Download - 25U11F01.PPT
![Page 1: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/1.jpg)
25U10 F01-LP125U10 F01-LP1Perform Signal Support Perform Signal Support
Procedures for a Local Area Procedures for a Local Area NetworkNetwork
![Page 2: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/2.jpg)
• Identify network types and their common designs.
• Finally, Achieve a minimum score of 70 percent on a written exam.
LEARNING OBJECTIVESLEARNING OBJECTIVES
• Identify common network devices and their use.
• Install and trouble shoot a Local Area Network.
LOCAL AREALOCAL AREANETWORKSNETWORKS
![Page 3: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/3.jpg)
As a 25U you will be required to:
• Install A Networks
• Troubleshoot Networks
LOCAL AREALOCAL AREANETWORKSNETWORKS
![Page 4: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/4.jpg)
The term topology, or more specifically network topology, refers to the physical layout of computers, cables, and other
components on the network.
Network LayoutNetwork Layout
Topology
![Page 5: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/5.jpg)
All network designs stem from three basic topologies:
Bus: Computers are connected in a row along a single cable segment.Star: Computers are connected to cable segments that branch out from a single point.Ring: Computers are connected to a series of cables that forms a loop.
Network LayoutNetwork Layout
![Page 6: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/6.jpg)
BUS TOPOLOGY
Network LayoutNetwork Layout
![Page 7: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/7.jpg)
STAR TOPOLOGY
Network LayoutNetwork Layout
![Page 8: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/8.jpg)
RING TOPOLOGY
Network LayoutNetwork Layout
![Page 9: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/9.jpg)
There are four different typesof networks
•Local Area Network (LAN)•Metropolitan Area Network (MAN)•Wide Area Network (WAN)•The Internet
Types of NetworksTypes of Networks
![Page 10: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/10.jpg)
A network of computers intended to serve an area of only a few square kilometers (or less). Usually a LAN will service an office or building.
Local Area Network
Types of NetworksTypes of Networks
![Page 11: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/11.jpg)
Metropolitan Area Network(MAN)
Although a MAN is based on a LANstandard, it is a network that servicesa large area like a city, military post,or school campus.
Types of NetworksTypes of Networks
![Page 12: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/12.jpg)
Wide Area Network (WAN)
A WAN is a network that covers agreater distance. It can be a collectionof LAN’s and MAN’s networked overa large area or two computers networkedover a large area.
Types of NetworksTypes of Networks
![Page 13: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/13.jpg)
The Internet
The Internet, sometimes referred as a GlobalArea Network.To be more specific, The Internet is a networkof networks.
Types of NetworksTypes of Networks
![Page 14: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/14.jpg)
Although there are four differenttypes of networks based on size, theyall stem from two general types of Networks.
•Local Area Network (LAN)•Wide Area Network (WAN)
Types of NetworksTypes of Networks
![Page 15: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/15.jpg)
A backbone is a media used to connect smaller networks, or nodes, together to create larger networks.
BACKBONE
![Page 16: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/16.jpg)
35th
1stCOSCOM
82nd Airborne
18th Airborne
Corps
Ft. BraggMAN
LAN LAN
Ft. DrumMAN
Ft. StewartMAN
Ft. CampbellMAN
LAN
WANLAN
LAN
LAN
LAN
LAN
LAN
LAN
LAN
Network DesignNetwork Design
Wide Area Network (WAN)
![Page 17: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/17.jpg)
QUESTIONSQUESTIONS
![Page 18: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/18.jpg)
CHECK FOR LEARNINGCHECK FOR LEARNING
What is a Topology?
Answer: The physical layout of networking components.
Name the three basic topologies.
Answer: Bus, Star and Ring
Which network is intended to serve a few kilometers or less?
Answer: Local Area Network (LAN)
Which media is used to connect smaller networks together to create larger networks?Answer: Backbone
![Page 19: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/19.jpg)
SIGNAL TRANSMISSION
![Page 20: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/20.jpg)
Electrical Properties:
Rules for how the message travels over transmission media.
•Attenuation•Cross-talk•Bandwidth
Terms To Understand
SIGNAL TRANSMISSIONSIGNAL TRANSMISSION
![Page 21: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/21.jpg)
Simply an advancedform of noise!
Attenuation: The reduction of signal strength.
Cross Talk: Induction of an unwanted signal from
one circuit into another.
SIGNAL TRANSMISSIONSIGNAL TRANSMISSION
![Page 22: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/22.jpg)
Bandwidth: The capacity of a particular media, the
range of frequencies supported in cycles per second.
The capacity varies with changes in distance and based on the signaling. Capacity is discussed in bits per second (Bps).
SIGNAL TRANSMISSIONSIGNAL TRANSMISSION
![Page 23: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/23.jpg)
QUESTIONSQUESTIONS
![Page 24: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/24.jpg)
CHECK FOR LEARNINGCHECK FOR LEARNING
What is attenuation?
Answer: The reduction of signal strength
![Page 25: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/25.jpg)
Bound: Consists of a central conductor surrounded by
a physical jacket. This offers security, reliability, and speed.
Bound Media (Cable): Coaxial Unshielded Twisted Pair - UTP Shielded Twisted Pair - STP Fiber Optics
CABLE TYPESCABLE TYPES
![Page 26: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/26.jpg)
A. Coaxial
B. Twisted Pair:
1. Shielded
2. Unshielded
C. Fiber Optic
PRIMARY CABLE TYPESPRIMARY CABLE TYPES
![Page 27: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/27.jpg)
![Page 28: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/28.jpg)
BasebandRG-58
Broadband
COAXIAL CABLECOAXIAL CABLE
![Page 29: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/29.jpg)
RG-58 COAXIAL CABLERG-58 COAXIAL CABLE
Baseband Broadband
A type of digital data transmission in which each medium (wire) carries only one signal, or channel, at a time.
A broadband transmission enables a single wire to carry multiple signals simultaneously
![Page 30: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/30.jpg)
RG-58 COAXIAL CABLERG-58 COAXIAL CABLE
![Page 31: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/31.jpg)
– Most Popular– Low Cost– 10 MBPS Data Rate– Immunity to EMI– Easy to Install– Thinnet .25 inch– Connects Directly to
Network Interface Card (NIC)
RG-58 COAXIAL CABLERG-58 COAXIAL CABLE
![Page 32: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/32.jpg)
Screw-on
Crimp-on
Compression
RG-58 COAXIAL CABLE RG-58 COAXIAL CABLE CONNECTORSCONNECTORS
![Page 33: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/33.jpg)
Connectors are the weakest link of a network!
T-Connector Terminator
COAXIAL CONNECTION COAXIAL CONNECTION HARDWAREHARDWARE
![Page 34: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/34.jpg)
THICKNETTHINNETTHINNET
![Page 35: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/35.jpg)
Coaxial Thinnet
•Can Carry signal up to approximately 185 meters, before attenuation occurs.
•Family of RG-58/AU (stranded) or /U(solid) cable has 50-ohm impedance
Coaxial Thicknet
•About .5 inch thick; 500 meter segments
•Often used as a backbone
•Hard to work with but carries the signal farther
COAXIAL CABLECOAXIAL CABLE
![Page 36: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/36.jpg)
![Page 37: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/37.jpg)
–Comprised of pairs of twisted wire.–Twisted to cancel electrical noise from adjacent pairs.
–Easy to Install.–If shielded then call shielded twisted pair.–Most Widely Used today .–Identified for use by categories.
TWISTED PAIR CABLETWISTED PAIR CABLE
![Page 38: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/38.jpg)
Cat 1:– Voice Only
Cat 2: – Data Transmission - 4 MBS
Cat 3:– Data Transmission - 10 MBS / 3 Twists per foot
Cat 4:– Data Transmission - 16 MBS
Cat 5:– Data Transmission - 100 MBS
UNSHIELDED TWISTED UNSHIELDED TWISTED PAIR (UTP) CABLE PAIR (UTP) CABLE
CATERGORIESCATERGORIES
![Page 39: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/39.jpg)
This is a wiring diagram that shows how the wires are installed in the RJ-45 connector.
RJ45 CONNECTOR - RJ45 CONNECTOR - (UTP)(UTP)
![Page 40: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/40.jpg)
• To reduce sensitivity to electrical noise, STP has shielding.
• Prevents cross talk with foil wrap between and around pairs and internal twisting of the pairs.
• Uses RJ-45 connectors (8 wire)
SHIELDED TWISTED SHIELDED TWISTED PAIR (STP)PAIR (STP)
![Page 41: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/41.jpg)
![Page 42: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/42.jpg)
•A technology that uses glass (or plastic) threads(fibers) to transmit data.
•A fiber optic cable consists of a bundle of glass threads, each of which is capable oftransmitting messages modulated onto light waves.
FIBER OPTICSFIBER OPTICS
![Page 43: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/43.jpg)
FIBER OPTIC CABLES FIBER OPTIC CABLES BREAKDOWNBREAKDOWN
![Page 44: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/44.jpg)
Advantages
• Has data rates from 100 MBS to over 2 GBS
• No attenuation and is immune to EMI
Disadvantages
•Very Expensive
•Not easy to install
FIBER OPTICSFIBER OPTICS
![Page 45: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/45.jpg)
• Use when data must be transmitted at very high speeds over long distances in a very secure media.
• Expensive.
• Difficult to install.
FIBER OPTICS FIBER OPTICS CONSIDERATIONSCONSIDERATIONS
![Page 46: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/46.jpg)
A backbone is a media used to connect smaller networks, or nodes, together to create
larger networks.
BACKBONEBACKBONE
![Page 47: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/47.jpg)
WIRELESS WIRELESS NETWORKSNETWORKS
The Wireless Environment: Emerging Technology
Wireless Capabilities:
• Temporary connections to an existing, cabled network.
• Backup to existing network.
• Portable.
• Extends networks beyond limits of cables.
![Page 48: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/48.jpg)
• Local area networks: use transmitters and receivers.
• Extended local area networks.
• Mobile computing: uses public carriers.
TYPES OF WIRELESS TYPES OF WIRELESS NETWORKNETWORK
![Page 49: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/49.jpg)
1) Busy areas. (lobbies, reception area)
2) People who must travel while working.
3) Isolated areas and buildings.
4) Departments that move frequently.
5) Structures that are difficult to cable.
USES FOR A WIRELESS USES FOR A WIRELESS NETWORKNETWORK
![Page 50: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/50.jpg)
QUESTIONSQUESTIONS
![Page 51: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/51.jpg)
CHECK FOR LEARNINGCHECK FOR LEARNING
What are the three primary types of cables?
Answer: Coaxial, Twisted Pair and Fiber Optics
Name the RG-58 coaxial connectors?
Answer: Screw On, Compression and Crimp On
True or False
A Thicknet coaxial cable can carry a signal 650 meters before attenuation occurs.
Answer: False
![Page 52: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/52.jpg)
PRACTICAL EXERCISE # 1
CABLE CREATION
![Page 53: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/53.jpg)
INTRODUCTION TO INTRODUCTION TO NETWORKING DEVICESNETWORKING DEVICES
Network Devices
Network devices are equipment that isused to connect networks together and/orenhance network performance.
![Page 54: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/54.jpg)
INTRODUCTION TO INTRODUCTION TO NETWORKING DEVICESNETWORKING DEVICES
Network Interface Card
An expansion card installed in your computerthat puts the data on the network media.
![Page 55: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/55.jpg)
An expansion board you insert into a computer so the computer can be connected to a network.
Can be either PCI or ISA and optional Plug and Play
NETWORK INTERFACE NETWORK INTERFACE CARDS (NIC)CARDS (NIC)
![Page 56: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/56.jpg)
Comes in 3 basic Connector types:
RJ-45 – Twisted Pair – Star Topology
RJ is abbreviated for Registered Jack
BNC – Coaxial Cable – BUS Topology
The acronym BNC is British Naval Connector.
NETWORK INTERFACE NETWORK INTERFACE CARDS (NIC)CARDS (NIC)
![Page 57: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/57.jpg)
ROLE OF THE ROLE OF THE NETWORK ADAPTER NETWORK ADAPTER
CARDCARD
• Prepares data from the computer for the network cable.
• Sends the data to another computer.
• Controls the flow of data between the computer and the cabling system.
![Page 58: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/58.jpg)
NIC DRIVERSNIC DRIVERS
• Each Network Card has it’s own drivers.
• Operating systems such as Windows often have generic drivers.
![Page 59: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/59.jpg)
• Has a connector for fiber optic connections.
• Can be either PCI or ISA.
FIBER OPTICS FIBER OPTICS NETWORK CARDNETWORK CARD
![Page 60: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/60.jpg)
WIRELESS LAN WIRELESS LAN ADAPTERSADAPTERS
Wireless LAN adapters allow you to network computers without a direct connection or they can be directly connected.
![Page 61: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/61.jpg)
HUB
A device used in a star topology as thecentral point to connect all the computerstogether.
Networking DevicesNetworking Devices
![Page 62: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/62.jpg)
STACKING HUBSSTACKING HUBS
If you may need to add more Users to your network and do not have enough ports on your hub to support this, you may stack hubs to add more ports to your network. This is done by using a Crossover cable.
![Page 63: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/63.jpg)
Repeater
A device in a bus topologyused to strengthen a signaland extend the network.
Networking DevicesNetworking Devices
![Page 64: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/64.jpg)
Router
A network device, commonly referred as a smart link, used to connect networks together. A router will route data through networks to reach it’s destination. A Router uses a Rollover cable to connect from the Router to the computer or hub.
Networking DevicesNetworking Devices
![Page 65: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/65.jpg)
Network Switch
A device, similar to a hub, used on a startopology to send a signal through to it’sdestination.
Networking DevicesNetworking Devices
![Page 66: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/66.jpg)
QUESTIONSQUESTIONS
![Page 67: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/67.jpg)
CHECK FOR LEARNINGCHECK FOR LEARNING
Name the central point of a Star topology.
Answer: Hub
What device is used to strengthen the signal of the network?
Answer: Repeater
What does BNC stand for?
Answer: British Navel Connector
![Page 68: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/68.jpg)
Practical Exercise # 2Practical Exercise # 2Design a NetworkDesign a Network
![Page 69: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/69.jpg)
Before data can be sent over the network, the network adapter card must change it from a form the computer can understand to another form which can travel over a network cable.
PREPARING THE DATAPREPARING THE DATA
![Page 70: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/70.jpg)
NETWORK ADDRESSESNETWORK ADDRESSES
• The network adapter card also has to indicate its location, or address, to the rest of the network distinguishing it from all other cards on the network.
• That address is referred to as the Media Access Control (MAC) or MAC address.
1234567 ABCDEFG
![Page 71: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/71.jpg)
1234567 ABCDEFG
MAC ADDRESSMAC ADDRESS
LOOKING FOR
![Page 72: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/72.jpg)
1234567 ABCDEFG
MAC ADDRESSMAC ADDRESS
SEND REPLY
![Page 73: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/73.jpg)
SENDING AND SENDING AND CONTROLLING DATACONTROLLING DATA
Each card signals to the other indicating its parameters and accepts or adjusts to the other
card's parameters. When all of the communication details have been determined, the
two cards begin sending and receiving data.
![Page 74: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/74.jpg)
PACKET PACKET CONSTRUCTIONCONSTRUCTION
![Page 75: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/75.jpg)
Data tends to exist as rather large files. However, networks cannot operate if computers put large
amounts of data on the cable at one time.
THE FUNCTIONS OF THE FUNCTIONS OF PACKETS IN NETWORKPACKETS IN NETWORK
COMMUNICATIONSCOMMUNICATIONS
![Page 76: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/76.jpg)
PACKET STRUCTUREPACKET STRUCTURE
Packets may contain several types of data including:
• Information, such as messages or files.
• Certain types of computer control data and commands.
• Session control codes, such as error correction, that indicate the need for a retransmission.
![Page 77: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/77.jpg)
PACKET COMPONENTSPACKET COMPONENTS
All packets have certain components in common.
These include:
• A source address (Sender)• Data that is intended for transmission.• A destination address (Recipient)• Instructions (How to pass data)• Information(Connect/Reassemble packets)• Error checking information
![Page 78: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/78.jpg)
HEADER
DATA
TRAILER
Packet ConstructionPacket Construction
![Page 79: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/79.jpg)
HEADERHEADER
The HEADER includes:
- An alert signal to indicate that the packet is being transmitted.
- The source address.
- The destination address.
-Clock information to synchronize
transmission.
![Page 80: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/80.jpg)
TRAILERTRAILER
The exact content of the TRAILER varies depending on the communication method, or protocol. However, the trailer usually contains an error checking component called a cyclical redundancy check (CRC). The CRC is a number produced by a mathematical calculation on the packet at its source. When the packet arrives at its destination, the calculation is redone.
![Page 81: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/81.jpg)
DATADATA
This is the actual data being sent. This part of the packet can be of various sizes depending on the network. The data section on most networks varies from 512 bytes to 4k.
![Page 82: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/82.jpg)
Carrier Sense Multiple Access / Collision Detection
Protocol for how Network devices respond when two devices attempt to use a data channel at the same time.
After detecting a collision, a device waits a random delay time and then attempts to re-transmit the message.
CSMA / CDCSMA / CD
![Page 83: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/83.jpg)
QUESTIONSQUESTIONS
![Page 84: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/84.jpg)
CHECK FOR LEARNINGCHECK FOR LEARNING
What are the three parts of Packet Construction?
Answer: Header, Data and Trailer
Where does the MAC address come from?
Answer: It is factory written on the network interface card
What is the purpose of CSMA / CD?
Answer: To detect and prevent collisions of data packets on the network.
![Page 85: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/85.jpg)
Protocols are rules and procedures for communicating across a network.
PROTOCOLSPROTOCOLS
![Page 86: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/86.jpg)
PROTOCOLSPROTOCOLS
• How protocols work:
(1) Data transmission is a step-by-step process.
(2) Each step has its own protocol, or rules.
![Page 87: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/87.jpg)
In 1978, the International Standards Organization (ISO) released a set of specifications that described a network architecture for connecting dissimilar devices.
In 1984, the ISO released a revision of this model and called it the Open Systems Interconnection (OSI) reference model.
THE OSI MODELTHE OSI MODEL
![Page 88: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/88.jpg)
Protocols in a Layered Architecture
Protocols have to work together to ensure data is prepared, transferred, received, and acted upon.
Protocol stacks:• (a) Each OSI layer has its own protocol (rules).• (b) Combination is called a protocol stack.• (c ) Lower layers determine how vendors design hardware.• (d) Upper layers define rules for communication.• (e) The higher the layer is in the stack, the more complex
its tasks and their associated protocols.
THE OSI MODELTHE OSI MODEL
![Page 89: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/89.jpg)
PACKET APPLICATIONPACKET APPLICATION(OSI MODEL)(OSI MODEL)
1 PHYSICAL LAYER
2 DATA LINK LAYER
3 NETWORK LAYER
4 TRANSPORT LAYER
5 SESSION LAYER
6 PRESENTATION LAYER
7 APPLICATION LAYERConverts data to a program format
Completion of packet transmission
Performs error checking of data(protocols)
Contains destination IP address
Contains destination MAC address
Receives raw data from the wire
C
Places packets into a file format
![Page 90: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/90.jpg)
Sending computer:• Its protocol breaks data into packets that the
protocol can handle.• Adds addressing information. • Prepares and sends data out onto the network
cable. Receiving computer:• Must use same protocol to take packet off the
cable.
PROTOCOLSPROTOCOLS
![Page 91: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/91.jpg)
• Both computers must process packets following exactly the same procedures.
• Rules for communicating in a particular LAN environment, such as, Ethernet are known as Network Protocols.
PROTOCOLSPROTOCOLS
![Page 92: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/92.jpg)
ROUTABLE vs. NONROUTABLE Protocols:
• Data sent from one LAN to another is routed.
• Routable protocols can navigate to a specific address, i.e. TCP/IP.
• Non-routable protocols broadcast to everyone.
PROTOCOLSPROTOCOLS
![Page 93: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/93.jpg)
• Allows network protocols and card to be mixed.
• Two or more protocols can be bound to one card.
• Operating System (OS) will attempt to use the protocols in the order they are bound.
The Binding Process
PROTOCOLSPROTOCOLS
![Page 94: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/94.jpg)
• IP (Internet Protocol): TCP/IP protocol for packet forwarding and routing.
•Protocols are implemented and removed in much the same way that drivers are added and removed.
PROTOCOLSPROTOCOLS
![Page 95: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/95.jpg)
QUESTIONSQUESTIONS
![Page 96: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/96.jpg)
CHECK ON LEARNINGCHECK ON LEARNING
What are protocols?
Answer: They are rules or standards that allow computers to communicate with each other.
Which OSI layer performs error checking of data?
Answer: Layer 4 (The Transport Layer).
How many layers does the OSI model consist of?
Answer: 7
![Page 97: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/97.jpg)
TCP/IP
TRANSMISSION CONTROL TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL / INTERNET
PROTOCOLPROTOCOL
![Page 98: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/98.jpg)
• Basic communication language or protocol for the internet.
• Two layered program:
1)Transmission Control Protocol
2) Internet Protocol
TCP/IPTCP/IP
![Page 99: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/99.jpg)
Two Layers
• Transmission Control Protocol/Internet Protocol:
TCP: Manages the assembling of a message or file.
IP: Handles the address to see where to forward the message.
TCP/IPTCP/IP
![Page 100: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/100.jpg)
IP ADDRESSESIP ADDRESSES
148.43.200.16
LET’S TALK IP ADDRESSES
![Page 101: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/101.jpg)
Think of an IP address like you would your mailbox address.
It represents your computer acrossa network like your house addressrepresents you across the country.
148.43.200.16
IP ADDRESSESIP ADDRESSES
![Page 102: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/102.jpg)
• IP address: An address used to determine a location of a host or other computer device.
148.43.200.16
IP ADDRESSESIP ADDRESSES
![Page 103: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/103.jpg)
IP ADDRESS IP ADDRESS BREAKDOWNBREAKDOWN
0-255 0-255 0-255 0-255
This address is broken down into what we call octets. Each octet has a possible 256
numbers ranging from 0-255.
148.43.200.16
148 43 200 16
![Page 104: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/104.jpg)
IP AddressingIP AddressingIn a TCP/IP network there are 5 classes of IP address. Each is identified by the number in the first octet.
Class A: 1-126
Class B: 128-191 (The military uses class B)
Class C: 192-223
Class D: 224-239 (Experimental purposes)
Class E: 240-255 (Experimental purposes)
NOTE: 127 IS RESERVED AS A LOOPBACK ADDRESS
FOR TESTING PURPOSES
![Page 105: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/105.jpg)
IP AddressingIP Addressing148.17.56.16
10010100.00010001.00111000.00010000
NETWORK HOSTS
IP addresses are broken down into 2 parts; the Network portion and the Host/User. The computer reads these IP addresses as a series of 1’s and 0’s.
![Page 106: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/106.jpg)
IP AddressingIP Addressing
128 64 32 16 8 4 2 1
1 0 0 1 0 1 0 0
1’s are considered ON and 0’s are OFF
ADD the numbers turned on to get the number for that octet.
128 + 16 + 4 = 148
![Page 107: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/107.jpg)
148.43.202.3
148.43.202.2
148.43.202.1
148.43.202.4
148.43.201.2 148.43.201.1
148.43.200.4
148.43.200.3
148.43.200.2
148.43.200.1
Each Device must have a unique number to identity itself
IP AddressingIP Addressing
![Page 108: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/108.jpg)
147.51.175.0 Network Address147.51.175.1 Hosts/Users147.51.175.254 147.51.175.255 Broadcast255.255.255.0 Sub mask
Every network must have a network IP Addressand a broadcast IP Address.
The Network and Broadcast IP addresses are not issued to the Users, but must encapsulate all User IP addresses.
IP AddressingIP Addressing
![Page 109: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/109.jpg)
IP AddressingIP Addressingexerciseexercise
Network Network IP Broadcast IP
197.10.100.0 thru ? ?197.10.100.255
147.55.126.16 thru ? ?147.55.126.31
192.18.0.0 thru ? ?192.18.255.255
![Page 110: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/110.jpg)
IP AddressingIP Addressinganswersanswers
Network Network IP Broadcast IP
197.10.100.0 thru 197.10.100.0 197.10.100.255197.10.100.255
147.55.126.16 thru 147.55.126.16 147.55.126.31147.55.126.31
192.18.0.0 thru 192.18.0.0 192.18.255.255192.18.255.255
![Page 111: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/111.jpg)
Subnet MaskingSubnet Masking
A subnet further breaks down the block of IP’s that you have been given from the ISP.
Example: If a company is given 172.16.0.0 as their block of IP addresses, they may elect to connect all their computers to the single network, which can result in poor network performance.
What is subnet masking?
![Page 112: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/112.jpg)
Network 172.16.0.0
172.16.0.0
One option of networking is to connectall workstations to one network.
Subnet MaskingSubnet Masking
![Page 113: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/113.jpg)
If you break down the network, you could limitthe traffic on the other networks.
Network 172.16.0.0
172.16.1.0 172.16.2.0
172.16.3.0
172.16.4.0
Subnet MaskingSubnet Masking
![Page 114: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/114.jpg)
Subnet Masking: Subnet Masking:
RULESRULES1. Bits=Number of bits turned on in the Host/User octet
2. Subnet=Sum of mask bits turned on in each octet
3. Mask Bits=Number of bits turned on in all Octets
4. # of Subnets=2 to the power of the number of bits turned on, minus 2(network & broadcast)
5. Host/User=Number of users minus 2 (network & broadcast)
![Page 115: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/115.jpg)
128 64 32 16 8 4 2 1
128 64 32 16 8 4 2 1
128 64 32 16 8 4 2 1
128 64 32 16 8 4 2 1
When starting to Subnet, to make things easier, draw this chart out first. This chart represents each octet of your IP address.
Subnet MaskingSubnet Masking
![Page 116: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/116.jpg)
Bits Subnet Mask
Mask Bits
# of Subnets
# of Host/User
# of Bits turned on in the Host/User octet of the IP address
Sum all Bits turned on in each octet
# of Bits turned on in all 4 octets
Formula: 2 to the power Bits turned on in the Host/User octet Minus 2
The first Bit turned on in the Host/User octet minus 2 (Network and Broadcast)
NOTE: After drawing the previous chart, draw this chart.
Subnet MaskingSubnet Masking
![Page 117: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/117.jpg)
192.50.100.0
255.255.255.0
25 Users
Using your 2 charts drawn from the previous slides, we will subnet this one IP Address and get the required amount of Host/User IP addresses and Subnet Mask.
Subnet MaskingSubnet Masking
![Page 118: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/118.jpg)
BitsSubnet Mask
Mask Bits
# of Subnets
# of Host/User
3 255.255.255.224 /27 6 30
NETWORK 192.50.100.32
USERS 192.50.100.33 192.50.100.62
BROADCAST 192.50.100.63
Subnet MaskingSubnet Maskinganswersanswers
![Page 119: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/119.jpg)
QUESTIONSQUESTIONS
![Page 120: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/120.jpg)
CHECK FOR LEARNINGCHECK FOR LEARNING
What is an IP address?
Answer: An address used to determine a location of a host or other computer device.
What is the range of each octet in an IP address?
Answer: Each octet of an IP address has a range of 0-255.
What are the 2 parts of an IP address?
Answer: Network and Hosts.
![Page 121: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/121.jpg)
CHECK FOR LEARNINGCHECK FOR LEARNING
What does the acronym TCP/IP stand for?
Answer: Transmission Control Protocol / Internet Protocol
TCP/IP is made up of how many layers?
Answer: 2
The number 192 in the first octet of an IP address signifies what class of IP address?
Answer: Class C
![Page 122: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/122.jpg)
Practical exercise # 3Practical exercise # 3192.100.50.0192.100.50.0
255.255.255.0255.255.255.050 Users50 Users
![Page 123: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/123.jpg)
INSTALLING A INSTALLING A NETWORK NETWORK
INTERFACE CARD INTERFACE CARD (NIC) DRIVER(NIC) DRIVER
![Page 124: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/124.jpg)
PREPARATIONPREPARATION
• Authorization - User Name and Password
• Network Card Drivers - Floppy Disk or CD-ROM
• IP Addresses - Computer, Subnet Mask, Gateway, DNS Service Search Order, and WINS Server
• Computer Name - Name that computer will be known as across network
• Workgroup Name or Domain Name
Items to have ready prior to installation:
![Page 125: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/125.jpg)
NETWORK CARD NETWORK CARD IRQ AND I/OIRQ AND I/O
• Windows NT does not have a Device Manager to resolve hardware conflicts or to make changes to the IRQ or
I/O range.
• To change the IRQ and/or the I/O range of a device, you must run the diagnostic program for the device.
![Page 126: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/126.jpg)
METHOD OF METHOD OF INSTALLING INSTALLING
EXPANSION BOARD EXPANSION BOARD DRIVERSDRIVERS• Almost all expansion board drivers can be
installed on Windows NT operating system by:
Floppy Disk CD-ROM Network Manufacturer
Website
For example, you can not install a NIC driver from the network because you are not connected to the network.
![Page 127: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/127.jpg)
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
To begin installing your network settings, Right click on the Network Neighborhood Icon and Select Properties.
![Page 128: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/128.jpg)
At the Network Neighborhood Properties window select the Adapters Tab.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 129: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/129.jpg)
If there are any Network adapters, highlight them and click Remove. Then Reboot your Computer.
Once Reboot is complete return to the Adapters Tab.
If no Adapters are present, Click the ADD button.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 130: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/130.jpg)
The Select Network Adapter window appears, Click: Have Disk
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 131: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/131.jpg)
Insert your Drivers disk into your Floppy Drive and Ensure that there is an A: in the location box.
Click OK
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 132: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/132.jpg)
The Select OEM Option window appears with the Network Card type in the window.
Click OK.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 133: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/133.jpg)
At the Input Ethernet ID window click on SKIP.
This option is only used if more than one Network Adapter is installed.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 134: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/134.jpg)
The adapter type window appears, for Realtek RTL 8019 select ISA, for Realtek RTL 8029 select PCI.
Click OK
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 135: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/135.jpg)
Windows NT will begin copying files necessary for the installation of the Network Adapter.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 136: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/136.jpg)
The Adapter window now appears with the appropriate Adapter installed.
Click the Bindings Tab.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 137: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/137.jpg)
Windows NT will now Bind your Network Adapter to the Protocols installed.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 138: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/138.jpg)
At the Binding Tab click the Close button.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 139: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/139.jpg)
You are now taken to the Microsoft TCP/IP Properties window.
Input your IP Address, Subnet Mask, and Default Gateway.
This information is located in your Student Position Binder.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 140: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/140.jpg)
In the DNS Tab enter your DNS addresses by clicking the ADD button.
Ensure that your Domain Address is Gordon.army.mil.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 141: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/141.jpg)
Click the WINS Address Tab.
Enter your WINS Address.
Click the Apply button then Click OK.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 142: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/142.jpg)
You are now prompted to Restart, click YES to restart.
Once you have Restarted, Log on as Administrator and go to your Desktop.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 143: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/143.jpg)
At the Windows NT Desktop, Right Click on Network Neighborhood and Select Properties.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 144: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/144.jpg)
At the Network Properties Window, Click on the Change button.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 145: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/145.jpg)
At the Identification changes window, change your computer name to your Host Name, I.E. wsf175___.
This will be the computer name seen across the Network.
Click OK.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 146: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/146.jpg)
You are now informed that the computer name has been successfully changed but a Restart is necessary.
Click OK.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 147: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/147.jpg)
Close out the Network Properties window by clicking on the Close button.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 148: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/148.jpg)
Click Yes to Restart your computer now.
Once Restart is complete Log on as Administrator.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 149: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/149.jpg)
At the Windows NT Desktop Right Click the Network Neighborhood Icon and select Properties.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 150: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/150.jpg)
At the Identification Tab click on the Change Button.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 151: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/151.jpg)
Click the Radio button next to Domain and enter 52div
Check mark the box for Create a Computer account in the Domain and enter your User name and Password.
Click OK.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 152: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/152.jpg)
At the Welcome to the 52DIV window click OK.
Click OK at the Identification Changes window if necessary.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 153: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/153.jpg)
At the Network Identification window click the Close button.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 154: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/154.jpg)
You are prompted to Restart, Click the YES button.
After restart is complete log on as Administrator and go to the Windows NT Desktop.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 155: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/155.jpg)
Double Click the Network Neighborhood Icon and you are now able to see all computers within your Domain.
INSTALLING NETWORK INSTALLING NETWORK SETTINGSSETTINGS
![Page 156: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/156.jpg)
![Page 157: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/157.jpg)
Practical Exercise # 4Practical Exercise # 4Install Network Settings and Install Network Settings and
Join the DomainJoin the Domain
![Page 158: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/158.jpg)
Troubleshooting the Troubleshooting the NetworkNetwork
Introduction
Applying a logical process is the keyto any kind of troubleshooting. Thereare multiple ways to fix any problem.The better you understand a problemsolving process, the easier it is to fixthe problem.
![Page 159: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/159.jpg)
Fixing any problem can be simple. Youare given a big problem. Break the bigproblem down into several little problems.
Utilize a network diagram to give yourselfan overlooking view of the network. Usea logical process to identify smaller portionsof the network to fix first.
Troubleshooting the Troubleshooting the NetworkNetwork
![Page 160: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/160.jpg)
HUB
HUB
A large network thathas a problem
Troubleshooting the Troubleshooting the NetworkNetwork
![Page 161: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/161.jpg)
HUB
HUB
Divide it into twosmaller networks
Fix the two smallernetworks individually
Troubleshooting the Troubleshooting the NetworkNetwork
![Page 162: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/162.jpg)
We use troubleshooting tools to assistin isolating network faults. The two tools most valuable are:
•PING (TCP/IP DOS Command)•Testing Equipment
Troubleshooting the Troubleshooting the NetworkNetwork
![Page 163: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/163.jpg)
PING: Tests connectivity from the computer to the distant end.
SYNTAXPING IP Address
EXAMPLEPING 147.51.169.7
Troubleshooting the Troubleshooting the NetworkNetwork
![Page 164: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/164.jpg)
To use the Ping Command, open the Ms-dos command Prompt by choosing Start, Programs and Ms Dos Command Prompt
Troubleshooting the Troubleshooting the NetworkNetwork
![Page 165: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/165.jpg)
This ping demonstrates good connectivity to the computer acd4
Troubleshooting the Troubleshooting the NetworkNetwork
![Page 166: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/166.jpg)
This ping demonstrates loss of connectivity to the computer
Troubleshooting the Troubleshooting the NetworkNetwork
![Page 167: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/167.jpg)
Test Equipment: Specialized devices to test cables and equipment for serviceability and correct installation.
LAN Cable Tester: Specialized devices to test LAN cables for correct construction and serviceability. Some can test LAN data flow.
Troubleshooting the Troubleshooting the NetworkNetwork
![Page 168: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/168.jpg)
Detailed records are a tremendous aid in troubleshooting. Records you should keep include:– Description of all hardware, to include
installation dates and configuration details.– A network diagram.– Service agreements and warranty
information, to include telephone numbers of vendors.
– A history of past problems.
Troubleshooting the Troubleshooting the NetworkNetwork
![Page 169: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/169.jpg)
QUESTIONSQUESTIONS
![Page 170: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/170.jpg)
What is the PING command used for?
Answer: To check connectivity from the computer to the distant end.
What kind of command is PING?
Answer: PING is a TCP/IP DOS Command.
CHECK ON LEARNINGCHECK ON LEARNING
![Page 171: 25U11F01.PPT](https://reader035.vdocument.in/reader035/viewer/2022062511/54badb6e4a7959387f8b45c1/html5/thumbnails/171.jpg)
Practical Exercise # 5Practical Exercise # 5Perform Troubleshooting Perform Troubleshooting
TechniquesTechniques