Download presentation
Presentation is loading. Please wait.
Published byGeorgina Bennett Modified over 9 years ago
1
Kentucky 2010 CTE Summer Program BASIC COMPUTER “HOME” NETWORKING – Teaching and Troubleshooting Elaine Horn, elaine@treca.orgelaine@treca.org Cisco Academy Main Contact
2
BASIC COMPUTER “HOME” NETWORKING – Teaching and Troubleshooting Session length: 90 minutes Target audience: Anyone who wants to learn about home networking Session description: Our classrooms and homes are no longer complete without an Internet connection. This session will discuss general networking concepts that could be taught in any class. It will equip teachers with skills to troubleshoot simple Internet problems. Terminology needed to understand buying home networking gear including wireless gear will be defined and activities for teaching computer networking will also be shared.
3
Need for… Internet Service Provider (ISP) Company that provides the connections and support to access the Internet. Can also provide additional services such as Email and web hosting. No one gets on the Internet without a host computer, and no one gets on the Internet without going through an ISP. Teach your students to be wise consumers! Company that provides the connections and support to access the Internet. Can also provide additional services such as Email and web hosting. No one gets on the Internet without a host computer, and no one gets on the Internet without going through an ISP. Teach your students to be wise consumers!
4
HOME INTERNET CONNECTIONS Choices to be made - First decide on type of network technology used to make connections to the “Internet Cloud”
5
HOME INTERNET CONNECTIONS ISP Choices http://isp1.us/state/kentucky/ Security, storage and email accounts 24/7 support, email, web space
6
HOME INTERNET CONNECTIONS ISP Choices http://isp1.us/state/kentucky/ Speed = 12Mbps, Speed, Photo Center, Games Speed = 7Mbps +, Security, Email
7
HOME INTERNET CONNECTIONS ISP Choices http://isp1.us/find/ Costs can vary greatly from company to company!
8
Considerations when choosing an ISP
9
Services: NEED FOR SPEED Reliability Security Email Accounts Storage Space Support
10
Need For Speed
11
Prices Dependent On Services
12
SPEED TEST terms! Download Speed: The speed at which data is sent from the testing server to your computer. Upload Speed: The speed at which data is sent from your computer to the testing server. Latency: The time it takes for data to be sent from your computer to the testing server and back (the "round trip time"). Jitter: The variability in the delay between your computer and the testing server.
13
SPEED TEST! Dslreports.com Speed Tests
14
http://reviews.cnet.c om/internet-speed- test/
15
SPEED TEST! http://video.about.com/compnetworking/Cable- Versus-DSL.htm http://video.about.com/compnetworking/Cable- Versus-DSL.htm
16
HOME INTERNET CONNECTIONS Equipment to be purchased
18
Modems: – use modems to send and receive information over telephone or cable lines Network cables (Ethernet): – connect computers to each other and to other related hardware, such as hubs and routers – for normal connections, straight- through cables needed – RJ45 end Definitions
19
Network adapters – also called network interface cards, or NICs – connect computers to a network so that they can communicate – network adapter can be connected to the USB port on your computer or installed inside – support different speeds – Ethernet – 10 Mbps Fast Ethernet - 100 Mbps Gigabit Ethernet peak performance up to 1000 Mbps – in new computers, NICs are pre-installed by the manufacturer and show a speed rating which suggests the general performance of the unit Definitions RJ45 vs RJ11
20
Definitions NETWORK ADAPTERS!
21
Access Point – connects wireless clients to a wired network – sends out wireless signals – If you want to connect your computers wirelessly and you have a router that provides wireless capability, you don't need an access point – must plug an access point into a router or a modem with a built-in router or buy an ISR Hubs/Switches – connect two or more computers to an Ethernet network. – a switch costs a little more than a hub, but it speeds up the transfer rate of information Router – enable computers to communicate and they can pass information between two networks—such as between your home network and the Internet – capability to direct network traffic is what gives the router its name – can be wired or wireless – typically provide built-in security, such as a firewall Definitions
22
Integrated Services Router (ISR) - Provide functionality of a switch, router, wireless access point in one device HOME INTERNET CONNECTIONS Equipment to be purchased -
26
Need for IP DHCP Server – hands out IP address
28
Services - Applications
31
Check the physical layer Troubleshooting
32
Check the physical layer Troubleshooting
33
http://video.about.com/compnetworking/Wir eless-Network-Setup.htm http://video.about.com/compnetworking/Wir eless-Network-Setup.htm Video – Home Connections - Wireless
34
802.11a – 5 GHz RF Spectrum transfers data at a maximum rate of 54 megabits per second (Mbps). Downloading a 10 megabyte (MB) photo from the Internet under optimal conditions takes about 1.5 seconds. 802.11b – 2.4 GHz Spectrum transfers data at a maximum rate of 11 Mbps. Downloading a 10 megabyte (MB) photo from the Internet under optimal conditions takes about 7 seconds. 802.11g – 2.4 GHz Spectrum transfers data at a maximum rate of 54 Mbps. Downloading a 10 megabyte (MB) photo from the Internet under optimal conditions takes about 1.5 seconds. 802.11n – NEWEST - 2.4 GHz (backwards compatible with g and b) depending upon the number of data streams the hardware supports, 802.11n can theoretically transmit data at up to 150 Mbps, 300 Mbps, 450 Mbps, or 600 Mbps. Wireless Standards
35
Note The transfer times listed are under ideal conditions. They aren't necessarily achievable under normal circumstances because of differences in hardware, web servers, network traffic conditions, and so on. Wireless is often slower than a wired connection. Wireless can be affected by interference from things such as walls, large metal objects, and pipes. Also, many cordless phones and microwave ovens can interfere with wireless networks when they're in use. Wireless networks are typically about half as fast as their rated speed under all but ideal conditions. Wireless Caution
36
Wireless Standards
37
Wireless Security
38
Service Set Identifier (SSID) – – used to tell wireless devices which WLAN they belong to and with which other devices they communicate – case-sensitive – do not use defaults – do not broadcast Wireless Security
43
The program can come in handy if you are using a WLAN and you don't have signal or it is not working properly. NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a, 802.11g and 802.11n. Here are some key features of "NetStumbler”: Verify that your network is set up the way you intended. Find locations with poor coverage in your WLAN. Detect other networks that might be causing interference with your network. Detect unauthorized "rogue" access points in your workplace. Help aim directional antennas for long-haul WLAN links. Use it recreationally for WarDriving.
44
Since there are no distinct boundaries on a wireless network, and all traffic is transmitted through the air, it is easy for an attacker to intercept, or sniff the wireless frames. Encryption is the process of transforming data so that even if it is intercepted it is unusable. SAY NO TO - Wired Equivalency Protocol (WEP) encryption USE Wi-Fi Protected Access (WPA) encryption!
45
Secure the ACCESS POINT
46
TROUBLESHOOTING! Sample Diagrams of Home Networks
47
Effective network security comes from a combination of products and services. SECURE YOUR PC!
48
Keep PC Firewall ON! Run an AntiVirus software! Run Spyware/Malware software! Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses. Software is considered to be malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, crimeware, most rootkits, and other malicious and unwanted software. Spyware, software that secretly gathers information about a person or organization. Any malicious software that is designed to take partial or full control of a computer's operation without the knowledge of its user.
49
TROUBLESHOOTING!
51
A number of software utility programs are available that can help identify network problems. Most of these utilities are provided by the operating system as command line interface (CLI) commands. The syntax for the commands may vary between operating systems. Some of the available utilities include: – ipconfig - Displays IP configuration information – ping - Tests connections to other IP hosts – tracert - Displays route taken to destination – netstat - Displays network connections – nslookup - Directly queries the name server for information on a destination domain TROUBLESHOOTING!
52
ipconfig - Displays IP configuration information IP addresses of 169.254.x.y means that your computer could not reach your DHCP servers to be assigned an address IP address of 127.x.x.x is a loopback address TROUBLESHOOTING!
54
Sample Diagrams
55
Need an ISP (Internet Service Provider) THE CLOUD!
56
Kentucky 2010 CTE Summer Program BASIC COMPUTER “HOME” NETWORKING – Teaching and Troubleshooting Elaine Horn, elaine@treca.orgelaine@treca.org Cisco Academy Main Contact
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.