0% found this document useful (0 votes)
113 views18 pages

Lesson 12 - Internet Connection Types SOHO Configurations Wi-Fi Standards and Encryption

The document covered common Internet connection types, SOHO router configurations, WiFi standards and encryption types, and troubleshooting tools. It categorized wired and wireless Internet connections from slowest to fastest and discussed SOHO router configuration options like NAT, DMZ, port forwarding, and QoS. It also ordered WiFi standards and encryption types from least secure to most secure. Finally, it outlined common command line network troubleshooting tools like ping, ipconfig/ifconfig, tracert, netstat, and nslookup.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views18 pages

Lesson 12 - Internet Connection Types SOHO Configurations Wi-Fi Standards and Encryption

The document covered common Internet connection types, SOHO router configurations, WiFi standards and encryption types, and troubleshooting tools. It categorized wired and wireless Internet connections from slowest to fastest and discussed SOHO router configuration options like NAT, DMZ, port forwarding, and QoS. It also ordered WiFi standards and encryption types from least secure to most secure. Finally, it outlined common command line network troubleshooting tools like ping, ipconfig/ifconfig, tracert, netstat, and nslookup.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Lesson 12:

Internet Connection Types, SOHO Configurations &


Wi-Fi Standards and Encryption
Objectives
▰ 2.5 Compare and contrast various WiFi networking standards and encryption types.
▰ 2.6 Given a scenario, install and configure SOHO wireless/wired router and apply
appropriate settings.
▰ 2.7 Compare and contrast Internet connection types, network types and their features.
▰4.4 Given a scenario, troubleshoot wired and wireless networks with appropriate tools.
1
Internet Connection Types
Learning Activity
In your teams:
1. Categorize the terms below into wired & wireless Internet connection types
2. After categorizing them, order the wired types from slowest to fastest connection
speeds and the wireless types from slowest to fastest connection speeds
3. Keep in mind the advantages and disadvantages of each type including cost, speed,
reliability, and availability as we will discuss these concepts in the larger group

Satellite Cellular Dial-up


ISDN DSL Cable
Learning Activity Solution

WIRED

Dial-
ISDN DSL Cable Fiber
up

WIRELESS

Refer to ITE 8.2.1.6


Selecting an ISP for
Cellular Satellite the Customer to learn
more
2
SOHO Configurations
Configure SOHO Routers - Ports
The physical ports make up the “switching” portion of SOHO routers. There are several things you need to know how to
configure.
▰ NAT: Network Address Translation is designed for IP address conservation. It enables private IP networks that use
unregistered IP addresses to connect to the Internet. NAT operates on a router, usually connecting two networks
together, and translates the private (not globally unique) addresses in the internal network into legal addresses,
before packets are forwarded to another network. As part of this capability, NAT can be configured to advertise
only one address for the entire network to the outside world. This provides additional security by effectively hiding
the entire internal network behind that address. NAT offers the dual functions of security and address
conservation and is typically implemented in remote-access environments.
▰ DMZ - A DMZ or Demilitarized zone is a sub-network that is behind the firewall but that is open to the public. By
placing your public services on a DMZ, you can add an additional layer of security to the LAN. The public can
connect to the services on the DMZ but cannot penetrate the LAN. You should configure your DMZ to include any
hosts that must be exposed to the WAN (such as web or email servers).
▰ http://www.mrwaljee.com/CompTIA_A_Plus/Module_04/dmz.mp4
Configure SOHO Routers – Ports Cont’d

▰ Port forwarding opens ports in response to inbound traffic for a specified service. For
example, if you host a web server on your LAN, you could set up a port forwarding rule for
HTTP traffic. When an Internet user sends an HTTP request to your WAN IP address,
domain name, or Dynamic DNS domain name, the router opens the specified port to
direct traffic to your web server
▰ Port Triggering - After a resource on your LAN sends outbound traffic through a “trigger”
port, the router listens for inbound traffic through a specified port or port range. This
function is necessary for applications, such as videoconferencing or gaming, that require
data exchange through specified ports
Other Router Technologies and Functions

▰ QoS - Quality of Services is a feature that attempts to prioritize streaming media, such
as VoIP phone calls and audio or video playback, over other types of network traffic
▰ UPnP - Universal Plug and Play is a group of networking protocols that allows
computers, printers, and other Internet-ready devices to discover each other on the
network. It is consumer-level technology designed to make networking easier for the
user.
Learning Activity
▰ Let’s take a look at the following website: http://ui.linksys.com/
▰ Scroll down and select the WRT54GP2 router, and select version 1.20.01
▰ See if you can find the following options:
▻ NAT
▻ DMZ
▻ Port Forwarding
▻ Port Triggering
▻ QoS
▻ When you find the above option in the router settings click on the “more” button on the right side to
learn more about what this feature is and how to configure the settings
3
WiFi Standards &
Encryptions
802.11 Wireless Standards

▰ Wireless options for the LAN - Wi-Fi or Wireless LAN (WLAN)


▰ The Institute of Electrical and Electronics Engineers (IEEE) developed what is called the
802.11 series of protocols
▰ These protocols define the various speeds, frequencies, and protocols used to transmit
data over radio waves in small geographic areas using unlicensed spectrums
▰ There are several different standards that you need to know
802.11 Wireless Standards Cont’d

*802.11g network throughput can be doubled to 108 Mb/s using super G


technology Refer to ITE 7.2.2.3
Wireless Standards
to learn more
Super G technology dramatically increases the bandwidth over existing 802.11
standards - Improving networking performance. It’s proprietary to Atheros.

https://quizlet.com/231400820/match
Learning Activity
▰ In your groups list the below encryption standards from
least secure to the most secure, and state the reasons why
they are considered to be secure

WEP WPA2

TKIP*
AES* WPA
Learning Activity Solution
▰ Order from least secure to most secure:
▻WEP
▻WPA
▻WPA-TKIP
▻WPA2
Refer to ITE 7.2.2.5
▻WPA2-AES Wireless Security to
learn more
4
Troubleshooting Networks
Common Command Line Tools
▰ PING – used to test the ability of source computer to reach a specified destination

▰ IPCONFIG/IFCONFIG (MacOS/Linux) – utility allows you to get the IP address information of a computer

▰ TRACERT - sends Internet Control Message Protocol (ICMP) Echo Request messages to a specified
remote computer with increasing Time to Live (TTL) field values and displays the IP address and hostname, if
available, of the router interfaces between the source and destination

▰ NETSTAT - most commonly used to display all open network connections and listening ports

▰ NBTSTAT - used to show TCP/IP information and other statistical information about a remote computer

▰NSLOOKUP - most commonly used to display the hostname of an entered IP address. The nslookup
command queries your configured DNS server to discover the IP address
Refer to ITE 8.1.2.9
▰NET - used to manage almost any aspect of a network and its settings including network shares, network Video – Network CLI
print jobs, network users, and much more Commands to learn
more
▰ NETDOM - tool that is built into Windows Server 2008 and Windows Server 2008 R2. It is available if you
have the Active Directory Domain Services (AD DS) server role installed.
Learning Activity
▰ Use the PDF called “Common Command Line
Tool Simulation Document” found on Schoology to
practice using common command line tools.
▰ Alternatively, you can use your own computer if
you have Administrative privileges

You might also like