SlideShare uma empresa Scribd logo
1 de 53
A+ Guide to Hardware, 4e


       Chapter 10
     PCs on a Network
Objectives
• Learn about different types of physical network
  architectures
• Learn how networking works with Windows
• Learn how to install a network card and connect to a
  network
• Learn how to set up and secure a wireless network
• Learn about troubleshooting tools and tips for
  network connections



A+ Guide to Hardware, 4e                             2
Introduction
• Topics covered in this chapter:
     –   Technologies used to build networks
     –   How Windows supports a network connection
     –   How to connect a computer to a network
     –   How switches and routers interface networks
     –   How to setup and secure a wireless network
     –   How to troubleshoot a network connection




A+ Guide to Hardware, 4e                               3
Physical Network Architectures
• Elements providing an overview of networks
    – The different sizes of networks
    – The different technologies used by networks
    – Some networking terms
• Network types commonly encountered
    –   Ethernet
    –   Wireless networks
    –   Telephone networks
    –   Mostly outdated token ring and FDDI networks


A+ Guide to Hardware, 4e                               4
Sizes of Networks
• A network links two or more computers
• PAN (personal area network)
    – Consists of personal devices at close range
• LAN (local area network)
    – Covers a small local area such as a home, or office
• MAN (metropolitan area network)
    – Covers a large campus or city
• WAN (wide area network)
    – Covers a large geographical area; e.g., the Internet

A+ Guide to Hardware, 4e                                     5
Networking Technologies
• Factors driving network evolution:
    – The type of data the network is intended to support
    – The data capacity on the network
    – How a network is to fit among other networks
• Bandwidth (data throughput or line speed):
    – Analog systems: measured in cycles/sec (hertz or Hz)
    – Digital systems: measured in bps, Kbps, or Mbps
• As networks grow, the need for bandwidth grows



 A+ Guide to Hardware, 4e                                   6
Additional Terms Used in Networking
• Node (host): one device on a network; e.g., server
• Network adapter: interfaces a PC with a network
    – Network interface card (NIC): fits in a PCI slot
• Adapter (MAC, physical, or hardware) address:
    – 48-bit (6-byte) id number hard-coded on card
    – Example: 00-0C-6E-4E-AB-A5
• Network protocols: rules of communication
• Packets (datagrams or frames)
    – Basic unit of data transmitted on a network

A+ Guide to Hardware, 4e                                 7
Figure 10-1 Ethernet network card showing its MAC address
A+ Guide to Hardware, 4e                                             8
Introducing Ethernet
• Ethernet types (categorized by speed):
    –   10-Mbps Ethernet
    –   100-Mbps or Fast Ethernet
    –   1000-Mbps or Gigabit Ethernet
    –   10-Gigabit Ethernet
• Types of cabling used:
    – Two kinds of twisted-pair
         • Unshielded twisted pair (UTP): four pairs of twisted wire
         • Shielded twisted pair (STP): protected from EMI
    – Coaxial cable: single copper wire with braided shield
    – Fiber-optic: glass strands inside protective tubing
A+ Guide to Hardware, 4e                                          9
Table 10-2 Variations of Ethernet and Ethernet cabling
A+ Guide to Hardware, 4e                                           10
Figure 10-4 Fiber-optic cables contain a glass core for
      transmitting light

A+ Guide to Hardware, 4e                                        11
Introducing Ethernet (continued)
• Topology: arrangement of nodes in a network
• Bus topology: connects all nodes with a line (no hub)
• Star topology
    – Connects nodes to central hub (or switch)
    – The hub broadcasts a data packet to every device
    – Switch uses a table to route packet to receiving device
• Scale networks by adding switches
• Star bus topology:
    – Multiple switches form a bus network
    – Nodes connected to each switch form a star
 A+ Guide to Hardware, 4e                                  12
Figure 10-6 Nodes on an Ethernet network can be connected to one
    another in a star or bus formation


A+ Guide to Hardware, 4e                                               13
Figure 10-10 A star bus network uses more than one switch



A+ Guide to Hardware, 4e                                             14
Introducing Ethernet (continued)
•     Attenuation: the weakening of a transmitted signal
•     Repeater: device used to amplify a signal in a LAN
•     Amplifier repeater: simply amplifies incoming signal
•     Signal-regenerating repeater
       – Reads and copies the signal (without noise)
       – Transmits an exact duplicate of the original
• Ethernet uses a signal-regenerating repeater
       – A switch or hub can act as the repeater



    A+ Guide to Hardware, 4e                             15
Figure 10-14 A repeater on a network restores the clarity of the signal,
 which degrades over a distance because of attenuation



A+ Guide to Hardware, 4e                                                    16
Wireless Networks
• Use radio waves or infrared light to connect PCs
• Popular in places where cables are difficult to install
• 802.11wireless (Wi-Fi or Wireless Fidelity)
    –   Types: 802.11g (most popular), 802.11b, 802.11a
    –   Two new standards: 802.11k and 802.11r
    –   Ad hoc mode: directly links two wireless devices
    –   Access point (AP): connects wireless device to LAN
• WiMAX (802.16 Wireless/802.16d and 802.16e)
    – Used in public hot spots and as a last mile solution
• Bluetooth: short range standard; e.g., optical mouse
A+ Guide to Hardware, 4e                                     17
Figure 10-16 Nodes on a wireless LAN connect to a cabled network by
 way of an access point


A+ Guide to Hardware, 4e                                               18
Telephone Networks
• Plain old telephone service (POTS)
    – Switching creates closed circuits between phones
• VoIP (Voice over Internet Protocol)
    – Uses packets of data to communicate
• Cellular WAN
    – Made up cells created by base stations
• Cellular WAN standards
    – GSM (Global System for Mobile Communications)
    – CDMA (Code Division Multiple Access)
    – TDMA (Time Division Multiple Access)
A+ Guide to Hardware, 4e                                 19
Figure 10-20 A cellular WAN is made up of many cells
    that provide coverage over a wide area

A+ Guide to Hardware, 4e                                   20
Telephone Networks (continued)
• General Packet Radio Service (GPRS)
    – New communication protocol using data packets
• Two types of transmission:
    – Full-duplex: allows both users to talk and transmit
    – Half-duplex: allows only one user on a channel
• Satellite phone: communicates with satellites
• Cordless phone: communicates with phone base
• Radio phone: uses VHF radio waves


A+ Guide to Hardware, 4e                                    21
Token Ring and FDDI
• Token Ring is physically a star, logically a ring
• Components of a token ring:
    –   Controlled Access Unit (CAU)
    –   Multistation Access Unit (MSAU or MAU)
    –   Token Ring LAN card connecting node to MSAU
    –   UTP or STP cables with two twisted pairs
    –   RJ-45 or Universal Data Connector (UDC)
• Fiber Distributed Data Interface (FDDI)
    – Uses a token that travels in a ring like a Token Ring
    – Data frames travel on the ring without the token
A+ Guide to Hardware, 4e                                  22
Figure 10-21 Full-duplex and half-duplex transmissions

A+ Guide to Hardware, 4e                                            23
Windows on a Network
• Major software components on a network
         • An operating system installed on each PC
    – Network operating system (NOS) for larger networks
• Peer-to-peer network (workgroup)
    – Each PC has the same authority on the network
• Client/server model (domain)
    – Access to network resources controlled by an NOS
    – Server is called a domain controller
• A few network operating systems
    – Windows 2003 Server, Novell NetWare, Linux
A+ Guide to Hardware, 4e                                 24
Four Suites of Protocols
• TCP/IP (Transmission Control Protocol/Internet
  Protocol)
    – Primary protocol used on the Internet
• IPX/SPX (Internetwork Packet Exchange/Sequenced
  Packet Exchange)
    – Designed for use with Novell NetWare
• NetBEUI (NetBIOS Extended User Interface)
    – Supports NetBIOS (Network Basic Input/Output
      System)
• AppleTalk
    – Proprietary networking protocol suite for Macs
 A+ Guide to Hardware, 4e                              25
Figure 10-25 An operating system can use more than one method to
address a computer on the network, but at the network level, a MAC address
is always used to address a device on the network

A+ Guide to Hardware, 4e                                                 26
Four Suites of Protocols (continued)
• Using a protocol on the network
   – Install a NIC card in the computer
   – Connect network cable to network device; e.g., a switch
   – NIC card binds to higher level protocol; e.g., TCP/IP
• How to identify which protocols are used in Windows
   – Look at the properties of a network connection
• More than one OS protocol can be used on a network
• New protocols may be installed
• Network printers can be accessed in various ways

A+ Guide to Hardware, 4e                                 27
Figure 10-26 Three Windows XP network protocols are installed and two
protocols are bound to this network card
 A+ Guide to Hardware, 4e                                               28
Addressing on a Network
• Four methods used to identify devices and programs
   –   Using a MAC address
   –   Using an IP address
   –   Using character-based names (host, domain, NetBIOS)
   –   Using a Port address
• IP addresses
   –   Used in TCP/IP to identify any device on the network
   –   4 bytes (octets) separated by dots; e.g., 190.180.40.120
   –   System allows for up to 4.3 billion IP addresses
   –   First part identifies network, last part identifies host
A+ Guide to Hardware, 4e                                   29
Figure 10-27 Computers on the same LAN use MAC addresses to
communicate, but computers on different LANs use IP addresses to
communicate over the Internet

A+ Guide to Hardware, 4e                                           30
Installing a NIC and Connecting to a
                  Network
• Components needed to connect a PC to a network
    – NIC and network port or wireless NIC card in the PC
    – Patch cable
    – Device for the PC to connect to, such as a router
• NIC card selection criteria
    – NIC should match type of bus on motherboard
    – NIC should match speed and type of network
    – Wireless NIC should match network technology



A+ Guide to Hardware, 4e                                31
Installing a NIC Using Windows
                     2000/XP
• Overview of installation steps
    –   Determine whether driver or NIC is installed first
    –   If NIC precedes driver, install NIC and turn on PC
    –   Follow instructions in Found New Hardware Wizard
    –   Verify driver installation using the Device Manager
    –   Update the driver if necessary
    –   Connect patch cable to NIC port and network switch
• Configuring Windows 2000/XP to use a network
    – Name computer in System Properties dialog box

A+ Guide to Hardware, 4e                                  32
Figure 10-32 Windows XP uses the Computer Name Changes dialog box to
assign a host name to a computer on a network
A+ Guide to Hardware, 4e                                           33
Installing a NIC Using Windows
               2000/XP (continued)
• Questions to ask before configuring TCP/IP
   – Will the PC use dynamic or static IP addressing?
   – What are the IP address, subnet mask, default gateway?
        • A question to ask if static IP addressing is used
   – Do you use DNS?
        • If so, what are the IP addresses of your DNS servers?
   – Is a proxy server used to connect to other networks?
        • If so, what is the IP address of the proxy server?
• Gateway: device that connects two networks

 A+ Guide to Hardware, 4e                                         34
Installing a NIC Using Windows
               2000/XP (continued)
• Internet Protocol (TCP/IP) Properties dialog box
   – Used to configure TCP/IP under Windows XP
   – Dialog opened from Properties of Local Area Connection
• NWLink or NetBEUI protocol
   – Used for network communication (excluding the Internet)
   – Can be used in combination with TCP/IP
   – Installed from Properties of Local Area Connection




 A+ Guide to Hardware, 4e                               35
Figure 10-34 To configure TCP/IP under Windows XP, use the
    Internet Protocol (TCP/IP) Properties dialog box

A+ Guide to Hardware, 4e                                         36
Installing a NIC Using Windows 9x/Me
• Overview of installation steps:
    – Physically install the NIC and turn on the PC
    – Follow instructions of the Wizard
    – Verify the installation using Device Manager
• Assigning a computer name
    – Access Identification tab in Network dialog box
    – Enter names of computer and workgroup
    – Verify assignment in Network Neighborhood window
• Installing and configuring TCP/IP using Windows 98
    – Use functions in the Network window

A+ Guide to Hardware, 4e                              37
Figure 10-40 To configure TCP/IP in Windows 98, select the binding and click
Properties to view the TCP/IP Properties dialog box
A+ Guide to Hardware, 4e                                                  38
Installing a Wireless Adapter in a
                  Notebook
• Wireless adapter uses a USB port or PC Card slot
• Installation package includes a CD and accessories
• Overview of steps for installing a Linksys adapter
    – Install the software from the setup CD
    – Plug the wireless adapter into a USB port
    – Launch Found New Hardware and follow instructions
• Managing the issue of an unsigned driver
    – Find approved driver or continue installation
• Deciding which installation utility to use
    – Choose manufacturer’s utility over Windows XP’s
A+ Guide to Hardware, 4e                                39
Figure 10-45 Plug the wireless USB adapter into the USB port

A+ Guide to Hardware, 4e                                               40
Installing a Wireless Adapter in a
           Notebook (continued)
• Information displayed about a current connection:
    – MAC address of access point device used by adapter
    – The current channel the connection is using
    – Transfer rate, throughput, link quality, signal strength
• Configuration changes you can make:
    –   Mode or network type
    –   The SSID (service set identifier)
    –   Encryption settings
    –   Tx rate
    –   TCP/IP configuration
A+ Guide to Hardware, 4e                                    41
Figure 10-49 Opening screen to configure a Linksys wireless adapter

A+ Guide to Hardware, 4e                                                  42
Installing a Wireless Adapter in a
           Notebook (continued)
• Connecting to a public hot spot using Windows XP
    –   Open Wireless Network Connection dialog box
    –   Select unsecured network from list and click Connect
    –   Open a browser to test the connection
    –   View link in Wireless Network Connection Status box
• Two ways to troubleshoot a connection
    – Add network SSID in Wireless network properties
    – Provide MAC address to network administrator



A+ Guide to Hardware, 4e                                   43
Figure 10-57 Enter the SSID of a hot spot to which you want to connect

A+ Guide to Hardware, 4e                                                    44
How to Set Up Your Own Wireless
                Network
• Two principal steps:
    – Buy a wireless access point
    – Configure AP and wireless PC for communication
• Providing security is critical for a successful network




A+ Guide to Hardware, 4e                               45
Security on a Wireless LAN
• Methods for securing a wireless connection:
    –   Disable SSID broadcasting
    –   Filter MAC addresses
    –   Data encryption; e.g., WPA (WiFi Protected Access)
    –   Change firmware default settings
    –   Update firmware
    –   Use a firewall
    –   Virtual private network (VPN)



A+ Guide to Hardware, 4e                                 46
Figure 10-60 With tunneling, packets can travel over a wireless LAN and
the Internet in a virtual private network (VPN), but WEP or WPA applies
only to the wireless connection

A+ Guide to Hardware, 4e                                                  47
Choosing a Wireless Access Point
• Selection criteria
    – The ability to use multiple security measures
    – Supports for the 802.11 b/g wireless standards
    – Good hardware reviews from other users
• An access point can be a standalone device
• An access point can also serve multiple purposes




A+ Guide to Hardware, 4e                               48
Configure and Test Your Wireless
                 Network
• Installing the hardware
    – Position device and plug it in
    – Connect the device using a network or USB cable
• Access point configuration is saved on firmware
• Configuring the access point
    –   Change default password to the administrative utility
    –   Select basic wireless settings, such as the channel
    –   Set up data encryption
    –   Choose whether to filter MAC addresses
    –   Save the settings and test the connection
A+ Guide to Hardware, 4e                                    49
Figure 10-65 This wireless access point supports several encryption methods

A+ Guide to Hardware, 4e                                                50
Troubleshooting a Network
                    Connection
• Some symptoms indicating a faulty NIC:
    – You cannot make a connection to the network.
    – My Network Places does not show any other PCs
    – An error message displays during driver installation
• Displaying TCP/IP connection information
    – Use Ipconfig under Windows 2000/XP
    – Use Winipcfg under Windows 9x/Me
• Ping (Packet Internet Groper) diagnostic tool
    – Sends a signal to a remote computer
    – If remote PC is online and senses signal, it responds
A+ Guide to Hardware, 4e                                     51
Summary
•     Network: system interconnecting two or more PCs
•     Basic network types: PANs, LANs, MANs, and WANs
•     Bandwidth: amount of data transmitted per unit time
•     Ethernet topologies: bus, star, star bus
•     Wireless standards: 802.11g/b/a/k/r, WiMAX,
      Bluetooth




    A+ Guide to Hardware, 4e                          52
Summary (continued)
• Telephone technologies: POTS, VoIP, Cellular WAN,
  satellite phone, cordless phone, and radio phone
• OS level protocols: TCP/IP, IPX/SPX, Net BEUI,
  AppleTalk
• IP address: 32-bit address identifying network node
• Local Area Connection dialog box: used to install
  and modify communication protocols




A+ Guide to Hardware, 4e                          53

Mais conteúdo relacionado

Mais procurados

Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networkingmlrbrown
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerUjjwal 'Shanu'
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Networkzaisahil
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16mlrbrown
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12mlrbrown
 
CE-Introduction-history-Draft
CE-Introduction-history-DraftCE-Introduction-history-Draft
CE-Introduction-history-DraftRoman Krzanowski
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7suddenven
 
Networks - Lecture D
Networks - Lecture DNetworks - Lecture D
Networks - Lecture DCMDLearning
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1Atika Zaimi
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocolAtika Zaimi
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3APSU
 

Mais procurados (20)

Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networking
 
8 network devices
8 network devices8 network devices
8 network devices
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Network
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
 
Chapter 6 - Networking
Chapter 6 - NetworkingChapter 6 - Networking
Chapter 6 - Networking
 
CE-Introduction-history-Draft
CE-Introduction-history-DraftCE-Introduction-history-Draft
CE-Introduction-history-Draft
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
2. network elements
2. network elements2. network elements
2. network elements
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
Networks - Lecture D
Networks - Lecture DNetworks - Lecture D
Networks - Lecture D
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
 

Destaque (7)

Bab 4
Bab 4Bab 4
Bab 4
 
E3 chap-08
E3 chap-08E3 chap-08
E3 chap-08
 
Ch12
Ch12Ch12
Ch12
 
Bab 3
Bab 3Bab 3
Bab 3
 
Ch20
Ch20Ch20
Ch20
 
Bab 2
Bab 2Bab 2
Bab 2
 
Assign3
Assign3Assign3
Assign3
 

Semelhante a A+ Guide to Hardware Networks Chapter

Lan basic
Lan basicLan basic
Lan basicOnline
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA Aiman Hud
 
This course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxThis course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxchristalgrieg
 
WIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALAWIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALASaikiran Panjala
 
educational content educational content educational content
educational content educational content  educational contenteducational content educational content  educational content
educational content educational content educational contentOlajide Kuku
 
Educational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentEducational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentOlajide Kuku
 
networking.ppt
networking.pptnetworking.ppt
networking.pptsuchita74
 
Network-Technologies.ppt
Network-Technologies.pptNetwork-Technologies.ppt
Network-Technologies.pptImXaib
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 

Semelhante a A+ Guide to Hardware Networks Chapter (20)

Ch 17
Ch 17Ch 17
Ch 17
 
9781111306366 ppt ch9
9781111306366 ppt ch99781111306366 ppt ch9
9781111306366 ppt ch9
 
ppt ch15
ppt ch15ppt ch15
ppt ch15
 
Lan basic
Lan basicLan basic
Lan basic
 
Ppt on networking
Ppt on networkingPpt on networking
Ppt on networking
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
This course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxThis course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docx
 
Basic networking
Basic networkingBasic networking
Basic networking
 
WIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALAWIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALA
 
educational content educational content educational content
educational content educational content  educational contenteducational content educational content  educational content
educational content educational content educational content
 
Educational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentEducational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-Content
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Technical Ethernet
Technical EthernetTechnical Ethernet
Technical Ethernet
 
presentation on type of toplogy and network
presentation on type of toplogy and networkpresentation on type of toplogy and network
presentation on type of toplogy and network
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Network-Technologies.ppt
Network-Technologies.pptNetwork-Technologies.ppt
Network-Technologies.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 

Mais de Lukmanulhakim Almamalik

Promoting Green Financing Mechanisms.pdf
Promoting Green Financing Mechanisms.pdfPromoting Green Financing Mechanisms.pdf
Promoting Green Financing Mechanisms.pdfLukmanulhakim Almamalik
 
PENGENALAN PEMODELAN SISTEM DINAMIK MENGGUNAKAN VENSIM PLE
PENGENALAN PEMODELAN SISTEM DINAMIK MENGGUNAKAN  VENSIM PLEPENGENALAN PEMODELAN SISTEM DINAMIK MENGGUNAKAN  VENSIM PLE
PENGENALAN PEMODELAN SISTEM DINAMIK MENGGUNAKAN VENSIM PLELukmanulhakim Almamalik
 
Buku informasi tik.cs03.012.01 (autosaved)
Buku informasi tik.cs03.012.01 (autosaved)Buku informasi tik.cs03.012.01 (autosaved)
Buku informasi tik.cs03.012.01 (autosaved)Lukmanulhakim Almamalik
 
Buku informasi tik.cs03.015.01 udah revisi
Buku informasi tik.cs03.015.01 udah revisiBuku informasi tik.cs03.015.01 udah revisi
Buku informasi tik.cs03.015.01 udah revisiLukmanulhakim Almamalik
 

Mais de Lukmanulhakim Almamalik (20)

Promoting Green Financing Mechanisms.pdf
Promoting Green Financing Mechanisms.pdfPromoting Green Financing Mechanisms.pdf
Promoting Green Financing Mechanisms.pdf
 
UU_Perindustrian_No_3_2014.pdf
UU_Perindustrian_No_3_2014.pdfUU_Perindustrian_No_3_2014.pdf
UU_Perindustrian_No_3_2014.pdf
 
PENGENALAN PEMODELAN SISTEM DINAMIK MENGGUNAKAN VENSIM PLE
PENGENALAN PEMODELAN SISTEM DINAMIK MENGGUNAKAN  VENSIM PLEPENGENALAN PEMODELAN SISTEM DINAMIK MENGGUNAKAN  VENSIM PLE
PENGENALAN PEMODELAN SISTEM DINAMIK MENGGUNAKAN VENSIM PLE
 
Bahan kuliah ttm [compatibility mode]
Bahan kuliah ttm [compatibility mode]Bahan kuliah ttm [compatibility mode]
Bahan kuliah ttm [compatibility mode]
 
Buku systems thinking
Buku systems thinkingBuku systems thinking
Buku systems thinking
 
Buku informasi tik.cs03.012.01 (autosaved)
Buku informasi tik.cs03.012.01 (autosaved)Buku informasi tik.cs03.012.01 (autosaved)
Buku informasi tik.cs03.012.01 (autosaved)
 
Buku informasi tik.cs03.016.01
Buku informasi tik.cs03.016.01Buku informasi tik.cs03.016.01
Buku informasi tik.cs03.016.01
 
Buku informasi tik.cs03.011.01
Buku informasi tik.cs03.011.01Buku informasi tik.cs03.011.01
Buku informasi tik.cs03.011.01
 
Tik.cs03.008.01 buku informasi
Tik.cs03.008.01 buku informasiTik.cs03.008.01 buku informasi
Tik.cs03.008.01 buku informasi
 
Tik.cs03.007.01 buku informasi
Tik.cs03.007.01 buku informasiTik.cs03.007.01 buku informasi
Tik.cs03.007.01 buku informasi
 
Tik.cs03.006.01 buku informasi
Tik.cs03.006.01 buku informasiTik.cs03.006.01 buku informasi
Tik.cs03.006.01 buku informasi
 
Tik.cs02.053.01 buku informasi
Tik.cs02.053.01 buku informasiTik.cs02.053.01 buku informasi
Tik.cs02.053.01 buku informasi
 
Buku informasi tik.cs03.015.01 udah revisi
Buku informasi tik.cs03.015.01 udah revisiBuku informasi tik.cs03.015.01 udah revisi
Buku informasi tik.cs03.015.01 udah revisi
 
Buku informasi tik.cs03.010.01
Buku informasi tik.cs03.010.01Buku informasi tik.cs03.010.01
Buku informasi tik.cs03.010.01
 
Buku informasi memperbaiki monitor
Buku informasi   memperbaiki monitorBuku informasi   memperbaiki monitor
Buku informasi memperbaiki monitor
 
Ch22
Ch22Ch22
Ch22
 
Ch21
Ch21Ch21
Ch21
 
Ch19
Ch19Ch19
Ch19
 
Ch18
Ch18Ch18
Ch18
 
Ch17
Ch17Ch17
Ch17
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

A+ Guide to Hardware Networks Chapter

  • 1. A+ Guide to Hardware, 4e Chapter 10 PCs on a Network
  • 2. Objectives • Learn about different types of physical network architectures • Learn how networking works with Windows • Learn how to install a network card and connect to a network • Learn how to set up and secure a wireless network • Learn about troubleshooting tools and tips for network connections A+ Guide to Hardware, 4e 2
  • 3. Introduction • Topics covered in this chapter: – Technologies used to build networks – How Windows supports a network connection – How to connect a computer to a network – How switches and routers interface networks – How to setup and secure a wireless network – How to troubleshoot a network connection A+ Guide to Hardware, 4e 3
  • 4. Physical Network Architectures • Elements providing an overview of networks – The different sizes of networks – The different technologies used by networks – Some networking terms • Network types commonly encountered – Ethernet – Wireless networks – Telephone networks – Mostly outdated token ring and FDDI networks A+ Guide to Hardware, 4e 4
  • 5. Sizes of Networks • A network links two or more computers • PAN (personal area network) – Consists of personal devices at close range • LAN (local area network) – Covers a small local area such as a home, or office • MAN (metropolitan area network) – Covers a large campus or city • WAN (wide area network) – Covers a large geographical area; e.g., the Internet A+ Guide to Hardware, 4e 5
  • 6. Networking Technologies • Factors driving network evolution: – The type of data the network is intended to support – The data capacity on the network – How a network is to fit among other networks • Bandwidth (data throughput or line speed): – Analog systems: measured in cycles/sec (hertz or Hz) – Digital systems: measured in bps, Kbps, or Mbps • As networks grow, the need for bandwidth grows A+ Guide to Hardware, 4e 6
  • 7. Additional Terms Used in Networking • Node (host): one device on a network; e.g., server • Network adapter: interfaces a PC with a network – Network interface card (NIC): fits in a PCI slot • Adapter (MAC, physical, or hardware) address: – 48-bit (6-byte) id number hard-coded on card – Example: 00-0C-6E-4E-AB-A5 • Network protocols: rules of communication • Packets (datagrams or frames) – Basic unit of data transmitted on a network A+ Guide to Hardware, 4e 7
  • 8. Figure 10-1 Ethernet network card showing its MAC address A+ Guide to Hardware, 4e 8
  • 9. Introducing Ethernet • Ethernet types (categorized by speed): – 10-Mbps Ethernet – 100-Mbps or Fast Ethernet – 1000-Mbps or Gigabit Ethernet – 10-Gigabit Ethernet • Types of cabling used: – Two kinds of twisted-pair • Unshielded twisted pair (UTP): four pairs of twisted wire • Shielded twisted pair (STP): protected from EMI – Coaxial cable: single copper wire with braided shield – Fiber-optic: glass strands inside protective tubing A+ Guide to Hardware, 4e 9
  • 10. Table 10-2 Variations of Ethernet and Ethernet cabling A+ Guide to Hardware, 4e 10
  • 11. Figure 10-4 Fiber-optic cables contain a glass core for transmitting light A+ Guide to Hardware, 4e 11
  • 12. Introducing Ethernet (continued) • Topology: arrangement of nodes in a network • Bus topology: connects all nodes with a line (no hub) • Star topology – Connects nodes to central hub (or switch) – The hub broadcasts a data packet to every device – Switch uses a table to route packet to receiving device • Scale networks by adding switches • Star bus topology: – Multiple switches form a bus network – Nodes connected to each switch form a star A+ Guide to Hardware, 4e 12
  • 13. Figure 10-6 Nodes on an Ethernet network can be connected to one another in a star or bus formation A+ Guide to Hardware, 4e 13
  • 14. Figure 10-10 A star bus network uses more than one switch A+ Guide to Hardware, 4e 14
  • 15. Introducing Ethernet (continued) • Attenuation: the weakening of a transmitted signal • Repeater: device used to amplify a signal in a LAN • Amplifier repeater: simply amplifies incoming signal • Signal-regenerating repeater – Reads and copies the signal (without noise) – Transmits an exact duplicate of the original • Ethernet uses a signal-regenerating repeater – A switch or hub can act as the repeater A+ Guide to Hardware, 4e 15
  • 16. Figure 10-14 A repeater on a network restores the clarity of the signal, which degrades over a distance because of attenuation A+ Guide to Hardware, 4e 16
  • 17. Wireless Networks • Use radio waves or infrared light to connect PCs • Popular in places where cables are difficult to install • 802.11wireless (Wi-Fi or Wireless Fidelity) – Types: 802.11g (most popular), 802.11b, 802.11a – Two new standards: 802.11k and 802.11r – Ad hoc mode: directly links two wireless devices – Access point (AP): connects wireless device to LAN • WiMAX (802.16 Wireless/802.16d and 802.16e) – Used in public hot spots and as a last mile solution • Bluetooth: short range standard; e.g., optical mouse A+ Guide to Hardware, 4e 17
  • 18. Figure 10-16 Nodes on a wireless LAN connect to a cabled network by way of an access point A+ Guide to Hardware, 4e 18
  • 19. Telephone Networks • Plain old telephone service (POTS) – Switching creates closed circuits between phones • VoIP (Voice over Internet Protocol) – Uses packets of data to communicate • Cellular WAN – Made up cells created by base stations • Cellular WAN standards – GSM (Global System for Mobile Communications) – CDMA (Code Division Multiple Access) – TDMA (Time Division Multiple Access) A+ Guide to Hardware, 4e 19
  • 20. Figure 10-20 A cellular WAN is made up of many cells that provide coverage over a wide area A+ Guide to Hardware, 4e 20
  • 21. Telephone Networks (continued) • General Packet Radio Service (GPRS) – New communication protocol using data packets • Two types of transmission: – Full-duplex: allows both users to talk and transmit – Half-duplex: allows only one user on a channel • Satellite phone: communicates with satellites • Cordless phone: communicates with phone base • Radio phone: uses VHF radio waves A+ Guide to Hardware, 4e 21
  • 22. Token Ring and FDDI • Token Ring is physically a star, logically a ring • Components of a token ring: – Controlled Access Unit (CAU) – Multistation Access Unit (MSAU or MAU) – Token Ring LAN card connecting node to MSAU – UTP or STP cables with two twisted pairs – RJ-45 or Universal Data Connector (UDC) • Fiber Distributed Data Interface (FDDI) – Uses a token that travels in a ring like a Token Ring – Data frames travel on the ring without the token A+ Guide to Hardware, 4e 22
  • 23. Figure 10-21 Full-duplex and half-duplex transmissions A+ Guide to Hardware, 4e 23
  • 24. Windows on a Network • Major software components on a network • An operating system installed on each PC – Network operating system (NOS) for larger networks • Peer-to-peer network (workgroup) – Each PC has the same authority on the network • Client/server model (domain) – Access to network resources controlled by an NOS – Server is called a domain controller • A few network operating systems – Windows 2003 Server, Novell NetWare, Linux A+ Guide to Hardware, 4e 24
  • 25. Four Suites of Protocols • TCP/IP (Transmission Control Protocol/Internet Protocol) – Primary protocol used on the Internet • IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) – Designed for use with Novell NetWare • NetBEUI (NetBIOS Extended User Interface) – Supports NetBIOS (Network Basic Input/Output System) • AppleTalk – Proprietary networking protocol suite for Macs A+ Guide to Hardware, 4e 25
  • 26. Figure 10-25 An operating system can use more than one method to address a computer on the network, but at the network level, a MAC address is always used to address a device on the network A+ Guide to Hardware, 4e 26
  • 27. Four Suites of Protocols (continued) • Using a protocol on the network – Install a NIC card in the computer – Connect network cable to network device; e.g., a switch – NIC card binds to higher level protocol; e.g., TCP/IP • How to identify which protocols are used in Windows – Look at the properties of a network connection • More than one OS protocol can be used on a network • New protocols may be installed • Network printers can be accessed in various ways A+ Guide to Hardware, 4e 27
  • 28. Figure 10-26 Three Windows XP network protocols are installed and two protocols are bound to this network card A+ Guide to Hardware, 4e 28
  • 29. Addressing on a Network • Four methods used to identify devices and programs – Using a MAC address – Using an IP address – Using character-based names (host, domain, NetBIOS) – Using a Port address • IP addresses – Used in TCP/IP to identify any device on the network – 4 bytes (octets) separated by dots; e.g., 190.180.40.120 – System allows for up to 4.3 billion IP addresses – First part identifies network, last part identifies host A+ Guide to Hardware, 4e 29
  • 30. Figure 10-27 Computers on the same LAN use MAC addresses to communicate, but computers on different LANs use IP addresses to communicate over the Internet A+ Guide to Hardware, 4e 30
  • 31. Installing a NIC and Connecting to a Network • Components needed to connect a PC to a network – NIC and network port or wireless NIC card in the PC – Patch cable – Device for the PC to connect to, such as a router • NIC card selection criteria – NIC should match type of bus on motherboard – NIC should match speed and type of network – Wireless NIC should match network technology A+ Guide to Hardware, 4e 31
  • 32. Installing a NIC Using Windows 2000/XP • Overview of installation steps – Determine whether driver or NIC is installed first – If NIC precedes driver, install NIC and turn on PC – Follow instructions in Found New Hardware Wizard – Verify driver installation using the Device Manager – Update the driver if necessary – Connect patch cable to NIC port and network switch • Configuring Windows 2000/XP to use a network – Name computer in System Properties dialog box A+ Guide to Hardware, 4e 32
  • 33. Figure 10-32 Windows XP uses the Computer Name Changes dialog box to assign a host name to a computer on a network A+ Guide to Hardware, 4e 33
  • 34. Installing a NIC Using Windows 2000/XP (continued) • Questions to ask before configuring TCP/IP – Will the PC use dynamic or static IP addressing? – What are the IP address, subnet mask, default gateway? • A question to ask if static IP addressing is used – Do you use DNS? • If so, what are the IP addresses of your DNS servers? – Is a proxy server used to connect to other networks? • If so, what is the IP address of the proxy server? • Gateway: device that connects two networks A+ Guide to Hardware, 4e 34
  • 35. Installing a NIC Using Windows 2000/XP (continued) • Internet Protocol (TCP/IP) Properties dialog box – Used to configure TCP/IP under Windows XP – Dialog opened from Properties of Local Area Connection • NWLink or NetBEUI protocol – Used for network communication (excluding the Internet) – Can be used in combination with TCP/IP – Installed from Properties of Local Area Connection A+ Guide to Hardware, 4e 35
  • 36. Figure 10-34 To configure TCP/IP under Windows XP, use the Internet Protocol (TCP/IP) Properties dialog box A+ Guide to Hardware, 4e 36
  • 37. Installing a NIC Using Windows 9x/Me • Overview of installation steps: – Physically install the NIC and turn on the PC – Follow instructions of the Wizard – Verify the installation using Device Manager • Assigning a computer name – Access Identification tab in Network dialog box – Enter names of computer and workgroup – Verify assignment in Network Neighborhood window • Installing and configuring TCP/IP using Windows 98 – Use functions in the Network window A+ Guide to Hardware, 4e 37
  • 38. Figure 10-40 To configure TCP/IP in Windows 98, select the binding and click Properties to view the TCP/IP Properties dialog box A+ Guide to Hardware, 4e 38
  • 39. Installing a Wireless Adapter in a Notebook • Wireless adapter uses a USB port or PC Card slot • Installation package includes a CD and accessories • Overview of steps for installing a Linksys adapter – Install the software from the setup CD – Plug the wireless adapter into a USB port – Launch Found New Hardware and follow instructions • Managing the issue of an unsigned driver – Find approved driver or continue installation • Deciding which installation utility to use – Choose manufacturer’s utility over Windows XP’s A+ Guide to Hardware, 4e 39
  • 40. Figure 10-45 Plug the wireless USB adapter into the USB port A+ Guide to Hardware, 4e 40
  • 41. Installing a Wireless Adapter in a Notebook (continued) • Information displayed about a current connection: – MAC address of access point device used by adapter – The current channel the connection is using – Transfer rate, throughput, link quality, signal strength • Configuration changes you can make: – Mode or network type – The SSID (service set identifier) – Encryption settings – Tx rate – TCP/IP configuration A+ Guide to Hardware, 4e 41
  • 42. Figure 10-49 Opening screen to configure a Linksys wireless adapter A+ Guide to Hardware, 4e 42
  • 43. Installing a Wireless Adapter in a Notebook (continued) • Connecting to a public hot spot using Windows XP – Open Wireless Network Connection dialog box – Select unsecured network from list and click Connect – Open a browser to test the connection – View link in Wireless Network Connection Status box • Two ways to troubleshoot a connection – Add network SSID in Wireless network properties – Provide MAC address to network administrator A+ Guide to Hardware, 4e 43
  • 44. Figure 10-57 Enter the SSID of a hot spot to which you want to connect A+ Guide to Hardware, 4e 44
  • 45. How to Set Up Your Own Wireless Network • Two principal steps: – Buy a wireless access point – Configure AP and wireless PC for communication • Providing security is critical for a successful network A+ Guide to Hardware, 4e 45
  • 46. Security on a Wireless LAN • Methods for securing a wireless connection: – Disable SSID broadcasting – Filter MAC addresses – Data encryption; e.g., WPA (WiFi Protected Access) – Change firmware default settings – Update firmware – Use a firewall – Virtual private network (VPN) A+ Guide to Hardware, 4e 46
  • 47. Figure 10-60 With tunneling, packets can travel over a wireless LAN and the Internet in a virtual private network (VPN), but WEP or WPA applies only to the wireless connection A+ Guide to Hardware, 4e 47
  • 48. Choosing a Wireless Access Point • Selection criteria – The ability to use multiple security measures – Supports for the 802.11 b/g wireless standards – Good hardware reviews from other users • An access point can be a standalone device • An access point can also serve multiple purposes A+ Guide to Hardware, 4e 48
  • 49. Configure and Test Your Wireless Network • Installing the hardware – Position device and plug it in – Connect the device using a network or USB cable • Access point configuration is saved on firmware • Configuring the access point – Change default password to the administrative utility – Select basic wireless settings, such as the channel – Set up data encryption – Choose whether to filter MAC addresses – Save the settings and test the connection A+ Guide to Hardware, 4e 49
  • 50. Figure 10-65 This wireless access point supports several encryption methods A+ Guide to Hardware, 4e 50
  • 51. Troubleshooting a Network Connection • Some symptoms indicating a faulty NIC: – You cannot make a connection to the network. – My Network Places does not show any other PCs – An error message displays during driver installation • Displaying TCP/IP connection information – Use Ipconfig under Windows 2000/XP – Use Winipcfg under Windows 9x/Me • Ping (Packet Internet Groper) diagnostic tool – Sends a signal to a remote computer – If remote PC is online and senses signal, it responds A+ Guide to Hardware, 4e 51
  • 52. Summary • Network: system interconnecting two or more PCs • Basic network types: PANs, LANs, MANs, and WANs • Bandwidth: amount of data transmitted per unit time • Ethernet topologies: bus, star, star bus • Wireless standards: 802.11g/b/a/k/r, WiMAX, Bluetooth A+ Guide to Hardware, 4e 52
  • 53. Summary (continued) • Telephone technologies: POTS, VoIP, Cellular WAN, satellite phone, cordless phone, and radio phone • OS level protocols: TCP/IP, IPX/SPX, Net BEUI, AppleTalk • IP address: 32-bit address identifying network node • Local Area Connection dialog box: used to install and modify communication protocols A+ Guide to Hardware, 4e 53