Start your free trial. Glossary —Consult the comprehensive Glossary with terms. How To —Look for this icon to studythe steps you need to learn to perform certain tasks. Which part of making cables did you find the most difficult? Inserting the cables in the proper order into the RJ connector is usually the hardest part. Why do you have to learn how to make a cable if you can easily buy pre-made cables? It may be too time consuming or costly to replace and it is often simpler to merely re-cable each end if necessary.
Windows provides a number of ways to view and work with your NICs. The wireless NIC was disabled initially. You will explore different ways to extract information about these NICs and how to activate and deactivate them. Note: This lab was performed using a PC running on the Windows 7 operating system. You should be able to perform the lab with one of the other Windows operating systems listed; however, menu selections and screens may vary. Step 1: Use the Network and Sharing Center.
In the left pane, click the Change adapter settings link. Step 2: Work with your wireless NIC. Select the Wireless Network Connection option and right-click it to bring up a drop-down list. If your wireless NIC is disabled, you will have an option to Enable it. If your NIC was already enabled, then Disable would be the first option on this drop-down menu. If your Wireless Network Connection is currently disabled, then click Enable.
Right-click the Wireless Network Connection, and then click Status. The Wireless Network Connection Status window displays where you can view information about your wireless connection.
Click Details to display the Network Connection Details window. Reasons may include the server is down for maintenance or is experiencing a problem. When you have reviewed the network connection details, click Close. Close the command window and the Network Connection Details windows. This should bring you back to the Wireless Network Connection Status window.
Click Wireless Properties. In the Wireless Network Properties window, click the Security tab. The type of security the connected wireless router has implemented displays. Click the Show characters check box to display the actual Network security key, instead of the hidden characters, and then click OK.
A pop-up window should appear at the bottom right corner of your desktop that displays your current connections, along with a list of SSIDs that are in range of the wireless NIC of your PC. If a scrollbar appears on the right side of this window, you can use it to display additional SSIDs. You can click the Hide characters check box to prevent people from seeing what you type in the Security key field. On the Network Connections window, select and right-click the Local Area Connection option to display the drop-down list.
If the NIC is disabled, enable it, and then click the Status option. Many wireless routers have a small 4-port Ethernet switch built-in. You can connect to one of the ports using a straight-through Ethernet patch cable. The Local Area Connection Status window will open. This window displays information about your wired connection to the LAN.
Click Details… to view the address information for your LAN connection. Find your Local Area Connection information and compare this with the information displayed in the Network Connection Details window. Close all windows on your desktop. Step 1: Use the Wireless Network icon. Click the Open Network and Sharing Center link. Note: This is a shortcut way to bring up this window.
In the left pane, click the Change adapter settings link to display the Network Connections window. Examine your system tray.
The Wireless Network Connection icon should be replaced by the Wired Network icon, which indicates that you are using your wired NIC for network connectivity. Step 2: Use the Wired Network icon. Click the Wired Network icon. Notice that the Wireless SSIDs are no longer displayed in this pop-up window, but you still have the ability to get to the Network and Sharing Center window from here. The Wireless Network icon should replace the Wired Network icon in your system tray.
Step 3: Identify the Network Problem icon. The system tray now displays the Network Disabled icon, which indicates that network connectivity has been disabled.
You can click this icon to return to the Network and Sharing Center window examine the network diagram at the top. You can click the red X to have the PC troubleshoot the problem with the network connection.
Troubleshooting attempts to resolve the network issue for you. If troubleshooting did not enable one of your NICs, then you should do this manually to restore the network connectivity of your PC. Note: If a network adapter is enabled and the NIC is unable to establish network connectivity, then the Network Problem icon appears in the system tray.
If this icon appears, you can troubleshoot this issue just like you did in Step 3c. One example of this would be if the PC is being used as a Proxy Server. Objectives Connect devices using wired and wireless media. Your small business is moving to a new location! Your building is brand new, and you must come up with a physical topology so that network port installation can begin. Your instructor will provide you with a blueprint created for this activity.
The area on the blueprint, indicated by Number 1, is the reception area and the area numbered RR is the restroom area. All rooms are within Category 6 UTP specifications meters , so you have no concerns about hard-wiring the building to code. Do not go into excessive detail on your design. Just use the content from the chapter to be able to justify your decisions to the class.
Its purpose is to encourage students to reflect on their comprehension of the data link layer from a physical perspective — wired and wireless connectivity. A facilitated discussion should be initiated as a result of this activity. Where would you locate your network main distribution facility, while keeping security in mind? It is situated away from plumbing, which could interfere with copper quality. How many intermediary devices you would use and where would you place them?
One router for connectivity to the ISP could be placed in Room 11, as well. One or two wireless ISRs could be placed in the diagram, possibly in Room 7 or 12 for wireless access throughout the physical space.
The central network room main distribution facility would need more than one network port as it serves internal LAN connections and external WAN connections — for the WAN, fiber optics would probably be run for ISP connectivity. What types of end devices you would use wired, wireless, laptops, desktops, tablets, etc.
Security and scalability are considered in this model. Objectives Describe the impact of ARP requests on network and host performance. A lot of our network communication is in the form of email, messaging text or instant , video contact, and social media postings.
For this activity, choose one of the following types of network communications and answer the questions in the Reflection section.
Its purpose is to encourage students to reflect on their perceptions of source and destination host identification as compared to social media. Is there a procedure you must follow to register others and yourself so that you can form a communications account? Why do you think that a procedure is needed?
You are doing this in order to have contact with your friends and be able to communicate directly. You do not want to have an intermediary person relay messages between you and your friends in your network.
By registering yourself and your friends to your contact list, you are building your own social communication network. During the registration process, you as a person with a civil name are assigned a service-specific user identifier that identifies you in the particular communication service. When you add your friends to your contact list, you are looking for their service-specific user identifiers.
When you contact the person, you select their civil name in your contact list and the system contacts the user using the associated user identifier. A single person may have different user identifiers depending on how many social networks he or she subscribes to.
In communication networks, there is a similar process. Although a network node for example, a PC is a single entity, it may have several network interface cards NICs. How do you initiate contact with the person or people with whom you wish to communicate? However, there will always be common steps: First, decide within which network your peer is reachable. However, there is no doubt who the intended recipient is. How do you ensure that your conversations are received only by those with whom you wish to communicate?
This is the purpose of using a contact list that associates individual persons with their unique user identifiers. If we do not know the user identifier of the recipient, we have to send the message to everyone or not at all.
In IP networks, this is accomplished by the resolution of the recipient or next-hop IP address into its unique Layer 2 address, using ARP or a similar mechanism. It is then up to the network technology to make sure that the message is sent only to the intended recipient.
Some technologies do not allow messages to be sent in a way that prevents third parties from seeing the message. For example, in Ethernet deployments using hubs or WiFi, the transmission is always visible to all nodes in the network. Only the intended recipient will process the message, but others can see it. This is similar to message boards on LinkedIn or Facebook where, although intended for a single recipient, many or all other users can see the messages.
The frame composition is dependent on the media access type. This is typical for a LAN environment. When learning about Layer 2 concepts, it is helpful to analyze frame header information. In the first part of this lab, you will review the fields contained in an Ethernet II frame.
In Part 2, you will use Wireshark to capture and analyze Ethernet II frame header fields for local and remote traffic. It also assumes that Wireshark has been pre-installed on the PC. The screenshots in this lab were taken from Wireshark v1. A Wireshark capture will be used to examine the contents in those fields. This PC host IP address is Step 3: Examine Ethernet frames in a Wireshark capture. The Wireshark capture below shows the packets generated by a ping being issued from a PC host to its default gateway.
The session begins with an ARP query for the MAC address of the gateway router, followed by four ping requests and replies. The following table takes the first frame in the Wireshark capture and displays the data in the Ethernet II header fields.
Destination Address Broadcast Layer 2 addresses for the frame. Each address is 48 bits ff:ff:ff:ff:ff:ff long, or 6 octets, expressed as 12 hexadecimal digits, 0- 9,A-F. The destination address may be a broadcast, which contains all ones, or a unicast.
The source address is always unicast. Frame Type 0x For Ethernet II frames, this field contains a hexadecimal value that is used to indicate the type of upper-layer protocol in the data field.
There are numerous upper-layer protocols supported by Ethernet II. The data field is between 46 — 1, bytes. The value is computed by the sending machine, encompassing frame addresses, type, and data field. It is verified by the receiver. What is significant about the contents of the destination address field? The host with the IP address of What is the MAC address of the source in the first frame? You will then examine the information that is contained in the frame header fields.
Open a command prompt window and issue the ipconfig command. Open Wireshark. On the Wireshark: Capture Interfaces window, select the interface to start traffic capturing by clicking the appropriate check box, and then click Start. If you are uncertain of what interface to check, click Details for more information about each interface listed. Observe the traffic that appears in the Packet List window. You can use the filter in Wireshark to block visibility of unwanted traffic.
The filter does not block the capture of unwanted data; it only filters what to display on the screen. For now, only ICMP traffic is to be displayed.
In the Wireshark Filter box, type icmp. The box should turn green if you typed the filter correctly. If the box is green, click Apply to apply the filter. Step 4: From the command prompt window, ping the default gateway of your PC.
From the command window, ping the default gateway using the IP address that you recorded in Step 1. Step 5: Stop capturing traffic on the NIC. Click the Stop Capture icon to stop capturing traffic.
Step 6: Examine the first Echo ping request in Wireshark. The Wireshark main window is divided into three sections: the Packet List pane top , the Packet Details pane middle , and the Packet Bytes pane bottom. If you selected the correct interface for packet capturing in Step 3, Wireshark should display the ICMP information in the Packet List pane of Wireshark, similar to the following example.
In the Packet List pane top section , click the first frame listed. You should see Echo ping request under the Info heading. This should highlight the line blue. Examine the first line in the Packet Details pane middle section. This line displays the length of the frame; 74 bytes in this example. The source and destination MAC addresses are also displayed. Notice that the plus sign changes to a minus - sign. What type of frame is displayed?
The last two lines displayed in the middle section provide information about the data field of the frame. Notice that the data contains the source and destination IPv4 address information. What is the source IP address?
You can click any line in the middle section to highlight that part of the frame hex and ASCII in the Packet Bytes pane bottom section. Click the Internet Control Message Protocol line in the middle section and examine what is highlighted in the Packet Bytes pane.
Click the next frame in the top section and examine an Echo reply frame. Notice that the source and destination MAC addresses have reversed, because this frame was sent from the default gateway router as a reply to the first ping. What device and MAC address is displayed as the destination address? Step 7: Restart packet capture in Wireshark. Click the Start Capture icon to start a new Wireshark capture.
You will receive a popup window asking if you would like to save the previous captured packets to a file before starting a new capture. Step 8: In the command prompt window, ping www. Step 9: Stop capturing packets.
Step Examine the new data in the packet list pane of Wireshark. In the first echo ping request frame, what are the source and destination MAC addresses? What are the source and destination IP addresses contained in the data field of the frame? The only address that changed is the destination IP address. This process continues from router to router until the packet reaches its destination IP address. Reflection Wireshark does not display the preamble field of a frame header.
What does the preamble contain? This address is assigned by the manufacturer and stored in the firmware of the NIC. This lab will explore and analyze the components that make up a MAC address, and how you can find this information on a switch and a PC. You will cable the equipment as shown in the topology.
You will configure the switch and PC to match the addressing table. You will verify your configurations by testing for network connectivity. After the devices have been configured and network connectivity has been verified, you will use various commands to retrieve information from the devices to answer questions about your network equipment.
If you are unsure, ask your instructor. For device name and address information, refer to the Topology and Addressing Table. Step 1: Cable the network as shown in the topology. Attach the devices shown in the topology and cable as necessary. Power on all the devices in the topology.
From the command prompt on PC-A, ping the switch address. Were the pings successful? The switch has not been configured yet. Step 3: Configure basic settings for the switch. In this step, you will configure the device name and the IP address, and disable DNS lookup on the switch. Console into the switch and enter global configuration mode. Switch config b. Assign a hostname to the switch based on the Addressing Table. Switch config hostname S1 c. Disable DNS lookup.
S1 config no ip domain-lookup d. S1 config interface vlan 1 S1 config-if ip address Ping the switch from PC-A. Ethernet MAC addresses are bits long. The editors will have a look at it as soon as possible. Delete template? Cancel Delete. Cancel Overwrite Save. Don't wait! Try Yumpu. This book begins by covering various ways of installing Windows 10, followed by instructions on post-installation tasks.
You will learn about the deployment of Windows 10 in Enterprise and also see how to configure networking in Windows As you progress through the chapters, you will be able to set up remote management in Windows 10 and learn more about Windows update usage, behavior, and settings. You will also gain insights that will help you monitor and manage data recovery and explore how to configure authentication, authorization, and advanced management tools in Windows By the end of this book, you will be equipped with enough knowledge to take the exam and explore different study methods to improve your chances of passing the exam with ease.
What you will learn Discover various ways of installing Windows 10 Understand how to configure devices and device drivers Configure and support IPv4 and IPv6 network settings Troubleshoot storage and removable device issues Get to grips with data access and usage Explore the advanced management tools available in Windows 10 Who this book is for This book is for IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services and are preparing to clear the Windows exam.
Popular Science gives our readers the information and tools to improve their technology and their world. The core belief that Popular Science and our readers share: The future is going to be better, and science and technology are the driving forces that will help make it better. For more than 20 years, Network World has been the premier provider of information, intelligence and insight for network and IT executives responsible for the digital nervous systems of large organizations.
Surveys Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Contests and Drawings Occasionally, we may sponsor a contest or drawing. Newsletters If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information ciscopress.
Service Announcements On rare occasions it is necessary to send out a strictly service related announcement. Customer Service We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.
Other Collection and Use of Information Application and System Logs Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Web Analytics Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. Cookies and Related Technologies This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising.
Security Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure. Children This site is not directed to children under the age of Marketing Pearson may send or direct marketing communications to users, provided that Pearson will not use personal information collected or processed as a K school service provider for the purpose of directed or targeted advertising. Such marketing is consistent with applicable law and Pearson's legal obligations.
Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing. Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn. Sale of Personal Information Pearson does not rent or sell personal information in exchange for any payment of money. Supplemental Privacy Statement for California Residents California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice.
Sharing and Disclosure Pearson may disclose personal information, as follows: As required by law. Links This web site contains links to other sites. Requests and Contact Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information. Last Update: November 17, Email Address. About Affiliates Cisco Systems, Inc.
0コメント