Chapter 8 Applied Networking Selecting a NIC Network

  • Slides: 93
Download presentation
Chapter 8 – Applied Networking

Chapter 8 – Applied Networking

Selecting a NIC • Network Interface Card • Can be wired or wireless •

Selecting a NIC • Network Interface Card • Can be wired or wireless • Most motherboards have integrated NICs

Installing/Updating a NIC • Sometimes need to replace/upgrade a NIC • Sometimes just need

Installing/Updating a NIC • Sometimes need to replace/upgrade a NIC • Sometimes just need to update the driver • Usually best to temporarily disable virus protection to ensure driver installs correctly • Win 8/8. 1: Control Panel > Hardware and Sound > Device Manager • Win 7/Vista : Start > Control Panel > Device Manager • If new driver does not perform as expected, can “Uninstall” or “Roll Back” Driver

Configuring a NIC • Two ways – Manually – host is statically assigned IP

Configuring a NIC • Two ways – Manually – host is statically assigned IP configuration – Dynamically – host requests IP configuration from DHCP server (default – “Obtain an IP address automatically”) • Win 8/8. 1: Control Panel > Network and Internet > Network and Sharing Center > Change adapter settings > right-click Ethernet • Win 7/Vista: Start > Control Panel > Network and Sharing Center > Change adapter setting > rightclick Local Area Connection

Advanced NIC settings • Duplex and Speed: Must match in order for data to

Advanced NIC settings • Duplex and Speed: Must match in order for data to transfer between devices (default: auto configure) • Wake on LAN: Used to wake up a networked computer from a very low power mode/state • Quality of Service: also called 802. 1 q Qo. S, is a variety of techniques that control the flow of network traffic, improve transmission speeds, and improve real-time communications traffic

Connecting a NIC • Plug in a network cable • After connecting the network

Connecting a NIC • Plug in a network cable • After connecting the network cable, lookat the LEDs – Solid on usually means it's connected – Blinking usually means network activity • If it's not working, might be faulty cable, port or NIC • After it's connected, usually DHCP takes care of everything else

Connecting a Router • Port labeled “WAN” connects to your ISP Modem • Port(s)

Connecting a Router • Port labeled “WAN” connects to your ISP Modem • Port(s) labeled “LAN” connects to your Hosts • Turn on modem, then router • Router establishes communication with your ISP and gets configuration from DHCP

Network Location • Home Network - when you trust the people/devices on the network.

Network Location • Home Network - when you trust the people/devices on the network. Network discovery is turned on, which allows you to see other computers and devices on the network and other network users to see your computer. • Work Network - For a small office or other workplace network. Network discovery is turned on but a homegroup cannot be created or joined. • Public Network - Airports, coffee shops, and other public places. Network discovery is turned off. This network location provides the most protection. Also choose this network location if you connect directly to the Internet without using a router, or if you have a mobile broadband connection. Homegroup is not available.

Domain vs Workgroup vs Homegroup • Domain: user access and shared resources are controlled

Domain vs Workgroup vs Homegroup • Domain: user access and shared resources are controlled by an administrator and a Domain Controller/Server • Workgroup: Not controlled by a server, each host must join the same workgroup to share resources • Computers that belong to the same Workgroup can also belong to a Homegroup • There can only be one Homegroup per Workgroup on a network • Computers can only be a member of one Homegroup at a time • Homegroup provides simple method to share files and printing. (Vista does not support Homegroup)

Connecting to a Workgroup or Domain Control Panel > System and Security > System

Connecting to a Workgroup or Domain Control Panel > System and Security > System > Change settings > Change Older OS’s have more restrictions If a Workgroup is made up of newer and older OS’s, use the Workgroup name from the oldest OS

Connecting to a Homegroup • One user in a Workgroup creates a Homegroup •

Connecting to a Homegroup • One user in a Workgroup creates a Homegroup • Others can then join the Homegroup, provided they know the password • Homegroup availability depends on your network location profile – Home Network - allowed to create or join a homegroup – Work Network - not allowed to create or join a homegroup, but you can see and share resources with other computers – Public Network - homegroup not available

Change Home Network Location Profile • Step 1. Click Start > Control Panel >

Change Home Network Location Profile • Step 1. Click Start > Control Panel > Network and Sharing Center • Step 2. Click the network location profile listed in the View your active networks section of the window • Step 3. Click Home network • Step 4. Select what you want to share (Pictures, Music, Videos, Documents, and Printers) then click Next • Step 5. Join or create a homegroup

Create a Homegroup • • • Step 1. Click Start > Control Panel >

Create a Homegroup • • • Step 1. Click Start > Control Panel > Home. Group Step 2. Click Create a homegroup, as shown in Figure 2 Step 3. Select files to share then click Next Step 4. Record the homegroup password Step 5. Click Finish

Join a Homegroup • • • Step 1. Click Start > Control Panel >

Join a Homegroup • • • Step 1. Click Start > Control Panel > Home. Group Step 2. Click Join now, as shown in Figure 3 Step 3. Select files to share then click Next Step 4. Type in the homegroup password, and then click Next Step 5. Click Finish • All user account on the computer (except Guest) become members of the Homegroup • To change files shared (Pictures, Music, Videos, Documents, and Printers) on a computer : Start > Control Panel > Home. Group. After you make your changes, click Save change. • And finally, if a computer belongs to a domain, you can join a homegroup and access files and resources on other homegroup computers, but you are not allowed to create a new homegroup or share your own files and resources with a homegroup.

Sharing Resources in Vista • Sharing and Discovery: Start > Control Panel > Network

Sharing Resources in Vista • Sharing and Discovery: Start > Control Panel > Network and Internet > Network and Sharing Center • Can control: – – – Network discovery File sharing Public folder sharing Printer sharing Password protected sharing Media sharing • Network Discovery and File Sharing must be turned on in order to share resources

Network Shares and Drive Mapping • Mapping a drive, which is done by assigning

Network Shares and Drive Mapping • Mapping a drive, which is done by assigning a letter (A to Z) to the resource on a remote drive, allows you to use the remote drive as if it was a local drive • The following are the permissions that can be assigned to the file or folder – Read – user can view and run program files – Change – In addition to Read permissions, the user can add files and subfolders, change the data in files, and delete subfolders and files – Full Control - In addition to Change and Read permissions, the user can change the permission of files and folders in an NTFS partition and take ownership of files and folders

Network Drive Mapping Win 7/Vista: • Start > right-click Computer > Map network drive

Network Drive Mapping Win 7/Vista: • Start > right-click Computer > Map network drive Win 8. 0: • Step 1. From the Start Screen type file explorer and click File Explorer to open it • Step 2. Right-click Computer > Map network drive Win 8. 1: • Step 1. from the Start Screen type file explorer and click File Explorer to open it • Step 2. Right-click This PC > Map network drive

Network Drive Mapping (Continued) • Locate the shared folder over the network and assign

Network Drive Mapping (Continued) • Locate the shared folder over the network and assign a drive letter • Windows 7 max 20 simultaneous filesharing connections • Vista Business max 10 simultaneous filesharing connections

Network Shares and Drive Mapping PC Drive F:  Network Looks like a local

Network Shares and Drive Mapping PC Drive F: Network Looks like a local disk drive, it’s really a link to a shared directory on another PC somewhere else in the network Another PC with shared directory \STUDENT 01UsersPublic|Documents PC Nameshared directory

Administrative Shares • Administrative shares (AKA hidden shares) are ID'd with a dollar sign

Administrative Shares • Administrative shares (AKA hidden shares) are ID'd with a dollar sign ($) at the end of the share name • Gives system administrators remote access • Must have administrator privileges to access • Default Windows hidden administrative shares: • Root partitions or volumes (C$, D$, E$ by default) • The system root folder • The FAX$ share (folder in which faxed pages/cover pages are cached) • The IPC$ share (inter-process communication via named pipes, not part of the file system) • The PRINT$ share (installed printer objects)

Administrative Shares • To create your own administrative share: • Step 1: Click Control

Administrative Shares • To create your own administrative share: • Step 1: Click Control Panel > Administrative Tools and double-click Computer Management • Step 2: Expand Shared Folders, right-click Shares, and then click New Share… to open Create A Shared Folder Wizard • Step 3: Type the path to the folder you want to use for the administrative share (for example, C: Admin. Only$. Be sure it includes a dollar sign ($) at the end of the name to identify this folder as an administrative share. Click Next. If the folder does not exist yet, Windows will ask if you want to create it. • Step 4: In the next screen, you can change the share name, add an optional description, and change the offline settings. Click Next. • Step 5: In the Share Folder Permissions window, select the Administrators have full access; other users have no access, and then click Finish.

Logging into a home Router • Web browser: http: //192. 168. 0. 1 or

Logging into a home Router • Web browser: http: //192. 168. 0. 1 or http: //10. 0. 0. 1 (default gateway address) • Admin/admin (default) which is why you want to change it when you first plug it in and start to use it

Basic Network Setup Best practice: • Change the default username and password • Change

Basic Network Setup Best practice: • Change the default username and password • Change the default router IP address (if not already a private IP address range) • Network Address Translation (NAT) configuration for anything that needs to be presented to the internet

Basic Wireless Settings • Network mode - A mixed-mode allows 802. 11 b, 802.

Basic Wireless Settings • Network mode - A mixed-mode allows 802. 11 b, 802. 11 g, 802. 11 n and 802. 11 ac devices • Service Set Identifier (SSID) - The name of the wireless network which is broadcast to potential users. Disabled is more secure but user has to manually enter SSID to connect. • Channel - 1 and 11 do not overlap with the default channel 6. Use one of these three channels for best results. (802. 11 ac automatically finds best channel) • Wireless security modes – Wired Equivalent Privacy (WEP) – Wi-Fi Protected Access (WPA) – Wi-Fi Protected Access 2 (WPA 2) • Temporal Key Integrity Protocol (TKIP) (Supported by more equipment) • Advanced Encryption Standard (AES) (Stronger, less equipment)

Testing Connectivity (GUI) • Easiest way, open a browser and see if it works

Testing Connectivity (GUI) • Easiest way, open a browser and see if it works • Otherwise, can use GUI – Vista: Start > Control Panel > Network and Internet > Network and Sharing Center > Manage Network Connections – Win 7/8/8. 1: Start > Control Panel > Network and Internet > Network and Sharing Center > Change adapter settings • Win 7/Vista, wired network connections are normally called ‘Local Area Connection’ • Win 8/8. 1, wired network connections are called ‘Ethernet’ • Double-click the network connection to display the status screen • “Details” to view IP address, subnet mask, default gateway, MAC address, and other information • If not working, close Details window and click Diagnose to reset the connection information and attempt to establish a new connection

Testing Connectivity (CLI) • Ipconfig – displays basic configuration for all network adapters. •

Testing Connectivity (CLI) • Ipconfig – displays basic configuration for all network adapters. • Ping – tests basic connectivity between devices. • Net commands – manage network computers, servers, and resources. • Tracert – trace the routes that packets take from your computer to a destination host. • Nslookup – tests and troubleshoots DNS servers.

IPCONFIG C: ipconfig /all Must have 4 things for a PC to work on

IPCONFIG C: ipconfig /all Must have 4 things for a PC to work on a network: -IP ADDRESS -SUBNET MASK -DEFAULT GATEWAY -IP ADDRESS of DNS

PING Ping – an echo request! Can begin by testing your own NIC C:

PING Ping – an echo request! Can begin by testing your own NIC C: ping <your ip address> If you don’t know your own IP Address: C: ping localhost or C: ping 127. 0. 0. 1 Same thing!

Net Commands

Net Commands

TRACERT Traces route and tells you time between each hop!

TRACERT Traces route and tells you time between each hop!

NSLOOKUP

NSLOOKUP

VPN • When connecting to the local network and sharing files, the communication between

VPN • When connecting to the local network and sharing files, the communication between computers is not sent beyond that network. Data remains secure because it is kept behind the router, off other networks, and off the Internet. To communicate and share resources over a network that is not secure, a Virtual Private Network (VPN) is used. • A VPN is a private network that connects remote sites or users together over a public network, like the Internet. The most common type of VPN is used to access a corporate private network. The VPN uses dedicated secure connections, routed through the Internet, from the corporate private network to the remote user. When connected to the corporate private network, users become part of that network and have access to all services and resources as if they were physically connected to the corporate LAN. • Remote-access users must install the VPN client on their computers to form a secure connection with the corporate private network. The VPN client software encrypts data before sending it over the Internet to the VPN gateway at the corporate private network. VPN gateways establish, manage, and control VPN connections, also known as VPN tunnels. ? T A H W

VPN Client Software To set up and configure a VPN connection, follow these steps

VPN Client Software To set up and configure a VPN connection, follow these steps in all Windows versions: • • Step 1. Select Start > Control Panel > Network and Sharing Center in Windows Step 2. Set up a new connection or network Step 3. Connect to a workplace, click Next Step 4. Use my Internet connection (VPN) and type the Internet address (URL of VPN Server)/destination name Step 5. Don’t connect now; just set it up so I can connect later, click Next Step 6. Type the username, password, and optional domain, Create Step 7. In the login window, enter the username and password, click Connect.

VPN How do you make a remote host look like it’s physically on the

VPN How do you make a remote host look like it’s physically on the same LAN? VPN! Example: WAN 12. 200. 48. 26 Internet ISP PC Router PC PC LAN 192. 168. 1. 3 192. 168. 1. 4 192. 168. 1. 5 WAN 63. 28. 132. 33 ISP Router PC LAN 10. 2. 0. 33 Make this: 192. 168. 1. 7? 192 168 1 3 11000 0000 1010 1000 0001 0000 0011 Network Part of Address Host Part of Address

VPN • How do you do it? • By adding a VPN server and

VPN • How do you do it? • By adding a VPN server and encapsulating the IP Packet Twice! WAN 12. 200. 48. 26 Internet ISP PC Router PC PC LAN 192. 168. 1. 3 192. 168. 1. 4 192. 168. 1. 5 VPN Server 192. 168. 1. 6 WAN 63. 28. 132. 33 ISP Router PC LAN 10. 2. 0. 33 Make this: 192. 168. 1. 7?

VPN 7 Application 6 Presentation 5 Session 4 Transport 3 Network (LAN) 3 Network

VPN 7 Application 6 Presentation 5 Session 4 Transport 3 Network (LAN) 3 Network (WAN) 2 Data 1 Physical App TCP Data TCP IP IP Encrypted Mac IP Encrypted IP IP Mac Segment Packet Frame LAN IP Address: 192. 168. 1. x (What ever LAN service you’re communicating with) WAN IP Address: 12. 200. 48. 26 (with NAT to VPN server) VPN server strips MAC Frame and IP Packet, then decrypts and forwards inside IP Packet to appropriate host on LAN

Windows Remote Desktop Client Used to view/control a computer from a remote location •

Windows Remote Desktop Client Used to view/control a computer from a remote location • Win 8: Start Screen, type Remote Desktop Connection, click Remote Desktop Connection icon • Win 7/Vista: Start > All Programs > Accessories > Remote Desktop Connection Must be enabled in remote computer Win 8: • Step 1. Right-click This PC (8. 1) or Computer (8. 0) and select Properties • Step 2. Click Remote Settings in the System window and select the Remote tab • Step 3. Select the Allow Remote Assistance Connections to This Computer • Step 4. Click OK Invite • Win 8 invite: Start Screen, type Invite, press Enter (only invite someone you trust) • Win 7/Vista: Start > All Programs > Maintenance > Windows Remote Assistance

Connection Technologies • Analog Telephone (POTS) • Integrated Services Digital Network (ISDN) – BRI

Connection Technologies • Analog Telephone (POTS) • Integrated Services Digital Network (ISDN) – BRI – PRI – BISDN • Broadband (Multiple signals, same media) – – • • • Cable Satellite Fiber Broadband Bluetooth Digital Subscriber Line (DSL) Asymmetric DSL (ADSL) Line of Sight Wireless Internet Service Wi. MAX (Fixed vs Mobile) Cellular

Connection Technologies Analog Telephone Plane Old Telephone Service (POTS), AKA Dialup Been around since

Connection Technologies Analog Telephone Plane Old Telephone Service (POTS), AKA Dialup Been around since Alexander Graham Bell Originally designed for voice/audio over twisted pair • Can be used for voice only or data only • Limited bandwidth (usually much less than 56 Kbps) • •

Connection Technologies • • • Integrated Services Digital Network (ISDN) Originally a European standard

Connection Technologies • • • Integrated Services Digital Network (ISDN) Originally a European standard Integrated voice, video, and data Higher quality BRI, PRI, BISDN

Connection Technologies • • • Integrated Services Digital Network (ISDN) BRI Basic Rate Interface

Connection Technologies • • • Integrated Services Digital Network (ISDN) BRI Basic Rate Interface 64 Kbps, AKA “DS 0” End user usually gets 2 x 64 Kbps ("B" channel and "D" channel) (and sometimes a little extra overhead bandwidth)

Connection Technologies Integrated Services Digital Network (ISDN) PRI Primary Rate Interface - AKA "DS

Connection Technologies Integrated Services Digital Network (ISDN) PRI Primary Rate Interface - AKA "DS 1“ US "T 1" = 24 x DS 0 = 1536 Kbps + overhead = 1544 Kbps • European "E 1" = 32 x DS 0 = 2048 Kbps (one channel used for overhead) • •

Connection Technologies Integrated Services Digital Network (ISDN)

Connection Technologies Integrated Services Digital Network (ISDN)

Connection Technologies • Integrated Services Digital Network (ISDN) • BISDN • Broadband Integrated Services

Connection Technologies • Integrated Services Digital Network (ISDN) • BISDN • Broadband Integrated Services Digital Network • Used in the backbone • Good for both voice and data • Asynchronous Transfer Mode (ATM) was the agreed upon technology

Connection Technologies • Broadband (*as opposed to “baseband”) defined: • A technique used to

Connection Technologies • Broadband (*as opposed to “baseband”) defined: • A technique used to transmit and receive multiple signals using multiple frequencies over one medium • Examples: – Cable – Satellite – Fiber Broadband

Connection Technologies Broadband Cable – bundled service Your house P O W E R

Connection Technologies Broadband Cable – bundled service Your house P O W E R TV PC VOIP Phone Satellite Earth Station CATV Company ISP WWW Email VOIP phone provider Router Cable

Connection Technologies Broadband Cable – bundled service Your house P O W E R

Connection Technologies Broadband Cable – bundled service Your house P O W E R TV PC VOIP Phone Satellite Earth Station CATV Company ISP WWW Email VOIP phone provider Router Cable

Connection Technologies Broadband Cable – bundled service Your house P O W E R

Connection Technologies Broadband Cable – bundled service Your house P O W E R TV PC VOIP Phone Satellite Earth Station CATV Company ISP WWW Email VOIP phone provider Router Cable

Connection Technologies Broadband Cable – bundled service Your house P O W E R

Connection Technologies Broadband Cable – bundled service Your house P O W E R TV PC VOIP Phone Satellite Earth Station CATV Company ISP WWW Email VOIP phone provider Router Cable

Connection Technologies • Other technologies considered to be broadband: • DSL - Voice and

Connection Technologies • Other technologies considered to be broadband: • DSL - Voice and data • ISDN - Multiple channels, Voice, Video, Data • Satellite – An alternative for customers who cannot get cable/DSL – Download speeds up to 500 Kbps; uploads to 56 Kbps – Delay is significant in satellite communications • Fiber Broadband – Telephone, video, data, and advanced features like video conferencing – A single fiber pair can carry millions of phone calls

Connection Technologies • Bluetooth is considered a broadband technology • IEEE 802. 15. 1

Connection Technologies • Bluetooth is considered a broadband technology • IEEE 802. 15. 1 standard • Handles both voice and data • Three classifications: – Class 1 has a range of approximately 100 m (330 ft) – Class 2 has a range of approximately 10 m (33 ft) – Class 3 has a range of approximately 1 m (3 ft) • • Operate 2. 4 to 2. 485 GHz AKA the Industrial, Scientific, and Medical (ISM) band Uses Adaptive Frequency Hopping (AFH) Frequency Hopping reduces chance of interference

Connection Technologies • Digital Subscriber Line (DSL) • Uses existing copper telephone lines •

Connection Technologies • Digital Subscriber Line (DSL) • Uses existing copper telephone lines • An "always-on" technology; there is no need to dial up each time to connect to the Internet

Connection Technologies • Asymmetric DSL (ADSL) • Most common • Has a fast downstream

Connection Technologies • Asymmetric DSL (ADSL) • Most common • Has a fast downstream speed, typically 1. 5 Mbps • Upload rate of ADSL is slower • Not the best solution for hosting a web server of FTP server

Connection Technologies ADSL

Connection Technologies ADSL

Connection Technologies Internet Length of wire from TELCO to your house is CRITICAL Telephone

Connection Technologies Internet Length of wire from TELCO to your house is CRITICAL Telephone Switch This is why it’s not available everywhere “Digital Subscriber Line Access Multiplexer” PSTN

Connection Technologies • Line of sight wireless Internet is an always-on • Uses radio

Connection Technologies • Line of sight wireless Internet is an always-on • Uses radio signals from a tower to the customer's receiver • Clear path required • Distance to the tower is a factor--closer is better • 900 MHz good for up to 40 miles (65 km) • 5. 7 GHz good for up to 2 miles (3 km) • Extreme weather, trees and tall buildings can affect signal strength/performance

Connection Technologies • Worldwide Interoperability for Microwave Access (Wi. MAX) - 4 G broadband,

Connection Technologies • Worldwide Interoperability for Microwave Access (Wi. MAX) - 4 G broadband, high-speed, mobile Internet access for mobile devices • IEEE 802. 16 e • Download speeds up to 70 Mb/s and distances up to 30 miles • Uses between 2 GHz to 11 GHz • Fixed Wi. MAX - A point-to-point or point-to-multipoint service with speeds up to 72 Mb/s and a range of 30 miles (50 km) • Mobile Wi. MAX - A mobile service, like Wi-Fi, but with higher speeds and a longer transmission range

Connection Technologies • Cellular – another broadband technology • 1 G - Analog voice

Connection Technologies • Cellular – another broadband technology • 1 G - Analog voice only • 2 G - Digital voice, conference calls, and caller ID; data speeds less than 9. 6 Kb/s • 2. 5 G - Data speeds between 30 Kb/s and 90 Kb/s; supports web browsing, short audio and video clips, games, and application and ring tone downloads • 3 G - Data speeds between 144 Kb/s and 2 Mb/s; supports full-motion video, streaming music, 3 D gaming, and faster web browsing • 3. 5 G - Data speeds between 384 Kb/s and 14. 4 Mb/s; supports highquality streaming video, high-quality video conferencing, and Vo. IP • 4 G - Data speeds between 5. 8 Mb/s and 672 Mb/s when mobile, and up to 1 Gb/s when stationary; supports IP-based voice, gaming services, highquality streamed multimedia, and IPv 6

Connection Technologies • Cellular networks use one or more of the following technologies: •

Connection Technologies • Cellular networks use one or more of the following technologies: • Global System for Mobile communications (GSM) - Standard used by the worldwide cellular network • General Packet Radio Service (GPRS) - Data service for users of GSM • Quad-band - Allows a cellular phone to operate on all four GSM frequencies: 850 MHz, 900 MHz, 1800 MHz, and 1900 MHz • Short Message Service (SMS) - Data service used to send and receive text messages • Multimedia Messaging Service (MMS) - Data service used to send and receive text messages and can include multimedia content • Enhanced Data Rates for GSM Evolution (EDGE) - Increased data rates and improved data reliability • Evolution-Data Optimized (EV-DO) - Improved upload speeds and Qo. S • High Speed Downlink Packet Access (HSDPA) - Enhanced 3 G access speed

NOT TESTABLE Connection Technologies • CDMA/GSM still competing • CDMA - Sprint, Virgin Mobile

NOT TESTABLE Connection Technologies • CDMA/GSM still competing • CDMA - Sprint, Virgin Mobile and Verizon Wireless • GSM - T-Mobile and AT&T

Selecting an ISP Four main considerations: • Cost • Speed • Reliability • Availability

Selecting an ISP Four main considerations: • Cost • Speed • Reliability • Availability

Data Center • Concentrated computing and storage • Centralization eases maintenance • Cheaper O&M

Data Center • Concentrated computing and storage • Centralization eases maintenance • Cheaper O&M costs – Focused power and cooling – Full time IT staff with full time duties • Currently over 3, 000 data centers in the world

Cloud vs Data Center • Data center – In-house data storage/processing facility • Cloud

Cloud vs Data Center • Data center – In-house data storage/processing facility • Cloud computing – Service provided by someone else that offers on-demand access to a shared pool of configurable computing resources. • National Institute of Standards and Technology (NIST), Special Publication 800 -145, define a Cloud model that consists of five characteristics, three service models, and four deployment models • http: //nvlpubs. nist. gov/nistpubs/Legacy/SP/nistspecial publication 800 -145. pdf

Cloud Computing - Characteristics • On-demand self-service - the network administrator can buy additional

Cloud Computing - Characteristics • On-demand self-service - the network administrator can buy additional computing space in the Cloud without requiring the interaction with another human. • Broad network access - access to the Cloud is available using a wide variety of client devices, such as PCs, laptops, tablets, and smartphones. • Resource pooling - the computing capacity of the Cloud provider is shared among all its customers and can be assigned and reassigned based on customer demand. • Rapid elasticity - resource allocation to customers can quickly expand or contract with demand. To the customer, the resources and capabilities of the Cloud service provider appear to be unlimited. • Measured service - resource usage can be easily monitored, controlled, reported, and billed to provide full visibility to both the Cloud service provide and customer.

Cloud Computing - Services • Software as a Service (Saa. S) – cloud provider

Cloud Computing - Services • Software as a Service (Saa. S) – cloud provider is responsible for access to services, such as email, communication, and virtual desktops that are delivered over the internet • Platform as a Service (Paa. S) – cloud provider is responsible for access to the development tools and services used to deliver the applications • Infrastructure as a Service (Iaa. S) – cloud provider is responsible for access to the network equipment, virtualized network services, and supporting network infrastructure • IT as a Sevice (Itaa. S) – Cloud service providers have extended these models to also provide IT support for the Saa. S, Paa. S, and Iaa. S models. Cloud provider contracts with organization for individual or bundled services

Cloud Deployment Models • Private – Paid for and used by specific organization/entity •

Cloud Deployment Models • Private – Paid for and used by specific organization/entity • Public – for general population – may be free or pay-per-use • Community – for specific industry – can be private or public • Hybrid – two or more clouds using the same architecture

Services • • • DHCP DNS Web File Print Email Proxy Authentication Intrusion Detection

Services • • • DHCP DNS Web File Print Email Proxy Authentication Intrusion Detection and Prevention Universal Threat Management

Dynamic Host Configuration Protocol (DHCP) Service • As client boots, it sends a DHCP

Dynamic Host Configuration Protocol (DHCP) Service • As client boots, it sends a DHCP discover message to find a DHCP server on the network • DHCP server replies with an offer message – – IP Address Subnet Mask IP Address to Default Gateway IP Address to DNS • Client request message of offered addresses • DHCP server acknowledge message and provides lease time

Domain Name Server (DNS) Service • Provides IP address to requested Universal Resource Locator,

Domain Name Server (DNS) Service • Provides IP address to requested Universal Resource Locator, or Fully Qualified Domain Name • Domain name -> IP Address

Web Service • • HTTP (Port 80) HTTPS (SSL/TLS) (Port 443) Text, graphics, sound,

Web Service • • HTTP (Port 80) HTTPS (SSL/TLS) (Port 443) Text, graphics, sound, video http: //www. cisco. com/index. html – http: // - protocol – www. cisco. com – server name – Index. html – specific file to return

SSL/TLS • In security chapter

SSL/TLS • In security chapter

File Service • File Transfer Protocol (FTP) – one of the first protocols created

File Service • File Transfer Protocol (FTP) – one of the first protocols created • FTP designed for the free and open exchange of information – therefore, it is very unsecure • File Transfer Protocol Secure (FTPS) – encrypts using TLS • Secure Shell File Transfer Protocol (SFTP) – extension of the Secure Shell (SSH) protocol – used to establish a secure file transfer session • Secure Copy (SCP) – uses SSH to secure file transfers

Print Service • Multiple users/single printer • Print server provides storage queue for print

Print Service • Multiple users/single printer • Print server provides storage queue for print jobs and provides feedback to the user

Email Service • Store-and-forward method of sending, storing, and retrieving electronic messages across a

Email Service • Store-and-forward method of sending, storing, and retrieving electronic messages across a network • Two methods: – Client email software -> Server email software – Web access to email server • Mail servers communicate with other mail servers to transport messages from one domain to another – Simple Mail Transfer Protocol (SMTP) (Sends Email) – Post Office Protocol (POP) – Internet Message Access Protocol (IMAP) (server to client)

Proxy Service • • All requests/traffic go through a proxy server Provides for centralized

Proxy Service • • All requests/traffic go through a proxy server Provides for centralized security Effectively hides IP addresses of internal hosts Provides web page cache (faster access)

Authentication Service • authentication, authorization, and accounting services. Referred to as AAA or “triple

Authentication Service • authentication, authorization, and accounting services. Referred to as AAA or “triple A” • AAA is a way to control who is permitted to access a network (authenticate), what they can do while they are there (authorize), and track what actions they perform while accessing the network (accounting).

Intrusion Detection and Prevention Service • Intrusion Detection Systems (IDSs) passively monitors and reports

Intrusion Detection and Prevention Service • Intrusion Detection Systems (IDSs) passively monitors and reports intrusion happened • Intrusion Prevention Systems (IPSs) actively monitors and stops intrusions before they happen

Universal Threat Management • Universal Threat Management (UTM) generic name for all-in-one security appliance

Universal Threat Management • Universal Threat Management (UTM) generic name for all-in-one security appliance (IDS/IPS/firewall) • Also can provide: – Zero Day protection – Denial of Service (Do. S) and Distributed Denial of Service (DDo. S) protection – Proxy filtering of applications – Email filtering for spam and phishing attacks – Antispyware – Network access control – VPN services

Next Generation Firewalls • Go beyond a UTM in several important ways: • Control

Next Generation Firewalls • Go beyond a UTM in several important ways: • Control the behaviors within applications • Restricting web and web application use based on the reputation of the site • Proactive protection against Internet threats • Enforcement of policies based on the user, device, role, application type, and threat profile

Preventive Maintenance • Scheduled maintenance reduces unscheduled maintenance • Check: – condition of cables/labeling

Preventive Maintenance • Scheduled maintenance reduces unscheduled maintenance • Check: – condition of cables/labeling - especially where other people can move or kick – Unusual sounds – Network devices – Servers – Computers – Uninteruptable Power Supplies (UPS) – should be tested at regular intervals – especially those hidden in closets • Clean: – One of the biggest problems with network devices, especially in the server room, is heat – Dust impedes proper flow of cool air – Clean at regular intervals and ensure good working order

Troubleshooting for Networks Step 1 Identify the problem Step 2 Establish a theory of

Troubleshooting for Networks Step 1 Identify the problem Step 2 Establish a theory of probable causes Step 3 Test the Theory to Determine cause Step 4 Establish a Plan of Action to Resolve the Problem and Implement the Solution • Step 5 Verify Full System Functionality and Implement Preventative Measures • Step 6 Document Findings, Actions, and Outcomes • •

Troubleshooting Step 1 • System Information – Manufacturer, model, OS, network environment, connection type

Troubleshooting Step 1 • System Information – Manufacturer, model, OS, network environment, connection type • Open-ended questions – – – What problems are you experiencing with your computer or network device? What software has been changed recently on your computer? What were you doing when the problem was identified? What error messages have you received? What type of network connection is the computer using? • Closed-ended questions – – – Has anyone else used your computer recently? Can you see any shared files or printers? Have you changed your password recently? Can you access the Internet? Are you currently logged into the network?

Troubleshooting Step 2 • Establish a theory of probable causes • Create a list

Troubleshooting Step 2 • Establish a theory of probable causes • Create a list of the most common reasons why the error would occur and list the easiest or most obvious causes at the top with the more complex causes at the bottom. – – – – Loose cable connections Improperly installed NIC ISP is down Low wireless signal strength Invalid IP address DNS Server issue DHCP server issue Network issue (switch, router, etc)

Troubleshooting Step 3 • Test the Theory to Determine cause • Start with the

Troubleshooting Step 3 • Test the Theory to Determine cause • Start with the quickest and easiest – – – – Check that all cables are connected to the proper locations Disconnect and then reconnect cables and connectors Reboot the computer or network device Login as a different user Repair or re-enable the network connection Contact the network administrator Ping your default gateway Access remote web pages • If exact cause of the problem has not been determined after you have tested all your theories, establish a new theory of probable causes and test it

Troubleshooting Step 4 • Establish a Plan of Action to Resolve the Problem and

Troubleshooting Step 4 • Establish a Plan of Action to Resolve the Problem and Implement the Solution • Sometimes quick procedures can determine the exact cause of the problem or even correct the problem • If a quick procedure does not correct the problem, you might need to research the problem further to establish the exact cause – – Helpdesk repair logs Other technicians FAQ, Technical, newsgroup, forum, search websites Computer/device manuals • Divide larger problems into smaller problems that can be analyzed and solved individually

Troubleshooting Step 5 • Verify Full System Functionality and Implement Preventative Measures – Ipconfig

Troubleshooting Step 5 • Verify Full System Functionality and Implement Preventative Measures – Ipconfig /all is used to display IP Address information – Ping is used to check network connectivity – Nslookup is used to query Internet domain name server – Tracert is used to determine the route taken by packets when they travel across the network – Net View is used to display a list of computers in a workgroup – Have the customer verify the solution and system functionality

Troubleshooting Step 6 • Document • Discuss the solution with the customer • Have

Troubleshooting Step 6 • Document • Discuss the solution with the customer • Have the customer confirm that the problem has been solved • Document the process – Problem description – Solution – Components used – Amount of time spent in solving the problem

Common Problems/Solutions

Common Problems/Solutions

Summary • A computer network is composed of two or more computers that share

Summary • A computer network is composed of two or more computers that share data and resources • A Local Area Network (LAN) refers to a group of interconnected computers that are under the same administrative control • A Wide Area Network (WAN) is a network that connects LANs in geographically separated locations • In a peer-to-peer network, devices are connected directly to each other. A peer-to-peer network is easy to install, and no additional equipment or dedicated administrator is required. Users control their own resources, and a networks best with a small number of computers. A client/server network uses a dedicated system that functions as the server. The server responds to requests made by users or clients connected to the network.

Summary (continued) • A LAN uses a direct connection from one computer to another.

Summary (continued) • A LAN uses a direct connection from one computer to another. It is suitable for a small area, such as in a home, building, or school. A WAN uses point-to-point or point-to-multipoint, serial communications lines to communicate over greater distances. A WLAN uses wireless technology to connect devices together. • The network topology defines the way in which computers, printers, and other devices are connected. Logical topology describes how the hosts access the medium and communicate on the network. Physical topology describes the layout of the wire and devices, as well as the paths used by data transmissions. . Topologies include bus, star, ring, and mesh. • Networking devices are used to connect computers and peripheral devices so that they can communicate. These include hubs, bridges, switches, routers, and multipurpose devices. The type of device implemented depends on the type of network.

Summary (continued) • Networking media can be defined as the means by which signals,

Summary (continued) • Networking media can be defined as the means by which signals, or data, are sent from one computer to another. Signals can be transmitted either by cable or wireless means. The media types discussed were coaxial, twisted-pair, fiber-optic cabling, and radio frequencies. • Ethernet is now the most popular type of LAN technology. The Ethernet architecture is based on the IEEE 802. 3 standard. The IEEE 802. 3 standard specifies that a network implement the CSMA/CD access control method. • The OSI reference model is an industry standard framework that is used to divide the functions of networking into seven distinct layers. These layers include Application, Presentation, Session, Transport, Network, Data Link, and Physical. It is important to understand the purpose of each layer.

Summary (continued) • The TCP/IP suite of protocols has become the dominant standard for

Summary (continued) • The TCP/IP suite of protocols has become the dominant standard for the Internet. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. • A NIC is a device that plugs into a motherboard and provides ports for the network cable connections. It is the computer interface with the LAN. • A modem is an electronic device that is used for computer communications through telephone lines. It allows data transfer between one computer and another. The modem converts byte-oriented data to serial bit streams.

Summary (continued) • The three transmission methods to sending signals over data channels are

Summary (continued) • The three transmission methods to sending signals over data channels are simplex, half-duplex, and full-duplex. Full-duplex networking technology increases performance because data can be sent and received at the same time. DSL, two-way cable modem, and other broadband technologies operate in full-duplex mode. • Network devices and media, such as computer components, must be maintained. It is important to clean equipment regularly and use a proactive approach to prevent problems. Repair or replace broken equipment to prevent downtime. • When troubleshooting network problems, listen to what your customer tells you so that you can formulate open-ended and closed-ended questions that will help you determine where to begin fixing the problem. Verify obvious issues and try quick solutions before escalating the troubleshooting process.