Download presentation
Presentation is loading. Please wait.
Published byTamsyn Spencer Modified over 9 years ago
1
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 15: Advanced Networks
2
Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Objectives Identify potential safety hazards and implement proper safety procedures related to networks. Design a network based on the customer’s needs. Determine the components for your customer’s network. Implement the customer’s network. Upgrade the customer’s network. Describe the installation, configuration, and management of a simple mail server. Describe preventive maintenance procedures for networks. Troubleshoot the network.
3
Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Critical Concepts What is this chapter about and why is it important? A computer technician can no longer just be responsible for computers and the things that are connected to them. Instead, a technician today must place that computer on a wired or wireless network and ensure that it is able to participate in that network. Additionally, devices such as a printer or scanner, and individual files and folders must be made available to other users or other devices on the network. A technician now must understand the basics of a TCP/IP-based network and Internet connectivity. A technician must be able to ensure that each device functions, is secure, and communicates with other devices and sites in a network environment. It is important for an instructor to fully prepare students to work as technicians in a network environment. This chapter covers safety hazards, network components that are included in a network environment, and Internet connectivity options. The chapter takes the basic networking concepts to the next level of implementation with design and preventive maintenance. Troubleshooting common network problems are also included.
4
Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Activities What activities are associated with this chapter? 15.2.2 Worksheet: Protocols 15.3.2 Worksheet: ISP Connection Types 15.4.2 Lab: Configure Browser Settings in Windows XP 15.4.2 Optional Lab: Configure Browser Settings in Windows Vista 15.4.2 Lab: Share a Folder, Share a Printer, and Set Share Permissions in Windows XP 15.4.2 Optional Lab: Share a Folder, Share a Printer, and Set Share Permissions in Windows Vista 15.5.1 Lab: Install a Wireless NIC in Windows XP 15.5.1 Optional Lab: Install a Wireless NIC in Windows Vista 15.5.1 Packet Tracer Activity: Install a Wireless NIC 15.5.2 Lab: Configure a Wireless Router
5
Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Activities (continued) What activities are associated with this chapter? 15.5.3 Lab: Test the Wireless NIC in Windows XP 15.5.3 Optional Lab: Test the Wireless NIC in Windows Vista 15.5.3 Packet Tracer Activity: Test a Wireless Connection 15.8.3 Lab: Fix a Network Problem 15.8.3 Lab: Remote Technician: Fix a Network Problem 15.8.3 Lab: Troubleshooting Network Problems in Windows XP 15.8.3 Optional Lab: Troubleshooting Network Problems in Windows Vista Chapter 15 Quiz
6
Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: New Terms What terms are introduced in this chapter? backward compatible15.3.3 Internet Service Provider (ISP)15.3.2 Main Distribution Facility (MDF)15.3.1 media15.5 Network Basic Input/Output System (NetBIOS)15.2.2 network cable15.1.2 network file services15.4.2 network topology15.2.1 networking media15.5 NSLOOKUP15.5.3
7
Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: New Terms (continued) What terms are introduced in this chapter? server15.6 site survey15.2.1 topology15.2
8
Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Changes What has changed from the previous version (4.0) of ITEPC? Page 15.2.2 Determine protocols and network applications Basic VoIP Page 15.3.1 Select cable types LAN cabling vs. Wireless Page 15.3.4 Select the network device Routers Access points Page 15.4.1 Install and test the customer’s network Ipconfig command Page 15.5.1 Install and configure a wireless NIC Wireless NIC installation DHCP settings Static IP
9
Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 15.5.2 Install and configure a wireless router Wireless 802.11 Protocol Selection SSID Disable DHCP Use static IP Disable SSID broadcast Update firmware Page 15.5.3 Test a connection Ping Command Tracert Command Net Command Nslookup Command
10
Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 15.8.1 Review the troubleshooting process Identify the Problem Establish a Theory of Probable Causes Determine an Exact Cause Implement a Solution Verify Solution and Full System Functionality Document Findings
11
Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 15.8.2 Identify common problems and solutions TCP/IP settings Gateway Subnet mask DNS DHCP NAT Characteristics of TCP/IP Loopback address APIPA Mail protocol settings SMTP IMAP POP
12
Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Changes (continued) What has changed from the previous version (4.0) of ITEPC? Page 15.8.2 Identify common problems and solutions (continued) FTP settings Ports IP addresses Exceptions Programs Tools (Use and interpret results.) Ping Nslookup Telnet Secure connection protocols SSH HTTPS
13
Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Classroom Management Ensure that the students are proficient in the manual assignment of an IP address, the subnet mask, and the default gateway. Ensure that the students can troubleshoot wiring issues and IP addressing issues. Ensure that the students can connect to a wireless network and troubleshoot wireless connectivity issues. Ensure that the students can share and access a device and a folder across a network with the appropriate permissions. Students should also be able to troubleshoot such a connection. Ensure that the student can build a small wired and wireless network.
14
Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Teaching Analogies Leaving the default password and SSID on a wireless network is like putting a sign in front of your house that says “The front door is unlocked.”
15
Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential What are some differences between WPA and WEP? Why is it important to have network wiring skills? How can the automatic assigning of IP addresses help or cause problems on a network? When should the following command line tools be used? ping net nslookup ipconfig tracert Chapter 15: Suggested Class Discussions
16
Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Best Practices Have the students create problems for each other to solve using Remote Desktop and Remote Assistance. If the school supports its own phone system, configure several phones in the classroom so that students can role-play the troubleshooting of network problems over the phone.
17
Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 15: Outside Reading Panduit http://www.panduit.com/
18
Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential
19
Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.