Uploaded by Rosalie Harper

Lesson Plan Week 1 Networking

advertisement
Lesson 1
Lesson 1
Understanding Local Area Networking
Learning Objectives
Students will learn to:
 Examine Local Area Networks, Devices, and Data Transfer
 Identify Network Topologies and Standards
ODN Skills


Understand local area networks (LANs).
Understand network topologies and access methods.
1.2
1.5
Lesson Summary — Lecture Notes
You should begin this lesson by introducing yourself and the course.
The rest of the lesson is an introducing to networking. Therefore, you should start with
explaining what a network is and then explain what a LAN is and give some examples of
LANs. Most LANs are within a building or set of buildings that are all close together.
You can then describe that, in order to make up a network, you must have something to
share and a method to share that data (such as a network and a protocol or protocols to
share the data).
You can then describe a home network (a very simple and very small network) and a
large company network. As some networks are large and complex, and network engineers
and administrators come and go, administrators may not always be available when a
problem occurs. An administrator may forget about a setting, a configuration, or a
solution to a problem, so network documentation is extremely important. To help create
some of the documentation, Microsoft Visio comes in handy when creating diagrams.
The next part of the lesson starts describing a simple LAN consisting of a hub. You could
mention that hubs are legacy devices but it is still a good place to start so that students
can understand how hubs and switches function. Of course, in the example, you have a
server providing a service and the PC, Mac and laptop requesting services from the
server.
After they understand a simple LAN, you can then explain what a SOHO is (as shown in
in Figure 1-2). A SOHO may be a small satellite office or even a simple home office.
Rather than have dedicated servers and expensive routers, you would use an inexpensive
router, which will allow you to share a DSL or cable modem connection to the Internet
among multiple users.
1-1
Lesson 1
To create a network, a host will need to have a network adapter. Therefore, you would
explain what a network adapter is and then explain the different types of adapters. They
would differ by how they connect to the host and what connections and speeds they
support. You could then show how to install and configure a network adapter.
To add a host with a NIC to a wired network, you would then use a patch cable. If you
have one handy, you can show the students a patch cable. Be sure to mention that it is a
cable used for Ethernet networks and has RJ-45 connectors.
One of the common characteristics for network connections is network speed. Therefore,
that you can explain that most network cables use serial data transfers and that their
speeds are specified in megabits per second (or Mbps). This should not be confused with
Megabytes per second (MBps).
For a host to communicate on a network, it has to have a logical address. For a TCP/IP
network, the logical address is the IP address. You would then explain the four octets
ranging from 0 to 255 and how the subnet mask relates to the IP address. You could then
discuss classful networks consisting of Class A, B and C networks and their default
subnet masks.
To show the students an IP address in use, you will then show how to configure an IP
address in Windows and how it communicates with another computer by using the ping
command. Explain how the ping command is a very handy tool when testing network
connectivity and testing the sending’s host IP configuration (loopback/localhost).
Mention that the ping command uses the ICMP protocol.
Now that the students have an understanding of a wired network, explain that wireless
LANs are very common. Discuss the various devices that connect to a wireless network
(besides computers, phones and pads).
The next part of the lecture talks about how to protect your network by adding a network
into a perimeter network or DMZ. You can then discuss the different ways to form a
DMZ.
The next part of the lesson describes the network topology. Consider digging a bit deeper
by describing logical topology and physical topology. For example, today’s Ethernet
usually forms a physical star topology, but the signals still form a bus topology.
The most common type of network is an Ethernet network. Therefore, you can then cover
the different Ethernet standards. While it is okay for students to know the original
standards (such as 10Base 5 and 10Base2) in today’s world, they need to know today’s
popular standards (including 100Base-TX and 100Base-T).
The next part of the lesson discusses various models, including the client-server model
and peer-to-peer model. You will need compare and contrast these two models. You can
then cover different types of servers, including Windows, Linux and UNIX. You can then
cover the different versions of Windows servers and their related client operating system.
1-2
Lesson 1
Key Terms
8P8C - A common connector or plug used on the end of the network cable. Also known
as RJ-45.
Broadcast – A method of communication where packets are sent to every host on the
network.
centralized computing – A model where all computing for a network is done by a large
central device.
client-server – A model that distributes applications between servers such as Windows
Server 2008 and client computers such as Windows 7 or Windows Vista machines.
CSMA/CA – Short for carrier sense multiple access with collision avoidance. It is used
as a method for multiple hosts to communicate on a wireless network and AppleTalk.
CSMA/CD – Short for carrier sense multiple access with collision detection. It is the
method for multiple hosts to communicate on a Ethernet.
computer telephony integration (CTI) - When a company’s telephone system meets its
computer system. Here, special PBXs that used to control phones as a separate entity can
now be controlled by servers with powerful software.
CTI-based server - When a company’s telephone system meets its computer system.
Here, special PBXs that used to control phones as a separate entity can now be controlled
by servers with powerful software.
data transfer rate – Network speed, also known as bit rate. This is defined as the
maximum bits per second (bps) that can be transmitted over a network.
database server - A server that provides data for applications.
demilitarized zone (DMZ) - Also known as a perimeter network, a small network that is
set up separately from a company’s private LAN and the Internet.
distributive computing – A model where computing is provided by each host.
Ethernet – A networking standard that has a set of rules that govern the transmission of
data between network adapters and various central connecting devices.
file server – A server that stores files for computers to share
frames – A group of bytes packaged by a network adapter for transmission across the
network.
full duplex – A type of communication where traffic is sent in both directions at the same
time.
half duplex – A type of communication where traffic is sent in both directions, but only
one at a time.
host – A device or computer has an IP address
1-3
Lesson 1
hub - A basic central connecting devices (sometimes referred to as CCDs) that connects
each of the networked computers, known as hosts, to one another by way of copper-based
cables. A hub is considered a legacy device.
IEEE 802.3 – A standard that defines carrier sense multiple access with collision
detection or CSMA/CD. Because computers on a default Ethernet LAN all share the
same channel, CSMA/CD governs the way that computers co-exist with limited
collisions.
IP address – A logical address that identifies a device or host connected on a network.
local area network (LAN) – A group of these computers that are confined to a small
geographic area, usually one building.
medium dependent interface (MDI) – A port used to daisy chain or stack one or more
hubs or switches.
mesh topology – A topology where every host or server is connected to every other host
or server.
messaging server - Email servers, but also fax, instant messaging, collaborative, and
other types of messaging servers. For a Windows Server to control email, special
software known as Exchange Server has to be loaded in addition to the operating system.
Microsoft ISA Server – Microsoft’s firewall and proxy server.
Microsoft Visio - A common tool used for network documentation
multistation access unit (MAU) – A central connecting device usually associated with
Token Ring.
network adapter - Also known as a network interface card or NIC, it is the device that
enables you to send and receive data to and from your computer.
network controller – A controlling server such as a Microsoft domain controller, it is in
charge of user accounts, computer accounts, network time, and the general well-being of
an entire domain of computers and users.
network documentation - Any information that helps describe, define, and otherwise
explain how computers are connected in a physical and logical way.
network operating systems – An operating system used by a server to provide network
services.
network topology – A method that defines the physical connections of hosts in a
computer.
peer-to-peer (P2P) – A model that has each computer has an equal ability to serve data
and to access data, just like any other computer on the network.
perimeter network - Also known as a DMZ, a small network that is set up separately
from a company’s private LAN and the Internet.
print server - A server controls printers that can be connected directly to the server or
(and more commonly) are connected to the network.
ring topology – A topology that forms a ring or loop.
1-4
Lesson 1
RJ45 – A common connector or plug used on the end of the network cable.
serial data transfer – A method where data is sent, one bit at a time.
star topology – A topology where each computer is individually wired to a central
connecting device with twisted-pair cabling.
switch – A device similar to a hub that connects computers to a central point. However,
different from a hub, a switch will only forward traffic to its destination instead of
broadcasting.
Transceiver – A device or component that can transmit and receive data.
unicast – A communication method where traffic is only sent to the computer or host that
is meant to be sent to.
virtual LAN (VLAN) – A group of hosts with a common set of requirements that
communicate as if they were connected together with a common set of requirements that
communicate as if they were connected together in a normal fashion on one switch,
regardless of their physical location.
web server – A server that share data and provide information about a company using
HTML web pages..
wireless access point (WAP) – A central connecting device used in wireless networks.
wireless LAN (WLAN) – A network that uses wireless signals.
1-5
Lesson 1
Lesson 1
Server Overview
Knowledge Assessment
Multiple Choice
Circle the letter that corresponds to the best answer.
1.
2.
3.
4.
5.
Which of the following regenerates a signal and broadcasts that signal to
every computer connected to it?
a.
Hub
b.
Switch
c.
Router
d.
Firewall
Which of the following is not a central connecting device?
a.
Hub
b.
Switch
c.
SOHO router
d.
Windows 7 client
You need to install a network adapter to a computer so that it can be
connected to a network that uses twisted-pair cabling. What type of port
does the network adapter need to use?
a.
RJ11
b.
RJ45
c.
RG-58
d.
Fiber optic
Where can you go in Windows 7 to access the Properties of a network
adapter?
a.
Device Manager
b.
Ping
c.
Advanced Firewall
d.
Task Manager
You need to connect a computer’s network adapter to a switch. You want
the connection to be able to send and receive data simultaneously. What
type of connection do you need?
a.
Half duplex
b.
Full duplex
c.
Simplex
d.
100 Mbps
1-6
Lesson 1
6.
7.
8.
9.
You need to connect a computer at a rate of 100,000,000 bits per second.
What speed network adapter should you install?
a.
10 Mbps
b.
100 MB/s
c.
100 Mbps
d.
1000 Mbps
You need to connect to a router that has the IP address 192.168.1.100 on a
standard, default Class C network using the subnet mask 255.255.255.0.
Which of the following is a valid IP address for your network adapter?
a.
192.168.0.1
b.
192.168.1.1
c.
192.168.100.1
d.
192.168.1.100
You have just installed a network adapter and configured an IP address and
subnet mask. What command can you use to verify that the IP address is
configured and listed properly?
a.
Ping
b.
Tracert
c.
CMD
d.
Ipconfig
You need to ping your own computer to see if it is alive. Which of the
following would qualify as command-line syntax to do so?
a.
ping localclient
b.
ping 128.0.0.1
c.
ping loopback
d.
ping network adapter
10. You have been instructed to connect a computer to a group of hosts that
have been segmented from the regular network. What kind of network is
this?
a.
LAN
b.
WLAN
c.
WAN
d.
VLAN
Fill in the Blank
Fill in the correct answer in the blank space provided.
1.
The manager of IT asks you to connect a perimeter network to the firewall,
which will be separate from the LAN. This type of network is known as a
DMZ
2.
A star topology can be defined by connecting several hubs to a switch.
3.
802.3u Ethernet networks run at 100 Mbps.
4.
A BitTorrent client is a program used to download files quickly from a
P2P network.
1-7
Lesson 1
5.
The Token Ring network architecture is physically a star and logically a
ring.
6.
802.3ab Ethernet networks run at 1000 Mbps.
7.
A Half duplex connection is one in which data can be both sent and
received, but not at the same time.
8.
A ring topology can be defined as connecting several computers together in
a circle without the use of a hub or a switch.
9.
When several computers are connected in a small geographic area, it is
known as a local area network.
10. A wireless access point acts as a central connecting device and allows
laptops, PDAs, and handheld computers to communicate with each other.
Case Scenarios
Scenario 1-1: Planning and Documenting a Basic LAN
Proseware, Inc. requires you to implement a 20-computer LAN. Fifteen of these
computers will be Windows 7 clients and five will be Windows Server 2008 computers.
The company also requires a 24-port switch, router, DSL Internet connection, DMZ with
web server, and a laptop for the CEO. Create a diagram of the network documentation for
this in Microsoft Visio or on paper. Refer to Figures 1-1 through 1-3 for types of devices
in the Visio networking stencils.
Figure 1-23 shows an example of what this documentation might look like.
Scenario 1-2: Selecting the Right Type of Networking Model
The ABC Company requires a network that can support 50 users. Which is the correct
type of networking model to use and why?
In this case the best networking model to select is client-server. Client-server
networks are meant for more than 10 users. If a network has 10 users or less, peerto-peer might be acceptable.
Scenario 1-3: Selecting Network Adapters for your LAN Computers
A company you are consulting for requires the installation of five new computers. Each
computer’s network adapter should be able to communicate at 1000 Mbps over its preexisting twisted-pair cabling and should be able to send and receive data simultaneously.
Which Ethernet standard should you select, and what technology should you utilize?
The network adapters should be compliant with the 802.3ab standard allowing them
to transfer 1000 Mbps over twisted pair cabling. You should also configure them for
full duplex mode so that they can send and receive signals at the same time.
Scenario 1-4: Configure the Correct Subnet Mask
A computer is not connecting to certain network devices properly. The IP address
information is as follows:
IP address: 192.168.1.210
1-8
Lesson 1
Subnet mask: 255.254.0.0
How should the subnet mask be configured so that the computer can communicate
properly with all networking devices and other hosts on the network?
The subnet mask should be configured as 255.255.255.0. This is a default Class C
subnet mask that is normally used with IP addresses that start with 192.
1-9
Download