Download presentation
Presentation is loading. Please wait.
Published byBaldwin Jesse Anderson Modified over 9 years ago
1
Chapter 8 Advanced Networks
2
8. Introduction This chapter focuses on advanced networking topics, including network design, network component upgrades, and e-mail server installations. Objectives Identify potential safety hazards Design a network based on the customer's needs. Determine the components for your customer's network. Implement the customer's network. Upgrade the customer's network. Describe installation, configuration, and management of a simple mail server. Describe preventive maintenance procedures for networks. Troubleshoot the network.
3
8.1 Potential Safety Hazards 8.1.1 Explain Copper Cable Hazards Copper cables are dangerous, small copper strands can puncture your skin or cut you. Hence, always wear proper clothing and safety glasses. The Cutting and Crimping tools used to repair copper cables can also be dangerous. Hence, read the documentation and practice it with scrap cables first. During installing network cables through ceilings and walls, wear clothing to protect yourself from unexpected or toxic materials. Most importantly, wear safety glasses.
4
8.1 Potential Safety Hazards 8.1.2 Explain Fiber-Optic Safety Specific tools and chemicals are used in fiber optic cables, hence must be handled safely. Chemicals The solvents and glues used with fiber optic are dangerous, hence use with extreme care. Tools The tools used to scribe glass and pinch cables in fiber opitic have sharp cutting surface and can produce shards of glass, hence used carefully. Harmful Light Protect your eyes from the harmful light that may be in the fiber-optic strands. As the light is a color that humans cannot see, it can damage your eyes before you can feel it.
5
8.1 Potential Safety Hazards 8.1.2 Explain Fiber-Optic Safety Glass Shards You should avoid glass shards that are produced during installation, from getting to your skin or eye. Further, use dark mat in the working surface that is resistant to chemicals, so that strands are visible. Never pick up fiber optic fragments with your finger, rather use Tape for it. Caution: Obtain proper training before you attempt to cut, strip, or splice fiber-optic cable.
6
8.2 Design a Network Based on the Customer's needs 8.2.1 Determine a Topology Understand the customer's need and determine the general layout of new network. Following network decision need to be discussed: Cable and wireless types Expandability Number and location of users The number of users and the estimated amount of future growth determines the initial physical and logical topology of the network. An inspection, called a site survey, should be done early in the project.
7
8.2 Design a Network Based on the Customer's needs 8.2.1 Determine a Topology You should create a checklist to record the needs of your customer: The location of users' computers The position of network equipment such as switches and routers The position of the servers A floor plan or blueprint is helpful to determine the physical layout of equipment and cables. If not available, you should make a drawing of where the network devices will be located using software like MS Visio.
8
8.2.2 Determine Protocols and Network Applications In the design of a network, you must determine the protocols that are going to be used. Some protocols are proprietary while some are open standard. Consider the following when selecting protocols: The TCP/IP suite of protocols is required for every device to connect to the Internet. This makes it a preferred protocol for networking. NetBEUI is a small, fast protocol that is useful in low security networks. It performs well in a small network that is not connected to the Internet. IPX/SPX is a protocol used with older versions of Novell Netware. However, newer versions of Novell Netware use TCP/IP instead of IPX/SPX. Apple Talk: Apple Macintosh networks have abandoned the AppleTalk protocol for the TCP/IP suite of protocols to ensure connectivity with other TCP/IP networks
9
8.2.2 Determine Protocols and Network Applications Network software applications use these protocols and ports to perform functions over the Internet or over a network. Example: Web Page Hosting, sending emails, transferring files.
10
8.2.2 Determine Protocols and Network Applications VoIP is a popular example of a network software application. It is a method to carry telephone calls over the data networks and Internet. It converts the analog signals of our voices into digital information that is transported in IP packets. VoIP can also use an existing IP network to provide access to the Public Switched Telephone Network (PSTN).
11
8.2.2 Determine Protocols and Network Applications Several ways to use VoIP: IP phone – A device that connects to an IP network using an RJ-45 Ethernet connector or a wireless connection. Analog Telephone Adapter (ATA) – A device that connects standard analog devices, such as telephones, FAX machines, to an IP network. IP phone software – This application connects by using a microphone, speakers, and a sound card to emulate the IP phone functionality.
12
8.3 Determine Customer's Network Components 8.3.1 Select Cable Types Cable Types Select the cable type that is the most beneficial and cost effective for the users and services. The size of the network determines the type of network cable that will be used. Most networks today are wired using one or more types of twisted-pair copper cable: CAT 5 and CAT 5e 100BASE-TX and 1000BASE-T 330 feet (100m) CAT 6 and CAT 6A 10GBASE-T 330 feet (100m) Have central divider Cables that are installed inside the walls and ceilings of buildings must be plenum rated.
13
8.3 Determine Customer's Network Components Wireless Cost A wireless solution may be possible in places where cables cannot be installed. Example: an older, historic building. When designing a network, cost is a consideration. Installing cable is expensive but is a one-time expense. Security A wired network is usually more secure than a wireless network. It is easier to gain unauthorized access to the signals on a wireless network than the signals on a wired network. Design for the Future Many organizations install the highest grade of cable that is available to ensures that the networks are prepared for additional bandwidth requirements in the future.
14
8.3 Determine Customer's Network Components 8.3.2 Select an ISP Connection Type There are three main considerations for an Internet connection: Speed Reliability Availability POTS - extremely slow - available wherever there is telephone. - modem is used to transmit and receive data. - method is called Dial-up.
15
8.3 Determine Customer's Network Components 8.3.2 Select an ISP Connection Type ISDN - comparatively, faster connection times and speeds. - very reliable as uses POTS lines. - available where telephone company support digital signaling. DSL - multiple signals share a single telephone line. - higher speeds than ISDN. - supports high-bandwidth applications. - uses same copper telephone wires used in our home - not available everywhere. - works better the closer to the provider's CO. - upload is comparatively less.
16
8.3 Determine Customer's Network Components 8.3.2 Select an ISP Connection Type Cable - uses coaxial cables used to carry cable television. - high speeds and always-on connection - alternative to DSL service. Satellite - used in rural sites - high speeds and always-on connection - satellite dish is used to transmit and receive signals - cost is extremely high. - heavy storm can degrade or even disconnect the connection
17
8.3 Determine Customer's Network Components 8.3.2 Select an ISP Connection Type Cellular - wireless internet service. - generally offered by cellular companies - bandwidth depend on type of services used - Example: GPRS, EDGE. - not available everywhere
18
8.3 Determine Customer's Network Components 8.3.3 Select Network Cards Before selecting NIC, one should research about Speed, Form Factor, and Capabilities that the card offers. Ensure, speed and capabilities of the hub or switch. Ethernet NICs may be backward-compatible: If you have a 10/100 Mbps NIC and a hub that is only 10 Mbps, the NIC will operate at 10 Mbps. If you have a 10/100/1000 Mbps NIC and a switch that is only operating at 100 Mbps, the NIC will operate at 100 Mbps. If you have gigabit switch, it is recommended to use gigabit NIC to match speeds.
19
8.3 Determine Customer's Network Components Wireless NICs Wireless NICs are available in various formats and capabilities. 802.11b NICs can be used on 802.11g networks. 802.11a can be used only on a network that supports 802.11a. 802.11b, and 802.11g NICs can be used on 802.11n networks.
20
8.3 Determine Customer's Network Components 8.3.4 Selecting Network Device Hubs A hub is used to share data between multiple devices on a section of the network. A hub can extend the reach of a network as it regenerates the data that passes through it. Hubs do not segment network traffic, so they decrease the amount of available bandwidth to any device. As it cannot filter data, a lot of unnecessary traffic constantly moves between all the devices connected to it.
21
8.3 Determine Customer's Network Components 8.3.4 Selecting Network Device Switches Switches have replaced hubs as the central point of connectivity. Switches filter and segment network traffic by sending data only to the device to which it is sent. This provides higher dedicated bandwidth to each device on the network. Switch maintains a Switching Table that contains a list of all MAC addresses on the network.
22
8.3 Determine Customer's Network Components 8.3.4 Selecting Network Device Routers Routers connect networks together. On a corporate network, one router port connects to the WAN connection and the other ports connect to the corporate LANs. Hence, Router acts as a gateway. The wireless router serves as a home gateway, wireless access point, and a switch (Multi- function device). ISP Equipment When subscribing to an ISP, you should find out what type of equipment is available so that you can select the most appropriate device. Home users may select to purchase equipment from the ISP.
23
8.4 Implement the Customer's Network
24
8.4.1 Network Installation Steps 1. Perform cable pull to install the cable in ceilings and behind walls. Label ends of every cable. 2. After cable installation, use a cable tester to make sure that there are no shorts or interference. 3. After installing network interfaces on desktops, laptops, etc. configure the software and IP address information. 4. Install switches and routers in a secured, centralized location. 5. Install an Ethernet patch cable from the wall connection to each network device. Also check link lights on devices. 6. Finally, test the network for connectivity using commands like ipconfig/all and ping (Gateway and other nodes).
25
8.4 Implement the Customer's Network 8.4.2 Configure Customer's Internet and Network Resources Temporary Internet Files Web browsers, downloads many files while you visit a website in Temporary Internet Files folder. Most of these files contain images and contents of the website. These files are to open those websites quickly the next time you access it. These folder should be deleted occasionally.
26
8.4 Implement the Customer's Network 8.4.2 Configure Customer's Internet and Network Resources Default Browser You can select which browser windows uses by default. To check, go to "run" and enter a website address. You can select the particular browser to be default from Settings. File Sharing Users can share resources over the network. You can share a single file, specific folders, or an entire drive. In XP: Right click folder and select >> Sharing and Security >> Share this folder In Vista: Right click folder and select >> Sharing >> Add a user and select Share
27
8.4 Implement the Customer's Network 8.4.2 Configure Customer's Internet and Network Resources File permissions: Read - to view files and subfolders, data in files, run programs. Change - all permissions of Read, along with adding files, changing data and deleting. Full Control - all permissions of Read and Change. Also can change permissions on the files and folder. Printer Sharing To share printer in XP: Start >> Control Panel >> Printer and Faxes Right-click printer icon >> select sharing >> click Share this printer >> ok To access printer in xp: Start >> Control Panel >> Printer and Faxes Click File >> Add Printer >> use Add Printer wizard to find and install
28
8.5 Upgrade the Customer's Network 8.5.1 Install and Configure a wireless NIC Remove the Computer case cover. Install the wireless NIC into an available PCI slot or PCI express slot. After the wireless NIC is installed, configure the device drivers and enter the IP address information. Static IP addresses requires to be changed when computer is connected to different network. Hence, enable DHCP to receive IP address.
29
8.5 Upgrade the Customer's Network 8.5.2 Install and Configure a Wireless Router Installing and Configuring of Linksys WRT300N Router will be done on Workshop classes in Packet Tracer. There are several configurations that can help secure and increase the speed of a wireless network. 802.11 protocol selection If all wireless devices connect with the same 802.11 standard, maximum speeds can be obtained for that standard. Static IP address configuration Static IP address assignments give better protection against network attacks than DHCP. For example, static IP address assignments allow firewalls to be configured to permit specific traffic or connections between specific devices.
30
8.5 Upgrade the Customer's Network 8.5.2 Install and Configure a Wireless Router Service Set Identifier (SSID) The SSID is the name of the wireless network. Firmware update Firmware updates can improve performance, fix bugs, or update security features. It can be downloaded from the manufacturer’s website. The SSID broadcast allows other devices to automatically discover the name of the wireless network. It can be disabled for security.
31
8.5 Upgrade the Customer's Network 8.5.3 Test a Connection Network Connection Go to Run >> Type "ncpa.cpl" >> enter Double-click Wireless Network Connection to view status.
32
8.5 Upgrade the Customer's Network 8.5.3 Test a Connection Ipconfig It is a CLI tool used to verify that the connection has a valid IP address.
33
8.5 Upgrade the Customer's Network 8.5.3 Test a Connection Ping It is a CLI tool used to test connectivity between devices. You can test your own connection by pinging your computer.
34
8.5 Upgrade the Customer's Network Tracert: It is a CLI tool used to trace the route that packets take from your computer to a destination address. Net: It is used to manage network computers, servers, and resources like drives and printers. It uses the NetBIOS protocol in Windows.
35
8.5 Upgrade the Customer's Network Nslookup: It is a CLI tool for testing and troubleshooting DNS servers. It queries the DNS server to discover IP addresses or host names.
36
8.6 Describe Installation, Configuration, and Management of Simple Mail Server An e-mail system uses e-mail client software on the users' devices and e-mail server software on one or more e-mail servers. Clients read e-mail from the e-mail server using one of two protocols: Post Office Protocol (POP) Internet Message Access Protocol (IMAP) Clients send e-mail to an e-mail server, and e-mail servers forward e-mail to each other, using Simple Mail Transfer Protocol (SMTP).
37
8.6 Describe Installation, Configuration, and Management of Simple Mail Server
38
You need to know how to configure a client computer to accept the correct incoming mail format.
39
8.6 Describe Installation, Configuration, and Management of Simple Mail Server Email Server An e-mail server is a computer that can send and receive e-mail on behalf of e-mail clients. Microsoft Exchange Sendmail Eudora Internet Mail Server (EIMS) Before you install Exchange, be prepared with the proper equipment and information: Fully functional and reliable DNS deployment Active Directory domain At least one Global Catalog Windows 2000 or higher native domain functionality Exchange server software Windows server support tools Schema master server
40
8.7 Preventive Maintenance for Networks Preventive maintenance is just as important for the network as it is for the computers on a network. This will help you to prevent network downtime and equipment failures. You much check following in a routinely manner: condition of cables network devices servers labeling of cables
41
8.8 Troubleshoot the Network
42
8.8.1 Identify Common Problems and Solutions
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.