A Guide to Managing and Maintaining your PC

  • Slides: 65
Download presentation
A+ Guide to Managing and Maintaining your PC, 6 e Chapter 10…. . PCs

A+ Guide to Managing and Maintaining your PC, 6 e Chapter 10…. . PCs on the Internet

Objectives • Learn about the TCP/IP suite of protocols • Learn how to connect

Objectives • Learn about the TCP/IP suite of protocols • Learn how to connect to the Internet using cable modem, DSL, and dial-up connections and how to share those connections • Learn how to use a router to enhance and secure a network connection to the Internet • Learn about supporting common Internet clients such as Web browsers, e-mail clients, file transfer software, Internet telephone, and Windows XP Remote Desktop A+ Guide to Managing and Maintaining your PC, 6 e 2

Introduction • Topics to cover – – – How the TCP/IP suite of protocols

Introduction • Topics to cover – – – How the TCP/IP suite of protocols is used Creating and troubleshooting broadband connections How to create and troubleshoot dial-up connections How to install and use a router Supporting Internet applications; e. g. , Web browsers A+ Guide to Managing and Maintaining your PC, 6 e 3

The TCP/IP Suite of Protocols • Client/server application – Client application on one PC

The TCP/IP Suite of Protocols • Client/server application – Client application on one PC requests data from server – Server application on another PC returns data • Example: World Wide Web – The client is a Web browser – The server is a Web server; e. g. , Apache HTTP server – Requested data is a Web page • Client applications are installed as programs • Server applications are installed as services A+ Guide to Managing and Maintaining your PC, 6 e 4

Figure 18 -1 A Web browser (client software) requests a Web page from a

Figure 18 -1 A Web browser (client software) requests a Web page from a Web server (server software); the Web server returns the requested file or files to the client A+ Guide to Managing and Maintaining your PC, 6 e 5

Using IP and Port Addresses to Identify Services • Port (port address, port number)

Using IP and Port Addresses to Identify Services • Port (port address, port number) – Number that identifies server application to client – Server application listens for request at assigned port – Example: port 80 is typically assigned to Web servers • Port numbers appear at the end of an IP address – Example: 138. 60. 30. 5: 80 • A few other common ports and assigned services – Port 20: FTP (File Transfer Protocol) – Port 25: E-mail (using SMTP protocol) – Port 443: Web server (using HTTPS protocol) A+ Guide to Managing and Maintaining your PC, 6 e 6

Using IP and Port Addresses to Identify Services (continued) • Communication protocol – Defines

Using IP and Port Addresses to Identify Services (continued) • Communication protocol – Defines rules of communication between client/server – Example: POP 3 is used by client to receive e-mail • Information flow between client and server – – – Application sends request to OS OS passes request to NIC places request on network NIC on receiving end sends request to OS OS passes request to Web server application Web server responds by sending data to OS A+ Guide to Managing and Maintaining your PC, 6 e 7

Common Port Numbers • http: //www. answersthatwork. com/Download_Area/ ATW_Library/Networking/Network__2 List_of_Common_TCPIP_port_numbers. pdf A+ Guide to

Common Port Numbers • http: //www. answersthatwork. com/Download_Area/ ATW_Library/Networking/Network__2 List_of_Common_TCPIP_port_numbers. pdf A+ Guide to Managing and Maintaining your PC, 6 e 8

TCP/IP Packet A+ Guide to Managing and Maintaining your PC, 6 e 9

TCP/IP Packet A+ Guide to Managing and Maintaining your PC, 6 e 9

Figure 18 -3 Applications, operating systems, and the physical network manage communication at all

Figure 18 -3 Applications, operating systems, and the physical network manage communication at all three levels A+ Guide to Managing and Maintaining your PC, 6 e 10

TCP/IP Protocol Layers • TCP/IP suite lies between applications and the OS • API:

TCP/IP Protocol Layers • TCP/IP suite lies between applications and the OS • API: application programming interface • How application protocols are used – Application makes an API call to the OS – The API causes OS to generate a request • Request follows format specified by application protocol – After response is passed back, a session is established • Example involving HTTP (Hypertext Transfer Protocol) – Web browser makes an API call to the OS – OS makes an HTTP request for a browser A+ Guide to Managing and Maintaining your PC, 6 e 11

Figure 18 -4 How software, protocols, and technology on a TCP/IP network relate to

Figure 18 -4 How software, protocols, and technology on a TCP/IP network relate to each other A+ Guide to Managing and Maintaining your PC, 6 e 12

TCP/IP Protocol Layers (continued) • Transmission Control Protocol (TCP) – A connection-oriented protocol –

TCP/IP Protocol Layers (continued) • Transmission Control Protocol (TCP) – A connection-oriented protocol – Makes a connection, checks delivery, resends data • User Datagram Protocol (UDP) – A connectionless or best-effort protocol – Does not guarantee delivery • Internet Protocol (IP) – Breaks up and reassembles data into packets – Routes packets to their destination • TCP uses IP to establish session and verify delivery A+ Guide to Managing and Maintaining your PC, 6 e 13

Figure 18 -5 TCP turns to IP to prepare the data for networking A+

Figure 18 -5 TCP turns to IP to prepare the data for networking A+ Guide to Managing and Maintaining your PC, 6 e 14

TCP/IP Protocol Layers (continued) • ARP (Address Resolution Protocol) – Responsible for locating a

TCP/IP Protocol Layers (continued) • ARP (Address Resolution Protocol) – Responsible for locating a host on a local network • RARP (Reverse Address Resolution Protocol) – Discovers Internet address of host on a local network • ICMP (Internet Control Message Protocol) – Communicates problems with a transmission – Example: message deleted due to excessive hops • Network protocols used by hardware – Ethernet and PPP (Point-to-Point Protocol) A+ Guide to Managing and Maintaining your PC, 6 e 15

TCP/IP Utilities • TCP/IP component includes a group of utilities – Location: Windows or

TCP/IP Utilities • TCP/IP component includes a group of utilities – Location: Windows or Winnt folder • Commonly used utilities: Ping, Winipcfg, Ipconfig • SNMP (Simple Network Management Protocol) – Provides system management tools for networks • Microsoft SNMP Agent – Utility installed after TCP/IP is installed – Used to monitor remote connections • Tracert (trace route): shows hops along packet route A+ Guide to Managing and Maintaining your PC, 6 e 16

Figure 18 -9 The Tracert command traces a path to a destination computer A+

Figure 18 -9 The Tracert command traces a path to a destination computer A+ Guide to Managing and Maintaining your PC, 6 e 17

Connecting to the Internet • Broadband: supports multiple transmission types • Internet Service Provider

Connecting to the Internet • Broadband: supports multiple transmission types • Internet Service Provider (ISP) – Connects a PC or network to the Internet • Bandwidth technologies used by ISPs: – – – Regular telephone lines Cable modem DSL (Digital Subscriber Line) ISDN (Integrated Services Digital Network) Satellite access Wireless access A+ Guide to Managing and Maintaining your PC, 6 e 18

Cable Modem and DSL Connections • Comparing communication media – Cable modem: TV cables

Cable Modem and DSL Connections • Comparing communication media – Cable modem: TV cables shared by multiple users – DSL: dedicated phone lines • Comparing service plans – Both: sliding-scale residential and business plans • Comparing setup – Both: a modem interfaces PC and broadband jack • Comparing installation services: – Both: will install equipment at additional cost A+ Guide to Managing and Maintaining your PC, 6 e 19

Figure 18 -10 Cable modem connecting to a PC through a network card installed

Figure 18 -10 Cable modem connecting to a PC through a network card installed in the PC A+ Guide to Managing and Maintaining your PC, 6 e 20

Cable Modem and DSL Connections (continued) • Overview of installing cable service or DSL

Cable Modem and DSL Connections (continued) • Overview of installing cable service or DSL – – – Connect the PC to the cable modem or DSL box Connect cable modem/DSL box to broadband jack Plug up power and turn on the broadband device Configure TCP/IP settings for connection to the ISP Test connection by using a browser to surf the Web • Devices and information needed for an installation – A computer with an available network or USB port – Modem/box and network cable – TCP/IP settings A+ Guide to Managing and Maintaining your PC, 6 e 21

Figure 18 -18 Sample setup for DSL A+ Guide to Managing and Maintaining your

Figure 18 -18 Sample setup for DSL A+ Guide to Managing and Maintaining your PC, 6 e 22

Dial-Up Connections • Based on a modem and regular phone line • How dial-up

Dial-Up Connections • Based on a modem and regular phone line • How dial-up networking works – – TCP/IP creates data packets for transport PPP adds its own header and trailer to data packets PPP presents packet to modem for delivery on line Process is reversed when data packet is received • Overview of setting dial-up in Windows XP – Install an internal or external modem – Launch New Connection Wizard – Follow directions onscreen A+ Guide to Managing and Maintaining your PC, 6 e 23

Figure 18 -19 PPP allows a PC to connect to a network using a

Figure 18 -19 PPP allows a PC to connect to a network using a modem A+ Guide to Managing and Maintaining your PC, 6 e 24

Figure 18 -21 The New Connection Wizard asks how to configure the connection A+

Figure 18 -21 The New Connection Wizard asks how to configure the connection A+ Guide to Managing and Maintaining your PC, 6 e 25

Dial-Up Connections (continued) • A few troubleshooting tips – Plug in a regular phone

Dial-Up Connections (continued) • A few troubleshooting tips – Plug in a regular phone and check line for a dial tone – Try another phone number – Reboot your PC and try again • Overview of setting dial-up in Windows 9 x/Me – Dial-Up Networking must first be installed • A dial-up adapter will also be installed – Install an internal or external modem – Create connection with Make New Connection Wizard – Configure the connection from Properties dialog box A+ Guide to Managing and Maintaining your PC, 6 e 26

Figure 18 -27 Configuring the server type for a connection to the Internet in

Figure 18 -27 Configuring the server type for a connection to the Internet in Windows 9 x/Me A+ Guide to Managing and Maintaining your PC, 6 e 27

Dial-Up Connections (continued) • High-speed dial-up: reduces download time by half • Enhancements needed

Dial-Up Connections (continued) • High-speed dial-up: reduces download time by half • Enhancements needed to support high-speed dialup – – – Abbreviated handshake Data compression Filtering Server-side caching Client-side caching A+ Guide to Managing and Maintaining your PC, 6 e 28

Figure 18 -30 Server-side caching and client-side caching improve download times by reducing the

Figure 18 -30 Server-side caching and client-side caching improve download times by reducing the number of requests for data A+ Guide to Managing and Maintaining your PC, 6 e 29

Sharing a Personal Internet Connection • Networked PCs access Internet through a host •

Sharing a Personal Internet Connection • Networked PCs access Internet through a host • Connecting two PCs – Single crossover network cable links two PCs – Host PC connects to the modem • Connecting three or more PCs – PCs connect to hub/switch using patch cables – Host connects to modem via USB cable • Internet Connection Sharing (ICS) – Manages shared Internet connections – Enables host to use NAT and act as proxy server A+ Guide to Managing and Maintaining your PC, 6 e 30

Figure 18 -31 Two or more networked computers can share a single Internet connection

Figure 18 -31 Two or more networked computers can share a single Internet connection A+ Guide to Managing and Maintaining your PC, 6 e 31

Network Address Translation A+ Guide to Managing and Maintaining your PC, 6 e 32

Network Address Translation A+ Guide to Managing and Maintaining your PC, 6 e 32

Implementing a Software Firewall • Guidelines for protecting your PC – Keep Windows updates

Implementing a Software Firewall • Guidelines for protecting your PC – Keep Windows updates current – Use a software or hardware firewall – Run antivirus software and keep it current • Services provided by a hardware or software firewall – – Firewalls can filter data packets Firewalls can filter ports Firewalls can block certain activity within the network Firewalls can filter inappropriate information • Example of a software firewall: Windows Firewall A+ Guide to Managing and Maintaining your PC, 6 e 33

Figure 18 -34 Windows Firewall is set for maximum protection A+ Guide to Managing

Figure 18 -34 Windows Firewall is set for maximum protection A+ Guide to Managing and Maintaining your PC, 6 e 34

Using a Router on Your Network • Disadvantages of using a host to share

Using a Router on Your Network • Disadvantages of using a host to share a connection – Host computer must always be turned on – Only low-level security for your network – Bottlenecks at host can slow traffic within network • Solution: use a router to interface with the Internet • Router provides two functions – Takes place of host as gateway to the Internet – Serves a hardware firewall to protect your network A+ Guide to Managing and Maintaining your PC, 6 e 35

Figure 18 -36 A router stands between the Internet and a local network A+

Figure 18 -36 A router stands between the Internet and a local network A+ Guide to Managing and Maintaining your PC, 6 e 36

Advantages of Using a Router • • Host PC will not be a performance

Advantages of Using a Router • • Host PC will not be a performance bottleneck Internet access is not dependent on running host Router can also serve as a hardware firewall The router can provide additional features – DHCP server, switch, or wireless access point • Example: Wireless-G Broadband Router by Linksys A+ Guide to Managing and Maintaining your PC, 6 e 37

Figure 18 -37 This Linksys router allows computers on a LAN to share a

Figure 18 -37 This Linksys router allows computers on a LAN to share a broadband Internet connection and is an access point for computers with wireless adapters A+ Guide to Managing and Maintaining your PC, 6 e 38

Installing and Configuring a Router • Run the setup program on any network PC

Installing and Configuring a Router • Run the setup program on any network PC • Connect the cable or DSL modem to the router – Follow the instructions on the setup screen • Connect PCs on your network to your router – PC can connect directly to a network port – You can also connect a switch or hub to the router • Plug in the router and turn it on • Sign in with default password and then reset it A+ Guide to Managing and Maintaining your PC, 6 e 39

Installing and Configuring a Router (continued) • Configuring a router (using Linksys as an

Installing and Configuring a Router (continued) • Configuring a router (using Linksys as an example) – Access configuration program on router firmware • Enter the IP address of the router (192. 168. 1) – View and/or change default settings in Setup window • Configure a hardware firewall – Settings in Security tab and Access Restrictions tab • Port filtering: open or close certain ports for use • Port forwarding – Request to certain ports forwarded to certain PCs – Local PC must have static address for this service A+ Guide to Managing and Maintaining your PC, 6 e 40

Figure 18 -39 Basic Setup screen used to configure the router A+ Guide to

Figure 18 -39 Basic Setup screen used to configure the router A+ Guide to Managing and Maintaining your PC, 6 e 41

Figure 18 -42 With port forwarding, a router allows requests initiated outside the network

Figure 18 -42 With port forwarding, a router allows requests initiated outside the network A+ Guide to Managing and Maintaining your PC, 6 e 42

Virtual Private Network • How VPN security works – Remote user sends id to

Virtual Private Network • How VPN security works – Remote user sends id to authentication server – Authentication server encrypts data • Various encryption protocols are used; e. g. , CHAP – Tunnel is created so all data transferred is encrypted • Various tunneling protocols are used; e. g. , PPP • How to configure a router to support VPN – Select encryption and tunneling protocols – Configure each tunnel the VPN will support • Configure client for VPN from Network Connections A+ Guide to Managing and Maintaining your PC, 6 e 43

Figure 18 -45 With a VPN, tunneling is used to send encrypted data over

Figure 18 -45 With a VPN, tunneling is used to send encrypted data over wired and wireless networks and the Internet A+ Guide to Managing and Maintaining your PC, 6 e 44

Figure 18 -48 Properties window of a VPN connection A+ Guide to Managing and

Figure 18 -48 Properties window of a VPN connection A+ Guide to Managing and Maintaining your PC, 6 e 45

Supporting Internet Clients • Section task: support Internet clients • Common Internet clients –

Supporting Internet Clients • Section task: support Internet clients • Common Internet clients – – – Web browsers E-mail FTP Vo. IP Windows XP Remote Desktop A+ Guide to Managing and Maintaining your PC, 6 e 46

Supporting Web Browsers • Web page: text file with an. htm or. html extension

Supporting Web Browsers • Web page: text file with an. htm or. html extension – Coded in HTML (Hypertext Markup Language) • Web browser: requests pages from a Web server • Uniform Resource Locator (URL): Web page address • Components of a URL – Protocol, host name, network name, folder, file name – Domain name = host name + network name – Example: http: //www. course. com/myfolder/myfile. html • Name resolution service relates name to IP address A+ Guide to Managing and Maintaining your PC, 6 e 47

Figure 18 -49 A URL contains the protocol used, the host name of the

Figure 18 -49 A URL contains the protocol used, the host name of the Web server, the network name, and the path and filename of the requested file A+ Guide to Managing and Maintaining your PC, 6 e 48

Table 18 -3 Suffixes used to identify top-level domain names A+ Guide to Managing

Table 18 -3 Suffixes used to identify top-level domain names A+ Guide to Managing and Maintaining your PC, 6 e 49

Supporting Web Browsers (continued) • Examples of Web browser software – Firefox by Mozilla,

Supporting Web Browsers (continued) • Examples of Web browser software – Firefox by Mozilla, Internet Explorer (IE) by Microsoft • Some configuration tasks you can perform in IE – – – Configure the pop-up blocker Manage IE add-ons Set Internet Explorer security levels Control how and if scripts are executed Configure Active. X controls Control proxy settings A+ Guide to Managing and Maintaining your PC, 6 e 50

Figure 18 -53 Set the security level of Internet Explorer using the Internet Options

Figure 18 -53 Set the security level of Internet Explorer using the Internet Options window A+ Guide to Managing and Maintaining your PC, 6 e 51

Supporting Web Browsers (continued) • Solving Internet Explorer problems – – – – First

Supporting Web Browsers (continued) • Solving Internet Explorer problems – – – – First perform routine maintenance; e. g. , run Scan. Disk Clean out cache that IE uses to hold temporary files Suppress downloading images Repair a corrupted Internet Explorer cache Run antivirus software Update Internet Explorer Verify Windows system files using System File Checker Remove and reinstall Internet Explorer 6 A+ Guide to Managing and Maintaining your PC, 6 e 52

Figure 18 -56 Use the Internet Options window to control the Internet Explorer environment

Figure 18 -56 Use the Internet Options window to control the Internet Explorer environment A+ Guide to Managing and Maintaining your PC, 6 e 53

Supporting Web Browsers (continued) • Digital certificate: identification plus public key • SSL (Secure

Supporting Web Browsers (continued) • Digital certificate: identification plus public key • SSL (Secure Sockets Layer) – Encryption system using a digital certificate – Data is encrypted with public key – Data is decrypted with a private key • TLS (Transport Layer Security) – An improved version of SSL • HTTPS (HTTP secure) – Can mean HTTP over SSL or HTTP over TLS – Indicates secure protocol being used is SSL or TLS A+ Guide to Managing and Maintaining your PC, 6 e 54

Figure 18 -61 Using secure HTTP, a Web server and browser encrypt data using

Figure 18 -61 Using secure HTTP, a Web server and browser encrypt data using a public key before the data is transmitted A+ Guide to Managing and Maintaining your PC, 6 e 55

Supporting E-mail • • • SMTP: Simple Mail Transfer Protocol SMTP AUTH (SMTP Authentication):

Supporting E-mail • • • SMTP: Simple Mail Transfer Protocol SMTP AUTH (SMTP Authentication): improved SMTP POP: Post Office Protocol IMAP 4: Internet Message Access Protocol, version 4 Route traveled by e-mail – Client sends e-mail to client e-mail server using SMTP – Client e-mail server sends e-mail to recipient with SMTP – Recipient’s e-mail server forwards e-mail to recipient • Recipient’s e-mail server uses POP or IMAP 4 • Recipient must first login and request e-mail from server A+ Guide to Managing and Maintaining your PC, 6 e 56

Figure 18 -63 The SMTP protocol is used to send e-mail to a recipient’s

Figure 18 -63 The SMTP protocol is used to send e-mail to a recipient’s mail server, and the POP 3 or IMAP 4 protocol is used to download e-mail to the client A+ Guide to Managing and Maintaining your PC, 6 e 57

Supporting FTP • File Transfer Protocol (FTP) – Used to transfer files between two

Supporting FTP • File Transfer Protocol (FTP) – Used to transfer files between two computers • FTP server (or FTP site) – Application running on another server; e. g. , Unix server • FTP from a command prompt – Connection to a network must first be established – Some commands: FTP, get your. File. dat • File transfer using FTP software – FTP utility software: can be downloaded from Internet – Web browser: change protocol used in address bar A+ Guide to Managing and Maintaining your PC, 6 e 58

Figure 18 -68 Using Internet Explorer as an FTP client A+ Guide to Managing

Figure 18 -68 Using Internet Explorer as an FTP client A+ Guide to Managing and Maintaining your PC, 6 e 59

Supporting Vo. IP • Vo. IP (Voice-over-IP) – Provides voice communication over a network

Supporting Vo. IP • Vo. IP (Voice-over-IP) – Provides voice communication over a network • Two types of phones used in Vo. IP service – Digital telephone: plugs into a network port – Analog phone: needs Analog Telephone Adapter (ATA) • Special requirements of Vo. IP – Phones must be assigned number by Vo. IP provider – Phones are programmed to use dynamic IP addressing – Each network cable to phone needs a ferrite clamp A+ Guide to Managing and Maintaining your PC, 6 e 60

Figure 18 -70 Use this ATA to turn an analog telephone into an Internet

Figure 18 -70 Use this ATA to turn an analog telephone into an Internet phone A+ Guide to Managing and Maintaining your PC, 6 e 61

Supporting Remote Desktop • Windows XP Professional Remote Desktop – Gives user access to

Supporting Remote Desktop • Windows XP Professional Remote Desktop – Gives user access to desktop from remote locations – Server must be running Windows XP Professional – Client can run Windows XP Home Ed. or Professional • Accessing a Remote Desktop – Open the Remote Desktop Connection window – Enter address of PC, identification, resources needed • Preparing a Remote Desktop for first use – Configure the computer for static IP addressing – Configure Remote Desktop for service A+ Guide to Managing and Maintaining your PC, 6 e 62

Figure 18 -75 The desktop of the remote computer is available on your local

Figure 18 -75 The desktop of the remote computer is available on your local computer A+ Guide to Managing and Maintaining your PC, 6 e 63

Summary • Internet communication is based on the client/server model • TCP/IP: suite of

Summary • Internet communication is based on the client/server model • TCP/IP: suite of protocols facilitating transfer of data between client and server • Bandwidth technologies: telephone lines, DSL, cable modem, ISDN, satellite access, wireless access • Internet Connection Sharing (ICS): manages shared Internet connections • Firewall: blocks and filters incoming network traffic A+ Guide to Managing and Maintaining your PC, 6 e 64

Summary (continued) • • • Router: manages traffic between two networks Web browser: loads

Summary (continued) • • • Router: manages traffic between two networks Web browser: loads and displays Web pages E-mail client: used to send and receive e-mail FTP client: used to transfer files over the Internet Vo. IP service: provides voice communications over the Internet A+ Guide to Managing and Maintaining your PC, 6 e 65