IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 15: Advanced Networks Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Chapter 15: Objectives Identify potential safety hazards and implement proper safety procedures related to networks. Design a network based on the customer’s needs. Determine the components for your customer’s network. Implement the customer’s network. Upgrade the customer’s network. Describe the installation, configuration, and management of a simple mail server. Describe preventive maintenance procedures for networks. Troubleshoot the network. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Chapter 15: Critical Concepts What is this chapter about and why is it important? A computer technician can no longer just be responsible for computers and the things that are connected to them. Instead, a technician today must place that computer on a wired or wireless network and ensure that it is able to participate in that network. Additionally, devices such as a printer or scanner, and individual files and folders must be made available to other users or other devices on the network. A technician now must understand the basics of a TCP/IP-based network and Internet connectivity. A technician must be able to ensure that each device functions, is secure, and communicates with other devices and sites in a network environment. It is important for an instructor to fully prepare students to work as technicians in a network environment. This chapter covers safety hazards, network components that are included in a network environment, and Internet connectivity options. The chapter takes the basic networking concepts to the next level of implementation with design and preventive maintenance. Troubleshooting common network problems are also included. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 Chapter 15: Activities What activities are associated with this chapter? 15.2.2 Worksheet: Protocols 15.3.2 Worksheet: ISP Connection Types 15.4.2 Lab: Configure Browser Settings in Windows XP 15.4.2 Optional Lab: Configure Browser Settings in Windows Vista 15.4.2 Lab: Share a Folder, Share a Printer, and Set Share Permissions in Windows XP 15.4.2 Optional Lab: Share a Folder, Share a Printer, and Set Share Permissions in Windows Vista 15.5.1 Lab: Install a Wireless NIC in Windows XP 15.5.1 Optional Lab: Install a Wireless NIC in Windows Vista 15.5.1 Packet Tracer Activity: Install a Wireless NIC 15.5.2 Lab: Configure a Wireless Router Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 Chapter 15: Activities (continued) What activities are associated with this chapter? 15.5.3 Lab: Test the Wireless NIC in Windows XP 15.5.3 Optional Lab: Test the Wireless NIC in Windows Vista 15.5.3 Packet Tracer Activity: Test a Wireless Connection 15.8.3 Lab: Fix a Network Problem 15.8.3 Lab: Remote Technician: Fix a Network Problem 15.8.3 Lab: Troubleshooting Network Problems in Windows XP 15.8.3 Optional Lab: Troubleshooting Network Problems in Windows Vista Chapter 15 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5 Chapter 15: New Terms What terms are introduced in this chapter? Presentation_ID backward compatible 15.3.3 Internet Service Provider (ISP) 15.3.2 Main Distribution Facility (MDF) 15.3.1 media 15.5 Network Basic Input/Output System (NetBIOS) 15.2.2 network cable 15.1.2 network file services 15.4.2 network topology 15.2.1 networking media 15.5 NSLOOKUP 15.5.3 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6 Chapter 15: New Terms (continued) What terms are introduced in this chapter? Presentation_ID server 15.6 site survey 15.2.1 topology 15.2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7 Chapter 15: Changes What has changed from the previous version (4.0) of ITEPC? Page 15.2.2 Determine protocols and network applications • Basic VoIP Page 15.3.1 Select cable types • LAN cabling vs. Wireless Page 15.3.4 Select the network device • Routers • Access points Page 15.4.1 Install and test the customer’s network • Ipconfig command Page 15.5.1 Install and configure a wireless NIC • Wireless NIC installation • DHCP settings • Static IP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8 Chapter 15: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 15.5.2 Install and configure a wireless router • Wireless •802.11 Protocol Selection • SSID • Disable DHCP • Use static IP • Disable SSID broadcast • Update firmware Page 15.5.3 Test a connection • Ping Command • Tracert Command • Net Command • Nslookup Command Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9 Chapter 15: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 15.8.1 Review the troubleshooting process • Identify the Problem • Establish a Theory of Probable Causes • Determine an Exact Cause • Implement a Solution • Verify Solution and Full System Functionality • Document Findings Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10 Chapter 15: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 15.8.2 Identify common problems and solutions • TCP/IP settings • Gateway • Subnet mask • DNS • DHCP • NAT • Characteristics of TCP/IP • Loopback address •APIPA • Mail protocol settings • SMTP • IMAP • POP Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11 Chapter 15: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 15.8.2 Identify common problems and solutions (continued) • FTP settings • Ports • IP addresses • Exceptions • Programs • Tools (Use and interpret results.) • Ping • Nslookup •Telnet • Secure connection protocols • SSH • HTTPS Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12 Chapter 15: Classroom Management Ensure that the students are proficient in the manual assignment of an IP address, the subnet mask, and the default gateway. Ensure that the students can troubleshoot wiring issues and IP addressing issues. Ensure that the students can connect to a wireless network and troubleshoot wireless connectivity issues. Ensure that the students can share and access a device and a folder across a network with the appropriate permissions. Students should also be able to troubleshoot such a connection. Ensure that the student can build a small wired and wireless network. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13 Chapter 15: Teaching Analogies Leaving the default password and SSID on a wireless network is like putting a sign in front of your house that says “The front door is unlocked.” Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14 Chapter 15: Suggested Class Discussions What are some differences between WPA and WEP? Why is it important to have network wiring skills? How can the automatic assigning of IP addresses help or cause problems on a network? When should the following command line tools be used? Presentation_ID • ping • net • nslookup • ipconfig • tracert © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15 Chapter 15: Best Practices Have the students create problems for each other to solve using Remote Desktop and Remote Assistance. If the school supports its own phone system, configure several phones in the classroom so that students can role-play the troubleshooting of network problems over the phone. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16 Chapter 15: Outside Reading Panduit http://www.panduit.com/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19