Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Sneakernet
1
Packets, Frames, and
MAC Address
NICs
• Data is broken up into small pieces and • Start Î Programs Î Accesories Î
moved about the network in chunks System Tools Î System Information
called packets or frames
• Every network interface card (NIC) has a
built-in identifier called a Media Access
Control (MAC) address
– No two NICs have the same MAC address
anywhere in the world
– Burned into a chip on the card
Thick Ethernet –
Coaxial Ethernet
10Base5
• Early Ethernet networks used coaxial • Thick Ethernet cable
cable (or just coax) (Thicknet) is used in
the 10Base5
– Composed of a center cable surrounded by
Ethernet
insulation, a shield of braided cable, and an outside
specification
protective cover
– Called RG-8 (Radio
– A different type of coaxial cable is used by your Grade) cable
VCR and TV – 10Base5
• 10 means that data is transferred at 10 Mbps
• Base refers to baseband signaling
• 5 means the maximum length of the cable is 500 meters
– Uses a bus topology where all devices attach to a single
cable
• Computers are connected one to another
• Every computer receives every packet of information
2
CSMA/CD CSMA/CD
Reflection and
CSMA/CD
Termination
• Even though the computers listen before • Signals traveling along a wire will
sending data, it is possible that two bounce back when they get to the end –
computers listened at about the same called reflection
time, heard nothing, and then sent data • As a result a terminator is installed on
– resulting in a collision the ends of the cable to absorb the signal
• Computer NICs have collision detection to prevent it from reflecting back –
circuitry that alerts them to a collision which would corrupt the signal
3
Thin Ethernet – UTP Ethernet –
10Base2 10BaseT
• Thin Ethernet is • Modern networks use UTP Ethernet
also known as – Modern networks do not use Thicknet or Thinnet
Thinnet – 10BaseT runs at 10 Mbps
– Uses RG-58 coax – 100BaseT runs at 100 Mbps
cable – 1000BaseT (Gigabit) runs at 1000 Mbps
– Limited to 30 devices – Use a star bus topology
per segment
– Uses unshielded twisted pair (UTP) cabling
– Cable length limited to 185 meters
– Thinner and cheaper than Thicknet
– Transceiver is built into the network
card
– Uses twist-on BNC connectors
– Uses terminators
Unshielded Twisted
Star Bus Topology
Pair
• Most common topology used is a star bus • UTP is the predominant type of cabling
– In a star topology all devices are connected to a used today
central device called a hub – Pairs of wires are twisted together in an
– Multiple hubs are connected together in a bus unshielded cable
topology – UTP cables come in categories (CATs) that define
– Together they form a star bus topology the maximum speed at which data can be
– Hubs have been replaced by switches that conserve transferred (called bandwidth)
bandwidth • CAT5, CAT5e, and CAT6 are most common today
Implementing
Combo Cards
10*BaseT
• Requires at least two pairs of wires – • All Ethernet networks share the same
one for receiving and one for sending language
• Cables use special RJ-45 connectors • Many NICs will run at either 10 or 100
• The Telecommunications Industry Mbps
Assciation/ Electronics Industries • Some NICs have both BNC and RJ-45
Alliance (TIA/EIA) has two standards for ports
connecting the RJ-45 connectors
– TIA/EIA 568A and TIA/EIA 568B
– Use either – just be consistent
– Wires are color-coded
4
Duplex and Half-
Hubs and Switches
Duplex
• Each PC is connected • Modern NICs can both send and receive
to a hub or switch in a
10*BaseT network data at the same time – called full duplex
– To add a device, just • Older NICs could send and receive data
run another cable to the
hub or switch from the
but not at the same time – called half
device duplex
– The maximum • NICs and switches use autosensing to
separation between the
device and the hub or decide how to operate
switch is 100 meters
– Hubs act as a repeater
that regenerates the
signal before it sends it
back out other ports
– Hubs come in 4, 8, 16,
or 24 ports
5
Client/Server
Peer-to-Peer Peer-to-Peer
• In a peer-to-peer network you must log • Domain Controllers keep the security
in to each server you wish to access database of users and passwords
• In a domain-based network you log into – Directory services are used to store user names
the network just once to access and passwords
resources throughout the network • In Windows 2000 and 2003 server, it is called Active
– Servers on the network may play one or several Directory
roles • In Novell NetWare it is called NetWare Directory Services
• Domain Controller (holds the security database) (NDS)
• File server
• Print server
• Fax server
• Remote Access Services (RAS) server
• Application server
• Web server
6
Administrative Tools Administrator Account
Administrative Tools in
Windows XP Professional
Administrative Tools in
Windows 2000 Server
Joining a Workgroup or
Domain in Windows 98
Protocols
NetBEUI IPX/SPX
7
TCP/IP AppleTalk
• To connect to a network you need • When choosing a NIC there are three
– Network Interface Card requirements
• Physical hardware that connects the PC to the network wire – Must run at the proper speed (many NICs run at
– Protocol more than one speed)
• The language the devices will use to communicate – Must be for the proper technology
– Network Client • Ethernet, Token Ring, Fiber optic (FDDI)
• Allows the computer system to speak to the protocol – Must fit into your expansion slot
– In addition, if you would like share your files or • ISA, PCI
printer, you need to enable Microsoft’s File and • If your NIC does not autoinstall, then
Print Sharing
use the Add Hardware wizard in Control
Panel
8
Configuring a Network Client for Microsoft
Client Networks
• You need a network client for each type
of server NOS
– Client for Microsoft Networks
• Alt-click My Network Places (or Network Neighborhood) and
choose Properties
• Double-click the Local Area Connection icon (or choose to
Create a New Network Connection) and choose Properties
• Client for Microsoft Networks is automatically installed
when you install a NIC in Windows
– Client Service for NetWare
• Provides access to file and print services on NetWare
servers
NetBEUI NetBEUI
• NetBEUI
– Windows 2000: Start ÎSettings ÎNetwork and
Dialup Connections ÎDouble-click the Local Area
Connection icon
– Windows 9x/Me: Start ÎSettings ÎControl Panel
Îdouble-click the Network applet
– Click the Properties button
– Install button Îhighlight Protocols and click Add
ÎNetBEUI
– Windows XP has dropped support for NetBEUI
9
IP Addresses Classes of Addresses
– In binary the second example is: – Class C IP addresses are for smaller companies
• The first three octets define the network
• 11001010.00100010.00010000.00001011
• The last octet defines the host
• The first octet begins with 110
Classes of IP Classes of IP
Addresses Addresses
• Some addresses are reserved
– 127.0.0.1 (the loopback address) is reserved for
testing
– Three ranges are reserved for private networks
• 10.0.0.1 thru 10.255.255.255.254
• 172.16.0.1 thru 172.31.255.254
• 192.168.0.0 thru 192.168.255.254
– One range is reserved for Automatic Private IP
Addressing
• 169.254.0.1 thru 169.254.255.254
• The subnet mask defines which portion • TCP/IP is an entire suite of protocols
of the IP address belongs to the network that offers TCP/IP Services such as
ID and which part belongs to the host ID – Hypertext Transfer Protocol (HTTP) used on the
– Expressed as a 32-bit number starting with 1s and World Wide Web
ending with 0s – Telnet used to access remote systems
– 1s represent a network ID bit and 0s represent a – Ping to check communication
host ID bit • TCP/IP is used to link multiple networks
• For example, 11111111.00000000.00000000.0000000
means that the first 8 bits define the network ID and the (Local Area Networks or LANs) with
last 24 bits define the host ID other networks to form an entire Wide
– It is associated with an IP address Area Network (WAN)
– Routers are used to route traffic among the LANs
10
PING, LAN and WAN TCP/IP Settings
• IP address
• Subnet Mask
• Default Gateway
– The address of a
machine (usually a
router) that will deliver
messages to hosts
outside of your local
segment or subnet
11
TCP/IP Tools:
TCP/IP Tools: ipconfig
WINIPCFG
• WINIPCFG • IPCONFIG
– Displays your TCP/IP settings in Windows 9x/Me – Displays your TCP/IP settings in Windows
– Release and Renew allows you to get new TCP/IP NT/2000/XP
information from a DHCP server – Release and Renew allows you to get new TCP/IP
information from a DHCP server
TCP/IP Tools:
TCP/IP Tools: tracert
nslookup
• NSLOOKUP • TRACERT
– Determines the name of a DNS server among other – Shows the route a packet takes to its destination
things
• Type exit to return to the command prompt
12
Sharing Drives and Accessing Shared
Folders Resources
• Access shared drives or folders using
Network Neighborhood (Windows NT
and 9x) or My Network Places (Windows
Me, 2000, XP)
– You may also map a drive letter to a shared drive
or folder
– Windows 2000 allows you to add a network icon
instead of using a drive letter
– Windows XP adds a menu option
Introduction
13
Wireless Networking
Infrared Connections Components
Wireless Networking
Wireless Access Point Software
14
Wireless Network Wireless Networking
Modes Security
• Wi-Fi Protected Access (WPA) – The original standard has been extended to form
the Shared Wireless Access Protocol (SWAP) used
– User authentication using the Extensible in HomeRF networks
Authentication Protocol (EAP)
– Uses encryption key integrity-checking
• IEEE 802.11i
– New security standard
Wireless Network
802.11 Standards
Standards
• Infrared Wireless Networking
– Simple way to share data without adding any additional
hardware or software
– Uses the Infrared Data Association (IrDA) protocol
• Included in Windows 95 and higher
– Line-of-sight required
– No authentication or encryption
• But then you can’t be over 1 meter away
15
Configuring Wireless Configuring Wireless
Networks Networks
16
Configuring Wireless Configuring Wireless
Networks Networks
• Encryption screen on
client wireless
network adapter
configuration utility
Configuring Wireless
Networks
• Infrared
– About the only thing to do is to confirm in your
network protocol configuration screen that you
have the IrDA protocol installed and enabled
– To transfer files just alt-click the file in Windows Connecting to the Internet
Explorer and choose Send To Infrared Recipient
– To network two computers just choose Connect
Directly to Another Computer when choosing the
connection type
Dial-up Requires a
Ways of Connecting
Modem
• Dial-up • The term modem is an abbreviation for
– Analog modulator/demodulator
– ISDN – Enables computers to communicate with each other
via standard telephone lines
• Dedicated – Convert analog signals into digital signals that can
– DSL be understood by the PC’s COM ports
– Cable – Convert digital signals from the PC’s COM ports
into analog signals for standard telephone lines
– LAN
– Transmit data as a series of
• Wireless individual 1’s and 0’s…
• Satellite serial communication
17
Modem Connections Dial-up Networking
ISDN DSL
Other Internet
Cable Connections
• Cable • LANs
– Uses cable TV connections – Most companies connect their network to the
– Very fast speeds…as fast as DSL or faster Internet thru an ISP
– Installation involves connecting the RG-6 or RG-59 – Users connect thru the local LAN
coaxial cable coming in for cable TV to a cable • Wireless
modem to a NIC in the PC
– Wireless connections are great when they work,
– Bandwidth is shared with other users which could but the technology isn’t quite there yet
affect performance
– Security may be an issue
• Satellite
– Uploads used to require a modem but not anymore
– Initial connections still must be made thru a
modem
18
Troubleshooting
Networks
1. Verify the symptom
– Talk with the user to try to get a solid description
of the symptoms
Troubleshooting Troubleshooting
Networks Networks
4. Check the environment 7. Separate hardware from software
– Heat, humidity, dirt – Replace the suspect hardware with known good
– What OS? What applications? Do others use the hardware – if that doesn’t solve the problem, then
computer? it’s probably software related
5. Reproduce the problem – Uninstall the suspect software and reinstall it
– Install the latest patch or upgrade
– If a problem happens only once, it’s not a problem
– Check for viruses
– Otherwise, try to make the problem happen again
6. Isolate the symptom 8. Research
– Use the Internet as a great tool
– With hardware remove parts until you find the
suspect one 9. Make the fix and test
– With software remove background programs or – Keep track of what you did so that you may return
boot into Safe Mode to the previous state if the fix does not work
Mike’s Four-Layer
Bluetooth
Model
• Hardware • Bluetooth is designed to replace all those
– Check the hardware starting with the physical layer cables connecting peripheral devices
• Protocols together – keyboards, mouse, printer,
– Is it installed and configured properly? speakers, scanner
– Acceptable for quick file transfers
• Network
– Acceptable for browsing the Internet
– Servers and non-servers
– Hardware comes integrated on most new portable
– Check users and groups, share names
electronic devices or as an internal or external
• Shared resources adapter
– Make sure the resource has been properly shared – Configuration is PnP
– Check the access allowed – Bluetooth access points use a web browser for
configuration
19