CSS3-WEEK Network

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

COMPUTER SYSTEMS SERVICING 4

Week 3

Network Connectivity Devices


Your company has three divisions. Each group has a network,
and all the networks are joined together. Is this still a LAN? Or
is it something else?

YES
If each group has their own network, each network could be called a LAN. If
these networks are joined together, this could also be called a LAN.

LAN is a simple term, and it doesn’t have a strict definition. The important
thing is that all the components of the network are in the local area, such as in
a single building.
OBJECTIVES
Upon successful completion of this lesson, you
will be able to:

Identify Network Connectivity Devices


Install and configure a SOHO router.
Network Interface Controller

A network interface controller (NIC, also known as


a network interface card, network adapter, LAN adapter,
and by similar terms) is a computer hardware component
that connects a computer to a computer network.

Early network interface controllers were commonly


implemented on expansion cards that plugged into
a computer bus; the low cost and ubiquity of
the Ethernet standard means that most newer computers
have a network interface built into the motherboard.
Network interface controller

A 1990s Ethernet network interface controller card which


connects to motherboard via the now-obsolete ISA bus.
This combination card features both a BNC connector
(left) for use in (now obsolete) 10BASE2 networks and an
8P8C connector (right) for use in 10BASE-Tnetworks.
Connects to Common manufacturers
Motherboard via one of: Intel
Integrated

Realtek
• PCI Connector
• ISA Connector Broadcom
• PCI-E 3Com
• FireWire
• USB
• Thunderbolt
Network via one of:
• Ethernet
• Wi-Fi
• Token ring
• ATM
HUBS
Hubs are commonly used LAN connectivity devices. They
serve as the central connection points for LANs). A basic
hub contains no active electronics and therefore cannot
be used to extend a LAN It basically organizes your cables
and relays data signals to all the computers on the LAN.
Hubs are most commonly used on networks that use
twisted-pair cabling. Ports available on the back of the
hub provide the connection points for the devices on the
network. Computers and other devices are attached to
the hub by individual network cables. Hubs come in many
sizes and shapes and supply different numbers of ports.
In cases where the LAN outgrows the size of the hub, a
new hub can be attached (the hubs are "daisy chained"
together using a short connection cable often referred to
as a rat tail) to the current hub, thus providing greater port
density
 Hubs provide the central connection points for LANs.
 Hubs come in all sizes and shapes and are available in a wide
range of prices.
 Typically, the more ports on the hub, the more expensive the
hub.
 Hubs that support faster varieties of Ethernet, such as Fast
Ethernet, will also cost more.
REPEATERS
A repeater takes the signal that it receives from computers and
other devices on the LAN and regenerates the signal so that the
signal maintains its integrity along a longer media run than is
normally possible.
Repeaters don't have any capabilities for directing network traffic
or deciding the particular route certain data should take; they
are simple devices that just sit on the network, boosting the data
signals they receive. The problem with repeaters is that they
amplify the entire signal that they receive, including any line
noise. So, in worst-case scenarios, they pass on data traffic that is
barely discernable from the background noise on the line.
BRIDGES
A bridge is an internetworking device used to help conserve the
bandwidth available on the network. When LANs really start to
grow, network data traffic can begin to overwhelm the available
bandwidth on network media.

One strategy for conserving network bandwidth is to chop the


network up into smaller segments. These segments are connected
to a bridge. Bridges are smarter than hubs and repeaters and
actually use some software to help get the job done. A bridge is
able to read the MAC address (also known as the hardware
address—remember it's burned onto the NIC in each computer on
the network) of each data packet circulating on the network
segments connected to the bridge. By learning which MAC
addresses live on each of the network segments, the bridge can
help keep data traffic that is local to a particular segment from
spreading to the other network segments that are serviced by the
bridge.
SWITCHES
A switch is another internetworking device used to manage the
bandwidth on a large network. A switch, which is often referred to as a
"bridge on steroids," controls the flow of data by using the MAC address
that is placed on each data packet (which coincides with the MAC
address of a particular computer's network card). Switches divide
networks into what are called Virtual LANs or VLANs. The great thing
about a VLAN, which is a logical grouping of computers on the network
into a sort of communication group, is that the computers don't have to
be in close proximity or even on the same floor. This allows you to group
computers that serve similar types of users into a VLAN. For example, even
if your engineers are spread all over your company's office building, their
computers can still be made part of the same VLAN, which would share
bandwidth.
ROUTERS
A router links computers to the Internet, so users can share
the connection. A router acts as a dispatcher, choosing the
best path for information to travel so it's received quickly.
Switches create networks, routers connect networks.
MODEM

A modem (modulator-demodulator) is a device


that modulates signals to encode digital
information and demodulates signals to decode the
transmitted information. The goal is to produce a signal that
can be transmitted easily and decoded to reproduce the
original digital data.
Install and Configure a SOHO
Router
In the last topic, you identified basic network connection
types. As an IT technician, you might be asked to
implement these technologies in a small office or home
office (SOHO) situation, rather than in a corporate
enterprise setting. In this topic, you will install and configure
a SOHO router.
Small businesses, whether located in a commercial
building or in an individual’s home, can benefit greatly
from being able to share files and other resources. SOHO
networks generally contain anywhere from two to ten
computers, though there can be exceptions to this
guideline. As an IT technician, you might be called upon to
implement SOHO networks as part of your job duties.
SOHO NETWORKS

A SOHO network is a network that provides connectivity


and resource sharing for a small office or home office.
Generally limited to fewer than 20 computers or nodes, a
SOHO network often facilitates sharing of files and printers,
as well as services such as email, faxing, and so forth. A
SOHO network can contain a combination of wired and
wireless computer connections, and all of the computing
devices in a SOHO network usually share the same physical
location.
HOW SMALL IS SMALL?

SOHO (Small Office/Home Office) networks can range in


size, and there is no real consensus as to the maximum
number of nodes that can be in a SOHO network. Some
sources cite the maximum as 10 nodes, whereas others say
that four or five nodes is the maximum.

SOHO Routers
A wireless router connects a computer to multiple networks
through a wireless connection. It performs the functions of
a wireless accent point (WAP) and a router. It enables
wired and wireless computers to connect to the Internet. It
can allow multiple users to be connected to a network at
the same time. Some wireless routers have a firewall built
into them.
SOHO Routers
HOW SMALL IS SMALL?
File encryption is a type of file protection that disguises the data
within a file or message so that the specific information included
within the file or message cannot be read or understood by
unauthorized users. A key is used to encode the data, and neither
the file nor the key contents can be read by anyone who does
not have the key. File encryption can be local, where a file that is
on a disk is protected, or it can be used when a file is being
transmitted over a network connection.
Note: In some instances, organizational policies can
restrict or require the use of file encryption.

An example of file encryption would be code


that substitutes each letter of the alphabet for
another letter at a specific distance in the
alphabet. A rule like that was used to encode the
following message: Iloh Hqfubswlrq.
The key to decoding this encrypted message
would be a number that shows the distance
between the original character and the
encoded character. The decryption key, -3, tells
you to take each letter in the encrypted message
and count back three letters in the alphabet to
read the message: File Encryption.
WIRELESS ENCRYPTION STANDARDS
Wireless networks are not as secure as wired networks, as
they operate over radio waves instead of physical cables.
In an effort to strengthen the security of wireless networks, a
number of wireless encryption protocols have been
developed.

Wireless
Encryption Method Description

WEP Wired Equivalent Privacy (WEP) is a security protocol


for wireless local area networks (WLANs). WEP does
not use strong encryption and is therefore considered
obsolete. However, some legacy devices may only
support WEP.

WPA Wi-Fi Protected Access (WPA) provides a significantly stronger


encryption scheme than WEP, and can use a shared private key, which are
unique keys assigned to each user.
Wireless
Encryption Method Description

WPA2 Wireless Protected Access 2 (WPA2) replaced WPA


encryption in 2006 and is based on the IEEE 802.11i
standards. The Institute of Electrical and Electronics
Engineers (IEEE) 802.11i standard is the most recent
encryption standard that provides improved
encryption for wireless networking. The 802.11i
standard requires strong encryption key protocols,
known as Temporal Key Integrity Protocol (TKIP) and
Advanced Encryption Standard (AES). WPA2/802.11i
encryption is considered to be the strongest available
method of wireless security.
SERVICE SET IDENTIFIERS (SSIDS)
A Service Set Identifier (SSID) is a 32-bit alphanumeric string that
identifies a WAP and all the devices attached to it. A WAP
typically broadcasts an SSID in plain text. It is more appropriate to
think of an SSID as a network name that is applied to the grouping
of the WAP and the devices currently connected to it. Wireless
connectivity devices such as a WAP or other wireless routers come
with a default SSID. Instead of accepting the device’s default
SSID, you should manually specify an SSID to more clearly identify
the device.

The SSIDs of two different WAPs.


SOHO ROUTER CONFIGURATION
OPTIONS
Setting Description
Basics Basic settings apply to both wired and wireless routers can
include the ability to:
• Secure your router or access point administration interface.
• Change default administrator passwords (and user names).
• Disable remote administration.
• Secure/disable the reset switch/function.
• Change the default SNMP parameter.
• Regularly upgrade the Wi-Fi router firmware to ensure you have the
latest security patches and critical fixes.
SSID When installing a wireless router, change the default Service
Set Identifier (SSID) and verify that you are not broadcasting out to the
network.
Channels

Change the default channel on wireless routers. By


changing the router channel, you can optimize data
transmission and reduce interference with other routers in
close proximity. If your router is dual channel, then you can
easily change from the default channel to the other
channel available. To help determine what channel is not
being used, you can use one of the utilities available that
can scan the local area and display used channels. This
can be very helpful in choosing a different less-used
channel for your router.
FIRMWARE

Firmware is specialized software that is stored on a hardware


device’s read-only memory (ROM) whether or not the device is
powered. It is most often written on an electronically
reprogrammable chip so that it can be updated with a special
program to fix any errors that might be discovered after a
computer is purchased, or to support updated hardware
components. Router firmware may need an upgrade from time to
time depending on manufacturer updates. These updates
contain security patches, updates to performance, and updates
to address any known issues. The updates can be installed in a
number of ways, but most commonly can be downloaded from
the manufacturer’s website.

 Note: Overwriting existing firmware, often through updating, is


called flashing.
ROUTER SETUP PROCESS

 The basic setup and configuration process for a SOHO


router includes:

 1. Verify the wired connection, if applicable.


 2. Configure encryption standard (WEP, WPA, or WPA2).
 3. Change SSID from default.
 4. Apply a new wireless password.
 5. Change the admin password for the router.
 6. Connect to the new network.
 7. Verify the Internet connectivity.
 8. Update firmware, if necessary
HOW TO INSTALL AND CONFIGURE A SOHO
ROUTER
You can use the following high-level steps as a guide or a
reference when you are installing and configuring SOHO
networks.

Installing, Configuring, and Deploying a Wired or Wireless SOHO


Router
To install, configure, and deploy a wired or wireless SOHO router:

 1. If you are deploying a wireless router, choose the appropriate


802.11 router for your needs, whether it be 802.11a, b, g, or n.
 2. Choose a location for the router.
• In a wired SOHO network, you must verify that the cables are
long enough so that devices can reach the router.
• Wireless routers need to be placed strategically so that all
computing devices have an equally strong wireless signal. In
some SOHO networks, you may need more than one wireless
router.
 3. Connect the router to a power source and turn it on.
 4. Connect the router to a cable or DSL modem via
Ethernet or USB cable. After plugging in the cables, you
may need to turn the router off and on to verify that the
router has recognized the modem.
 5. Connect a computing device to the router. If you are
deploying a wireless router, use a cable for the initial
router configuration. Once the router configuration is
completed, you can remove the cable and connect
wirelessly.
 6. Navigate to the router’s administrative utility. You may
need to refer to the router’s user manual, but in most
cases you can open an Internet browser and enter
http://192.168.1.1.
 7. Enter the information needed to connect the router to
the Internet. The exact information will depend on how
you are subscribing to an ISP.
 • If you are using DSL, then you may need to enter a specific
user name and password issued to you by the ISP.
 • If you have been asked to use a static IP address, then you
may need to enter the address issued to you by the ISP. 8.
Configure the router settings according to your needs.
 • For a wired router, change the default user name and
password.
 • For a wireless router, make sure that you update the SSID and
change the default user name and password.

9. If necessary, create an access control list for the router to


control which users or computers can access it.
10. Verify that you can connect to the Internet by opening a
browser and performing a search.
11. Configure the security settings in the administrative utility.
12. Connect additional computing devices to the router.
REFERENCES
 CompTIA® IT Fundamentals™
 Understanding Computer System Fundamentals, its Architecture,
Installation, and Basic Servicing Module
 Data Communication Local Area Network
End of the Lesson
Thank you!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy