setting up a local network chapter 3
183 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of network is ideal for personal devices like cell phones and laptops?

  • PAN (correct)
  • MAN
  • WAN
  • LAN
  • Which network category is typically used to cover a large geographic area that includes several smaller networks?

  • MAN
  • WMN
  • LAN
  • WAN (correct)
  • Which type of network is commonly used in areas where installing cables is difficult?

  • LAN
  • WMN (correct)
  • PAN
  • MAN
  • A network that covers a large campus or city is called a:

    <p>MAN</p> Signup and view all the answers

    What type of network would be most appropriate for a single office building?

    <p>LAN</p> Signup and view all the answers

    Which of the following best describes bandwidth?

    <p>The measure of the maximum data transmission rate</p> Signup and view all the answers

    ISPs typically devote more bandwidth to which type of data transmission?

    <p>Downloading</p> Signup and view all the answers

    What is the primary function of an Internet Service Provider (ISP)?

    <p>To connect users to the internet</p> Signup and view all the answers

    What is latency in the context of network transmissions?

    <p>The delays in network transmissions</p> Signup and view all the answers

    Which type of internet connection is commonly used by ISPs?

    <p>DSL and cable Internet</p> Signup and view all the answers

    What device connects the LAN to the ISP?

    <p>Modem</p> Signup and view all the answers

    Which role does the ISP play in the network?

    <p>It provides internet services and connects to the internet.</p> Signup and view all the answers

    Which type of technology is used to connect the router to the ISP?

    <p>DSL or cable internet connection</p> Signup and view all the answers

    What does LAN stand for?

    <p>Local Area Network</p> Signup and view all the answers

    In the provided diagram, how do devices on the LAN communicate with the internet?

    <p>Via the router connected to the modem</p> Signup and view all the answers

    Which technology uses existing TV cable lines for internet connection?

    <p>Cable Internet</p> Signup and view all the answers

    What type of line does DSL use for connections?

    <p>Copper phone lines</p> Signup and view all the answers

    Which device converts a PC's digital signals to analog for cable internet?

    <p>Cable modem</p> Signup and view all the answers

    What enables DSL to use the same phone line for both voice and internet simultaneously?

    <p>Unused voice frequencies</p> Signup and view all the answers

    Which of the following is NOT a feature of DSL?

    <p>Uses coax cables</p> Signup and view all the answers

    What is a common drawback of cable internet?

    <p>Service may become degraded</p> Signup and view all the answers

    Which infrastructure does cable internet share with neighbors?

    <p>TV cable infrastructure</p> Signup and view all the answers

    What is a necessary step when using DSL to ensure a clear connection?

    <p>Filter phone line static</p> Signup and view all the answers

    What type of line does DSL use?

    <p>Dedicated phone line</p> Signup and view all the answers

    Which statement is true for both cable internet and DSL?

    <p>Both can sometimes be purchased on a sliding scale</p> Signup and view all the answers

    What is the purpose of having a DSL filter on phone jacks?

    <p>To reduce noise on phone lines and separate the DSL signal from the phone signal</p> Signup and view all the answers

    Which phone jack DOES NOT require a filter when using DSL in a home?

    <p>The jack used for the DSL modem</p> Signup and view all the answers

    How is 'HPN' labeled on the DSL filter related to internet connections?

    <p>It means 'Home Phone Network' and relates to phone jacks</p> Signup and view all the answers

    What happens if a DSL filter is not used on other phone jacks but the one used by the DSL modem?

    <p>Interference and noise could disrupt both phone and internet services</p> Signup and view all the answers

    Which of the following equipment connects directly to the phone jack labeled 'DSL' on the filter?

    <p>A DSL Modem</p> Signup and view all the answers

    Which port on the modem/router is used to connect to the ISP?

    <p>Cable connection to ISP</p> Signup and view all the answers

    Which of the following correctly identifies the purpose of the port labeled 'Internal Ethernet network'?

    <p>To connect the LAN to the modem/router</p> Signup and view all the answers

    What action is associated with the 'Reset button' on the modem/router?

    <p>Restoring the modem/router to factory settings</p> Signup and view all the answers

    Which type of connection does the blue-tipped cable provide?

    <p>ISP connection</p> Signup and view all the answers

    What is a key disadvantage of satellite internet technology?

    <p>It requires line-of-sight wireless connectivity</p> Signup and view all the answers

    Which of the following statements is accurate regarding fiber optic connections?

    <p>They can carry television, internet data, and voice communication on a single cable</p> Signup and view all the answers

    Which internet technology is beneficial for providing high-speed connections in remote locations?

    <p>Satellite</p> Signup and view all the answers

    Why might latency be an issue with satellite internet?

    <p>As a result of the distance data must travel to the satellite and back</p> Signup and view all the answers

    Which best describes the connection method of fiber optic cables?

    <p>Point-to-point</p> Signup and view all the answers

    What does WWAN stand for?

    <p>Wireless Wide Area Network</p> Signup and view all the answers

    Which statement is true about a base station in a Cellular WAN?

    <p>It might include multiple transceivers and antennas to support multiple technologies.</p> Signup and view all the answers

    Which are the two established cellular technologies?

    <p>GSM and CDMA</p> Signup and view all the answers

    What is the expected future of GSM and CDMA technologies?

    <p>They will be replaced by LTE and VoLTE</p> Signup and view all the answers

    What is the primary disadvantage of dial-up internet?

    <p>Slow connection speeds</p> Signup and view all the answers

    What is required to connect a computer to a cellular network using mobile broadband?

    <p>A mobile broadband hardware device and software</p> Signup and view all the answers

    What card is typically needed for most networks when connecting a computer using mobile broadband?

    <p>SIM (Subscriber Identification Module) Card</p> Signup and view all the answers

    Which of the following is NOT an option for connecting to a cellular network?

    <p>Ethernet cable</p> Signup and view all the answers

    Which option allows you to share a cellular network connection through a physical USB connection?

    <p>Cell phone tethering</p> Signup and view all the answers

    What is a common feature of a mobile hotspot?

    <p>It allows multiple devices to connect wirelessly to a cellular network.</p> Signup and view all the answers

    What does a cell tower consist of?

    <p>A radio transceiver and a ladder</p> Signup and view all the answers

    What is the primary function of cell towers in a cellular WAN?

    <p>To provide cellular service</p> Signup and view all the answers

    What is a key characteristic of the areas represented by each hexagon in a cellular WAN?

    <p>Each hexagon represents a cellular base station</p> Signup and view all the answers

    Which description best fits a 'cell' in the context of a cellular WAN?

    <p>A geographical area served by a cell tower</p> Signup and view all the answers

    What is the first step in connecting a computer to a network using a wired or wireless connection?

    <p>Install network adapter and drivers</p> Signup and view all the answers

    Which port is used to connect a network cable for a wired network?

    <p>Ethernet RJ-45 port</p> Signup and view all the answers

    What should you do if the wireless network you are trying to connect to is secured?

    <p>Enter a security key</p> Signup and view all the answers

    When connecting to a wireless network, what icon should you click to begin the process?

    <p>Network icon</p> Signup and view all the answers

    What action should you take to ensure the wired network connection is properly established?

    <p>Verify lights</p> Signup and view all the answers

    What should you do if you connect to a local network for the first time and it asks if you want to make the PC discoverable?

    <p>Click Yes for private networks and No for public networks</p> Signup and view all the answers

    How do you verify the availability of network resources on a private network?

    <p>Open File Explorer and drill down into the Network group</p> Signup and view all the answers

    What action is required for some hotspots before gaining Internet connectivity?

    <p>Agreeing to terms of use on a captive portal</p> Signup and view all the answers

    Where can you view and change network security settings in Windows 10?

    <p>Settings app &gt; Network &amp; Internet</p> Signup and view all the answers

    How do you change the network profile type between Public and Private in Windows 10?

    <p>Settings app &gt; Network &amp; Internet &gt; Change connection properties</p> Signup and view all the answers

    Which action allows you to view the security key in a Wi-Fi connection?

    <p>Click Show characters in the Security tab</p> Signup and view all the answers

    What is the first step to view the status of a wireless connection?

    <p>Open Control Panel and open Network and Sharing Center</p> Signup and view all the answers

    Which option is used to reset a network connection if there is a problem?

    <p>Select Disable from the shortcut menu and then select Enable</p> Signup and view all the answers

    Where do you need to navigate to change adapter settings?

    <p>Control Panel's Network and Sharing Center</p> Signup and view all the answers

    In the Network Connections window, what action is performed first to view a Wi-Fi connection's status?

    <p>Right-click the Wi-Fi connection and click Status</p> Signup and view all the answers

    What is the primary function of a virtual private network (VPN)?

    <p>To provide encrypted data transmission over the Internet</p> Signup and view all the answers

    Which of the following can manage a VPN?

    <p>Operating systems, routers, and third-party software</p> Signup and view all the answers

    How is data typically protected when using a VPN?

    <p>Encryption through tunneling</p> Signup and view all the answers

    What is a defining characteristic of a VPN connection?

    <p>It involves setting up a tunnel over an existing connection</p> Signup and view all the answers

    When creating a VPN connection, what is the recommended action?

    <p>Follow the directions provided by the network administrator</p> Signup and view all the answers

    Which step comes after clicking 'Set up a new connection or network' in Network and Sharing Center?

    <p>Click Connect to a workplace</p> Signup and view all the answers

    What information is required in the 'Connect to a Workplace' box to set up a VPN connection?

    <p>IP address or domain name of the network</p> Signup and view all the answers

    Which icon should you click to use the VPN connection after it is set up?

    <p>Network icon in the taskbar</p> Signup and view all the answers

    What might cause problems when connecting to a VPN?

    <p>Wrong authentication protocols</p> Signup and view all the answers

    Where can you configure security settings for the VPN connection?

    <p>Properties of the VPN Connection</p> Signup and view all the answers

    What is the first step in setting up a dial-up connection?

    <p>Install internal or external dial-up modem</p> Signup and view all the answers

    Where do you enter ISP information during the dial-up connection setup?

    <p>In the Connect to the Internet setup window</p> Signup and view all the answers

    Which action must be performed after selecting the dial-up connection from the Network icon?

    <p>Click Dial</p> Signup and view all the answers

    What sound indicates that the modem is dialing up the ISP?

    <p>A modem dial tone</p> Signup and view all the answers

    Which option must be chosen after opening the Network and Sharing Center window for setting up a dial-up connection?

    <p>Set up a broadband or dial-up connection</p> Signup and view all the answers

    Which version of Internet Protocol defines 32-bit IP addresses?

    <p>IPv4</p> Signup and view all the answers

    How is a 128-bit IP address typically written?

    <p>Eight hexadecimal numbers separated by colons</p> Signup and view all the answers

    Which statement about IP address usage on networks is correct?

    <p>Some networks use both 32-bit and 128-bit IP addresses</p> Signup and view all the answers

    What is the primary difference between IPv4 and IPv6 addresses?

    <p>IPv4 defines 32-bit addresses, while IPv6 defines 128-bit addresses</p> Signup and view all the answers

    Which format is NOT associated with an IP address?

    <p>Six hexadecimal numbers separated by periods</p> Signup and view all the answers

    Which server allows a device to request an IP address dynamically?

    <p>DHCP server</p> Signup and view all the answers

    What is required for a host to communicate on a network?

    <p>IP address, default gateway, DNS server, and subnet mask</p> Signup and view all the answers

    What is a computer's IP address called when it is manually assigned?

    <p>Static IP address</p> Signup and view all the answers

    What is the function of a default gateway in a network configuration?

    <p>To send data to other networks</p> Signup and view all the answers

    Which of the following is an example of a subnet mask?

    <p>255.255.255.0</p> Signup and view all the answers

    What is the default setting when configuring an IP address in Windows?

    <p>Dynamic IP addressing</p> Signup and view all the answers

    To configure a static IP address, which of the following options should be selected?

    <p>Use the following IP address</p> Signup and view all the answers

    Which tab in the network connection properties box allows you to access the IPv4 properties?

    <p>Networking tab</p> Signup and view all the answers

    When setting a static IP address, which additional information must be provided alongside the IP address?

    <p>Subnet mask and default gateway</p> Signup and view all the answers

    If given by the network administrator, where should DNS server addresses be entered?

    <p>Use the following DNS server addresses</p> Signup and view all the answers

    Which of the following accurately describes a full duplex network adapter?

    <p>Sends and receives transmissions at the same time</p> Signup and view all the answers

    What is the primary function of a network interface card (NIC)?

    <p>Connects a computer to a local network</p> Signup and view all the answers

    What essential feature does every network adapter have?

    <p>A unique 48-bit MAC address</p> Signup and view all the answers

    What is an important factor to consider about the drivers a NIC uses?

    <p>Compatibility with the operating system</p> Signup and view all the answers

    What type of connection does a network adapter that is an external device typically use?

    <p>USB port</p> Signup and view all the answers

    What must be enabled in BIOS/UEFI setup for an onboard NIC to use Wake-on-LAN?

    <p>Wake-on-LAN</p> Signup and view all the answers

    Which feature allows the control of network traffic priority for specific applications?

    <p>Quality of Service (QoS)</p> Signup and view all the answers

    What is the main function of the status indicator lights on a network adapter?

    <p>To indicate network adapter activity</p> Signup and view all the answers

    What does QoS need to be configured on to manage network priority?

    <p>Both the router and each computer's network adapter</p> Signup and view all the answers

    What capability does Wake-on-LAN provide for a computer?

    <p>Wakes up the computer upon certain network communication</p> Signup and view all the answers

    What is the primary role of a router in a SOHO network?

    <p>To manage traffic between two or more networks</p> Signup and view all the answers

    Which action is necessary when setting up a SOHO network?

    <p>Configuring a multipurpose router</p> Signup and view all the answers

    How does a router aid in traffic management?

    <p>By finding the best path for traffic to travel</p> Signup and view all the answers

    In the context of setting up a multifunction router, what does SOHO stand for?

    <p>Small Office, Home Office</p> Signup and view all the answers

    Which device is crucial for managing traffic between the network and the internet in a SOHO setup?

    <p>Router</p> Signup and view all the answers

    Which function of a SOHO router allows it to assign IP addresses to computers on the network?

    <p>As a DHCP server</p> Signup and view all the answers

    What role does a SOHO router perform to enable wireless devices to access the internet?

    <p>As a wireless access point (WAP)</p> Signup and view all the answers

    How does a SOHO router manage to block unwanted traffic from the internet?

    <p>As a firewall</p> Signup and view all the answers

    What is the primary function of a SOHO router when it routes traffic between the ISP network and the local network?

    <p>As a router</p> Signup and view all the answers

    Which feature of a SOHO router can be used to share files with network users by connecting an external hard drive?

    <p>As an FTP server</p> Signup and view all the answers

    What should you do to maximize the physical security of a router?

    <p>Place it behind a locked door accessible only to authorized personnel</p> Signup and view all the answers

    What is the next step after entering the IP address of the router in a browser?

    <p>Enter admin as the user name (or whatever user name is assigned)</p> Signup and view all the answers

    Which antenna position is recommended for routers with external antennas?

    <p>Vertical</p> Signup and view all the answers

    Where should a router be placed to create the best Wi-Fi hotspot for users?

    <p>Centrally located</p> Signup and view all the answers

    What should you always do after finishing configuration changes on a router?

    <p>Save changes, click Logout, and close the browser window</p> Signup and view all the answers

    What is identified by a port number in a message directed to a computer?

    <p>The application running on the computer</p> Signup and view all the answers

    What feature do routers offer to prevent any unsolicited internet activity from getting into the network?

    <p>Disabling (closing) all ports</p> Signup and view all the answers

    How can exceptions to a firewall rule be specified to allow unsolicited traffic from the Internet?

    <p>Using port forwarding or a DMZ</p> Signup and view all the answers

    What key function does a router's firewall perform?

    <p>Monitors and decides on the allowance of messages from the internet</p> Signup and view all the answers

    Which term also refers to a port number used to identify an application?

    <p>Port address</p> Signup and view all the answers

    What is a requirement for port forwarding to function correctly?

    <p>The computer must have a static IP address</p> Signup and view all the answers

    What must you acquire from your ISP to effectively perform port forwarding?

    <p>A static IP address</p> Signup and view all the answers

    What is one of the security risks associated with using port forwarding?

    <p>More vulnerability to external attacks</p> Signup and view all the answers

    Which device typically handles requests for communication from the Internet in port forwarding?

    <p>Firewall</p> Signup and view all the answers

    Which of the following accurately describes port forwarding?

    <p>Allowing external communication to a specific computer and port on the network</p> Signup and view all the answers

    What is the primary purpose of placing a computer in a DMZ?

    <p>To resolve issues with port forwarding</p> Signup and view all the answers

    What does a whitelist specify in content filtering?

    <p>Websites that can be accessed</p> Signup and view all the answers

    Which of the following can content filtering criteria NOT be based on?

    <p>File type</p> Signup and view all the answers

    Which best describes a DMZ in networking?

    <p>A network area not protected by a firewall</p> Signup and view all the answers

    When using content filtering, what is the role of a blacklist?

    <p>To list prohibited websites</p> Signup and view all the answers

    What is the purpose of changing the Service Set Identifier (SSID) and disabling SSID broadcasting?

    <p>To hide the network name from casual users</p> Signup and view all the answers

    How many channels are available for wireless networks in the US?

    <p>11</p> Signup and view all the answers

    What can you do to address interference issues in a wireless network environment?

    <p>Switch to a different channel</p> Signup and view all the answers

    Why might you adjust the radio power levels on high-end access points (APs)?

    <p>To reduce interference</p> Signup and view all the answers

    What is a potential downside of disabling SSID broadcasting?

    <p>Reduced network security</p> Signup and view all the answers

    What is the primary benefit of enabling WMM (Wi-Fi Multimedia) in a wireless network?

    <p>Prioritization of audio, video, and voice traffic</p> Signup and view all the answers

    How does WPS generate the SSID and security key?

    <p>By using a random string of hard-to-guess letters and numbers</p> Signup and view all the answers

    Which action should be taken to mitigate the security risk associated with WPS?

    <p>Enable auto disable after a few failed PIN entries</p> Signup and view all the answers

    What does WMM (Wi-Fi Multimedia) specifically prioritize over other types of wireless network traffic?

    <p>Audio, video, and voice</p> Signup and view all the answers

    Why might WPS be considered a security risk?

    <p>It can be vulnerable if not managed well</p> Signup and view all the answers

    What does the nslookup command primarily test?

    <p>DNS server name resolution</p> Signup and view all the answers

    What information can you request from a DNS server using the nslookup command?

    <p>Zone data</p> Signup and view all the answers

    What encompasses the zone data that a DNS server is aware of?

    <p>A specific portion of the DNS namespace</p> Signup and view all the answers

    What is a reverse lookup in the context of the nslookup command?

    <p>Finding the host name from an IP address</p> Signup and view all the answers

    Which command would you use to troubleshoot DNS name resolution issues?

    <p>nslookup</p> Signup and view all the answers

    What is the purpose of the tracert command?

    <p>To resolve issues in reaching a destination host and display each hop to the destination</p> Signup and view all the answers

    What happens to a message once it exceeds its Time To Live (TTL) value?

    <p>The router drops the packet and sends an ICMP message back to the sender</p> Signup and view all the answers

    What is a 'hop' in the context of the tracert command?

    <p>The movement a packet makes from one router to another</p> Signup and view all the answers

    Which protocol sends a message back to the host if a packet exceeds its TTL?

    <p>ICMP</p> Signup and view all the answers

    What information does the tracert command provide?

    <p>Each hop from the source to the destination host</p> Signup and view all the answers

    What is the purpose of the net user command?

    <p>To manage user accounts</p> Signup and view all the answers

    Which command would you use to map a network drive to the /Medical folder on the \bluelight remote computer?

    <p>net use \bluelight\Medical /user: &quot;Jean Andrews&quot; mypassword</p> Signup and view all the answers

    Which of the following operations requires an elevated command prompt window when using the 'net' commands?

    <p>Most 'net' commands</p> Signup and view all the answers

    What does the command net use z: \bluelight\Medical accomplish?

    <p>Mapping a network drive to the /Medical folder with drive letter Z</p> Signup and view all the answers

    Which 'net' command would be used to disconnect a computer from a shared resource?

    <p>net use</p> Signup and view all the answers

    What is the purpose of the netstat command?

    <p>To view statistics about network activity</p> Signup and view all the answers

    Which parameter of netstat would you use to display all connections and listening ports?

    <p>-A</p> Signup and view all the answers

    Which netstat parameter is used to show executable involved in creating each connection or listening port?

    <p>-B</p> Signup and view all the answers

    To display the owning process ID of a connection using netstat, which parameter should be used?

    <p>-O</p> Signup and view all the answers

    Which of the following is NOT a parameter used with the netstat command?

    <p>-C</p> Signup and view all the answers

    Which netstat command provides statistics about all active connections and the ports the computer is listening on?

    <p>netstat -a</p> Signup and view all the answers

    Which netstat command option is useful for finding programs that might be using the connection and requires an elevated command prompt?

    <p>netstat -b</p> Signup and view all the answers

    What is the benefit of using netstat -b -o?

    <p>It includes the process ID of each program listed.</p> Signup and view all the answers

    Which command would you use to redirect the output of netstat to a file for later analysis?

    <p>netstat &gt;&gt;netlog.txt</p> Signup and view all the answers

    Which of the following netstat commands lists the IP addresses of active connections?

    <p>netstat</p> Signup and view all the answers

    Which components are essential for a host to communicate with other hosts on local or remote networks?

    <p>IP address, subnet mask, default gateway, DNS servers</p> Signup and view all the answers

    How does a VPN protect data?

    <p>By encrypting data from the remote computer to a server on the corporate network</p> Signup and view all the answers

    What are network adapters commonly called?

    <p>NICs</p> Signup and view all the answers

    Which factors are used to measure network performance?

    <p>Bandwidth and latency</p> Signup and view all the answers

    Which are the two most popular ways to connect to the Internet?

    <p>Cable Internet and DSL</p> Signup and view all the answers

    Which function is NOT typically served by a multifunction router in a SOHO network?

    <p>DNS server</p> Signup and view all the answers

    Which method is NOT mentioned for allowing certain traffic initiated from the Internet past your firewall?

    <p>VPN tunneling</p> Signup and view all the answers

    What should you do immediately after installing a new router?

    <p>Change the router’s password</p> Signup and view all the answers

    Which encryption standards are recommended for securing a wireless access point?

    <p>WPA</p> Signup and view all the answers

    Which Windows command-line utility is used for network troubleshooting?

    <p>ping</p> Signup and view all the answers

    Study Notes

    Network Categorization

    • Networks can be classified by technology used and size of the network

    Network Types

    • PAN (Personal Area Network)
      • Consists of personal devices such as cell phones and laptops
      • Covers a small, localized area
    • LAN (Local Area Network)
      • Covers a small local area such as a home, office, or building
      • Typically confined to a small geographical area
    • WMN (Wireless Mesh Network)
      • Covers a limited geographic area
      • Popular in areas where cables are difficult to install
    • MAN (Metropolitan Area Network)
      • Covers a large campus or city
      • Larger than LAN, smaller than WAN
    • WAN (Wide Area Network)
      • Covers a large geographic area
      • Comprised of multiple smaller networks

    Internet Connection Technologies

    • Internet connection is facilitated through an Internet Service Provider (ISP)
    • Common types of internet connections are DSL and cable Internet (cable modem)
    • ISPs typically allocate more bandwidth for downloading data than uploading

    Key Concepts in Internet Connection

    • Bandwidth: the maximum rate of data transmission, measured in bits per second (bps)
    • Data throughput: the actual speed of data transmission over a network
    • Latency: the delay in network transmission, measured by the round-trip time it takes for a data packet to travel from source to destination and back

    Internet Connection Technologies

    • A local area network (LAN) connects to the internet via a DSL or cable internet connection and an internet service provider (ISP).
    • Devices on the LAN are connected to a router, which is linked to either DSL or cable internet connection.
    • An ISP (internet service provider) is a company that provides internet services.
    • The ISP connects to the internet.
    • The ISP acts as a bridge between a local area network (LAN) and the internet.

    Cable Internet vs DSL

    Cable Internet

    • Uses existing TV cable lines for internet connectivity
    • Always connected, with no need to dial up
    • TV signals and PC data signals share the same coax cable
    • Cable modem converts PC's digital signals to analog and vice versa
      • Enables data transmission over the coax cable

    DSL (Digital Subscriber Line)

    • A group of broadband technologies offering varying speeds
    • Utilizes ordinary copper phone lines for internet connectivity
    • Always connected, with no need to dial up
    • Supports simultaneous use of the same phone line for voice and DSL
      • Allows for voice calls and internet access at the same time

    Cable Internet vs. DSL

    • Both cable internet and DSL can be purchased on a sliding scale, offering flexibility in pricing.
    • Cable modem technology shares the same infrastructure as TV cables, which can lead to degraded service quality due to shared bandwidth with neighbors.
    • In contrast, DSL uses a dedicated phone line, providing a separate connection for internet access.
    • However, DSL connections require a filter to remove static from the phone line, which can affect internet speeds.

    DSL Filters

    • DSL filters are required on every phone jack in a home, except for the one used by the DSL modem.
    • The filter is typically connected to a wall plate with a single phone jack and a DSL label.
    • A DSL filter has two jacks, one labeled "DSL" and "HPN", and the other labeled "Phone".

    Modem/Router Connections

    • The modem/router has several ports, including Voice-over-IP phone line, Internal Ethernet network, Cable connection to ISP, and Reset button.
    • A Voice-over-IP phone line is connected using a yellow cable.
    • The Internal Ethernet network is connected using a black cable.
    • The Cable connection to ISP is connected using a blue-tipped cable.

    Dedicated Line Using Fiber Optic

    • Fiber optic connections are dedicated, point-to-point (PTP) lines, ensuring no sharing of the line with others.
    • A single broadband fiber-optic cable supports multiple services, including television, internet data, and voice communication.
    • Upstream and downstream speeds, as well as prices, vary depending on the fiber optic connection.

    Satellite Internet

    • Satellite internet technology provides high-speed connections to remote areas, offering widespread coverage.
    • Satellite connections can be established anywhere, including in airplanes, making them highly accessible.
    • Two significant drawbacks of satellite internet are the requirement for line-of-sight wireless connectivity and the latency that occurs when uploading data.

    Internet Connection Technologies

    • Dial-Up
    • Least expensive and slowest internet connection technology
    • Also known as Plain Old Telephone Service (POTS)

    Cellular WAN

    • Wireless Wide Area Network (WWAN) that covers a wide area
    • Comprised of cells created by base stations
    • Each base station can have multiple transceivers and antennas on the same tower
    • Supports multiple technologies
    • Two established cellular technologies: GSM and CDMA

    LTE and VoLTE

    • Expected to replace GSM and CDMA eventually
    • LTE: Long Term Evolution
    • VoLTE: Voice over LTE

    Cellular WAN Connection

    • To connect a computer to a cellular network, two essential components are required:
      • Hardware to facilitate the connection
      • Software to enable the connection
    • A SIM (Subscriber Identification Module) card is necessary for most networks

    Options for Cellular Network Connection

    • Embedded mobile broadband modem: a device with built-in cellular connectivity
    • Cell phone tethering: using a cell phone as a modem to connect to a cellular network
    • USB broadband modem: a USB device that connects to a computer and cellular network
    • LTE installed Internet: a broadband Internet connection using Long-Term Evolution (LTE) technology
    • Mobile hotspot: a device that provides a cellular connection and shares it with other devices

    Cellular WAN Structure

    • A cellular WAN consists of many cells that provide coverage over a wide area.
    • The structure of a cellular WAN is represented by a honeycomb of hexagon shapes, each representing a geographical area.
    • Cell towers are situated inside each hexagon, providing cellular service.
    • A cell tower is a radio transceiver that consists of a small structure with a dish and a ladder attached to a tall radio mast.

    Connecting to a Network

    • To connect a computer to a network, install network adapter and drivers

    Wired Network Connection

    • Connect network cable to Ethernet RJ-45 port on the computer and network port
    • Verify lights to ensure connection is active
    • Windows will automatically configure the connection

    Wireless Network Connection

    • Click the Network icon and select a wireless network to connect
    • Click Connect to establish the connection
    • If the network is secured, enter a security key to gain access

    Connecting to a Wired or Wireless Local Network

    • To connect to a network, decide if the PC should be discoverable: click Yes for private networks and No for public networks

    Verifying Internet Connectivity

    • Open a browser to verify internet connectivity

    Captive Portal (Initial Page)

    • Some hotspots display an initial page, requiring code entry or agreement to terms of use

    Private Network Resources

    • On a private network, open File Explorer or Windows Explorer to access network resources

    Network Security Settings in Windows 10

    • Open the Settings app and click Network & Internet to view and change network security settings
    • Click Change connection properties and select either Public or Private

    Checking Wireless Connection Status

    • Open Control Panel and navigate to Network and Sharing Center to view wireless connection status
    • Click Change adapter settings to open Network Connections window
    • Right-click Wi-Fi connection and select Status to access Wi-Fi Status box

    Viewing Security Key

    • In Wi-Fi Status box, click Wireless Properties and select Security tab
    • Check Show characters to view security key

    Troubleshooting Network Connection Issues

    • To reset network connection, open Network Connections window and right-click network connection
    • Select Disable from shortcut menu and then re-enable the connection by right-clicking and selecting Enable

    Creating a VPN Connection

    • A VPN allows telecommuting employees to connect to a corporate network via the Internet
    • Data sent over the VPN is encrypted using a technique called "tunneling"
    • VPNs can be managed by operating systems, routers, or third-party software
    • A VPN connection is a virtual connection that is set up over an existing connection
    • When setting up a VPN, it is essential to follow the directions provided by the network administrator who hosts the VPN

    Creating a VPN Connection in Windows

    • To set up a VPN connection, go to Network and Sharing Center and click "Set up a new connection or network", then select "Connect to a workplace" and "Set up a dial-up or VPN connection to your workplace".
    • In the "Connect to a Workplace" box, select "Use my Internet connection (VPN)" and enter the IP address or domain name of the network, then name the VPN connection and click "Create".

    Connecting to a VPN in Windows

    • To connect to the VPN, click the Network icon in the taskbar and select the VPN connection from the list of available networks.
    • Click "Connect" and enter your user name and password, then click "OK".

    Troubleshooting VPN Connection Issues

    • Problems connecting to a VPN can be caused by using the wrong authentication protocols when passing the user name and password.
    • To configure security settings, click on the "Properties" of the VPN Connection.

    Setting up a Dial-Up Connection

    • Install an internal or external dial-up modem
    • Connect the phone line to the modem port on the computer and the wall jack
    • Access the Network and Sharing Center window to set up a connection or network
    • Select "Connect to the Internet" and then "Set up a broadband or dial-up connection"
    • Click "Next" and then select "Dial-up"
    • Enter ISP information and click "Create" to complete the setup

    Using the Dial-Up Connection

    • Click the Network icon in the taskbar to access the connection
    • Select the dial-up connection and click "Connect" and then "Dial"
    • The modem will dial up the ISP and establish the connection, which can be heard through the modem's sounds

    IP Addresses

    • Computers use IP addresses to find each other on a network
    • IP addresses are assigned to a network connection when the connection is first made

    IP Address Format

    • 32-bit IP addresses are written as four decimal numbers called octets, separated by periods
    • 128-bit IP addresses are written as eight hexadecimal numbers, separated by colons

    IP Address Versions

    • Most networks use 32-bit IP addresses, defined by IPv4 (Internet Protocol version 4)
    • Some networks use both 32-bit and 128-bit addresses, with 128-bit addresses defined by IPv6 (Internet Protocol version 6)

    Host Requirements for Network Communication

    • A host is any device on a network that requests or serves data or services to other devices.
    • To communicate on a network or the Internet, a host needs its own IP address, subnet mask, IP address of a default gateway, and IP address of one or more DNS servers.

    IP Address Configurations

    • Static IP address: manually assigned to a computer's network connection.
    • Dynamic IP address: received from a DHCP (Dynamic Host Configuration Protocol) server on the network.

    DHCP Server

    • A server on the network that provides IP address and other network configuration information to hosts.

    Configuring Dynamic and Static IP Addresses

    • To access IP configuration settings, open Network Connections, right-click the network connection, and select Properties
    • In the Properties box, click the Networking tab to access IP configuration options
    • Internet Protocol Version 4 (TCP/IPv4) is the default IP configuration protocol
    • By default, IP addressing is set to dynamic; to change to static, select Use the following IP address
    • To configure static IP addressing, enter the following information:
      • IP address
      • Subnet mask
      • Default gateway
    • If using DNS servers, select Use the following DNS server addresses and enter up to two IP addresses provided by the network administrator

    Network Adapters

    • A computer connects to a local network using a network adapter, which can be a network port on the motherboard or a network interface card (NIC)
    • External network adapters can also be connected via a USB port

    Key Features of Network Adapters

    • Drivers are required for a NIC to function
    • Ethernet speeds can be either full duplex or half duplex
    • Full duplex allows for simultaneous sending and receiving of transmissions
    • Half duplex only works in one direction at a time
    • Every network adapter has a unique 48-bit MAC address, hardcoded by the manufacturer

    Managing Network Adapters

    • Network adapters have status indicator lights that show their current state
    • Wake-on-LAN allows a computer to wake up when it receives certain network communication
    • For onboard NICs, Wake-on-LAN must be enabled in the BIOS/UEFI setup

    Quality of Service (QoS)

    • QoS enables control over which applications have priority on the network
    • QoS requires configuration on both the router and the network adapter of each computer

    Setting Up a Multifunction Router for a SOHO Network

    • To set up a SOHO network, configuring a multipurpose router is essential to connect the network to the internet
    • A router is a device that manages traffic between two or more networks
    • Routers can help find the best path for traffic to travel from one network to another

    Functions of a SOHO Router

    • A typical SOHO router combines multiple features, including:

    Routing Function

    • Stands between the ISP network and the local network
    • Routes traffic between these two networks

    Switching Function

    • Manages several network ports
    • Can be connected to wired computers or other network devices

    DHCP Server Function

    • Assigns IP addresses to all computers on the local network
    • Acts as a central IP address manager

    Wireless Access Point (WAP) Function

    • Enables wireless computers to connect to the Internet
    • Provides wireless network connectivity

    Firewall Function

    • Blocks unwanted traffic from the Internet
    • Restricts Internet access for local devices behind the firewall
    • Provides network security and protection

    FTP Server Function

    • Can be used to share files with network users
    • Requires an external hard drive to be connected
    • FTP firmware on the router is necessary for file sharing

    Router Placement and Physical Security

    • Place the router behind a locked door accessible only to authorized personnel for maximum security
    • Centrally locate the router to create the best Wi-Fi hotspot for users

    Configuring a Router with External Antennas

    • Raise the external antennas to vertical positions for optimal performance

    General Router Configuration Steps

    • Open a browser and enter the IP address of the router to access its setup page
    • Log in using the assigned admin username (or default admin credentials)
    • Navigate the router's firmware menus to change its configuration settings
    • Save changes when finished, then log out and close the browser window

    Limiting Internet Traffic on Your Network

    • A router's firewall examines each incoming message from the internet to decide whether to allow it onto the network.
    • Each message is directed to a specific computer and a particular application running on that computer, identified by a port number or port address.
    • Routers offer the option to disable (close) all ports, effectively blocking all incoming internet activity.
    • To allow unsolicited traffic from the internet, exceptions to this firewall rule must be specified using either port forwarding or a DMZ.

    Port Forwarding

    • Port Forwarding allows a firewall to receive and forward requests from the Internet to a specific computer and port on your network
    • Leasing a static IP address from an ISP is necessary for port forwarding to work
    • A computer on the network must have a static IP address to receive forwarded requests
    • Port forwarding increases vulnerability of your computer and network as it allows external users direct access to your private network

    Network Traffic Management

    • A DMZ (Demilitarized Zone) is a network or computer that bypasses the firewall's protection.
    • Placing a device in the DMZ zone can help resolve issues with port forwarding.

    Content Filtering and Parental Controls

    • Routers often provide features for employers and parents to restrict internet access for specific computers or users.
    • Filtering criteria can be based on specific websites, categories of websites, keywords, services, time of day, or day of the week.
    • Blacklists define what cannot be accessed, while whitelists define what can be accessed.

    Wireless Network Security

    • The Service Set Identifier (SSID) is the name of the wireless network
    • Changing the default SSID is recommended as a security measure
    • Disabling SSID broadcasting is not a strong security method, as software can discover a non-broadcasted SSID

    WLAN Channel Selection

    • A channel is a specific radio frequency within a broader frequency
    • 11 channels are available for wireless networks in the US
    • Selecting a different channel can help minimize interference if experiencing issues

    Radio Power Level Management

    • High-end Access Points (APs) allow adjusting radio power levels to reduce interference
    • Adjusting radio power levels can also limit the range of the network
    • Radio power level adjustment can help save electricity

    Wireless QoS

    • Enabling WMM (Wi-Fi Multimedia) improves QoS for wireless devices
    • WMM prioritizes wireless traffic for audio, video, and voice over other types of wireless network traffic

    Wi-Fi Protected Setup (WPS)

    • Generates a random SSID and security key using hard-to-guess letters and numbers
    • WPS can be a security risk if not managed well
    • Auto disable feature can be turned on to disable WPS after a few failed PIN entries

    Nslookup Command

    • The nslookup command is used to test and troubleshoot name resolution issues with DNS servers.
    • It allows users to request specific information from a DNS server's zone data.

    DNS Zone Data

    • Zone data refers to the portion of the DNS namespace that a DNS server is aware of.

    Reverse Lookup

    • A reverse lookup occurs when the nslookup command is used to retrieve a host name when only the IP address is known.

    Tracert Command

    • Useful for resolving issues reaching a destination host
    • Sends a series of requests to the destination computer and displays each hop to the destination
    • A hop occurs when a packet moves from one router to another

    Time To Live (TTL)

    • A message is assigned a TTL, which is the number of hop counts it can make
    • Packet is dropped by a router after TTL is exceeded
    • Router sends an ICMP message back to the host that sent the packet after dropping it

    Net Command Overview

    • The net command is a collection of multiple commands.

    Net Use Command

    • Used to connect or disconnect a computer from a shared resource.
    • Requires an elevated command prompt window.
    • Example usage: connect to a remote computer and map a network drive to a specific folder.
    • Syntax: net use \\remote_computer\folder /user: "username" password
    • Example: net use \\bluelight\Medical /user: "Jean Andrews" mypassword
    • Can map a network drive to a local drive letter: net use z: \\bluelight\Medical

    Net User Command

    • Manages user accounts.
    • Used to create, modify, or delete user accounts.

    Wireless QoS and Wi-Fi Protected Setup (WPS)

    • Wireless QoS can be improved by enabling WMM (Wi-Fi Multimedia), which prioritizes wireless traffic for audio, video, and voice over other types of wireless network traffic.
    • WPS generates the SSID and security key using a random string of hard-to-guess letters and numbers, but it can be a security risk if not managed well.
    • Turn on auto disable to disable WPS after a few failed PIN entries.

    Types of Networks and Network Connections

    • Networks can be categorized by technology used and size of the network.
    • PAN (personal area network) consists of personal devices such as a cell phone and laptop.
    • LAN (local area network) covers a small local area such as a home, office, or other building.
    • WMN (wireless mesh network) covers a limited geographic area and is popular in places where cables are difficult to install.
    • MAN (metropolitan area network) covers a large campus or city.
    • WAN (wide area network) covers a large geographic area and is made up of small networks.

    Internet Connection Technologies

    • Internet Service Provider (ISP) is used to connect to the Internet.
    • The most common types of connections are DSL and cable Internet (cable modem).
    • ISPs devote more available bandwidth to downloading and less of it to uploading.
    • Bandwidth is a measure of the maximum data transmission rate.
    • Data throughput is the actual network transmission speed.
    • Latency is the delay in network transmissions, measured by the round-trip time it takes for a data packet to travel from source to destination and back.

    Nslookup and Tracert

    • The nslookup command is used to test name resolution problems with DNS servers.
    • It allows you to request information from a DNS server's zone data.
    • A reverse lookup is when you use the nslookup command to find the host name when you know the IP address.
    • The tracert command is used to resolve a problem reaching a destination host.
    • It sends a series of requests to the destination computer and displays each hop to the destination.
    • A hop happens when a packet moves from one router to another.

    Internet Connection Technologies (continued)

    • Cable Internet uses existing TV cable lines and is always connected.
    • TV signals and PC data signals share the same coax cable.
    • Cable modem converts PC's digital signals to analog and converts incoming analog data to digital.
    • DSL (Digital Subscriber Line) is a group of broadband technologies that covers a wide range of speeds.
    • It uses ordinary copper phone lines and unused voice frequencies.
    • DSL is always connected and can use the same phone line for voice and DSL at the same time.
    • When deciding between cable internet and DSL, consider the sliding scale of costs and the possibility of service degradation.
    • DSL uses a dedicated phone line and requires filtering phone line static.

    Dial-Up and Cellular WAN

    • Dial-up or POTS (plain old telephone service) is the least expensive and slowest connection to the Internet.
    • Cellular WAN is a wireless wide area network (WWAN) that covers a wide area.
    • It is made up of cells created by base stations.
    • A base station might include more than one transceiver and antenna on the same tower to support multiple technologies.
    • Two established cellular technologies are GSM and CDMA.
    • Long Term Evolution (LTE) and Voice over LTE (VoLTE) are expected to ultimately replace GSM and CDMA.

    Connecting to a Network

    • To connect a computer to a network using a wired or wireless connection, follow these steps:
      • Install network adapter and drivers.
      • For a wired network, connect the network cable to the Ethernet RJ-45 port and network port, verify lights, and Windows should automatically configure the connection.
      • For a wireless network, click the Network icon and select a wireless network, click Connect, and if network is secured, enter a security key.
    • If this is the first time you've connected to a local network, you will be asked if you want to make the PC discoverable.

    Netstat and Net Use

    • The netstat command gives statistics about network activity and includes several parameters.

    • The net use command connects or disconnects a computer from a shared resource.

    • Use the net use command to pass a user name and password to a remote computer, and then map a network drive to a folder on that computer.### Network Connections

    • To view Wi-Fi security key, go to Wi-Fi Status box, select Wireless Properties, and check Show characters.

    • To reset a network connection, disable and then re-enable it in the Network Connections window.

    Creating a VPN Connection

    • A VPN (Virtual Private Network) is used to connect to a corporate network over the Internet, encrypting data using tunneling.
    • A VPN connection is a virtual connection that sets up a tunnel over an existing connection.
    • To connect to a VPN using Windows:
      • Go to Network and Sharing Center, click Set up a new connection or network, and select Connect to a workplace.
      • Enter the IP address or domain name of the network, name the VPN connection, and click Create.
      • To use the VPN connection, click the Network icon in the taskbar, select the VPN connection, and click Connect.

    Creating a Dial-Up Connection

    • To create a dial-up connection:
      • Install an internal or external dial-up modem.
      • Plug in the phone line and open the Network and Sharing Center window.
      • Click Set up a connection or network, select Connect to the Internet, and follow the prompts.
    • To use the dial-up connection:
      • Click the Network icon in the taskbar, select the dial-up connection, and click Connect.

    Dynamic and Static IP Configurations

    • IP addresses are used to find computers on a network and are assigned when a connection is made.
    • IP addresses can be 32-bit (IPv4) or 128-bit (IPv6) strings.
    • A host on a network needs an IP address, subnet mask, default gateway, and DNS server addresses to communicate.
    • IP addresses can be manually assigned (static) or dynamically assigned by a DHCP server.

    Managing Network Adapters

    • A network adapter is used to connect to a local network and can be a network port, NIC, or external device.
    • Features to be aware of on an adapter include drivers, Ethernet speeds (full or half duplex), MAC address, status indicator lights, Wake-on-LAN, and Quality of Service (QoS).

    Setting Up a Multifunction Router for a SOHO Network

    • A router manages traffic between two or more networks and can be configured to stand between the ISP network and the local network.
    • A typical SOHO router combines features of a router, switch, DHCP server, wireless access point, firewall, and FTP server.

    Installing and Configuring a Router on the Local Network

    • When placing a router, consider physical security and central location for the best Wi-Fi hotspot.
    • To configure a router, open a browser and enter the router's IP address, then use menus on the main setup page to change the router's configuration.

    Limiting Internet Traffic on Your Network

    • A router's firewall examines incoming messages and decides whether to allow them onto the network.
    • Port forwarding allows incoming traffic from the Internet to a specific computer and port.
    • A DMZ is a computer or network that is not protected by a firewall and can be used if port forwarding doesn't work.
    • Content filtering and parental controls can be used to limit Internet access for specific computers, users, or categories of websites.

    Setting Up a Wireless Network

    • Change the default SSID and disable SSID broadcasting for security.
    • Select channels for the WLAN to reduce interference, and adjust radio power levels to limit the range of the network or save electricity.

    Netstat Command

    • The netstat command displays statistics about network connections, including active connections' IP addresses.
    • The command can be used to redirect its output to a file, e.g., netstat &gt;&gt;netlog.txt, which directs the output to a file named netlog.txt.

    Network Categorization

    • Networks are categorized by size as:
      • PAN (Personal Area Network)
      • LAN (Local Area Network)
      • Wireless LAN
      • MAN (Metropolitan Area Network)
      • WAN (Wide Area Network)

    Network Performance

    • Network performance is measured by:
      • Bandwidth (rate of data transfer)
      • Latency (delay in data transfer)

    Internet Connection

    • Two popular ways to connect to the Internet:
      • Cable Internet
      • DSL (Digital Subscriber Line)

    Virtual Private Network (VPN)

    • A VPN protects data by:
      • Encrypting it from the remote computer to the corporate network server
      • Ensuring secure data transmission

    Host Configuration

    • A host requires:
      • IP address
      • Subnet mask
      • Default gateway
      • IP addresses for DNS servers
      • To communicate with other hosts on local or remote networks

    Network Adapters (NICs)

    • Network adapters are rated by:
      • Speed
    • Each NIC has a unique:
      • MAC (Media Access Control) address

    Multifunction Router Functions

    • A multifunction router in a SOHO network can serve as a router, switch, DHCP server, wireless access point, firewall, and FTP server.

    Router Security

    • Change the router's password immediately after installation.

    Firewall Configuration

    • Use port forwarding, DMZ, and content filtering with whitelists or blacklists to allow specific traffic from the Internet to bypass the firewall.

    Wireless Access Point Security

    • Secure a wireless access point by requiring a security key, disabling SSID broadcasting, and enabling encryption such as WPA2, WPA, or WEP.

    Network Troubleshooting Tools

    • Useful Windows command-line utilities for network troubleshooting include ping, ipconfig, nslookup, tracert, net use, net user, and netstat.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG
    Capture.PNG

    Description

    Learn about different types of networks, including PAN, LAN, WMN, and MAN, and their characteristics.

    More Like This

    Computer Networks Fundamentals
    40 questions
    Network Types
    48 questions

    Network Types

    FoolproofTopaz avatar
    FoolproofTopaz
    Computer Networking Overview
    48 questions
    Use Quizgecko on...
    Browser
    Browser