Lesson 12 - Internet Connection Types SOHO Configurations Wi-Fi Standards and Encryption
Lesson 12 - Internet Connection Types SOHO Configurations Wi-Fi Standards and Encryption
WIRED
Dial-
ISDN DSL Cable Fiber
up
WIRELESS
▰ Port forwarding opens ports in response to inbound traffic for a specified service. For
example, if you host a web server on your LAN, you could set up a port forwarding rule for
HTTP traffic. When an Internet user sends an HTTP request to your WAN IP address,
domain name, or Dynamic DNS domain name, the router opens the specified port to
direct traffic to your web server
▰ Port Triggering - After a resource on your LAN sends outbound traffic through a “trigger”
port, the router listens for inbound traffic through a specified port or port range. This
function is necessary for applications, such as videoconferencing or gaming, that require
data exchange through specified ports
Other Router Technologies and Functions
▰ QoS - Quality of Services is a feature that attempts to prioritize streaming media, such
as VoIP phone calls and audio or video playback, over other types of network traffic
▰ UPnP - Universal Plug and Play is a group of networking protocols that allows
computers, printers, and other Internet-ready devices to discover each other on the
network. It is consumer-level technology designed to make networking easier for the
user.
Learning Activity
▰ Let’s take a look at the following website: http://ui.linksys.com/
▰ Scroll down and select the WRT54GP2 router, and select version 1.20.01
▰ See if you can find the following options:
▻ NAT
▻ DMZ
▻ Port Forwarding
▻ Port Triggering
▻ QoS
▻ When you find the above option in the router settings click on the “more” button on the right side to
learn more about what this feature is and how to configure the settings
3
WiFi Standards &
Encryptions
802.11 Wireless Standards
https://quizlet.com/231400820/match
Learning Activity
▰ In your groups list the below encryption standards from
least secure to the most secure, and state the reasons why
they are considered to be secure
WEP WPA2
TKIP*
AES* WPA
Learning Activity Solution
▰ Order from least secure to most secure:
▻WEP
▻WPA
▻WPA-TKIP
▻WPA2
Refer to ITE 7.2.2.5
▻WPA2-AES Wireless Security to
learn more
4
Troubleshooting Networks
Common Command Line Tools
▰ PING – used to test the ability of source computer to reach a specified destination
▰ IPCONFIG/IFCONFIG (MacOS/Linux) – utility allows you to get the IP address information of a computer
▰ TRACERT - sends Internet Control Message Protocol (ICMP) Echo Request messages to a specified
remote computer with increasing Time to Live (TTL) field values and displays the IP address and hostname, if
available, of the router interfaces between the source and destination
▰ NETSTAT - most commonly used to display all open network connections and listening ports
▰ NBTSTAT - used to show TCP/IP information and other statistical information about a remote computer
▰NSLOOKUP - most commonly used to display the hostname of an entered IP address. The nslookup
command queries your configured DNS server to discover the IP address
Refer to ITE 8.1.2.9
▰NET - used to manage almost any aspect of a network and its settings including network shares, network Video – Network CLI
print jobs, network users, and much more Commands to learn
more
▰ NETDOM - tool that is built into Windows Server 2008 and Windows Server 2008 R2. It is available if you
have the Active Directory Domain Services (AD DS) server role installed.
Learning Activity
▰ Use the PDF called “Common Command Line
Tool Simulation Document” found on Schoology to
practice using common command line tools.
▰ Alternatively, you can use your own computer if
you have Administrative privileges