Podcast
Questions and Answers
Which type of network is ideal for personal devices like cell phones and laptops?
Which type of network is ideal for personal devices like cell phones and laptops?
Which network category is typically used to cover a large geographic area that includes several smaller networks?
Which network category is typically used to cover a large geographic area that includes several smaller networks?
Which type of network is commonly used in areas where installing cables is difficult?
Which type of network is commonly used in areas where installing cables is difficult?
A network that covers a large campus or city is called a:
A network that covers a large campus or city is called a:
Signup and view all the answers
What type of network would be most appropriate for a single office building?
What type of network would be most appropriate for a single office building?
Signup and view all the answers
Which of the following best describes bandwidth?
Which of the following best describes bandwidth?
Signup and view all the answers
ISPs typically devote more bandwidth to which type of data transmission?
ISPs typically devote more bandwidth to which type of data transmission?
Signup and view all the answers
What is the primary function of an Internet Service Provider (ISP)?
What is the primary function of an Internet Service Provider (ISP)?
Signup and view all the answers
What is latency in the context of network transmissions?
What is latency in the context of network transmissions?
Signup and view all the answers
Which type of internet connection is commonly used by ISPs?
Which type of internet connection is commonly used by ISPs?
Signup and view all the answers
What device connects the LAN to the ISP?
What device connects the LAN to the ISP?
Signup and view all the answers
Which role does the ISP play in the network?
Which role does the ISP play in the network?
Signup and view all the answers
Which type of technology is used to connect the router to the ISP?
Which type of technology is used to connect the router to the ISP?
Signup and view all the answers
What does LAN stand for?
What does LAN stand for?
Signup and view all the answers
In the provided diagram, how do devices on the LAN communicate with the internet?
In the provided diagram, how do devices on the LAN communicate with the internet?
Signup and view all the answers
Which technology uses existing TV cable lines for internet connection?
Which technology uses existing TV cable lines for internet connection?
Signup and view all the answers
What type of line does DSL use for connections?
What type of line does DSL use for connections?
Signup and view all the answers
Which device converts a PC's digital signals to analog for cable internet?
Which device converts a PC's digital signals to analog for cable internet?
Signup and view all the answers
What enables DSL to use the same phone line for both voice and internet simultaneously?
What enables DSL to use the same phone line for both voice and internet simultaneously?
Signup and view all the answers
Which of the following is NOT a feature of DSL?
Which of the following is NOT a feature of DSL?
Signup and view all the answers
What is a common drawback of cable internet?
What is a common drawback of cable internet?
Signup and view all the answers
Which infrastructure does cable internet share with neighbors?
Which infrastructure does cable internet share with neighbors?
Signup and view all the answers
What is a necessary step when using DSL to ensure a clear connection?
What is a necessary step when using DSL to ensure a clear connection?
Signup and view all the answers
What type of line does DSL use?
What type of line does DSL use?
Signup and view all the answers
Which statement is true for both cable internet and DSL?
Which statement is true for both cable internet and DSL?
Signup and view all the answers
What is the purpose of having a DSL filter on phone jacks?
What is the purpose of having a DSL filter on phone jacks?
Signup and view all the answers
Which phone jack DOES NOT require a filter when using DSL in a home?
Which phone jack DOES NOT require a filter when using DSL in a home?
Signup and view all the answers
How is 'HPN' labeled on the DSL filter related to internet connections?
How is 'HPN' labeled on the DSL filter related to internet connections?
Signup and view all the answers
What happens if a DSL filter is not used on other phone jacks but the one used by the DSL modem?
What happens if a DSL filter is not used on other phone jacks but the one used by the DSL modem?
Signup and view all the answers
Which of the following equipment connects directly to the phone jack labeled 'DSL' on the filter?
Which of the following equipment connects directly to the phone jack labeled 'DSL' on the filter?
Signup and view all the answers
Which port on the modem/router is used to connect to the ISP?
Which port on the modem/router is used to connect to the ISP?
Signup and view all the answers
Which of the following correctly identifies the purpose of the port labeled 'Internal Ethernet network'?
Which of the following correctly identifies the purpose of the port labeled 'Internal Ethernet network'?
Signup and view all the answers
What action is associated with the 'Reset button' on the modem/router?
What action is associated with the 'Reset button' on the modem/router?
Signup and view all the answers
Which type of connection does the blue-tipped cable provide?
Which type of connection does the blue-tipped cable provide?
Signup and view all the answers
What is a key disadvantage of satellite internet technology?
What is a key disadvantage of satellite internet technology?
Signup and view all the answers
Which of the following statements is accurate regarding fiber optic connections?
Which of the following statements is accurate regarding fiber optic connections?
Signup and view all the answers
Which internet technology is beneficial for providing high-speed connections in remote locations?
Which internet technology is beneficial for providing high-speed connections in remote locations?
Signup and view all the answers
Why might latency be an issue with satellite internet?
Why might latency be an issue with satellite internet?
Signup and view all the answers
Which best describes the connection method of fiber optic cables?
Which best describes the connection method of fiber optic cables?
Signup and view all the answers
What does WWAN stand for?
What does WWAN stand for?
Signup and view all the answers
Which statement is true about a base station in a Cellular WAN?
Which statement is true about a base station in a Cellular WAN?
Signup and view all the answers
Which are the two established cellular technologies?
Which are the two established cellular technologies?
Signup and view all the answers
What is the expected future of GSM and CDMA technologies?
What is the expected future of GSM and CDMA technologies?
Signup and view all the answers
What is the primary disadvantage of dial-up internet?
What is the primary disadvantage of dial-up internet?
Signup and view all the answers
What is required to connect a computer to a cellular network using mobile broadband?
What is required to connect a computer to a cellular network using mobile broadband?
Signup and view all the answers
What card is typically needed for most networks when connecting a computer using mobile broadband?
What card is typically needed for most networks when connecting a computer using mobile broadband?
Signup and view all the answers
Which of the following is NOT an option for connecting to a cellular network?
Which of the following is NOT an option for connecting to a cellular network?
Signup and view all the answers
Which option allows you to share a cellular network connection through a physical USB connection?
Which option allows you to share a cellular network connection through a physical USB connection?
Signup and view all the answers
What is a common feature of a mobile hotspot?
What is a common feature of a mobile hotspot?
Signup and view all the answers
What does a cell tower consist of?
What does a cell tower consist of?
Signup and view all the answers
What is the primary function of cell towers in a cellular WAN?
What is the primary function of cell towers in a cellular WAN?
Signup and view all the answers
What is a key characteristic of the areas represented by each hexagon in a cellular WAN?
What is a key characteristic of the areas represented by each hexagon in a cellular WAN?
Signup and view all the answers
Which description best fits a 'cell' in the context of a cellular WAN?
Which description best fits a 'cell' in the context of a cellular WAN?
Signup and view all the answers
What is the first step in connecting a computer to a network using a wired or wireless connection?
What is the first step in connecting a computer to a network using a wired or wireless connection?
Signup and view all the answers
Which port is used to connect a network cable for a wired network?
Which port is used to connect a network cable for a wired network?
Signup and view all the answers
What should you do if the wireless network you are trying to connect to is secured?
What should you do if the wireless network you are trying to connect to is secured?
Signup and view all the answers
When connecting to a wireless network, what icon should you click to begin the process?
When connecting to a wireless network, what icon should you click to begin the process?
Signup and view all the answers
What action should you take to ensure the wired network connection is properly established?
What action should you take to ensure the wired network connection is properly established?
Signup and view all the answers
What should you do if you connect to a local network for the first time and it asks if you want to make the PC discoverable?
What should you do if you connect to a local network for the first time and it asks if you want to make the PC discoverable?
Signup and view all the answers
How do you verify the availability of network resources on a private network?
How do you verify the availability of network resources on a private network?
Signup and view all the answers
What action is required for some hotspots before gaining Internet connectivity?
What action is required for some hotspots before gaining Internet connectivity?
Signup and view all the answers
Where can you view and change network security settings in Windows 10?
Where can you view and change network security settings in Windows 10?
Signup and view all the answers
How do you change the network profile type between Public and Private in Windows 10?
How do you change the network profile type between Public and Private in Windows 10?
Signup and view all the answers
Which action allows you to view the security key in a Wi-Fi connection?
Which action allows you to view the security key in a Wi-Fi connection?
Signup and view all the answers
What is the first step to view the status of a wireless connection?
What is the first step to view the status of a wireless connection?
Signup and view all the answers
Which option is used to reset a network connection if there is a problem?
Which option is used to reset a network connection if there is a problem?
Signup and view all the answers
Where do you need to navigate to change adapter settings?
Where do you need to navigate to change adapter settings?
Signup and view all the answers
In the Network Connections window, what action is performed first to view a Wi-Fi connection's status?
In the Network Connections window, what action is performed first to view a Wi-Fi connection's status?
Signup and view all the answers
What is the primary function of a virtual private network (VPN)?
What is the primary function of a virtual private network (VPN)?
Signup and view all the answers
Which of the following can manage a VPN?
Which of the following can manage a VPN?
Signup and view all the answers
How is data typically protected when using a VPN?
How is data typically protected when using a VPN?
Signup and view all the answers
What is a defining characteristic of a VPN connection?
What is a defining characteristic of a VPN connection?
Signup and view all the answers
When creating a VPN connection, what is the recommended action?
When creating a VPN connection, what is the recommended action?
Signup and view all the answers
Which step comes after clicking 'Set up a new connection or network' in Network and Sharing Center?
Which step comes after clicking 'Set up a new connection or network' in Network and Sharing Center?
Signup and view all the answers
What information is required in the 'Connect to a Workplace' box to set up a VPN connection?
What information is required in the 'Connect to a Workplace' box to set up a VPN connection?
Signup and view all the answers
Which icon should you click to use the VPN connection after it is set up?
Which icon should you click to use the VPN connection after it is set up?
Signup and view all the answers
What might cause problems when connecting to a VPN?
What might cause problems when connecting to a VPN?
Signup and view all the answers
Where can you configure security settings for the VPN connection?
Where can you configure security settings for the VPN connection?
Signup and view all the answers
What is the first step in setting up a dial-up connection?
What is the first step in setting up a dial-up connection?
Signup and view all the answers
Where do you enter ISP information during the dial-up connection setup?
Where do you enter ISP information during the dial-up connection setup?
Signup and view all the answers
Which action must be performed after selecting the dial-up connection from the Network icon?
Which action must be performed after selecting the dial-up connection from the Network icon?
Signup and view all the answers
What sound indicates that the modem is dialing up the ISP?
What sound indicates that the modem is dialing up the ISP?
Signup and view all the answers
Which option must be chosen after opening the Network and Sharing Center window for setting up a dial-up connection?
Which option must be chosen after opening the Network and Sharing Center window for setting up a dial-up connection?
Signup and view all the answers
Which version of Internet Protocol defines 32-bit IP addresses?
Which version of Internet Protocol defines 32-bit IP addresses?
Signup and view all the answers
How is a 128-bit IP address typically written?
How is a 128-bit IP address typically written?
Signup and view all the answers
Which statement about IP address usage on networks is correct?
Which statement about IP address usage on networks is correct?
Signup and view all the answers
What is the primary difference between IPv4 and IPv6 addresses?
What is the primary difference between IPv4 and IPv6 addresses?
Signup and view all the answers
Which format is NOT associated with an IP address?
Which format is NOT associated with an IP address?
Signup and view all the answers
Which server allows a device to request an IP address dynamically?
Which server allows a device to request an IP address dynamically?
Signup and view all the answers
What is required for a host to communicate on a network?
What is required for a host to communicate on a network?
Signup and view all the answers
What is a computer's IP address called when it is manually assigned?
What is a computer's IP address called when it is manually assigned?
Signup and view all the answers
What is the function of a default gateway in a network configuration?
What is the function of a default gateway in a network configuration?
Signup and view all the answers
Which of the following is an example of a subnet mask?
Which of the following is an example of a subnet mask?
Signup and view all the answers
What is the default setting when configuring an IP address in Windows?
What is the default setting when configuring an IP address in Windows?
Signup and view all the answers
To configure a static IP address, which of the following options should be selected?
To configure a static IP address, which of the following options should be selected?
Signup and view all the answers
Which tab in the network connection properties box allows you to access the IPv4 properties?
Which tab in the network connection properties box allows you to access the IPv4 properties?
Signup and view all the answers
When setting a static IP address, which additional information must be provided alongside the IP address?
When setting a static IP address, which additional information must be provided alongside the IP address?
Signup and view all the answers
If given by the network administrator, where should DNS server addresses be entered?
If given by the network administrator, where should DNS server addresses be entered?
Signup and view all the answers
Which of the following accurately describes a full duplex network adapter?
Which of the following accurately describes a full duplex network adapter?
Signup and view all the answers
What is the primary function of a network interface card (NIC)?
What is the primary function of a network interface card (NIC)?
Signup and view all the answers
What essential feature does every network adapter have?
What essential feature does every network adapter have?
Signup and view all the answers
What is an important factor to consider about the drivers a NIC uses?
What is an important factor to consider about the drivers a NIC uses?
Signup and view all the answers
What type of connection does a network adapter that is an external device typically use?
What type of connection does a network adapter that is an external device typically use?
Signup and view all the answers
What must be enabled in BIOS/UEFI setup for an onboard NIC to use Wake-on-LAN?
What must be enabled in BIOS/UEFI setup for an onboard NIC to use Wake-on-LAN?
Signup and view all the answers
Which feature allows the control of network traffic priority for specific applications?
Which feature allows the control of network traffic priority for specific applications?
Signup and view all the answers
What is the main function of the status indicator lights on a network adapter?
What is the main function of the status indicator lights on a network adapter?
Signup and view all the answers
What does QoS need to be configured on to manage network priority?
What does QoS need to be configured on to manage network priority?
Signup and view all the answers
What capability does Wake-on-LAN provide for a computer?
What capability does Wake-on-LAN provide for a computer?
Signup and view all the answers
What is the primary role of a router in a SOHO network?
What is the primary role of a router in a SOHO network?
Signup and view all the answers
Which action is necessary when setting up a SOHO network?
Which action is necessary when setting up a SOHO network?
Signup and view all the answers
How does a router aid in traffic management?
How does a router aid in traffic management?
Signup and view all the answers
In the context of setting up a multifunction router, what does SOHO stand for?
In the context of setting up a multifunction router, what does SOHO stand for?
Signup and view all the answers
Which device is crucial for managing traffic between the network and the internet in a SOHO setup?
Which device is crucial for managing traffic between the network and the internet in a SOHO setup?
Signup and view all the answers
Which function of a SOHO router allows it to assign IP addresses to computers on the network?
Which function of a SOHO router allows it to assign IP addresses to computers on the network?
Signup and view all the answers
What role does a SOHO router perform to enable wireless devices to access the internet?
What role does a SOHO router perform to enable wireless devices to access the internet?
Signup and view all the answers
How does a SOHO router manage to block unwanted traffic from the internet?
How does a SOHO router manage to block unwanted traffic from the internet?
Signup and view all the answers
What is the primary function of a SOHO router when it routes traffic between the ISP network and the local network?
What is the primary function of a SOHO router when it routes traffic between the ISP network and the local network?
Signup and view all the answers
Which feature of a SOHO router can be used to share files with network users by connecting an external hard drive?
Which feature of a SOHO router can be used to share files with network users by connecting an external hard drive?
Signup and view all the answers
What should you do to maximize the physical security of a router?
What should you do to maximize the physical security of a router?
Signup and view all the answers
What is the next step after entering the IP address of the router in a browser?
What is the next step after entering the IP address of the router in a browser?
Signup and view all the answers
Which antenna position is recommended for routers with external antennas?
Which antenna position is recommended for routers with external antennas?
Signup and view all the answers
Where should a router be placed to create the best Wi-Fi hotspot for users?
Where should a router be placed to create the best Wi-Fi hotspot for users?
Signup and view all the answers
What should you always do after finishing configuration changes on a router?
What should you always do after finishing configuration changes on a router?
Signup and view all the answers
What is identified by a port number in a message directed to a computer?
What is identified by a port number in a message directed to a computer?
Signup and view all the answers
What feature do routers offer to prevent any unsolicited internet activity from getting into the network?
What feature do routers offer to prevent any unsolicited internet activity from getting into the network?
Signup and view all the answers
How can exceptions to a firewall rule be specified to allow unsolicited traffic from the Internet?
How can exceptions to a firewall rule be specified to allow unsolicited traffic from the Internet?
Signup and view all the answers
What key function does a router's firewall perform?
What key function does a router's firewall perform?
Signup and view all the answers
Which term also refers to a port number used to identify an application?
Which term also refers to a port number used to identify an application?
Signup and view all the answers
What is a requirement for port forwarding to function correctly?
What is a requirement for port forwarding to function correctly?
Signup and view all the answers
What must you acquire from your ISP to effectively perform port forwarding?
What must you acquire from your ISP to effectively perform port forwarding?
Signup and view all the answers
What is one of the security risks associated with using port forwarding?
What is one of the security risks associated with using port forwarding?
Signup and view all the answers
Which device typically handles requests for communication from the Internet in port forwarding?
Which device typically handles requests for communication from the Internet in port forwarding?
Signup and view all the answers
Which of the following accurately describes port forwarding?
Which of the following accurately describes port forwarding?
Signup and view all the answers
What is the primary purpose of placing a computer in a DMZ?
What is the primary purpose of placing a computer in a DMZ?
Signup and view all the answers
What does a whitelist specify in content filtering?
What does a whitelist specify in content filtering?
Signup and view all the answers
Which of the following can content filtering criteria NOT be based on?
Which of the following can content filtering criteria NOT be based on?
Signup and view all the answers
Which best describes a DMZ in networking?
Which best describes a DMZ in networking?
Signup and view all the answers
When using content filtering, what is the role of a blacklist?
When using content filtering, what is the role of a blacklist?
Signup and view all the answers
What is the purpose of changing the Service Set Identifier (SSID) and disabling SSID broadcasting?
What is the purpose of changing the Service Set Identifier (SSID) and disabling SSID broadcasting?
Signup and view all the answers
How many channels are available for wireless networks in the US?
How many channels are available for wireless networks in the US?
Signup and view all the answers
What can you do to address interference issues in a wireless network environment?
What can you do to address interference issues in a wireless network environment?
Signup and view all the answers
Why might you adjust the radio power levels on high-end access points (APs)?
Why might you adjust the radio power levels on high-end access points (APs)?
Signup and view all the answers
What is a potential downside of disabling SSID broadcasting?
What is a potential downside of disabling SSID broadcasting?
Signup and view all the answers
What is the primary benefit of enabling WMM (Wi-Fi Multimedia) in a wireless network?
What is the primary benefit of enabling WMM (Wi-Fi Multimedia) in a wireless network?
Signup and view all the answers
How does WPS generate the SSID and security key?
How does WPS generate the SSID and security key?
Signup and view all the answers
Which action should be taken to mitigate the security risk associated with WPS?
Which action should be taken to mitigate the security risk associated with WPS?
Signup and view all the answers
What does WMM (Wi-Fi Multimedia) specifically prioritize over other types of wireless network traffic?
What does WMM (Wi-Fi Multimedia) specifically prioritize over other types of wireless network traffic?
Signup and view all the answers
Why might WPS be considered a security risk?
Why might WPS be considered a security risk?
Signup and view all the answers
What does the nslookup command primarily test?
What does the nslookup command primarily test?
Signup and view all the answers
What information can you request from a DNS server using the nslookup command?
What information can you request from a DNS server using the nslookup command?
Signup and view all the answers
What encompasses the zone data that a DNS server is aware of?
What encompasses the zone data that a DNS server is aware of?
Signup and view all the answers
What is a reverse lookup in the context of the nslookup command?
What is a reverse lookup in the context of the nslookup command?
Signup and view all the answers
Which command would you use to troubleshoot DNS name resolution issues?
Which command would you use to troubleshoot DNS name resolution issues?
Signup and view all the answers
What is the purpose of the tracert command?
What is the purpose of the tracert command?
Signup and view all the answers
What happens to a message once it exceeds its Time To Live (TTL) value?
What happens to a message once it exceeds its Time To Live (TTL) value?
Signup and view all the answers
What is a 'hop' in the context of the tracert command?
What is a 'hop' in the context of the tracert command?
Signup and view all the answers
Which protocol sends a message back to the host if a packet exceeds its TTL?
Which protocol sends a message back to the host if a packet exceeds its TTL?
Signup and view all the answers
What information does the tracert command provide?
What information does the tracert command provide?
Signup and view all the answers
What is the purpose of the net user
command?
What is the purpose of the net user
command?
Signup and view all the answers
Which command would you use to map a network drive to the /Medical folder on the \bluelight remote computer?
Which command would you use to map a network drive to the /Medical folder on the \bluelight remote computer?
Signup and view all the answers
Which of the following operations requires an elevated command prompt window when using the 'net' commands?
Which of the following operations requires an elevated command prompt window when using the 'net' commands?
Signup and view all the answers
What does the command net use z: \bluelight\Medical
accomplish?
What does the command net use z: \bluelight\Medical
accomplish?
Signup and view all the answers
Which 'net' command would be used to disconnect a computer from a shared resource?
Which 'net' command would be used to disconnect a computer from a shared resource?
Signup and view all the answers
What is the purpose of the netstat command?
What is the purpose of the netstat command?
Signup and view all the answers
Which parameter of netstat would you use to display all connections and listening ports?
Which parameter of netstat would you use to display all connections and listening ports?
Signup and view all the answers
Which netstat parameter is used to show executable involved in creating each connection or listening port?
Which netstat parameter is used to show executable involved in creating each connection or listening port?
Signup and view all the answers
To display the owning process ID of a connection using netstat, which parameter should be used?
To display the owning process ID of a connection using netstat, which parameter should be used?
Signup and view all the answers
Which of the following is NOT a parameter used with the netstat command?
Which of the following is NOT a parameter used with the netstat command?
Signup and view all the answers
Which netstat command provides statistics about all active connections and the ports the computer is listening on?
Which netstat command provides statistics about all active connections and the ports the computer is listening on?
Signup and view all the answers
Which netstat command option is useful for finding programs that might be using the connection and requires an elevated command prompt?
Which netstat command option is useful for finding programs that might be using the connection and requires an elevated command prompt?
Signup and view all the answers
What is the benefit of using netstat -b -o?
What is the benefit of using netstat -b -o?
Signup and view all the answers
Which command would you use to redirect the output of netstat to a file for later analysis?
Which command would you use to redirect the output of netstat to a file for later analysis?
Signup and view all the answers
Which of the following netstat commands lists the IP addresses of active connections?
Which of the following netstat commands lists the IP addresses of active connections?
Signup and view all the answers
Which components are essential for a host to communicate with other hosts on local or remote networks?
Which components are essential for a host to communicate with other hosts on local or remote networks?
Signup and view all the answers
How does a VPN protect data?
How does a VPN protect data?
Signup and view all the answers
What are network adapters commonly called?
What are network adapters commonly called?
Signup and view all the answers
Which factors are used to measure network performance?
Which factors are used to measure network performance?
Signup and view all the answers
Which are the two most popular ways to connect to the Internet?
Which are the two most popular ways to connect to the Internet?
Signup and view all the answers
Which function is NOT typically served by a multifunction router in a SOHO network?
Which function is NOT typically served by a multifunction router in a SOHO network?
Signup and view all the answers
Which method is NOT mentioned for allowing certain traffic initiated from the Internet past your firewall?
Which method is NOT mentioned for allowing certain traffic initiated from the Internet past your firewall?
Signup and view all the answers
What should you do immediately after installing a new router?
What should you do immediately after installing a new router?
Signup and view all the answers
Which encryption standards are recommended for securing a wireless access point?
Which encryption standards are recommended for securing a wireless access point?
Signup and view all the answers
Which Windows command-line utility is used for network troubleshooting?
Which Windows command-line utility is used for network troubleshooting?
Signup and view all the answers
Study Notes
Network Categorization
- Networks can be classified by technology used and size of the network
Network Types
-
PAN (Personal Area Network)
- Consists of personal devices such as cell phones and laptops
- Covers a small, localized area
-
LAN (Local Area Network)
- Covers a small local area such as a home, office, or building
- Typically confined to a small geographical area
-
WMN (Wireless Mesh Network)
- Covers a limited geographic area
- Popular in areas where cables are difficult to install
-
MAN (Metropolitan Area Network)
- Covers a large campus or city
- Larger than LAN, smaller than WAN
-
WAN (Wide Area Network)
- Covers a large geographic area
- Comprised of multiple smaller networks
Internet Connection Technologies
- Internet connection is facilitated through an Internet Service Provider (ISP)
- Common types of internet connections are DSL and cable Internet (cable modem)
- ISPs typically allocate more bandwidth for downloading data than uploading
Key Concepts in Internet Connection
- Bandwidth: the maximum rate of data transmission, measured in bits per second (bps)
- Data throughput: the actual speed of data transmission over a network
- Latency: the delay in network transmission, measured by the round-trip time it takes for a data packet to travel from source to destination and back
Internet Connection Technologies
- A local area network (LAN) connects to the internet via a DSL or cable internet connection and an internet service provider (ISP).
- Devices on the LAN are connected to a router, which is linked to either DSL or cable internet connection.
- An ISP (internet service provider) is a company that provides internet services.
- The ISP connects to the internet.
- The ISP acts as a bridge between a local area network (LAN) and the internet.
Cable Internet vs DSL
Cable Internet
- Uses existing TV cable lines for internet connectivity
- Always connected, with no need to dial up
- TV signals and PC data signals share the same coax cable
- Cable modem converts PC's digital signals to analog and vice versa
- Enables data transmission over the coax cable
DSL (Digital Subscriber Line)
- A group of broadband technologies offering varying speeds
- Utilizes ordinary copper phone lines for internet connectivity
- Always connected, with no need to dial up
- Supports simultaneous use of the same phone line for voice and DSL
- Allows for voice calls and internet access at the same time
Cable Internet vs. DSL
- Both cable internet and DSL can be purchased on a sliding scale, offering flexibility in pricing.
- Cable modem technology shares the same infrastructure as TV cables, which can lead to degraded service quality due to shared bandwidth with neighbors.
- In contrast, DSL uses a dedicated phone line, providing a separate connection for internet access.
- However, DSL connections require a filter to remove static from the phone line, which can affect internet speeds.
DSL Filters
- DSL filters are required on every phone jack in a home, except for the one used by the DSL modem.
- The filter is typically connected to a wall plate with a single phone jack and a DSL label.
- A DSL filter has two jacks, one labeled "DSL" and "HPN", and the other labeled "Phone".
Modem/Router Connections
- The modem/router has several ports, including Voice-over-IP phone line, Internal Ethernet network, Cable connection to ISP, and Reset button.
- A Voice-over-IP phone line is connected using a yellow cable.
- The Internal Ethernet network is connected using a black cable.
- The Cable connection to ISP is connected using a blue-tipped cable.
Dedicated Line Using Fiber Optic
- Fiber optic connections are dedicated, point-to-point (PTP) lines, ensuring no sharing of the line with others.
- A single broadband fiber-optic cable supports multiple services, including television, internet data, and voice communication.
- Upstream and downstream speeds, as well as prices, vary depending on the fiber optic connection.
Satellite Internet
- Satellite internet technology provides high-speed connections to remote areas, offering widespread coverage.
- Satellite connections can be established anywhere, including in airplanes, making them highly accessible.
- Two significant drawbacks of satellite internet are the requirement for line-of-sight wireless connectivity and the latency that occurs when uploading data.
Internet Connection Technologies
- Dial-Up
- Least expensive and slowest internet connection technology
- Also known as Plain Old Telephone Service (POTS)
Cellular WAN
- Wireless Wide Area Network (WWAN) that covers a wide area
- Comprised of cells created by base stations
- Each base station can have multiple transceivers and antennas on the same tower
- Supports multiple technologies
- Two established cellular technologies: GSM and CDMA
LTE and VoLTE
- Expected to replace GSM and CDMA eventually
- LTE: Long Term Evolution
- VoLTE: Voice over LTE
Cellular WAN Connection
- To connect a computer to a cellular network, two essential components are required:
- Hardware to facilitate the connection
- Software to enable the connection
- A SIM (Subscriber Identification Module) card is necessary for most networks
Options for Cellular Network Connection
- Embedded mobile broadband modem: a device with built-in cellular connectivity
- Cell phone tethering: using a cell phone as a modem to connect to a cellular network
- USB broadband modem: a USB device that connects to a computer and cellular network
- LTE installed Internet: a broadband Internet connection using Long-Term Evolution (LTE) technology
- Mobile hotspot: a device that provides a cellular connection and shares it with other devices
Cellular WAN Structure
- A cellular WAN consists of many cells that provide coverage over a wide area.
- The structure of a cellular WAN is represented by a honeycomb of hexagon shapes, each representing a geographical area.
- Cell towers are situated inside each hexagon, providing cellular service.
- A cell tower is a radio transceiver that consists of a small structure with a dish and a ladder attached to a tall radio mast.
Connecting to a Network
- To connect a computer to a network, install network adapter and drivers
Wired Network Connection
- Connect network cable to Ethernet RJ-45 port on the computer and network port
- Verify lights to ensure connection is active
- Windows will automatically configure the connection
Wireless Network Connection
- Click the Network icon and select a wireless network to connect
- Click Connect to establish the connection
- If the network is secured, enter a security key to gain access
Connecting to a Wired or Wireless Local Network
- To connect to a network, decide if the PC should be discoverable: click Yes for private networks and No for public networks
Verifying Internet Connectivity
- Open a browser to verify internet connectivity
Captive Portal (Initial Page)
- Some hotspots display an initial page, requiring code entry or agreement to terms of use
Private Network Resources
- On a private network, open File Explorer or Windows Explorer to access network resources
Network Security Settings in Windows 10
- Open the Settings app and click Network & Internet to view and change network security settings
- Click Change connection properties and select either Public or Private
Checking Wireless Connection Status
- Open Control Panel and navigate to Network and Sharing Center to view wireless connection status
- Click Change adapter settings to open Network Connections window
- Right-click Wi-Fi connection and select Status to access Wi-Fi Status box
Viewing Security Key
- In Wi-Fi Status box, click Wireless Properties and select Security tab
- Check Show characters to view security key
Troubleshooting Network Connection Issues
- To reset network connection, open Network Connections window and right-click network connection
- Select Disable from shortcut menu and then re-enable the connection by right-clicking and selecting Enable
Creating a VPN Connection
- A VPN allows telecommuting employees to connect to a corporate network via the Internet
- Data sent over the VPN is encrypted using a technique called "tunneling"
- VPNs can be managed by operating systems, routers, or third-party software
- A VPN connection is a virtual connection that is set up over an existing connection
- When setting up a VPN, it is essential to follow the directions provided by the network administrator who hosts the VPN
Creating a VPN Connection in Windows
- To set up a VPN connection, go to Network and Sharing Center and click "Set up a new connection or network", then select "Connect to a workplace" and "Set up a dial-up or VPN connection to your workplace".
- In the "Connect to a Workplace" box, select "Use my Internet connection (VPN)" and enter the IP address or domain name of the network, then name the VPN connection and click "Create".
Connecting to a VPN in Windows
- To connect to the VPN, click the Network icon in the taskbar and select the VPN connection from the list of available networks.
- Click "Connect" and enter your user name and password, then click "OK".
Troubleshooting VPN Connection Issues
- Problems connecting to a VPN can be caused by using the wrong authentication protocols when passing the user name and password.
- To configure security settings, click on the "Properties" of the VPN Connection.
Setting up a Dial-Up Connection
- Install an internal or external dial-up modem
- Connect the phone line to the modem port on the computer and the wall jack
- Access the Network and Sharing Center window to set up a connection or network
- Select "Connect to the Internet" and then "Set up a broadband or dial-up connection"
- Click "Next" and then select "Dial-up"
- Enter ISP information and click "Create" to complete the setup
Using the Dial-Up Connection
- Click the Network icon in the taskbar to access the connection
- Select the dial-up connection and click "Connect" and then "Dial"
- The modem will dial up the ISP and establish the connection, which can be heard through the modem's sounds
IP Addresses
- Computers use IP addresses to find each other on a network
- IP addresses are assigned to a network connection when the connection is first made
IP Address Format
- 32-bit IP addresses are written as four decimal numbers called octets, separated by periods
- 128-bit IP addresses are written as eight hexadecimal numbers, separated by colons
IP Address Versions
- Most networks use 32-bit IP addresses, defined by IPv4 (Internet Protocol version 4)
- Some networks use both 32-bit and 128-bit addresses, with 128-bit addresses defined by IPv6 (Internet Protocol version 6)
Host Requirements for Network Communication
- A host is any device on a network that requests or serves data or services to other devices.
- To communicate on a network or the Internet, a host needs its own IP address, subnet mask, IP address of a default gateway, and IP address of one or more DNS servers.
IP Address Configurations
- Static IP address: manually assigned to a computer's network connection.
- Dynamic IP address: received from a DHCP (Dynamic Host Configuration Protocol) server on the network.
DHCP Server
- A server on the network that provides IP address and other network configuration information to hosts.
Configuring Dynamic and Static IP Addresses
- To access IP configuration settings, open Network Connections, right-click the network connection, and select Properties
- In the Properties box, click the Networking tab to access IP configuration options
- Internet Protocol Version 4 (TCP/IPv4) is the default IP configuration protocol
- By default, IP addressing is set to dynamic; to change to static, select Use the following IP address
- To configure static IP addressing, enter the following information:
- IP address
- Subnet mask
- Default gateway
- If using DNS servers, select Use the following DNS server addresses and enter up to two IP addresses provided by the network administrator
Network Adapters
- A computer connects to a local network using a network adapter, which can be a network port on the motherboard or a network interface card (NIC)
- External network adapters can also be connected via a USB port
Key Features of Network Adapters
- Drivers are required for a NIC to function
- Ethernet speeds can be either full duplex or half duplex
- Full duplex allows for simultaneous sending and receiving of transmissions
- Half duplex only works in one direction at a time
- Every network adapter has a unique 48-bit MAC address, hardcoded by the manufacturer
Managing Network Adapters
- Network adapters have status indicator lights that show their current state
- Wake-on-LAN allows a computer to wake up when it receives certain network communication
- For onboard NICs, Wake-on-LAN must be enabled in the BIOS/UEFI setup
Quality of Service (QoS)
- QoS enables control over which applications have priority on the network
- QoS requires configuration on both the router and the network adapter of each computer
Setting Up a Multifunction Router for a SOHO Network
- To set up a SOHO network, configuring a multipurpose router is essential to connect the network to the internet
- A router is a device that manages traffic between two or more networks
- Routers can help find the best path for traffic to travel from one network to another
Functions of a SOHO Router
- A typical SOHO router combines multiple features, including:
Routing Function
- Stands between the ISP network and the local network
- Routes traffic between these two networks
Switching Function
- Manages several network ports
- Can be connected to wired computers or other network devices
DHCP Server Function
- Assigns IP addresses to all computers on the local network
- Acts as a central IP address manager
Wireless Access Point (WAP) Function
- Enables wireless computers to connect to the Internet
- Provides wireless network connectivity
Firewall Function
- Blocks unwanted traffic from the Internet
- Restricts Internet access for local devices behind the firewall
- Provides network security and protection
FTP Server Function
- Can be used to share files with network users
- Requires an external hard drive to be connected
- FTP firmware on the router is necessary for file sharing
Router Placement and Physical Security
- Place the router behind a locked door accessible only to authorized personnel for maximum security
- Centrally locate the router to create the best Wi-Fi hotspot for users
Configuring a Router with External Antennas
- Raise the external antennas to vertical positions for optimal performance
General Router Configuration Steps
- Open a browser and enter the IP address of the router to access its setup page
- Log in using the assigned admin username (or default admin credentials)
- Navigate the router's firmware menus to change its configuration settings
- Save changes when finished, then log out and close the browser window
Limiting Internet Traffic on Your Network
- A router's firewall examines each incoming message from the internet to decide whether to allow it onto the network.
- Each message is directed to a specific computer and a particular application running on that computer, identified by a port number or port address.
- Routers offer the option to disable (close) all ports, effectively blocking all incoming internet activity.
- To allow unsolicited traffic from the internet, exceptions to this firewall rule must be specified using either port forwarding or a DMZ.
Port Forwarding
- Port Forwarding allows a firewall to receive and forward requests from the Internet to a specific computer and port on your network
- Leasing a static IP address from an ISP is necessary for port forwarding to work
- A computer on the network must have a static IP address to receive forwarded requests
- Port forwarding increases vulnerability of your computer and network as it allows external users direct access to your private network
Network Traffic Management
- A DMZ (Demilitarized Zone) is a network or computer that bypasses the firewall's protection.
- Placing a device in the DMZ zone can help resolve issues with port forwarding.
Content Filtering and Parental Controls
- Routers often provide features for employers and parents to restrict internet access for specific computers or users.
- Filtering criteria can be based on specific websites, categories of websites, keywords, services, time of day, or day of the week.
- Blacklists define what cannot be accessed, while whitelists define what can be accessed.
Wireless Network Security
- The Service Set Identifier (SSID) is the name of the wireless network
- Changing the default SSID is recommended as a security measure
- Disabling SSID broadcasting is not a strong security method, as software can discover a non-broadcasted SSID
WLAN Channel Selection
- A channel is a specific radio frequency within a broader frequency
- 11 channels are available for wireless networks in the US
- Selecting a different channel can help minimize interference if experiencing issues
Radio Power Level Management
- High-end Access Points (APs) allow adjusting radio power levels to reduce interference
- Adjusting radio power levels can also limit the range of the network
- Radio power level adjustment can help save electricity
Wireless QoS
- Enabling WMM (Wi-Fi Multimedia) improves QoS for wireless devices
- WMM prioritizes wireless traffic for audio, video, and voice over other types of wireless network traffic
Wi-Fi Protected Setup (WPS)
- Generates a random SSID and security key using hard-to-guess letters and numbers
- WPS can be a security risk if not managed well
- Auto disable feature can be turned on to disable WPS after a few failed PIN entries
Nslookup Command
- The nslookup command is used to test and troubleshoot name resolution issues with DNS servers.
- It allows users to request specific information from a DNS server's zone data.
DNS Zone Data
- Zone data refers to the portion of the DNS namespace that a DNS server is aware of.
Reverse Lookup
- A reverse lookup occurs when the nslookup command is used to retrieve a host name when only the IP address is known.
Tracert Command
- Useful for resolving issues reaching a destination host
- Sends a series of requests to the destination computer and displays each hop to the destination
- A hop occurs when a packet moves from one router to another
Time To Live (TTL)
- A message is assigned a TTL, which is the number of hop counts it can make
- Packet is dropped by a router after TTL is exceeded
- Router sends an ICMP message back to the host that sent the packet after dropping it
Net Command Overview
- The net command is a collection of multiple commands.
Net Use Command
- Used to connect or disconnect a computer from a shared resource.
- Requires an elevated command prompt window.
- Example usage: connect to a remote computer and map a network drive to a specific folder.
- Syntax:
net use \\remote_computer\folder /user: "username" password
- Example:
net use \\bluelight\Medical /user: "Jean Andrews" mypassword
- Can map a network drive to a local drive letter:
net use z: \\bluelight\Medical
Net User Command
- Manages user accounts.
- Used to create, modify, or delete user accounts.
Wireless QoS and Wi-Fi Protected Setup (WPS)
- Wireless QoS can be improved by enabling WMM (Wi-Fi Multimedia), which prioritizes wireless traffic for audio, video, and voice over other types of wireless network traffic.
- WPS generates the SSID and security key using a random string of hard-to-guess letters and numbers, but it can be a security risk if not managed well.
- Turn on auto disable to disable WPS after a few failed PIN entries.
Types of Networks and Network Connections
- Networks can be categorized by technology used and size of the network.
- PAN (personal area network) consists of personal devices such as a cell phone and laptop.
- LAN (local area network) covers a small local area such as a home, office, or other building.
- WMN (wireless mesh network) covers a limited geographic area and is popular in places where cables are difficult to install.
- MAN (metropolitan area network) covers a large campus or city.
- WAN (wide area network) covers a large geographic area and is made up of small networks.
Internet Connection Technologies
- Internet Service Provider (ISP) is used to connect to the Internet.
- The most common types of connections are DSL and cable Internet (cable modem).
- ISPs devote more available bandwidth to downloading and less of it to uploading.
- Bandwidth is a measure of the maximum data transmission rate.
- Data throughput is the actual network transmission speed.
- Latency is the delay in network transmissions, measured by the round-trip time it takes for a data packet to travel from source to destination and back.
Nslookup and Tracert
- The nslookup command is used to test name resolution problems with DNS servers.
- It allows you to request information from a DNS server's zone data.
- A reverse lookup is when you use the nslookup command to find the host name when you know the IP address.
- The tracert command is used to resolve a problem reaching a destination host.
- It sends a series of requests to the destination computer and displays each hop to the destination.
- A hop happens when a packet moves from one router to another.
Internet Connection Technologies (continued)
- Cable Internet uses existing TV cable lines and is always connected.
- TV signals and PC data signals share the same coax cable.
- Cable modem converts PC's digital signals to analog and converts incoming analog data to digital.
- DSL (Digital Subscriber Line) is a group of broadband technologies that covers a wide range of speeds.
- It uses ordinary copper phone lines and unused voice frequencies.
- DSL is always connected and can use the same phone line for voice and DSL at the same time.
- When deciding between cable internet and DSL, consider the sliding scale of costs and the possibility of service degradation.
- DSL uses a dedicated phone line and requires filtering phone line static.
Dial-Up and Cellular WAN
- Dial-up or POTS (plain old telephone service) is the least expensive and slowest connection to the Internet.
- Cellular WAN is a wireless wide area network (WWAN) that covers a wide area.
- It is made up of cells created by base stations.
- A base station might include more than one transceiver and antenna on the same tower to support multiple technologies.
- Two established cellular technologies are GSM and CDMA.
- Long Term Evolution (LTE) and Voice over LTE (VoLTE) are expected to ultimately replace GSM and CDMA.
Connecting to a Network
- To connect a computer to a network using a wired or wireless connection, follow these steps:
- Install network adapter and drivers.
- For a wired network, connect the network cable to the Ethernet RJ-45 port and network port, verify lights, and Windows should automatically configure the connection.
- For a wireless network, click the Network icon and select a wireless network, click Connect, and if network is secured, enter a security key.
- If this is the first time you've connected to a local network, you will be asked if you want to make the PC discoverable.
Netstat and Net Use
-
The netstat command gives statistics about network activity and includes several parameters.
-
The net use command connects or disconnects a computer from a shared resource.
-
Use the net use command to pass a user name and password to a remote computer, and then map a network drive to a folder on that computer.### Network Connections
-
To view Wi-Fi security key, go to Wi-Fi Status box, select Wireless Properties, and check Show characters.
-
To reset a network connection, disable and then re-enable it in the Network Connections window.
Creating a VPN Connection
- A VPN (Virtual Private Network) is used to connect to a corporate network over the Internet, encrypting data using tunneling.
- A VPN connection is a virtual connection that sets up a tunnel over an existing connection.
- To connect to a VPN using Windows:
- Go to Network and Sharing Center, click Set up a new connection or network, and select Connect to a workplace.
- Enter the IP address or domain name of the network, name the VPN connection, and click Create.
- To use the VPN connection, click the Network icon in the taskbar, select the VPN connection, and click Connect.
Creating a Dial-Up Connection
- To create a dial-up connection:
- Install an internal or external dial-up modem.
- Plug in the phone line and open the Network and Sharing Center window.
- Click Set up a connection or network, select Connect to the Internet, and follow the prompts.
- To use the dial-up connection:
- Click the Network icon in the taskbar, select the dial-up connection, and click Connect.
Dynamic and Static IP Configurations
- IP addresses are used to find computers on a network and are assigned when a connection is made.
- IP addresses can be 32-bit (IPv4) or 128-bit (IPv6) strings.
- A host on a network needs an IP address, subnet mask, default gateway, and DNS server addresses to communicate.
- IP addresses can be manually assigned (static) or dynamically assigned by a DHCP server.
Managing Network Adapters
- A network adapter is used to connect to a local network and can be a network port, NIC, or external device.
- Features to be aware of on an adapter include drivers, Ethernet speeds (full or half duplex), MAC address, status indicator lights, Wake-on-LAN, and Quality of Service (QoS).
Setting Up a Multifunction Router for a SOHO Network
- A router manages traffic between two or more networks and can be configured to stand between the ISP network and the local network.
- A typical SOHO router combines features of a router, switch, DHCP server, wireless access point, firewall, and FTP server.
Installing and Configuring a Router on the Local Network
- When placing a router, consider physical security and central location for the best Wi-Fi hotspot.
- To configure a router, open a browser and enter the router's IP address, then use menus on the main setup page to change the router's configuration.
Limiting Internet Traffic on Your Network
- A router's firewall examines incoming messages and decides whether to allow them onto the network.
- Port forwarding allows incoming traffic from the Internet to a specific computer and port.
- A DMZ is a computer or network that is not protected by a firewall and can be used if port forwarding doesn't work.
- Content filtering and parental controls can be used to limit Internet access for specific computers, users, or categories of websites.
Setting Up a Wireless Network
- Change the default SSID and disable SSID broadcasting for security.
- Select channels for the WLAN to reduce interference, and adjust radio power levels to limit the range of the network or save electricity.
Netstat Command
- The netstat command displays statistics about network connections, including active connections' IP addresses.
- The command can be used to redirect its output to a file, e.g.,
netstat >>netlog.txt
, which directs the output to a file namednetlog.txt
.
Network Categorization
- Networks are categorized by size as:
- PAN (Personal Area Network)
- LAN (Local Area Network)
- Wireless LAN
- MAN (Metropolitan Area Network)
- WAN (Wide Area Network)
Network Performance
- Network performance is measured by:
- Bandwidth (rate of data transfer)
- Latency (delay in data transfer)
Internet Connection
- Two popular ways to connect to the Internet:
- Cable Internet
- DSL (Digital Subscriber Line)
Virtual Private Network (VPN)
- A VPN protects data by:
- Encrypting it from the remote computer to the corporate network server
- Ensuring secure data transmission
Host Configuration
- A host requires:
- IP address
- Subnet mask
- Default gateway
- IP addresses for DNS servers
- To communicate with other hosts on local or remote networks
Network Adapters (NICs)
- Network adapters are rated by:
- Speed
- Each NIC has a unique:
- MAC (Media Access Control) address
Multifunction Router Functions
- A multifunction router in a SOHO network can serve as a router, switch, DHCP server, wireless access point, firewall, and FTP server.
Router Security
- Change the router's password immediately after installation.
Firewall Configuration
- Use port forwarding, DMZ, and content filtering with whitelists or blacklists to allow specific traffic from the Internet to bypass the firewall.
Wireless Access Point Security
- Secure a wireless access point by requiring a security key, disabling SSID broadcasting, and enabling encryption such as WPA2, WPA, or WEP.
Network Troubleshooting Tools
- Useful Windows command-line utilities for network troubleshooting include ping, ipconfig, nslookup, tracert, net use, net user, and netstat.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Learn about different types of networks, including PAN, LAN, WMN, and MAN, and their characteristics.