IT Essentials PC Hardware
and Software 4.1
Instructional Resource
Chapter 15: Advanced
Networks
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
1
Chapter 15: Objectives
 Identify potential safety hazards and implement proper safety procedures related to
networks.
 Design a network based on the customer’s needs.
 Determine the components for your customer’s network.
 Implement the customer’s network.
 Upgrade the customer’s network.
 Describe the installation, configuration, and management of a simple mail server.
 Describe preventive maintenance procedures for networks.
 Troubleshoot the network.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
2
Chapter 15: Critical Concepts
 What is this chapter about and why is it important?
 A computer technician can no longer just be responsible for computers and the
things that are connected to them. Instead, a technician today must place that
computer on a wired or wireless network and ensure that it is able to participate in
that network. Additionally, devices such as a printer or scanner, and individual files
and folders must be made available to other users or other devices on the network.
A technician now must understand the basics of a TCP/IP-based network and
Internet connectivity. A technician must be able to ensure that each device functions,
is secure, and communicates with other devices and sites in a network environment.
It is important for an instructor to fully prepare students to work as technicians in a
network environment.
 This chapter covers safety hazards, network components that are included in a
network environment, and Internet connectivity options. The chapter takes the basic
networking concepts to the next level of implementation with design and preventive
maintenance. Troubleshooting common network problems are also included.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
3
Chapter 15: Activities
 What activities are associated with this chapter?
15.2.2 Worksheet: Protocols
15.3.2 Worksheet: ISP Connection Types
15.4.2 Lab: Configure Browser Settings in Windows XP
15.4.2 Optional Lab: Configure Browser Settings in Windows Vista
15.4.2 Lab: Share a Folder, Share a Printer, and Set Share Permissions in
Windows XP
15.4.2 Optional Lab: Share a Folder, Share a Printer, and Set Share Permissions
in Windows Vista
15.5.1 Lab: Install a Wireless NIC in Windows XP
15.5.1 Optional Lab: Install a Wireless NIC in Windows Vista
15.5.1 Packet Tracer Activity: Install a Wireless NIC
15.5.2 Lab: Configure a Wireless Router
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
4
Chapter 15: Activities (continued)
 What activities are associated with this chapter?
15.5.3 Lab: Test the Wireless NIC in Windows XP
15.5.3 Optional Lab: Test the Wireless NIC in Windows Vista
15.5.3 Packet Tracer Activity: Test a Wireless Connection
15.8.3 Lab: Fix a Network Problem
15.8.3 Lab: Remote Technician: Fix a Network Problem
15.8.3 Lab: Troubleshooting Network Problems in Windows XP
15.8.3 Optional Lab: Troubleshooting Network Problems in Windows Vista
Chapter 15 Quiz
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
5
Chapter 15: New Terms
 What terms are introduced in this chapter?
Presentation_ID
backward compatible
15.3.3
Internet Service Provider (ISP)
15.3.2
Main Distribution Facility (MDF)
15.3.1
media
15.5
Network Basic Input/Output System (NetBIOS)
15.2.2
network cable
15.1.2
network file services
15.4.2
network topology
15.2.1
networking media
15.5
NSLOOKUP
15.5.3
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
6
Chapter 15: New Terms (continued)
 What terms are introduced in this chapter?
Presentation_ID
server
15.6
site survey
15.2.1
topology
15.2
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
7
Chapter 15: Changes
 What has changed from the previous version (4.0) of ITEPC?
Page 15.2.2 Determine protocols and network applications
• Basic VoIP
Page 15.3.1 Select cable types
• LAN cabling vs. Wireless
Page 15.3.4 Select the network device
• Routers
• Access points
Page 15.4.1 Install and test the customer’s network
• Ipconfig command
Page 15.5.1 Install and configure a wireless NIC
• Wireless NIC installation
• DHCP settings
• Static IP
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
8
Chapter 15: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 15.5.2 Install and configure a wireless router
• Wireless
•802.11 Protocol Selection
• SSID
• Disable DHCP
• Use static IP
• Disable SSID broadcast
• Update firmware
Page 15.5.3 Test a connection
• Ping Command
• Tracert Command
• Net Command
• Nslookup Command
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
9
Chapter 15: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 15.8.1 Review the troubleshooting process
• Identify the Problem
• Establish a Theory of Probable Causes
• Determine an Exact Cause
• Implement a Solution
• Verify Solution and Full System Functionality
• Document Findings
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
10
Chapter 15: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 15.8.2 Identify common problems and solutions
• TCP/IP settings
• Gateway
• Subnet mask
• DNS
• DHCP
• NAT
• Characteristics of TCP/IP
• Loopback address
•APIPA
• Mail protocol settings
• SMTP
• IMAP
• POP
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
11
Chapter 15: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 15.8.2 Identify common problems and solutions (continued)
• FTP settings
• Ports
• IP addresses
• Exceptions
• Programs
• Tools (Use and interpret results.)
• Ping
• Nslookup
•Telnet
• Secure connection protocols
• SSH
• HTTPS
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
12
Chapter 15: Classroom Management
 Ensure that the students are proficient in the manual assignment of an IP address,
the subnet mask, and the default gateway.
 Ensure that the students can troubleshoot wiring issues and IP addressing issues.
 Ensure that the students can connect to a wireless network and troubleshoot wireless
connectivity issues.
 Ensure that the students can share and access a device and a folder across a
network with the appropriate permissions. Students should also be able to
troubleshoot such a connection.
 Ensure that the student can build a small wired and wireless network.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
13
Chapter 15: Teaching Analogies
 Leaving the default password and SSID on a wireless network is like putting a sign
in front of your house that says “The front door is unlocked.”
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
14
Chapter 15: Suggested Class Discussions

What are some differences between WPA and WEP?

Why is it important to have network wiring skills?

How can the automatic assigning of IP addresses help or cause problems on a
network?

When should the following command line tools be used?
Presentation_ID
•
ping
•
net
•
nslookup
•
ipconfig
•
tracert
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
15
Chapter 15: Best Practices
 Have the students create problems for each other to solve using Remote Desktop
and Remote Assistance.
 If the school supports its own phone system, configure several phones in the
classroom so that students can role-play the troubleshooting of network problems
over the phone.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
16
Chapter 15: Outside Reading
 Panduit
http://www.panduit.com/
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
17
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
18
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
19