Network+ Guide To Networks, 8th Edition Lecture Notes

Network+ Guide To Networks, 8th Edition Lecture Notes captures key lecture discussions, ensuring you don�t miss important concepts and insights.

Benjamin Clark
Contributor
4.7
32
11 months ago
Preview (16 of 179 Pages)
100%
Log in to unlock

Page 1

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 1 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-1© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.Chapter1Introduction to NetworkingAt a GlanceInstructor’s Manual Table of ContentsOverviewObjectivesTeaching TipsQuick QuizzesClass Discussion TopicsAdditional ProjectsAdditional ResourcesKey Terms

Page 2

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 2 preview image

Loading page ...

Page 3

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 3 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-2© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.Lecture NotesOverviewLoosely defined, a network is a group of computers and other devices connected by some typeof transmission media. Variations on the elements of a network anditsdesign, however, arenearly infinite.A network can be as small as two computers connected by a cable in a homeoffice or the largest network all, the Internet, made up ofbillions of computersand otherdevicesconnected across the world via a combination of cable, phone lines, and wireless links.Networksmightlinkcellphones,personalcomputers,mainframecomputers,printers,corporate phone systems, security cameras, vehicles, and wearable technology devices. Theymight communicate through copper wires, fiber-optic cable, or radio waves. This chapterintroduces students to the fundamentals of networks and how technicians support them.Chapter ObjectivesAfter reading this chapter and completing the exercises, the student will be able to:Distinguish between client-server and peer-to-peer models used to control access to anetworkIdentify types of applications and protocols used on a networkDescribe various networking hardware devices and the most common physical topologiesDescribe the seven layers of the OSI modelExplore best practices for safety when working with networks and computersDescribe the seven-step troubleshooting model for solving a networking problemTeaching TipsNetwork Models1.Define and describe the termtopology.Discuss the two types of topology students willneed to understand:physical topologylogical topology2.Explain that controlling how users and programs get access to the resources on anetwork is a function of the OS used on the network.3.Introduce students to the peer-to-peer and the client-server network models.Point outthat the client-server model requires one or more network operating systems (NOS).

Page 4

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 4 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-3© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.Peer-to-Peer Model1.Discuss the characteristics of aP2P(peer-to-peer)networkmodel.2.Describe the characteristics of a traditional peer-to-peer network.3.Use Figure 1-1to illustrate resource sharing on a peer-to-peer network.4.Discuss the three ways resources can be sharedif all computers in a P2P network arerunning a Windows OS.5.Describe the advantages of peer-to-peer networks.6.Describe the disadvantages of peer-to-peer networks.TeachingTipBe sure to emphasize that modifying file-sharing controls is operating systemdependent and that this method of resource sharing may lead to access controlsthat are not uniform or secure.Client-Server Network Model1.Introduce the client/server model.Use Figure 1-2in your discussion.2.Define and describea Windows domain. Point out thecentralized database that containsuser account information and security for the entire group of computers is called ActiveDirectory (AD).3.Point out that a Microsoft account links local domain resources with Microsoft cloudresources. Compare this type of account to a local account, which is specific to adomain.TeachingTipStudents can learn more about Microsoft Active Directory by visiting:https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview4.Describe how clients and serverscommunicate.5.Provide examples of current Network Operating Systemsand discuss some of the tasksthat a NOS is responsible.

Page 5

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 5 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-4© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.6.Describe the disadvantage of a client/server network relative to a peer-to-peer network.7.Describe the advantages of aclient/server network relative to a peer-to-peer network.Client-Server Applications1.Define networkservices.2.Explain that a client-server application involves two computers:client computerserver3.Use Figure 1-3to demonstrate how a client and server communicate across a network.4.Define and discuss protocols.TeachingTipBe sure to emphasize that it is possible for a computer to act as both a client anda server and explain how this might occur.5.Discuss several popularclient-server applications used on networks and the Internet:web serviceemail servicesFTP serviceTelnet serviceremote applicationsRemote DesktopNetworkHardware1.Introduce this section by using Figure 1-6 to discuss networking hardware and howthathardware is connected together.LANs and Their Hardware1.Define and describe a LAN.Mention that LANs are usually contained in a small space,such as an office or building.2.Define and describeaswitch.3.Introducethestar topology.Use Figure 1-6 to illustratea typical star topology network.

Page 6

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 6 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-5© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.4.Compare a star topology to a mesh topology, where each device connects to multipleother devices. Use Figure 1-1 to illustrate a mesh topology.5.Use Figure 1-8 to discuss the concept of a network port.6.Define and describeNICs (network interface cards).Use Figure 1-9 in your discussion.Point out that a NIC may also be called a network adapter.7.Introduce the concept of a network backbone.8.Note the cabling needs for a network backbone and discuss whythey are important.9.Introducethebustopologyas devices that are daisy-chained together.10.Define and describe the star-bustopology, which is a type of hybrid topology.UseFigure 1-10 to illustratea star-bustopology.11.Define and describe arouter as a device that manages traffic between two or morenetworks. Mention that a very important function of a router is to determine the bestpath for traffic to go through in order to reach its destination.12.Use Figures 1-12 and1-13to discuss the difference between a switch and a router.MANs and WANs1.Define and describe a WAN as a group of LANs that spread over a wide2.Define and describeaMAN.Point out that a MAN may also be called a CAN.3.Use Figure 1-14 to illustrate aWAN connecting two LANs in different geographicalareas.TeachingTipBe sure to mention thatthe Internet the largest and most varied WAN in theworld.

Page 7

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 7 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-6© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.Quick Quiz 11.Which of the following protocols is used by a client to send an email message?a.HTTPb.SMTPc.FTPd.RDPAnswer: B2.When Windows Server controls network access to a group of computers, this logicalgroup is called which of the following?a.workgroupb.homegroupc.domaind.access groupAnswer: C3.True orFalse: A client/server network is the simplest network model.Answer: False4.A _____ is a central conduit that connects the segments (pieces) of a network.Answer:backbone5.A network that is larger than a LAN and connects clients and servers from multiplebuildings is known aswhich of the following?a.WANb.MANc.PANd.LANAnswer:bTheSeven-LayerOSI Model1.Use Figure 1-15 to compare network communications and the US Postal Service.2.Define and describe the OSIreferencemodel.Stress the importance of using the OSImodel to help understand networking protocols and to troubleshoot network problems.3.Introduce the seven layers of the OSI model.Use Figure 1-16 in your discussion.4.Emphasize thatthe OSI model is a theoretical representation of what happens betweentwo nodes communicating on a network.

Page 8

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 8 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-7© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.TeachingTipStudents may find more information on the OSI Model's seven layers athttp://support.microsoft.com/kb/103884Layer 7:Application Layer1.Introduce and describe the Application layer.2.Explain how the Application Layer facilitates communicationbetween softwareapplications and lower-layer network services.3.Point out thatdata passed between applications or utility programs and the OS is calleda payload.Layer 6:Presentation Layer1.Introduce and describe the Presentation layeras being responsible for reformatting,compressing, and/or encrypting data in a way that the application on the receiving endcan read.2.Explain how the Presentation layer services also manage data encryption (such as thescrambling of passwords) and decryption.Layer 5:Session Layer1.Introduce and describe the functionof the Session layer.2.Explain how theterm sessionis used to describe an established connection between twoend points.3.Point out that most tasks are performed by the OS when an application makes an APIcall to the OS.Layer 4:Transport Layer1.Introduce and describe the function of theTransportlayer.2.Define and describeTCP and the characteristics of aconnection-oriented protocol.3.Define and describeUDP and the characteristics of aconnectionless protocol.4.Define encapsulation as the process of adding of a header to the data inherited from thelayer above.5.Discuss the Transport layer’s use of ports numbers.

Page 9

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 9 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-8© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.6.Point out that TCP messages aredivided into smaller messages calledsegments andUDP messages are known as a datagram.Layer 3:Network Layer1.Introduce and describe the function of the Network layer.2.Note that the IP protocol is the most commonNetwork layer protocol.3.Explain how the data unit accepted from the Transport layer is transformed into apacket.4.Define and discuss an IP address.Mention that because an IP address is used by theNetwork layer, it may also be known as a network address.5.Point out that IP relies on several routing protocols to find the best route for a packetwhen traversing several networks on its way to its destination.6.Define and discuss fragmentation, which is a process that divides a packet into smallerpackets.Layer 2:Data Link Layer1.Introduce and describe the function of the Data Link layer.2.Point out that switchesand NICsoperate at this layer.3.Explain that the Data Link layer puts its own control information in a header andattaches control information to the end of the packet (called a trailer) that was receivedfrom the Network layer above.The entire Data Link layer message is then called aframe.4.Describe the communicationmishapreferred to as partial communication.5.DescribeaMAC addressas a Layer 2 address that is found on every network adapter onthe globe.Mention that a MAC address may also be referred to as a physical address,hardware address, or a Data Link layer address.Layer 1:Physical Layer1.Introduce and describe the function of the Physical layer.2.Explain the different signal types corresponding to the different transmission media.

Page 10

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 10 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-9© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.Protocol Data Unit or PDU1.Describe a PDU (protocol data units) and explain how it flows through the model.2.UseTable 1-1 to discuss the different names for a PDU as it moves from one layer toanother.Summary of How the Layers Work Together1.Use Figure 1-17 and Table 1-2 to describe the steps through the OSI layers during abrowser-to-Web server transmission.Safety Procedures and PoliciesEmergency Procedures1.Discuss the importance of knowing the best escape route in the event of an emergency.2.Describe the components of a fire suppression system:a.emergency alert systemb.portable fire extinguishersc.emergency power-offswitchd.suppression agent3.Discuss thedifference between a fail open and a fail close.Point out that a fail-openpolicy is often based on common sense so as to ensure that, in an emergency, no one isharmed when a system is not working.4.Explain that a material safety data sheet (MSDS) explains how to properly handlesubstances such as chemical solvents and how to dispose of them.Safety Precautions1.Explain that electrical and tool safety in workplaces is generally regulated by OSHA.2.Discuss the general OSHA guidelines that should be followed when using power toolsor other hand tools in the workplace:a.Wear PPE (personal protective equipment)b.Keep all tools in good condition and properly storedc.Use the right tool for the jobd.Watch out for trip hazards3.Describe the guidelines that should be followed when lifting heavy objects.

Page 11

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 11 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-10© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.4.Define and describe grounding.5.Discuss the negative effects that static electricity (ESD) can have on electroniccomponents.6.Describe the steps that should be followed before touching a component.Troubleshooting Network Problems1.Introduce basic troubleshooting methodology.2.Use Figure 1-21to describe each of the seven steps of the troubleshooting methodology.3.Demonstrate using the seven steps to troubleshoot a failed network connection (see“Applying Concepts: Troubleshoot a Failed Network Connection”).Quick Quiz 21.What is theseventh layer of the OSI model?a.Physical layerb.Transport layerc.Application layerd.Session layerAnswer:C2.Thename given to a group of bits asit moves from one layer of the OSI model to thenext is which of the following?a.frameb.packetc.segmentd.protocol data unit (PDU)Answer: D3.Protocols in the ____layer accept data from the Session layer and manage end-to-enddelivery of data.Answer: Transport4.True or False: The IP (Internet Protocol) operates in the Transport layer.Answer: False

Page 12

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 12 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-11© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.5.The least intelligent switches operate at which layer of the OSI model?a.Physical layerb.Transport layerc.Session layerd.Data Link layerAnswer: DClassDiscussion Topics1.Discuss the differences and similarities between apeer-to peer network and a clientserver network.2.As a class, discussthe difference between a physical topology and a logical topology.Why are both necessary?Additional Projects1.The student has learned that the OSI model allows TCP to function at the Transportlayer and IP to function at the Network layer. Have the students’ research TCP/IPprotocols in more depthin relation to the OSI model. The students should then prepare areport summarizing their research. Includedin the reportshould be a critiqueofthequestion, “Does the OSI models conform to TCP/IP protocols, or vice versa?Requirestudents to defend their thoughts.Additional Resources1.UnderstandingClient-Server Applicationshttps://www.experts-exchange.com/articles/11271/Understanding-Client-Server-Protocols-and-Web-Applications.html2.Client-Server vs. Peer Networkshttp://www.tomshardware.com/reviews/local-area-network-wi-fi-wireless,3020-2.html3.The Seven Layers of the OSI Modelhttp://www.webopedia.com/quick_ref/OSI_Layers.asp4.How Stuff WorksNetworking Libraryhttp://computer.howstuffworks.com/computer-networking-channel.htm

Page 13

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 13 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-12© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.Key TermsFor definitions of key terms, see the Glossary near the end of the book.Active Directory (AD)Active Directory Domain Services(AD DS)API (application programming interface)callApplication layerbackbonebus topologyCAN (campus area network)catastrophic failureclientclient-server applicationsclient-server network modelconnectionless protocolconnection-oriented protocolData Link layerData Link layer addressdatagramdecapsulationdomainemergency alert systemencapsulationESD (electrostatic discharge)failclosefail openfire suppression systemfirmwarefragmentationframeFTP (File Transfer Protocol)groundinghardware addressheaderhostHTTP (Hypertext TransferProtocol)HTTPS (HTTP Secure)hubhybrid topologyIMAP4 (Internet Message AccessProtocol, version 4)IP (Internet Protocol)IP addressknowledge base

Page 14

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 14 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-13© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.local area network (LAN)logical topologyMAC (Media Access Control)addressMAN (metropolitan areanetwork)mesh topologymaterial safety data sheet (MSDS)networknetworkinterface card (NIC)Network layernetwork operating system (NOS)network servicesnodeOSHA (Occupational Safety andHealth Administration)OSI (Open Systems Interconnection)reference modelpeer-to-peer (P2P) networkPacketPAN (personal areanetwork)payloadprotocol data unit (PDU)physical addressPhysical layerphysical topologyPOP3 (Post Office Protocol,version 3)port numberPPE (personal protective equipment)Presentation layerprotocolRDP (Remote DesktopProtocol)remote applicationRemote Desktop Servicesring topologyrouterscalablesegmentserverSession layerSFTP (Secure File TransferProtocol)SMTP (Simple Mail TransferProtocol)SNMP (Simple Network Management Protocol)SOHO (small office-home office)SSH (Secure Shell)SSL(Secure Sockets Layer)star topologystar-bus topologystatic electricityswitch

Page 15

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 15 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition1-14© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.TCP (Transmission ControlProtocol)TCP/IPTelnetTLS (Transport Layer Security)topologytrailerTransport layertrip hazardUDP (User Datagram Protocol)upset failureWAN (wide area network)

Page 16

Network+ Guide To Networks, 8th Edition Lecture Notes - Page 16 preview image

Loading page ...

Network+ Guide to Networks, 8thEdition2-1© 2019Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in alicense distributed with a certain product or service or otherwise on a password-protected website for classroom use.Chapter2Network Infrastructure and DocumentationAt a GlanceInstructor’s Manual Table of ContentsOverviewObjectivesTeaching TipsQuick QuizzesClass Discussion TopicsAdditional ProjectsAdditional ResourcesKeyTerms
Preview Mode

This document has 179 pages. Sign in to access the full document!