 The Connect to Printer Dialog Box p. 652
Ch 12 39
Activity—Sharing Activity—Sharing Printers on a NetworkPrinters on a Network
KEY CONCEPTS:Can run different OS for each computer
on networkMust use same name across network Icons
Identifying network and shared printer iconsTwo printer icons (“Hung Off” and “Local”)
Ch 12 40
Activity—Sharing Activity—Sharing Printers on a NetworkPrinters on a Network
KEY CONCEPTS:Choose Local printer if printer on hubNetwork path always begins with
double backslash Format - \\computer name\share name
Ch 12 41
Sharing Hard Drive and Sharing Hard Drive and a Folder on a Networka Folder on a Network
File server:Computer with drive that is sharedLarge network - often one computer
designated at file serverSmall network - usually no dedicated
file server
Ch 12 42
Sharing Hard Drive and Sharing Hard Drive and a Folder on a Networka Folder on a Network
Can share entire drive
or selected folders.
Ch 12 43
Permissions and RightsPermissions and Rights
In lab environment local computer part of domain:
Administered by network administratorIncludes access control
Ch 12 44
Permissions and RightsPermissions and Rights
Using NTFS:Can set permissions on files/foldersUsers can be assigned to groupsWhen object created owner assigned to itObjects inherit permissions
Ch 12 45
Permissions and RightsPermissions and Rights
Using FAT32: Can provide some security on folders when shared on network Cannot assign permissions on a file-by-file basis as you can with NTFS
Ch 12 46
Activity—Sharing Activity—Sharing Drives on a NetworkDrives on a Network
KEY CONCEPTS: Flashlight icon - Windows looking for a network
connection Ramifications of “Simple File Sharing” Administrator share Authenticated Users Naming shared device How to identify computer you are on Deny permissions takes precedence over allow entries
Ch 12 47
Using Net CommandsUsing Net Commands
See list of net commands by keying in net help at
command line.
Ch 12 48
Using Net CommandsUsing Net CommandsFigure 12.6 List of NET Commands p. 668Figure 12.6 List of NET Commands p. 668
Ch 12 49
Using Net CommandsUsing Net Commands
For detailed help on a command use syntax net
help command
Ch 12 50
Using Net CommandsUsing Net CommandsFigure 12.7 Using Help with the Net Command p. 668Figure 12.7 Using Help with the Net Command p. 668
Ch 12 51
Using Net CommandsUsing Net Commands
For brief help use net command /?
Three net commands answer questions regarding network setup needed when seeking Tech support.
Ch 12 52
Activity - Gathering Information Activity - Gathering Information with NET Command on Domainwith NET Command on Domain
KEY CONCEPTS: Gathered information about workstation No limit to # of users that can be logged onto network
Function of “Net localgroup” Messaging name Commands - NET NAME, NET USER, NET VIEW, NET ACCOUNTS,
NET STATISTICS Reason for having hard copy of above information
Ch 12 53
Activity - Gathering Information Activity - Gathering Information with NET Command on Domainwith NET Command on Domain
Figure 12.9 Windows 2000 Server Figure 12.9 Windows 2000 Server Using the NET USER p. 672Using the NET USER p. 672
Ch 12 54
Activity - Gathering Information Activity - Gathering Information with NET Command on Domainwith NET Command on Domain
Figure 12.10 Windows 2000 Domain Server Figure 12.10 Windows 2000 Domain Server Using the NET STATISTICS SERVER p. 675Using the NET STATISTICS SERVER p. 675
Ch 12 55
Mapping Drives and the Mapping Drives and the NET USE commandNET USE command
Mapped drive:Shared network drive or folder
that has been assigned a local drive letter
Ch 12 56
Mapping Drives and the Mapping Drives and the NET USE commandNET USE command
Mapped drive/folder: Appears as a drive on client
computer Can be accessed (My Computer)
using assigned/mapped letter.
Ch 12 57
Mapping Drives and the Mapping Drives and the NET USE commandNET USE command
NET USE:Command line utility used to map drives, gives info
and allows shares to be manipulatedConnects/disconnects computer to shared resourceUsed to set up network printer to act as a “local”
printerDrive alias assigned with NETUSE may or may not be
“persistent”
Ch 12 58
Activity—Using the Activity—Using the NET USE CommandNET USE Command
KEY CONCEPTS: Drive alias assigned with NET USE may/may not be
“persistent” Know before issuing NET USE connection
Place drive mapping commands into batch file and place shortcuts to batch files on Desktop
PAUSE holds batch file for user intervention Use drive letter mappings to shared devices in many
ways Make backups of critical data “on the fly” Graphic with two CD’s
Ch 12 59
Activity—Using the Activity—Using the NET USE CommandNET USE Command
Fig 12.11 Use of Persistent on a Domain Server p. 679Fig 12.11 Use of Persistent on a Domain Server p. 679
Ch 12 60
Activity—Using the Activity—Using the NET USE CommandNET USE Command
Fig 12.12 Net Use on a Domain p. 685Fig 12.12 Net Use on a Domain p. 685
Ch 12 61
Activity—Using the Activity—Using the NET USE CommandNET USE Command
Fig 12.13 Using NET USE on a Domain p. 685Fig 12.13 Using NET USE on a Domain p. 685
Ch 12 62
Mapping Drives Using Windows Mapping Drives Using Windows Explorer and My ComputerExplorer and My Computer
Can also use GUI to map drives: Right-click My Computer/or My Network
Places from Start menu and choose Map Network
Drive
If available - right click icons
Use Tools menu
Ch 12 63
Activity - Mapping Drives with Activity - Mapping Drives with Windows Explorer and My Windows Explorer and My
ComputerComputerKEY CONCEPTS: Can identify network drive by icon Access mapped network drive as any drive
on system Sharing drive - sharing all folders on drive
Ch 12 64
The InternetThe Internet
Internet: Worldwide network of computers Part of information superhighway Referred to as cyberspace
Ch 12 65
The InternetThe InternetInternet is used to connect to various public and private institutions in order to:
Communicate with other computer users Gather information Do research To learn Purchase/sell goods
Ch 12 66
The InternetThe Internet
Internet - actual network used to transport information.
Web - Collection of standards and protocols used to
access information on the Internet.Interconnected collection of millions of Web sites
Ch 12 67
The InternetThe Internet
Web uses three standards: URL’s - location of document HTML - programming language used
to create documents HTTP - protocol used to transfer data
Ch 12 68
The InternetThe Internet
To retrieve a document, URL needs: Protocol to be used Server address with which to connect Path to the information
Ch 12 69
The InternetThe Internet
URL syntax:
protocol://server name/path
Ch 12 70
The InternetThe Internet
HTTP is major protocol used to transfer information within the
World Wide Web.
Ch 12 71
The InternetThe Internet
Web site: Resides on a server Has an address (URL) Virtual/physical location of Web
page (person/org)
Ch 12 72
The InternetThe Internet
Web page: Single screen of text and/or
graphics Usually has hypertext links to
other pages
Ch 12 73
The InternetThe Internet“Dot” part of address denotes type of web site:
.com .edu .gov .mil .org
Ch 12 74
The InternetThe InternetSearch engine: Category of sites developed to find
needed information Helps you find what you want Index to indexes
Ch 12 75
The InternetThe InternetSearch engines:
http://www.yahoo.com http://www.altavista.com http://www.guide.infoseek.com http://www.lycos.com http://www.askjeeves.com http://www.webcrawler.com
Ch 12 76
The InternetThe Internet
Portal - entry to Web
Yahoo! and Excite are positioning themselves as portals
Ch 12 77
The InternetThe InternetConnect to the Internet via:
Online provider ISP (Internet service providers)
Also called IAP (Internet access providers) Direct cable connection ISDN (Integrated Services Digital Network) DSL Satellites
Ch 12 78
An Overview of TCP/IPAn Overview of TCP/IP
Data is transferred over the Internet through TCP/IP protocols.
Ch 12 79
An Overview of TCP/IPAn Overview of TCP/IP
Data travels through several networks until it gets to its destination
Each network has a router Data sent in packets
Ch 12 80
An Overview of TCP/IPAn Overview of TCP/IP
TCP and IP protocols specify the rules used for creating,
addressing, and sending the packets of data.
Ch 12 81
An Overview of TCP/IPAn Overview of TCP/IP
TCP: Divides data into packets Numbers each packet so they can be
reassembled at receiving end.
IP: Specifies addresses of sending/receiving
computers Sends packets on their way
Ch 12 82
An Overview of TCP/IPAn Overview of TCP/IP
Data divided into packets.
Ch 12 83
An Overview of TCP/IPAn Overview of TCP/IP
Connecting to the Internet: Permanent open connection PPP (Point to Point Protocol) SSLIP (Serial Line Internet Protocol) Cable modem or DSL connection
Ch 12 84
An Overview of TCP/IPAn Overview of TCP/IP
Each computer connected to the Internet needs:
TCP/IP protocols installed Unique IP address
Can be static or dynamic.
Ch 12 85
An Overview of TCP/IPAn Overview of TCP/IP
IP address made up of four numbers separated
by periods.
Ch 12 86
An Overview of TCP/IPAn Overview of TCP/IPFig 12.14 A Dotted Quad Address p. 696Fig 12.14 A Dotted Quad Address p. 696
Ch 12 87
An Overview of TCP/IPAn Overview of TCP/IP
Originally, IP address divided into: Class A, Class B, or Class C
Now, two additional classes: Class D or Class E
Ch 12 88
An Overview of TCP/IPAn Overview of TCP/IP
To not run out of IP addresses:Do not assign permanent (static)
addressAssign temporary (dynamic) IP
address for work session
Ch 12 89
An Overview of TCP/IPAn Overview of TCP/IP
Each site attached to Internet belongs to a domain.
Domain Name System (DNS) - provides name resolution. Numeric IP address needed to communicate across Internet.
Ch 12 90
An Overview of TCP/IPAn Overview of TCP/IP
Use browser to access a site on Internet, key in its URL.
Ch 12 91
An Overview of TCP/IPAn Overview of TCP/IP Fig 12.14 A Dotted Quad Address p. 696Fig 12.14 A Dotted Quad Address p. 696
Internet name of the computer (server)
Name of the item to request from the server
Name of the protocol to use when accessing the server
Ch 12 92
TCP/IP Utilities—TCP/IP Utilities—Command Command Line Interface with the InternetLine Interface with the Internet
Windows provides a series of commands (utility programs) that run at the command line.
Ch 12 93
TCP/IP Utilities—TCP/IP Utilities—Command Command Line Interface with the InternetLine Interface with the Internet
Utility programs are TCP/IP commands: Set of tools used for troubleshooting problems Offer connections to computers not connected to
web If in lab environment and going through a
“firewall” some of utilities may not function Installed when TCP/IP network protocols
installed
Ch 12 94
TCP/IP Utilities—TCP/IP Utilities—Command Line Command Line Interface with the InternetInterface with the Internet
Table 12.1 Command Line Commands for the Internet Table 12.1 Command Line Commands for the Internet pp.. 698-699pp.. 698-699
Ch 12 95
TCP/IP Utilities—TCP/IP Utilities—Command Command Line Interface with the InternetLine Interface with the Internet
For help with any of the commands, at the command line key in:
Command name, a space, and then /?
Ch 12 96
IPCONFIGIPCONFIG
IPCONFIG: Displays current TCP/IP
configurations in one place Allows the request of a release or
renewal of a DHCP-assigned IP address
Ch 12 97
IPCONFIGIPCONFIG
Assigned address with dial-up service.
Need address if trying to Telnet into restricted server.
Ch 12 98
Activity—Using IPCONFIGActivity—Using IPCONFIG
KEY CONCEPTS: See all information on Internet adapter that has
TCP/IP bound to it If not connected/logged on - no IP address
reported Adding /ALL parameter - obtain more
information about network and internet connections
Ch 12 99
PINGPINGPING (Packet InterNet Groper):
Diagnostic tool used to determine if computer you are trying to reach is up and running.
Ch 12 100
PINGPING
If ping successful - see four replies on screen display.
If ping not successful - see “Request timed out” message.
Ch 12 101
PINGPING Can ping yourself using loopback
address (127.0.0.1).
Pings are not always reliable.
Some servers do not allow themselves to be “pinged”.
Ch 12 102
Activity—Using PINGActivity—Using PINGKEY CONCEPTS: “Pinged” IP address and host name “Pinged” yourself using loopback
address (127.0.0.1)Loopback address is IP address of your
computer Large organizations usually have a
number of servers
Ch 12 103
TRACERTTRACERT
TRACERT: Diagnostic utility that determines and
traces route on which data is moving to destination computer.
Ch 12 104
TRACERTTRACERT TRACERT determines data route by
sending packets containing time values.
When command is completed sends back five-column display.
An asterisk (*) means attempt timed out.
Ch 12 105
TRACERTTRACERT
Tracert uses pings: If server does not allow pinging -
may not be able to trace a route
Ch 12 106
Activity—Using TRACERTActivity—Using TRACERT
KEY CONCEPTS: Right most column indicates what
computers packets are traveling on Not always easy to know where route
actually goes
Ch 12 107
FTPFTPFTP (File Transfer Protocol): Communications protocol that
computer uses to transfer files FTP servers store files that Internet
users can download
Ch 12 108
FTPFTPAdvantage of FTP: Ability to transfer files to and from
computers running different operating systems
Can transfer files in either text or binary mode
Ch 12 109
FTPFTP
FTP has many commands: To get help within FTP, key in “HELP
command” For list of commands, key in HELP
Ch 12 110
Activity—Using FTPActivity—Using FTP
KEY CONCEPTS: Some servers allow anonymous logins
Password - any word can be used For command syntax - key in “HELP” plus
command name ASCII files have extensions of .txt Directories have a dr on far left. Compressed files have .ZIP extensions
Need utility (PKZIP) to unpack file
Ch 12 111
Activity—Using FTPActivity—Using FTP
KEY CONCEPTS: Command Line Interface borrows from Unix
Key in: “get filename” - transfer file to default directory Key in: “get filename” - (file name followed by hyphen)
- acts like TYPE command To transfer binary file (.EXE) key in:
binary get file.exe ASCII
Key in ASCII to return to text-file mode
Ch 12 112
TelnetTelnetTelnet is connection to a remote computer: You become user on remote computer,
and Your monitor becomes monitor for
remote computer.
Ch 12 113
TelnetTelnetExample
1. You key in 3 + 42. Your computer transmits keystrokes to remote computer.3. Remote computer receives keystrokes and does the work.4. Your monitor becomes monitor for remote computer and results of work displayed on your computer.
Ch 12 114
TelnetTelnet
Technically, Telnet is protocol and terminal handler portion of the TCP/IP protocol suite.
Ch 12 115
TelnetTelnet
To use Telnet: Both computers must support
Telnet protocol Incoming user must have
permission to use remote computer
Ch 12 116
TelnetTelnet
Telnet used: By system administrator (or other
professional) to log on to your computer and troubleshoot problems on your computer
Most commonly, for connecting to libraries and other public databases
Ch 12 117
Activity—Using TelnetActivity—Using Telnet
KEY CONCEPTS: For list of commands in Telnet
environment, key in ?/help Became a user on a remote computer Used Telnet to connect to Library
catalog