Ebook Introduction to Networking with Network +1: Part 1

250 3 0
Ebook Introduction to Networking with Network +1: Part 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

This book uses particular fonts, symbols, and heading conventions to highlight important information or to call your attention to special steps. For more information about the features in each lesson, refer to the Illustrated Book Tour section. Ebook Introduction to Networking with Network +1: Part 1 include of the following content: Lesson 1 Introduction to Networks; Lesson 2 The OSI and TCP/IP Models; Lesson 3 Media; Lesson 4 Network Addressing; Lesson 5 Network Protocols; Lesson 6 Networking Devices.

This page is intentionally left blank Introduction to Networking with Network1 Timothy Pintello Credits VP & PUBLISHER EXECUTIVE EDITOR EDITOR DIRECTOR OF SALES EXECUTIVE MARKETING MANAGER EDITORIAL PROGRAM ASSISTANT SENIOR PRODUCTION & MANUFACTURING MANAGER ASSOCIATE PRODUCTION MANAGER ASSISTANT MARKETING MANAGER CREATIVE DIRECTOR COVER DESIGNER TECHNOLOGY AND MEDIA COVER PHOTO Don Fowley John Kane Bryan Gambrel Mitchell Beaton Chris Ruel Jennifer Lartz Janis Soo Joel Balbin Debbie Martin Harry Nolan Jim O’Shea Tom Kulesa/Wendy Ashenberg Arthur Kwiatkowski /Getty Images, Inc This book was set in Garamond by Aptara®, Inc and printed and bound by Bind-Rite Robbinsville The cover was printed by Bind-Rite Robbinsville Copyright © 2013 by John Wiley & Sons, Inc All rights reserved No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600 Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008 To order books or for customer service, please call 1-800-CALL WILEY (225-5945) Microsoft, ActiveX, Excel, InfoPath, Microsoft Press, MSDN, OneNote, Outlook, PivotChart, PivotTable, PowerPoint, SharePoint, SQL Server, Visio, Windows, Windows Mobile, Windows Server, Windows Vista, and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries Other product and company names mentioned herein may be the trademarks of their respective owners The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred The book expresses the author’s views and opinions The information contained in this book is provided without any express, statutory, or implied warranties Neither the authors, John Wiley & Sons, Inc., nor their resellers or distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by this book Evaluation copies are provided to qualified academics and professionals for review purposes only, for use in their courses during the next academic year These copies are licensed and may not be sold or transferred to a third party Upon completion of the review period, please return the evaluation copy to Wiley Return instructions and a free of charge return shipping label are available at www.wiley.com/go/returnlabel Outside of the United States, please contact your local representative ISBN 9780470487327 Printed in the United States of America 10 www.wiley.com/college/ or call the Toll-Free Number: 1+(888) 764-7001 (U.S & Canada only) Preface Welcome to Introduction to Networking with Network1 Wiley aims produce a series of textbooks that deliver compelling and innovative teaching solutions to instructors and superior learning experiences for students Crafted by a publisher known worldwide for the pedagogical quality of its products, these textbooks maximize skills transfer in minimum time Students are challenged to reach their potential by using their new technical skills as highly productive members of the workforce ■ The Wiley Program Introduction to Networking with Network1 includes a complete program for instructors and institutions to prepare and deliver a fundamentals of networking course and prepare students for CompTIA’s Network1 certification exam We recognize that, because of the rapid pace of change in networking technology and changes in the CompTIA Network1 curriculum, there is an ongoing set of needs beyond classroom instruction tools for an instructor to be ready to teach the course Our program endeavors to provide solutions for all these needs in a systematic manner in order to ensure a successful and rewarding course experience for both instructor and student—technical and curriculum training for instructor readiness with new software releases; the software itself for student use at home for building hands-on skills, assessment, and validation of skill development; and a great set of tools for delivering instruction in the classroom and lab All are important to the smooth delivery of an interesting introduction to networking course, and all are provided with the Wiley technology program We think about the model below as a gauge for ensuring that we completely support you in your goal of teaching a great course As you evaluate your instructional materials options, you may wish to use the model for comparison purposes with available products www.wiley.com/college/ or call the Toll-Free Number: 1+(888) 764-7001 (U.S & Canada only) | iii www.wiley.com/college/ or call the Toll-Free Number: 1+(888) 764-7001 (U.S & Canada only) Illustrated Book Tour ■ Pedagogical Features Introduction to Networking with Network1 is designed to cover all the learning objectives for the Network1 exam, which is referred to as its “exam objectives.” The Network1 exam objectives are highlighted throughout the textbook Many pedagogical features have been developed specifically for our Wiley information technology titles Presenting the extensive procedural information and technical concepts woven throughout the textbook raises challenges for the student and instructor alike The Illustrated Book Tour that follows provides a guide to the rich features available with Introduction to Networking with Network1 Following is a list of key features in each lesson designed to prepare students for success on the certification exams and in the workplace: • Each lesson begins with an Exam Objective Matrix More than a standard list of learning objectives, the Exam Objective Matrix correlates each software skill covered in the lesson to the specific Network1 exam objective • Illustrations: Screen images provide visual feedback as students work through the exercises The images reinforce key concepts, provide visual clues about the steps, and allow students to check their progress • Key Terms: Important technical vocabulary is listed at the beginning of the lesson When these terms are first used later in the lesson, they appear in bold italic type and are defined • Engaging point-of-use Reader aids, located throughout the lessons, tell students why this topic is relevant (The Bottom Line), provide students with helpful hints (Take Note), or show alternate ways to accomplish tasks (Another Way) Reader aids also provide additional relevant or background information that adds value to the lesson • Certification Ready features throughout the text signal students where a specific certification objective is covered They provide students with a chance to check their understanding of that particular Network1 exam objective and, if necessary, review the section of the lesson where it is covered • Knowledge Assessments provide progressively more challenging lesson-ending activities, including practice exercises and case scenarios • A Lab Manual is integrated with this textbook The Lab Manual contains hands-on lab work corresponding to each of the lessons within the textbook Numbered steps give detailed, step-by-step instructions to help students learn networking The labs are constructed using real-world scenarios to mimic the tasks students will see in the workplace www.wiley.com/college/ or call the Toll-Free Number: 1+(888) 764-7001 (U.S & Canada only) | v vi | Illustrated Book Tour ■ Lesson Features c09BasicNetworkSecurity.indd Page 285 1/26/12 1:33 PM user-f501 F-401 Basic Network Security LESSO N Exam Objective Matrix E X A M O B J E C T I V E M AT R I X TECHNOLOGY SKILL COVERED EXAM OBJECTIVE EXAM OBJECTIVE NUMBER Explain common threats, vulnerabilities, and mitigation techniques • Wireless: • War driving • War chalking • WEP cracking • WPA cracking • Evil twin • Rogue access point • Attacks: • DoS • DDoS • Man in the middle • Social engineering • Virus • Worms • Buffer overflow • Packet sniffing • FTP bounce • Smurf 5.4 Given a scenario, use the appropriate network monitoring resource to analyze traffic • SNMP • SNMPv2 • SNMPv3 Explain methods of user authentication • PKI • Kerberos • AAA (RADIUS, TACACS+) • Network access control (802.1x, posture assessment) • CHAP • MS-CHAP 4.4 Network Security Considerations Basic Network Security Threats Countering Basic Security Threats Business Scenario c09BasicNetworkSecurity.indd Page 287 1/26/12 1:33 PM user-f501 F-401 Basic Network Security | 287 Allen Fox is the IT manager of a large call center There have been a number of problems in his call center related to basic security threats such as spyware and viruses Allen determines that one way he can minimize these problems is to educate the people who work in the call center about basic security problems What things should Allen include in his education plan for the call center employees? ■ Network Security Considerations 5.3 THE BOTTOM LINE Networking leaves computers susceptible to security threats This lesson covers security threats, how to combat threats, and what to after a security violation has taken place If a computer is attached to a network in any way, it is vulnerable to outside attack Therefore, if you have a network of any sort in your home or work, you need to take into consideration what network security threats are there and how to deal with them The first step to minimize network security threats in a corporate or business environment is to have a comprehensive network security policy for your business Your policy should address the following security considerations: • What security threats does your organization have to combat? • What can you to combat a security threat? • What should you after a security violation has taken place? 285 This lesson deals with each of these considerations in detail c09BasicNetworkSecurity.indd Page 286 1/26/12 1:33 PM user-f501 F-401 ■ Basic Network Security Threats 286 | Lesson THE BOTTOM LINE • • • • After an Attack Has Occurred EAP Two-factor authentication Multifactor authentication Single sign-on Explain common threats, vulnerabilities, and mitigation techniques • Mitigation techniques: • Training and awareness • Patch management • Incident response 5.4 CERTIFICATION READY What are some common security threats to a network? What are some ways to mitigate those threats? 5.4 Network Tools that Can Be Used for Good or Bad Network Access Control (NAC) AAA (authentication, authorization, accounting) packet analyzer attackers packet sniffer authentication phishing botnet physical security certificate port scanner certificate authority private key encryption Challenge-Handshake Authentication Protocol (CHAP) private key certificate Denial of Service (DoS) Public Key Infrastructure (PKI) digital certificate remote access dumpster diving Remote Authentication Dial-In User Service (RADIUS) Extensible Authentication Protocol (EAP) Remote Shell (RSH) File Transfer Protocol (FTP) rogue access point fraggle attack Secure Copy Protocol (SCP) holder Hypertext Transfer Protocol (HTTP) Secure File Transfer Protocol or SSH File Transfer Protocol (SFTP) Hypertext Transfer Protocol Secure (HTTPS) Secure Shell (SSH) identity theft Simple Network Management Protocol version (SNMPv3) intrusion detection software (IDS) First, you need to answer the following questions: “What security threats does my company have to combat?” and “Are there security threats that are common to the entire network?” Next, you need to look at the unique threats that exist for your company or for specific portions of your company It is important to realize that different companies in different lines of business have different priorities and needs when it comes to network security This fact leads different companies to take different measures in addressing threats that they consider specific to their situation The most important thing is that a company is looking at security threats and trying to address them As long as a company is at least aware of the specific threats out there to their own line of business, and are taking steps to address them, they are on the right track As the saying goes, “knowing is half the battle.” Too often, companies—especially smaller ones—do not even think about these things A company that is not thinking about security issues is already at great risk and vulnerable to attack from outside groups or individuals However, this issue is not limited to companies or businesses; it is also a problem in our homes as well In fact, many small-time hackers (sometimes called script kiddies) actually actively target home computers As the very first sentence of this lesson said, any computer connected to any type of network is vulnerable to being attacked The Internet is the biggest and least controlled network out there This means that any computer connected to the Internet is by definition at risk and you should take steps to protect it KEY TERMS 802.11x This portion of Lesson outlines the various threats that are typically seen on a computer connected to or on a network This section discusses various types of malicious software Additionally, the differences between viruses, worms, and trojans are discussed Finally, this section of Lesson outlines a couple of common attacks and vulnerabilities found on networks Key Terms smurf attack intrusion prevention software (IPS) social engineering Kerberos spyware local access TELNET macro Terminal Access Controller Access-Control System Plus (TACACS+) macro virus malicious software Trojan horse man-in-the-middle attack virus Microsoft Challenge-Handshake Authentication Protocol (MS-CHAP) worm www.wiley.com/college/ or call the Toll-Free Number: 1+(888) 764-7001 (U.S & Canada only) Illustrated Book Tour | vii c07LANTechnologies.indd Page 228 25/01/12 2:03 PM user-f396 F-402 228 | Lesson TAKE NOTE * It is good to note that while 10GBase-T cannot use the wiring infrastructure of older versions of Ethernet, older versions of Ethernet can use 10GBase-T’s wiring infrastructure ■ also has to be replaced This has resulted in a slow adoption of this technology In order for 10GBase-T to be used effectively with a range of up to 100 meters in a LAN environment, CAT 6A wiring needs to be in place Standard CAT can work in some situations, but it is not able to achieve the full 100-meter range that CAT 6A can achieve 40/100 GIGABIT ETHERNET 40 Gigabit and 100 Gigabit Ethernet are the latest Ethernet standards available Both are defined under the IEEE 802.3ba standard that was released in June 2010 40/100 Gigabit Ethernet is full-duplex just like 10 Gigabit Ethernet and is intended to be used with multimode fiber, single-mode fiber, and copper cabling 100 Gigabit Ethernet is also intended to have a range of up to 40 km using single-mode fiber 40/100 Gigabit Ethernet also does not support CSMA/CD just like the previously discussed 10 Gigabit Ethernet Finally 40/100 Gigabit Ethernet is intended as a bridge technology between current Ethernet standards and an eventual Terabit Ethernet standard that has not been developed yet Other LAN Concepts THE BOTTOM LINE In this portion of Lesson 7, the basic LAN concepts of broadcasting, collision, bonding, speed, and distance are discussed This section of Lesson also explains how distance needs to be taken into account when designing a new network Additionally, a few concepts related to networking and particularly to LANs are discussed Bottom Line Broadcast CERTIFICATION READY What are broadcasts? How are they used in networking? How does this relate to Ethernet? 3.7 CERTIFICATION READY What is a collision? When collisions occur? 3.7 In its simplest terms, a broadcast is where a computer sends data across a network by sending the data frame containing the data to all computers directly connected to it on a local network In broadcast networking, broadcasts, as described here, are used to send data across a local network Ethernet is a broadcast-based network technology c03Media.indd Page 57 24/01/12 1:22 PM user-f396 In the case of Ethernet, when a computer on a local network wishes to send data to another computer on the local network, it creates a data frame This data frame contains the data that a computer needs to send across the network as well as its own physical address and the physical address of the computer for which the data frame is intended The sending computer then releases the prepared data frame to all the computers on the local network The computers on the local network listen to every data frame that comes by and read their physical destination addresses If the physical destination is the same as that of the computer looking at it, the computer retrieves the data frame and processes it If the destination physical address does not match that of the computer looking at it, the data frame is ignored and not opened Figure 3-9 Media | 57 Shielded twisted-pair cable showing its shielding COLLISION A collision is where two different data frames from two different computers interfere with each other because they were released onto the network at the same time The previously discussed broadcast-based networking technologies create the circumstances that allow collisions to take place Because a data frame is sent to all the computers on a local network segment, if any two computers on that segment send data at the same time, a collision is inevitable CERTIFICATION READY What are STP cables? How they differ from UTP cables? 3.1 Collisions are inevitable because every data frame sent out by one computer is going to every other computer on the network Sooner or later the two data frames that were released at the same time will collide CSMA/CD and CSMA/CA were developed so that a network would be able to two things: (1) limit the number of collisions that take place on a network and (2) so the network and the computers on it would know how to recover when a collision did take place CERTIFICATION READY What is coaxial cable? What applications was it used in during the past? Where are you most likely to find coaxial cable today? What are the two most commonly used types of coaxial cable? 3.1 Take Note Reader Aid Screen Images c12NetworkTroubleshooting.indd Page 442 1/27/12 1:31 PM user-f501 442 | Lesson 12 Figure 12-22 Cable certifier F-402 F-401 TAKE NOTE * It is no longer necessary to know much about most coax cable types used in data networks The primary place that coaxial is used today is in cable TV and broadband Internet access from the cable TV providers The cable used for cable TV is known as 75 ohm cable RG-6 or cable TV coax is used in the broadband home Internet access market Use of coaxial cables of any sort for Ethernetbased networks is pretty much a thing of the past Table 3-1 Coaxial Coaxial cable, referred to as coax, contains a center conductor made of copper that is surrounded by a plastic jacket The plastic jacket then has a braided shield over it A plastic such as PVC or Teflon covers this metal shield The Teflon-type covering is frequently referred to as a plenum-rated coating This coating is expensive; however, it is often mandated by local or municipal fire code when cable is hidden in walls and ceilings Many municipalities require these coatings because if plenum-rated cable is used in a building that catches fire, it will not release toxic gases Non-plenum-rated cables release toxic gases when they are burned Plenum rating applies to all types of cabling, including UTP and STP cables, and is an approved replacement for all other compositions of cable sheathing and insulation There is more about plenum and non-plenum cabling later in this lesson Table 3-1 lists some specifications for the different types of coaxial cables You should note, however, that we tend to use only RG-59 and RG-6 in modern day situations RG R ATING P OPULAR N AME E THERNET I MPLEMENTATION RG-58 U N/A None Solid copper RG-58 A/U Thinnet 10Base-2 Stranded copper RG-8 Thicknet 10Base-5 Solid copper RG-59 Cable television Low cost, short distance N/A Solid copper RG-6 Cable television, cable modems Longer distances than RG-59; some power implementations N/A Solid copper RG-62 ARCnet (obsolete) N/A Solid/stranded copper Coaxial Cable Specifications TIME-DOMAIN REFLECTOMETER (TDR) The main use for Time-Domain Reflectometers (TDRs) is to test cables that are in place A TDR is not only sonar for copper cables and other connections When you connect a TDR to a metal cable it will send an electrical pulse down the wire The response back tells the TDR if there is a fault in the wiring somewhere and exactly how far down the cable the fault is located if there is one TDRs can also be used in metal circuit boards and can tell where faults may be in the circuit board Some cable certifiers like the one shown in Figure 12-22 have TDR capabilities built into them Figure 12-23 shows a TDR Figure 12-23 Time-Domain Reflectometer (TDR) CERTIFICATION READY What are TDRs and OTDRs? How are they related? How are they different? 4.2 OPTICAL TIME-DOMAIN REFLECTOMETER (OTDR) An Optical Time-Domain Reflectometer (OTDR) is basically a TDR for fiber-optic cables It works the same way as a TDR, except that it is designed for fiber-optic cable instead of copper cables The cable certifier shown in Figure 12-22 also has OTDR capabilities www.wiley.com/college/ or call the Toll-Free Number: 1+(888) 764-7001 (U.S & Canada only) T YPE OF C ABLE viii | Illustrated Book Tour c03Media.indd Page 67 24/01/12 1:22 PM user-f396 F-402 Media | 67 Installing Wiring Distributions ■ THE BOTTOM LINE Certification Ready Alert There are many components involved in wiring a computer network The components involved are not just the cables themselves but also connectors, devices the connectors go into, different types of cables based on purpose, and many other things The following section of this lesson discusses some of those devices and types of cables CERTIFICATION READY What are some of the main components of cable distribution in a network? What does each of those components do? 3.8 Cross Reference Reader Aid X Vertical and Horizontal Cross-Connects A cross-connect is a location within a cabling system that facilitates the termination of cable elements, plus the reconnection of those elements with jumpers, termination blocks, and/ or cables to a patch panel, and so on In other words, the cross-connect is where all the wires come together The cables used to make the connection from the switches to the computers have specific names and specifications that go with them REF Lesson in this book will go into much more detail about this topic Cables that run from communications closets to wall outlets are known as horizontal connect cables, because they are generally used on the same floor of a building Sometimes a horizontal cable will run directly from a switch to a wall jack, but more often it will run from something called a patch panel (discussed next) to the wall outlet More Information Reader Aid c05NetworkProtocols.indd Page 125 24/01/12 1:29 PM user-f396 The cable that connects the patch panel with the switch is called a patch cable and is not considered part of the horizontal cable The cable that connects the wall outlet to the actual computer is also called a patch cable In other words, a patch cable is any cable that has a connector on both ends and is used to connect a network device to a network device, a wall jack to a network device, or a network device to a patch panel Patch cables come in two main types and one secondary type These types are straight-through, crossover, and rollover These cables were discussed earlier in this lesson F-402 When using UTP cables for the horizontal connect cables, the cable should not exceed 100 meters, which includes the entire distance from the switch all the way to the computer at the other end Any patch cables that are used to connect up the computers are included in the 100-meter length Network Protocols | 125 Here is a formula that is used to try and keep all this in perspective The cross-connect cable that runs from the switch to the patch panel should not be any longer than meters The horizontal connect cable that goes from the patch panel to the wall jack should not be longer than 90 meters Finally, the patch cable that connects the wall jack to the actual computer should not be longer than meters These values are not absolute, but they are a good point to start with and try to stay within If you add up all the cable lengths, you end up with 99 meters This is one meter within the Category specifications that define cable lengths for UTP cables, preventing you from exceeding the specification limit Because IP only verifies the header of a packet and not the data in the packet, several types of errors are possible when IP packets are sent Some of these errors are: ✚ • Data corruption: The date contained in the packet is corrupted When this happens, although the data arrived at the correct destination, the data carried in the packet is useless because whatever data sent is not what has arrived • Lost data packets: Packets never reach their intended destination This can be caused by any number of things It can be something as simple as the header getting corrupted so that a networking device somewhere down the line discarded it or the connection between the destination and the source could have gone down, which meant the packet was not able to find an alternative route before it expired • Duplicate arrivals: More than one copy of the data packet arrived at the destination computer This could happen because the source computer received a message that a packet was lost when it was not and so it sent a second packet This can also happen if TCP, a higher-level protocol, expected a response from the destination computer and did not receive it and then ordered that a second packet be sent • Out-of-order packet delivery: Packets arrive in a different order than the one they were sent in Most data sent across a network is too large to fit into the data portion of a single packet As a result, most data sent across a network is broken up into multiple pieces and sent with different packets However because different packets can take different routes to get to their destination, and take different amounts of time to arrive, there is a good likelihood that the packet could arrive in a different order from the one in which they were sent When this happens, the receiving computer needs to know what the correct order should be If it does not know this, then the data will be out of order and it will not be able to be effectively reassembled on the destination computer When data is being sent that needs to be reassembled in a specific order, IP needs to use a higher-level protocol such as TCP to properly sequence data MORE INFORMATION The following paragraphs will go into some detail about the headers of select protocols This information is not needed for the CompTIA Networkϩ exam but is included for those students who may wish to become programmers As programmers, they will need to write code for networking applications and in many cases this class may be the only class they have that covers networking The additional information is included for these students In this portion of Lesson 3, we discuss how to install wiring and distribute it across the network and topics such as horizontal and vertical cross-connects, patch panels, and Main Distribution Frames and Intermediate Distribution Frames and their related equipment Additionally we examine how to verify that both your wire installation and wire termination are good Backbone cables that connect equipment rooms, telecommunications rooms, and other physical termination points are referred to as vertical connect cables This name came about because these cables often go from floor to floor in a building All of these cables will eventually connect to each other and finish off the network cabling for the building The exact pieces involved depend on the size of the installation, the needs of the organization, and the structure in which they are installed c04NetworkAddressing.indd Page 86 24/01/12 1:24 PM user-f396 F-402 One of the important things to know about the IPv4 protocol is what the IP header portion of a packet looks like Figure 5-2 shows this Figure 5-2 Internet Protocol version (IPv4) header Version IHL 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 TTL Total Length Differentiated Services Flags Identification Protocol 86 | Lesson Fragment Offset have up to 254 hosts in a single octet and you only need to have room on your network for 178 hosts, you really only need to use the last octet of the IP address as your host portion of the network This is especially true considering that if you use both the third and fourth octets, you are allowed well over 65,000 host numbers That is way too many host IP addresses for just 178 computers Header Checksum Source IP Address Destination IP Address Options and Padding Data ANDing The next logical question related to subnetting is, “How does the computer know what portion of the network address is for the host and which part is for the network ID?” This is where something called the subnet mask comes in The subnet mask is a series of 1s and 0s that the computer uses to determine which part of the IP address is the network ID versus which part is the host The subnet mask is all 1s followed by all 0s Ones are placed in the portion of a four octet IP address that is intended for the network, but 0s are placed in the portion of an IP address that is intended for host The computer then compares the subnet mask IP address to the actual IP address of the computer to determine which part is which As you can see in Figure 5-2, there are many parts to an IP header The first bits of the header contain the IP version being used This is important because IPv4 is handled a bit differently than IPv6 is by networking devices The next bits contain the IHL, which stands for the Internet Header Length and specifies how many 32-bit words are used to make up the IP header The minimum value for an IP header to be valid is five Because our example has six 32-bit words in it, it is a valid IP header The next bits are the Differentiated Services field, which is intended to show any differentiated services that are used by this IP packet Differentiated services are a number of enhancements created for IP that are intended to help IP easily discriminate scalable services that are available on the Internet Scalable services are services that can be built into network nodes and make it possible to quantify network performance based on peak performance, bandwidth, and so on, as well as more relative measures of performance If you wish to know more about this, you can read up on it in RFC 2474 RFC stands for Request For Comment and To illustrate this, we will use our example from earlier The IP address we used previously was 192.130.227.27 Also we stated that 192.130.227 was the network portion of that address and the.27 part was the host portion of that address Finally if you look back even earlier in this lesson, we said the binary value for this IP was 11000000100000101110001100011011 This is all well and good, but how you tell the computer this? You tell the computer this by giving it the subnet mask 255.255.255.0 The next logical question is, “How does this tell the computer anything?” The answer to that question comes from comparing the binary address of the computer to the binary equivalent of the subnet mask The binary equivalent for the subnet mask 255.255.255.0 is 11111111111111111111111100000000 The computer uses a logical AND truth table to compare the full IP address of the computer to the subnet mask The logical AND truth table resembles Table 4-1 Table 4-1 Logical AND Truth Table Easy-to-Read Tables I NPUT I NPUT O UTPUT 0 0 1 0 1 Following the AND truth table rules shown in Figure 4-1, the computer compares the binary value of the IP address to the binary value of the subnet mask The process of comparing the IP address with the subnet mask using the AND truth table is called ANDing The result of ANDing looks something like Table 4-2 Table 4-2 Result of ANDing 192.130.227.27 with the Subnet Mask 255.255.255.0 1 0 0 0 0 0 1 0 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 1 0 0 0 0 0 1 1 0 1 0 0 0 0 AND www.wiley.com/college/ or call the Toll-Free Number: 1+(888) 764-7001 (U.S & Canada only) 204 | Lesson 14 With the left mouse button, double-click Documents and Settings 15 With the right mouse button, click on the folder or User Name where the files and folders are located that you want to gain access to 16 With the left mouse button, click on the Sharing and Security link 17 With the left mouse button, click on the check box Make this folder private to remove the check mark from the box If there is no check mark in the box already, skip down to step 18 18 With the left mouse button, click on the check box next to the Share this folder on the network link to place a check in the box The user’s folder name will appear in the Share name text box as the default Share name Again you can rename it to a different share name if you so desire 19 With the left mouse button, click on the checkbox next to Allow network users to change my files to place a check in the box 20 With the left mouse button, click OK 21 The Setting folder permissions dialog box will briefly appear 22 A hand holding the folder appears, indicating the folder is now shared 23 With the left mouse button, click the Close button to close the C:\Documents and Settings window 24 Repeat steps 18–23 to share other folders on the other computers TAKE NOTE * It could take up to 15 minutes for the computers to start showing up It is a known issue with the Windows XP Computer Browser function It is quicker to just restart all computers, if one of them is not showing up ■ Verify the Share in Network Places With the left mouse button, click Start With the left mouse button, click Control Panel With the left mouse button, click Network Connections or Network and Internet Connections, then Network Connections With the left mouse button, click on My Network Places, below Other Places, on the left side of the screen With the left mouse button, click on View workgroup computers, below Network Tasks, on the left side of the screen With the left mouse button, double-click on one of the computers to view the shared folders/files on it You will see your computers It is best practice to have all computers in the same workgroup, so they will show up on the other computers If you not see your computers, then you may have a “firewall” of sorts running on your computer You will need to either configure your firewall to allow file sharing between computers or temporarily shut the firewall down You can now exchange data between the two computers Lab Connecting Multiple Computers Together Using a Switch or Hub The purpose of this lab is to connect more than one computer together using a switch or a hub Using switches is preferable for this lab because switches are what a student is most likely to see in the corporate world After completing this lab, the student will be familiar with what is involved in connecting multiple computers together via a switch or hub Networking Devices | 205 MATERIALS • More than one computer with NICs in them and running Windows XP • The straight-through cable created in Lesson lab • A switch or hub • Paper • Pen or pencil DO THE LAB Build a Network Using a Switch or Hub Make sure all the computers are off Connect each computer to the switch or hub by using a straight-through cable to connect each computer’s NIC to a port on the switch or hub Go through the steps laid out under the heading Verify the Share in Network Places in Lab to verify that all the computers connected to the switch or hub can see each other and share data If a computer cannot be seen on the network, go through the necessary components of Lab for each computer that is not seen on the network so that it can be seen ■ Lab Connecting Multiple Switches or Hubs Together in a Single Network The purpose of this lab is to teach the student how to link multiple switches or hubs together in a single network After completing this lab the student will be familiar with the concepts behind linking multiple switches or hubs together in a single network As in Lab 2, switches are preferable to hubs for this lab because the student in more likely to see switches in the corporate world than they are to see hubs MATERIALS • Two or more networks from Lab • Straight-through cables to connect the various switches or hubs together • Paper • Pencil DO THE LAB Connect Multiple Networks Together Using Switches or Hubs Link two or more switches with their computers still connected together using a straightthrough cable Check whether the computers connected to the different switches are all part of the same workgroup using the appropriate steps from Lab If they are not, change the workgroup names in the computers so that they all use the same workgroup name Do this by following the appropriate steps in the first section of Lab 206 | Lesson Go through the steps laid out under the heading Verify the Share in Network Places in Lab to verify that all the computers connected to the switch or hub can see each other and share data If a computer cannot be seen on the network, go through the necessary components of Lab for each computer that is not seen on the network so that it can be seen ■ Lab Creating a Virtual Workstation using VMPlayer In this lab the student will download, or have their professor download ahead of time, the installation file for VMPlayer and an ISO for a Linux distribution, sometimes called a Linux distro For the purposes of this lab I have chosen to use MintOS 11, which is a Windows like variation of the Linux distro called Ubuntu In the first part of this lab the student will install VMPlayer and look at some of its capabilities In the second part of this lab the student will use VMPlayer to create and install a virtual machine of the Linux distro they downloaded Once they have created and installed the virtual machine, they will then use it and explore the Linux operating system This lab will introduce the student to concepts of virtual computing, software related to virtual computing, how to install a Linux operating system, and how to use the Linux operating system with a graphical interface MATERIALS • The file VMware-player-3.1.4-385536.exe or a newer version • The ISO linuxmint-11-gnome-cd-nocodecs-32bit.iso or the ISO of a Linux distro of your professor’s choice • A computer running Windows XP or later • Paper • Pencil TAKE NOTE * VMPlayer is a fully functional educational and personal use version of VMWare’s VMWorkstation software and does not have a usage time limit on it The only difference between VMPlayer and VMWorkstation is that VMWorkstation had some additional functionality that VMPlayer does not DO THE LAB Obtaining the Needed Files The two files listed above can be downloaded both legally and free from the Internet To download the VMware-player file go to www.filehippo.com and search for VMPlayer a Once you have found the file listed above, or a later version of it, download it to the local computer b Alternatively your professor can download the file ahead of time and store it in a network location c Write down the location where this file is saved on the local computer Networking Devices | 207 To download the Linux ISO listed above you will need to go to the website http://www linuxmint.com/edition.php?id=83 The version being downloaded from this location is the 32-bit CD no Codex version a Once you have found the ISO file listed above, download it to the local computer b Alternatively your professor can download the file ahead of time and store it in a network location c Write down the location where this file is saved on the local computer Install VMPlayer Navigate to the VMPlayer installation file downloaded previously Double click the MVPlayer installation file Figure 6-27 shows what the installation dialog box should look like Figure 6-27 VMPlayer initial installation dialog box Press the button and take the default options until you reach a dialog box similar to Figure 6-28 Once you see this dialog box, click on Figure 6-28 VMPlayer’s “Ready to Perform Requested Operations” dialog box 208 | Lesson Once the VMPlayer installation program has completed its installation, the dialog box in Figure 6-29 will be displayed When you see this dialog box, close all open programs and click on the control button in the “Setup Wizard Complete” dialog box Figure 6-29 VMPlayer’s “Setup Wizard Complete” dialog box Once the system has restarted, locate the VMPlayer icon on the Desktop and doubleclick it This will load the VMPlayer program When loaded, VMPlayer will look similar to Figure 6-30 Figure 6-30 VMPlayer running in a Windows environment Networking Devices | 209 VMPlayer is now installed and running in Windows Look around in VMPlayer and view some of the Help options available in VMPlayer Close VMPlayer Creating Your First Virtual Machine Once you have installed and restarted your computer, you need to Double Click on the icon for VMPlayer and bring up the same dialog box as shown in Figure 6-30 In the left hand pane of VMPlayer you will notice for icons Double Click the icon labeled “Create a New Virtual Machine” Once you have completed step a dialog box similar to the one in Figure 6-31 will come up Figure 6-31 VMPlayer New Virtual Machine Wizard Click on the radial button labeled “Installer disc image file (iso):” Click on the button located to the left of the above radial button and browse to the location where your ISO image has been stored This will point the new virtual machine to where it needs to go in order to install the guest operating system Once you have clicked on the ISO you want to use, click on the button After clicking on the button you will get a dialog box that looks like Figure 6-32 210 | Lesson Figure 6-32 VMPlayer New Virtual Machine Wizard “Select Guest Operating System” dialog box Make sure that the radial button labeled “Linux” is selected in the “Guest Operating System” portion of the dialog box Make sure that “Ubuntu” is selected in the “Version” part of the dialog box Click the button to move on to the next dialog box Continue clicking on the button while leaving the default settings until you reach a dialog box like the one shown in Figure 6-33 Figure 6-33 VMPlayer New Virtual Machine Wizard “Name the Virtual Machine” dialog box Networking Devices | 211 10 In the “Virtual Machine Name” portion of the dialog box, type a name that will tell you what this virtual machine is As you can see from Figure 6-33, I named my virtual machine “MintOS 11” you can use whatever name reminds you exactly what the virtual machine is 11 Take the default setting in the “Location” portion of the dialog box 12 Click and continue taking default settings until you reach a dialog box similar to Figure 6-34 Figure 6-34 VMPlayer New Virtual Machine Wizard “Ready to Create Virtual Machine” dialog box 13 Click the button in this dialog box If a dialog box comes up talking about removable devices simply click the button for that dialog box Once you have done this, a dialog box similar to the one found in Figure 6-35 will come up Figure 6-35 VMPlayer New Virtual Machine Wizard “VMWareTools” dialog box 212 | Lesson 14 It is very important that you click the button in this dialog box because you cannot install VMTools in a Linux Guest Operating System like you can a Windows Quest Operating System The next part of this Lab will walk us through the process of installing VMTools in a Linux Guest Operating System Once you click the button a screen similar to Figure 3-36 will come up Figure 6-36 VMPlayer MintOS virtual machine with message box 15 On the bottom part of the screen there is a message box Click on the “I Finished Installing” button to make that message box go away When you do, you will have a screen like Figure 6-37 where that bottom message box has disappeared Figure 6-37 VMPlayer MintOS virtual machine without message box 16 Once you have a screen similar to Figure 3-37 up, fine the icon on the MintOS desktop that says “Install Linux Mint” This icon will allow you to install MintOS as a full blown virtual machine that will act just like a computer where the MintOS operating system is installed directly into the computer 17 Double Click the “Install Linux MintOS” icon When you this a screen similar to Figure 6-38 will come up Networking Devices | 213 Figure 6-38 VMPlayer MintOS virtual machine “Allocated Space” install dialog box 18 Make sure that the radial button labeled “Erase disk and install Linux Mint” is highlighted like in Figure 6-38 and then click on the button 19 Continue clicking on the button and taking the default options until you come to a screen like the one shown in Figure 3-39 Figure 6-39 VMPlayer MintOS virtual machine “Erase and install Linux Mint” install dialog box 20 Once you have a screen like the one shown in Figure 6-39 up, click on the button Once the button has been clicked a screen similar to the one in Figure 6-40 will come up Figure 6-40 VMPlayer MintOS virtual machine “Who are you” install dialog box not populated 214 | Lesson 21 In the dialog box like the one that appears in Figure 6-40 type your first name in the text field labeled “Your Name” When you this the field labeled “Your Computer’s Name” will automatically be populated 22 In the field labeled “Pick a Username” you can enter the username you would prefer to use 23 Finally choose a password and type it in the “Choose a password” field and retype it in the “Confirm your password” field When you get done your dialog box should look something like the dialog box shown in Figure 6-41 Figure 6-41 VMPlayer MintOS virtual machine “Who are you” install dialog box populated TAKE NOTE * It is very important to note that Linux is case sensitive This means that if you choose to use a capital letter in your username you will have to make sure you use the capital letter whenever you log into Linux as well 24 When the “Who are you” dialog box is completely filled out click on the button 25 Keep clicking the button and accepting the default settings until you reach a dialog box that looks like the one in Figure 6-42 Figure 6-42 VMPlayer MintOS virtual machine “Installation Complete” dialog box 26 Once you have the dialog box up shown in Figure 6-42 click the button This will force the quest operating system inside VMPlayer to restart and make all the changes you made permanent 27 Once MintOS has restarted you will get a screen similar to the one shown in Figure 6-43 28 Click on your username and enter your password This will bring up the MintOS desktop This will look just like the desktop shown in Figure 6-37 minus the “Install Linux Mint” icon Networking Devices | 215 Figure 6-43 VMPlayer MintOS virtual machine logon screen 29 Congratulations, you have successfully installed Linux MintOS into VMPlayer The Linux installation process you followed here is exactly the same installation process you would have followed to install this Operating System directly onto a computer 30 Leave MintOS open and active for the next section of this Lab Installing VM-Tools inside Linux VMTools is not absolutely necessary for using a virtual machine inside VMPlayer However, VMTools make it easier for the Guest operating system running inside VMPlayer to interact with the Host operating system that VMPlayer is running on more smoothly TAKE NOTE * You can install any software package that is available in Linux MintOS in the same manner that you install VMTools Figure 6-44 MintOS start menu When installing a Windows based Guest operating system, VMTools can be installed at the time the Guest operating system is installed However, when running a Linux or Unix based Guest operating system VMTools needs to be installed separately This section of Lab will take you through the process of installing VMTools on the MintOS Guest operating system using the Graphical Software Management Tool that comes with MintOS Make sure that the Linux MintOS Quest operating system is running and that your are on the MintOS desktop that you ended on in the last section Click on the “Menu” button in the bottom left hand side of the MintOS desktop and a Start Menu similar to the one shown in Figure 6-44 will come up 216 | Lesson On the left hand side of the MintOS start menu under the heading “System” is a program button labeled “Software Manager” Click on the “Software Manager” menu option When you a program dialog box similar to the one shown in Figure 6-45 will come up Figure 6-45 MintOS Software Manager program dialog box As can be seen from the screen shot in Figure 6-45, there are over 33,000 packages available for download All the programs are free Some time you may want to look at the different programs available in the different categories to see what is available For our purposes we will use the search tool in the upper right hand corner of the package manager to look for VMTools To this, place the word “vmware” in the search tool like shown in Figure 6-46 Figure 6-46 MintOS Software Manager program dialog box with “vmware” in the search tool Once you have searched for “vmware” you will notice that packages came up The package we are interested in is the one labeled “open-vm-toolbox” Double click on the package named “open-vm-toolbox” When you the screen shown in Figure 6-47 will come up Networking Devices | 217 Figure 6-47 MintOS Software Manager install screen for “ open-vm-toolbox” When the screen shown in Figure 6-47 comes up click on the button labeled “install” Once this package is done installing, all components needed for VMTools Click the X in the upper right hand corner to close the Software Management Tools Once VMTools is installed, look around MintOS and get a feel for it You may also want to go back into the Software Management Tool and see if there are other programs you would like to install List some things you like about MintOS List some things you did not like about MintOS 10 How you think MintOS compares to Windows? 218 | Lesson 11 Once you are finish looking around in MintOS, go back to the start “Menu” button and Quit MintOS The Quit button will be the Menu option at the very bottom of the Start Menu on the left hand side When you click on the Quit option, the Shutdown Computer dialog box will come up as shown in Figure 6-48 Figure 6-48 MintOS Shutdown Computer screen 12 To complete shutting down MintOS, click the “Shutdown” option Once you that you will be taken back to the VMPlayer main screen This will look like Figure 6-49 Figure 6-49 VMPlayer opening screen with MintOS shown in the left hand pane 13 If you wish to go back into the MintOS virtual machine, simply open up VMPlayer and Double-Click the MintOS option in the left hand pane This will begin the process of loading the MintOS virtual machine so that you can begin using it again ... Mask 255.255.255.0 1 0 0 0 0 0 1 0 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 1 0 0 0 0 0 1 1 0 1 0 0 0 0 AND www.wiley.com/college/ or call the Toll-Free Number: 1+ (888) 764-70 01 (U.S & Canada only)... 12 1 11 8 11 7 17 1 Fiber to Ethernet 17 2 Fiber to Coaxial 17 3 Singlemode Fiber to Multimode Fiber Repeaters and Hubs 17 3 17 4 www.wiley.com/college/ or call the Toll-Free Number: 1+ (888) 764-70 01. .. to that question comes from comparing the binary address of the computer to the binary equivalent of the subnet mask The binary equivalent for the subnet mask 255.255.255.0 is 11 111 111 111 111 111 111 111 100000000

Ngày đăng: 20/12/2022, 12:33

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan