0% found this document useful (0 votes)
224 views129 pages

Welcome To IT Support

This document provides an overview of an introductory networking essentials course. The course introduces core networking concepts for new IT support learners, examining how networks are configured in homes, offices, and globally with the Internet. Topics covered include network topologies, physical networking, network protocols, and basic network troubleshooting. The course contains text, videos, and hands-on activities focused on networking fundamentals. Learners will understand networking topologies, LANs/WANs, wireless/wired networks, protocols, TCP/IP, and troubleshooting tools. Students are graded via module exams, a final exam, and case studies applying course concepts to real-world scenarios.

Uploaded by

Pradeep Joshi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
224 views129 pages

Welcome To IT Support

This document provides an overview of an introductory networking essentials course. The course introduces core networking concepts for new IT support learners, examining how networks are configured in homes, offices, and globally with the Internet. Topics covered include network topologies, physical networking, network protocols, and basic network troubleshooting. The course contains text, videos, and hands-on activities focused on networking fundamentals. Learners will understand networking topologies, LANs/WANs, wireless/wired networks, protocols, TCP/IP, and troubleshooting tools. Students are graded via module exams, a final exam, and case studies applying course concepts to real-world scenarios.

Uploaded by

Pradeep Joshi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 129

Welcome to IT Support: 

Networking Essentials
 Bookmark this page

Welcome to IT Support: Networking


Essentials! This course is designed to
introduce core networking concepts to
learners who are new to IT Support. The
course begins by explaining the purpose of
networking and then examines how networks
are configured in homes, offices, between
offices, and around the world with the
Internet. This includes a review of network
topologies, physical networking, and network
protocols. The course concludes with an
introduction to network troubleshooting,
including how to troubleshoot common
networking issues.

This course contains text-based content, video discussions, and hands-on activities, all
focused on introducing you to the world of IT networks.

By actively participating in this course, you will learn about the following:

 Understanding networking topologies

 Understanding LANs, WANs and the Internet

 Understanding wireless and wired networks

 Understanding network protocols

 Understanding TCP/IP

 Troubleshooting networking using built-in networking tools

Course Syllabus and Grading


 Bookmark this page

COURSE SYLLABUS
The course Syllabus can be downloaded from the Course
Updates page.

COURSE GRADING
There is a graded assessment exam and a graded case study at the end of each
module as well as at the end of the course.

You are graded on the following:

 40% of total available points - Module assessment exams. There is an exam at the


end of each module that covers just the material from that module. There will be 10 questions in
each module exam. You will have one attempt to answer each module assessment question
correctly.

 40% of total available points - Course assessment exam. This is the final exam at
the end of the course that has 20 questions covering all modules. You will have one attempt to
answer each course assessment question correctly.

 20% of total available points - Case Studies. There is a case study at the end of each
module and at the end of the course. Module case studies include a 5 question exam; the final
case study has a 12 question exam. The questions in each case study exam allow you to apply
the knowledge you have acquired into a real-world networking scenario.

You need to score 70% or better to pass this course.

Case Studies
 Bookmark this page

Case Studies
Throughout the course you will be tasked with completing a
series of graded case studies that will test your knowledge
on the material that you just covered. There is a case study
at the end of each module, as well as a final case study at
the end of the course.

The same business scenario is used for each case study.


However, the questions asked in each case study will be
based of the topics covered in each respective module, or in the case of the final case
study, a mix of topics from throughout the course. The case studies are an opportunity
for you to take the knowledge that you have learned from each module and apply it in a
real-life business scenario.

The questions for each case study will be graded, and your scores will be accumulated
into your final grade for the course.
Lesson Overview
 Bookmark this page

People have been communicating all around the world for thousands of years.
Technology has evolved to a level where communication is faster and easier than ever
before. Today, if someone needs to renew their driver’s license, send a gift to a friend in
another country/region, make sure their bills are paid, or even say hello to an astronaut
in space, they can do all of that thanks to computer networking.

In this lesson you will learn about:

 What networking is
 The benefits of networking
 Examples of basic network types

What is networking?

Networks are a collection of computers that are connected together with


wires and wireless signals. These connected computers send and receive
data and instructions to each other. The data and instructions that are sent
across a network are more than just what you see when you type on your
keyboard or click on a website link. They happen in the background so that
the computers know how to act in all sorts of situations.

Imagine that networks are the electronic versions of all the post offices
around the world. If you want to send a package to somebody, you put the
correct addresses and postage on it and drop it at the post office. Then the
post office clerk puts special symbols on the package. Those symbols help all
the other post office employees know what to do with that package when it
comes to them. Networks do the same thing, but they do it with computers
instead of physical locations.

Networking can be defined as the act of:

 setting up new networks (usually by installing computers and cables).


 sending information back and forth across one or more networks.

Networking allows computer users to share data and interact with each
other, even though they are using two different computers. People can
network with each other anywhere; they can use networking while they are
in the same room, or they can use networking while they are each in two
different countries/regions.

Let's take a moment to introduce several key aspects of networking, each of


which will be covered in greater detail throughout this course.

Basic network types


 Bookmark this page

The two basic types of networks are client-server networks and peer-to-


peer networks.

A server is a powerful computer that stores files and applications. Other


computers or devices on the same network can access the server as a
central place to store information or use applications. The devices that
access the server are known as clients.

The server controls the level of access that clients have. A user can access a
server file or application from anywhere if they use a client that is connected
to the server’s network and has the proper level of access (usually
password-based).

The following slider tool identifies each of these two basic network types.
Slide the pointer along the bar and stop at each network type to display its
corresponding description.

Lesson Overview
 Bookmark this page

There are different types of networks depending on who is using them and what their
needs are. Some networks are available to the public. Some networks are private. And
then there are other networks that combine public and private access, and have special
security tools to protect information.

In this lesson you will learn about:

 The Internet
 Intranets
 Extranets
 Security zones, perimeter networks, and firewalls

Lesson Overview
 Bookmark this page

Some networks are small, such as a network that connects computers and devices
within a single home or office. This smaller type of network is called a Local Area
Network (LAN). Some networks are big, such as a network that connects computers
and devices across cities, countries/regions, and so on. This larger type of network is
called a Wide Area Network (WAN). The internet is the largest WAN in the world.

LANs connect to WANs. WANs make it possible for a computer in one LAN to share
data with another computer in a different LAN that is farther away.

Different networks are set up in different ways, depending on what is required for each
network. The different ways networks can be set up is called network topology. The size
of a network, number of users, and power requirements help network engineers
understand which network topology to choose when building a network.

This lesson examines these various network types and network topologies.

Other Types of Area Networks

Local Area Networks (LANs) and Wide Area Networks (LANs) are the most popular
type of area networks. Other area networks include:

Wireless Local Area Network (WLAN)



Metropolitan Area Network (MAN)

Campus Area Network (CAN)
+
Storage Area Network (SAN)
+
System Area Network

Virtual Private Networks (VPNs)

Sometimes networks like the ones described above are connected through
the Internet. Doing this allows private network users from all around the
world to access the same network without travelling to the physical location
of the servers. To keep these networks secure, a technology called Virtual
Private Network (VPN) is used. VPN creates an encrypted connection so that
other Internet users are not able to see or access user data or network
activity on that VPN. VPN networks use passwords and other identification
methods so that only approved users may access the network.
Networking topologies

Network topology is the way a network’s flow of data is arranged. Networks


can have different topologies depending on what the needs of the network
are. For example, in a “bus topology,” all the computers on that network
share and communicate across one data path that they all share. This type
of network is good for small networks that don’t have a lot of devices
connected to it. In a “star topology,” the data paths of the network are
arranged so that there is one central device that all the other computers on
that network communicate and share with. Star topology networks can
support more devices than bus topology networks. Star topology networks
are also better for users that want all their data stored in one place. That
makes it easier to run updates and back up large amounts of data.

Network topology can be logical or physical.


 A network’s physical topology is literally how the network devices and
cables are wired together in a physical room or building.

 A network’s logical topology is how the flow of data is experienced by


the network users.

A network’s logical topology might match its physical topology, or it can be


different. You should be aware of the different types of topologies because
each one is useful in different ways. When setting up a network, it is
important to choose a topology that meets the needs of the group. If a
group wants to set up a client-server network, they might choose a star
topology. If a group wants to set up a peer-to-peer network, they might
choose a bus topology.

The following slider tool identifies the most common network topologies.
Slide the pointer along the bar and stop at each network topology to display
its corresponding description.

Star topology networks


Ring topology networks
Bus topology networks
Tree topology networks
Mesh topology networks

Star topology networks connect each device to a switch or hub with a


dedicated cable. Star networks are fast and very reliable. If one cable or
node fails, it will not affect the performance of other nodes or cables.
However, if the hub or switch fails, it will take down the entire network. Star
networks are also more expensive to install because they require extra
hardware (hub/switch) and use the most amount of cable.
Ring topology networks connect all devices in a circular ring pattern where data
only flows in one direction. Each node receives and passes on the data until it
reaches the intended recipient node, which processes the data. Ring networks can
process information quickly because it only flows in one direction. With ring
networks, a failure in any cable or device will take down the entire network.
Bus topology networks connect all devices with a single cable. This cable functions
as a shared communication channel that devices can tap into without a separate
network connection device. On a bus network, a device that wants to connect to
another device on the same network sends a message that is broadcast to all
connected devices, but only accepted and processed by the device the message
was intended for. Bus networks are inexpensive (less cable) and easy to install.
However, they are also dependent on the main cable. If the main cable fails, the
network fails. Users will also experience performance problems if too many devices
are connected; therefore, it’s best to keep Bus networks limited to 30 devices.

Tree topology networks connect multiple star topology networks together into a bus
topology. Only hub devices connect to the bus. Tree topology is a network
arrangement that supports future network growth. Bus topology is limited in the
number of devices it can support and star topology is limited in the number of
connection points it can support. A network can avoid those limitations with a tree
topology.

Mesh topology networks connect all devices on the network together. Each mesh
network device has special mesh network software installed so that it can
automatically choose the quickest path to the intended recipient. This is called
dynamic routing. Mesh topology is faster and more powerful than other topologies
for several reasons. With mesh topologies data doesn’t have to travel back and
forth between a main server. Mesh topology networks can be quickly expanded by
installing additional wireless mesh connectors. They are self-healing and self-
configuring because they automatically choose the best data paths and
automatically adjust to any newly added devices and wireless mesh connectors.
Mesh topology is ideal for large areas because the more nodes you install, the
bigger and faster it becomes.
Module 1 Case Study
 Bookmark this page

Company Overview
Northwind Traders is a multi-national corporation that owns and operates a global chain
of retail stores. The corporate headquarters is in New York City, and it has branch
offices and retail locations throughout the United States and Europe. The corporate
office has 300 employees, and each of the branch offices has between 50-150
employees.

Existing Environment
All existing servers run Windows Server 2016. All client computers run Windows 10 Pro
Enterprise.

The corporate headquarters in New York has multiple file servers; whereas, each
branch office has one file server. Each file server has two hard disks. One disk has the
server’s operating system installed and the other disk stores data files. File server
backups are performed regularly.

The corporate headquarters has a Windows Server Update Services (WSUS) server. All
client computers are configured to receive updates from the WSUS server.

Planned Changes
Northwind Traders plans to open a new branch office in Rio de Janeiro, Brazil. The new
office will be responsible for setting up and managing a new series of Northwind
Traders retail shops throughout Brazil.

The new office in Rio de Janeiro will be responsible for translating all product
information and website data into Portuguese. Those translations will be added to the
Brazilian versions of the Northwind Traders websites by corporate employees of the
new office. These employees will also be responsible for all Brazilian marketing and PR
functions, which will include hiring local manufacturers to update all Northwind Traders
packaging with the Brazilian translations so that those products will be ready for local
markets. Employees will be encouraged to work with additional local partners to
collaborate on packaging, and to develop new products for local and global markets.

Employees of the new Rio branch office will only be allowed to access the Northwind
Traders network through wired connections. Employees will not be able to access the
corporate network outside of the new office, and they will not be able to remove their
network devices from the main building of the new office. There will be standard devices
available on the wired network, including printers, faxes, employee computers, and so
on. Employees with permissions will be able to access Northwind Traders’ corporate
network, any internal Northwind Traders’ websites, and the internet.

The new Rio de Janeiro office will be connected to the corporate network, which runs
Windows Server 2016 and Windows 10 Enterprise.

Module 1 Case Study  Questions


Based on this scenario, please answer the following questions regarding network setup
in the new Rio de Janeiro office.

M1CS01
0.0/1.0 point (graded)

What physical equipment is needed to set up the new office with a network connection?
(Select 3)

Server

Computer

Router

Printer
Cables

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M1CS02
0.0/1.0 point (graded)

What sort of area network(s) should the new office use? (Select 2)

LAN

WAN

MAN

CAN

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M1CS03
0.0/1.0 point (graded)

What type of network should the new office use?


Peer-to-peer

Client-Server

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M1CS04
0.0/1.0 point (graded)

Will the new office use an intranet, an extranet, or the Internet?

Internet and Extranet

Intranet and Internet

Internet only

Extranet, Internet, and Intranet

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M1CS05
0.0/1.0 point (graded)
What type of topology should be used to connect this new office to the corporate
network?

Star

Ring

Bus

Tree

Mesh

Module 1 Assessment Exam


 Bookmark this page

M115
0.0/1.0 point (graded)

Which of the following is a network that connects all devices with a single cable?

Star topology network

Ring topology network

Bus topology network

Tree topology network

Mesh topology network


unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M105
0.0/1.0 point (graded)

Which of the following is the world’s largest network?

Internet

Intranet

Extranet

Perimeter network

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M109
0.0/1.0 point (graded)

Which of the following is a large type of network that connects large areas, such as
cities or countries/regions, to smaller networks within those areas?
Firewall

Extranet

Wide Area Network (WAN)

Local Area Network (LAN)

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M108
0.0/1.0 point (graded)

Which of the following is a small type of network that connects computers and devices
within a single home or office?

Firewall

Extranet

Wide Area Network (WAN)

Local Area Network (LAN)

unanswered
Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M110
0.0/1.0 point (graded)

Which of the following is a local area network that uses wireless network technology?

Wireless Local Area Network (WLAN)

Metropolitan Area Network (MAN)

Campus Area Network (CAN)

Storage Area Network (SAN)

System Area Network

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M111
0.0/1.0 point (graded)

Which of the following is an area network that connects multiple LANs across a city or
county?
Wireless Local Area Network (WLAN)

Metropolitan Area Network (MAN)

Campus Area Network (CAN)

Storage Area Network (SAN)

System Area Network

unanswered

M112
0.0/1.0 point (graded)

Which of following is an area network that connects multiple LANs on a college or


school campus?

Wireless Local Area Network (WLAN)

Metropolitan Area Network (MAN)

Campus Area Network (CAN)

Storage Area Network (SAN)

System Area Network

unanswered
Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M101
0.0/1.0 point (graded)

Which of the following define networking? (Select 2)

The act of setting up new networks usually by installing computers and cables.

The act of sending information back and forth across one or more networks.

Setting up a computer.

Setting up a printer.

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M107
0.0/1.0 point (graded)

Which of the following is a private computer network within an organization?

Internet
Intranet

Extranet

Perimeter network

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M103
0.0/1.0 point (graded)

Which of the following describe a client-server network? (Select 3)

It’s commonly installed in homes.

It’s commonly installed in businesses.

It stores all shared data in one location.

It makes backups easier.

Bluetooth is one example of a resources that works on this type of network.


Lesson Overview
 Bookmark this page

Networks can be customized to meet different needs. Network engineers can customize
networks because they understand the basics of how information connects and flows on
a network, and because they understand which hardware devices will enable them to
create different types of network connections.

In this lesson you will learn about:

 Networking architecture
 Networking layers
 Common networking equipment

Networking layers
 Bookmark this page

The layered concept of networking was developed in the 1980s to address changes in
technology. In layered networking, layers are established to carry out the different
processing functions that data must go through to successfully travel along a network.
Each layer processes the data and then passes it up or down to the next layer where it
goes through a different process, and so on. This is done until the data is in the proper
format for traveling across a network. Then, once the data has reached the intended
network location or device, it is reverse-processed so that it appears at the receiving
end in its original state.

When thinking about layered networks, it might be helpful to imagine that data being
sent is wrapped in a new envelope every time it moves to a different layer, and each of
those envelopes has instructions that tell the next layer what to do with the data and
where to send it.

The different ways that network engineers set up networking layers are known as
models. There are various networking models, but here we will focus on the Open
System Interconnection model, commonly called the OSI model. The OSI model
became so popular when it was first released as a teaching tool in the 1980s that is has
become a common standard in networking.

The OSI model consists of the following seven layers; the lowest layer is level 1:

7.Application layer. The Application layer provides services directly to user


applications, such as email or file transfers. Because of the potentially wide variety of
applications, this layer must provide a wealth of services. Among these services are
establishing privacy mechanisms, authenticating the intended communication partners,
and determining if adequate resources are present.

6.Presentation. The Presentation layer performs data transformation to provide a


common interface for user applications, including services such as reformatting, data
compression, and encryption. It translates application formats to network formats by
encrypting the data being sent, or it translates network formats to application formats by
decrypting the data being received.

5.Session layer. The Session layer establishes, manages, and ends user connections
and manages the interaction between end systems. Service include things like
establishing communications or grouping data. This layer sets up, manages, and ends
connections between applications and deals with coordinating connections and session
times.

4.Transport layer. The Transport layer insulates the three upper layers (layer 5 – layer
7) from having to deal with the complexities of layer 1 – layer 3. It does this by providing
the functions necessary to guarantee a reliable network link. Among other functions, the
Transport layer provides error recovery and flow control between the two end points of
the network connection. This layer basically handles flow control and end-to-end error
recovery, which ensures a complete data transfer.

3.Network layer. The Network layer establishes, maintains, and terminates network


connections. Among other functions, standards define how data routing and relaying are
handled. The Network layer builds logical paths to transmit data from one network
device to another. Actions performed on this layer include switching, routing, and
forwarding.

2.Data Link layer. The Data Link layer ensures the reliability of the physical link
established at layer 1 (the Physical layer). Standards define how data frames (how data
is packaged) are recognized and provide necessary flow control and error handling at
the frame level. The data link layer translates packets of information into bits by
encoding the information being sent, or it translates bits into packets of information by
decoding the bits being received.

1.Physical layer. They Physical layer controls transmission of the raw bitstream over
the transmission medium. Standards for this layer define such parameters as the
amount of signal voltage swing, the duration of voltages (bits), and so on. This layer
transfers the bit stream through the network. This can be done with an electrical signal,
a light signal (such as fiber optics), or a radio signal.

As you can see in the following diagram, information that travels across a network has
to go through several changes. Even the simple task of emailing a picture of a cat to
someone requires many steps. And on each step, the information must be adjusted until
it is in the correct format to send across a network. Once the information has travelled
across the network, it has to be changed back to its original form so that the cat picture
can be accessed in its original format.

Networking equipment

Networks are built and configured in many different ways using servers, computers,
and cables. There are also special hardware devices available that help to make
networks more efficient. Some of the more common devices include:
Hubs

A hub is a device that lets nodes communicate with each other. Each node
connected to the hub can send or receive information through that hub.
However, a hub cannot recognize who is sending the information or who is
supposed to receive it, so it repeats all the data packets it receives so that
all the nodes that are connected to it receive that data, including the node
that sent the information. This can cause a lot of unneeded traffic, especially
on larger networks that send and receive more information. Hubs are also
slow because they cannot send and receive at the same time.

Switches

A switch is a hub that has the added ability to control the flow of network
traffic by reading each data packet’s address information. A switch monitors
which nodes are connected to it, and only sends data packets to a node
when the data packet is addressed to that node. This greatly reduces
unneeded network traffic. Switches can also send and receive at the same
time, which makes them faster than hubs. Switches save bandwidth and
provide higher security by preventing unauthorized users from accessing
data packets.

Bridges

A bridge is a device that connects two separate computer networks and


enables communications between them. Bridges do not bother to understand
network communications protocol, such as IP addresses. It only recognizes
and considers the physical means, like the Media Access Control (MAC)
address, which is usually an Ethernet. Thus, traffic will only exist in a
bridged network if the two networks are logically the same. So, unlike a
router, a bridge is unable to distinguish networks; they can only be used
when you intend to connect networks of same type.
Routers

A router passes information between two networks, such as a home network


and the Internet. A router can be wired or wireless. Routers work with hubs
and switches so that nodes on different networks can connect seamlessly.
Routers are more intelligent than bridges because they make smarter
decisions; that is, a router determines the fastest way possible to pass
information between two networks, which is also usually the shortest way
possible. They only send a packet to its intended destination, eliminating
unnecessary traffic. In contrast, bridges sacrifice call management and
performance by automatically broadcasting packets to all the computers on
a network.

Gateways

A gateway connects two networks together. It can either be a piece of


software, that is, a gateway application installed on a server, or an actual
hardware device. When two networks want to connect, they must each have
gateways that provide exit and entry points for computers from the two
networks to communicate. A router is basically the same as a gateway, but
with additional functionality; that is, a router determines the shortest
possible path to send data between two computers.

Repeaters

A repeater is a device that repeats signals across a network connection to


amplify the signal strength so nodes that are farther away can still connect
to the signal. This is useful in large buildings.
Now let's take a look at how a few of these devices might connect with each
other.

Lesson Overview
 Bookmark this page

Wireless networking enables users to connect to networks without being physically


plugged in with a network cable. Wireless networking is convenient because it requires
fewer network cables and enables users to connect from anywhere in the world.
Remember that some network cable is still required in certain wireless
networking devices, such as wi-fi routers, so that they can create the wireless signals
that other devices connect to.

In this lesson you will learn about:

 Wireless standards and how they evolved


 Wireless network security and how it's applied
 Wireless Interface cards
Wireless standards
 Bookmark this page

Wireless networking uses radio frequencies


to send information between devices that are
able to pick up the frequency and translate
the radio signal back into information that the
device user can understand and use. Radios
can pick up radio frequencies, but they
cannot translate the signal into computer
information. Wireless networking uses
different types of radio frequencies. 2.4 GHz
is a very common and popular frequency
because it has a bigger range that is not
affected by obstacles like walls in a building.
It is also popular because it is free and available to use by anyone. Manufacturing a
device is much less expensive when the company making it doesn’t have to pay extra to
use a private frequency. The downside to using 2.4 GHz in a wireless device is that it
can experience a lot of interference when other wireless devices are close to it. The 5
GHz frequency has much less interference and can feature higher speeds than the 2.4
GHz frequency. But it is also more expensive, and it has a shorter signal range that is
more easily blocked by obstacles like walls. That is why manufacturers and users
choose different frequencies depending on what their networking needs are.

Wireless networking speed is measured in Mbps. Mbps stands for “Megabits per
second.” It measures how fast data can be transferred from one location to another. For
example, if you wanted to send a bunch of pictures to your family over the internet, the
pictures would be sent much faster if you have an internet connection with a higher rate
of Mbps. Older wireless networking speeds are considered too slow for a lot of modern
network activities.

Different wireless communication methods have been developed over the years in order
to keep up with changing technology and user needs. These methods have become
standards of wireless networking and are used all around the world.

To understand where we're at today, it might help to understand how the wireless
communication standard for WLANs has evolved. In the late 1990s, the Institute of
Electrical and Electronics Engineers (IEEE) created the first wireless communication
standard for wireless local area networks (WLAN). It was called 802.11 because that
was the name of the group that developed it. It used a radio signal with a frequency of
2.4 GHz to communicate data across the airwaves). This standard is no longer used
because it is too slow. It had a maximum network bandwidth of 2 Mbps, which is too
slow for most of today’s applications. For example, if someone wants to watch a movie
on a video streaming service, the minimum recommended speed is 5 Mbps for HD, or
25 Mbps for Ultra HD. Viewers would have to have even faster speeds if anyone in their
household wanted to do anything online while the movie was playing.
Let’s take a look at how wireless standards have been evolving:

Wireless standards evolution


There are many more wireless communications standards. Some are just different
versions of 802.11, like the ones described above. And others are special standards
that were designed for a different use. For example, the IEEE 802.15 standard is used
in Bluetooth devices. It has a very limited range of only a few feet. Other wireless
communication standards exist to work on much bigger networks, such as MANs or
WANs.

Wireless network security

Wireless technology is extremely flexible and convenient for users. Signals are sent back and forth
across networks all the time. But it is hard to control where those signals travel. Sometimes users who
are nearby might pick up your signals on their devices. Or, there might be a hacker looking for insecure
wireless networks to break into. These are real possibilities with unsecured wireless networks. That is
why wireless network security is so important. It is important to make sure the data you send is
protected.

Here is a basic list of things you can do to make sure your wireless network is secure:

Change the system ID


Devices come with a Service Set Identifier (SSID) or an Extended Service Set
Identifier (ESSID). These are both types of default system IDs. It is easy to find out
the default IDs of devices. That is why it is important that SSIDs and ESSIDs are
changed from default to something unique that cannot be easily guessed.

Hide your wireless network


One of the features included with having a wireless connection is the ability to show
the network or not show the network. Depending on the option you choose, the
network will either be visible or invisible to people who do a scan for nearby
networks.

Encrypt your data


When you encrypt your data, you are giving your computer instructions to change
information into an unreadable file that can only be made normal again when it is
accessed by approved users with the proper encryption key.

Use firewalls
Firewalls help keep out unwanted and unneeded traffic to your device. You can set
up your wireless router to only accept or send information that is approved by you.
The instruction manual will have information on how to set that up.

Change the default administrator password


This is one of the easiest security measures you can take. Many people leave their
devices and networks vulnerable to attack because they don’t take this one simple
step. Servers, routers, computers, and all devices should have their default
passwords changed to private and secure passwords.

Lesson Overview
 Bookmark this page

Wired networking is the original form of computer networking. It has been around for over
50 years! It is important to know about the hardware that goes with wired networking.
Making sure a network has the right equipment will prevent it from failing. Wired
computer networking has many benefits, especially when it comes to keeping
information secure.

In this lesson you will learn about:


 Wired media types
 Network cables
 Network interface cards
 The pros and cons of wired vs. wireless networking

Wired transmission media types

Even though technology has advanced a lot in the 21st century, most


computer networks still depend on cables or wires to connect devices and
transfer data. These cables are known as wired transmission media because
they transmit data across wires. The following is a list of some common
wired transmission media examples:

The following slider tool identifies the most common wired transmission
media. Slide the pointer along the bar and stop at each wired transmission
media to display its corresponding description.

The coaxial (or co-ax) cable was developed to connect TVs to home
antennas. Coaxial cables contain an inner copper wire that is surrounded by
insulation and other shielding. This type of cable is a standard for 10 Mpbs
Ethernet cables.

Twisted pair cables became a popular cable for Ethernet use in the 1990s.
These cables started with 10 Mbps, but advanced with technology to achieve
speeds of 100 Mbps, and later up to 10 Gbps. Twisted pair cables have up to
8 wires inside them. Each pair of two wires is wound together in order to
minimize electromagnetic interference. Twisted pair cables can be
unshielded (UTP) or shielded (STP). Most modern twisted pair cables are
unshielded. Shielded twisted pair cables are more expensive, but some
networks use them when shielded cables are required. Shielded cables are
designed to reduce any outside interference that might interrupt data that is
flowing through the cable.

Fiber optic cables transmit data by sending pulses of light across strands of
glass inside the cable. Fiber optic cables are very useful in wide area
networks (WANs) because they work over long distances and can handle a
heavy volume of data traffic. Different types of fiber optic cables are used
depending on the cost and on the amount of bandwidth the cable must have
to support a network.

USB stands for Universal Serial Bus. USBs are pieces of hardware inside
computers that have special protocols that allow them to communicate to
any other USBs. That is what makes them “universal.” They are “serial”
because they send pieces of data one at a time in sequence. They are called
“buses” because they carry data, just like a bus carries people. Universal
Serial Bus (USB) cables connect computers to keyboards, mice, or other
external devices by connecting the USB in the computer to the USB in the
external device.

A crossover cable is used to join two network devices of the same type, such
as two PCs or two network hubs. The use of crossover cables has diminished
in recent years because most modern routers can connect devices together
on its own.

 Bookmark this page

Company Overview
Northwind Traders is a multi-national corporation that owns and operates a global chain
of retail stores. The corporate headquarters is in New York City, and it has branch
offices and retail locations throughout the United States and Europe. The corporate
office has 300 employees, and each of the branch offices has between 50-150
employees.

Existing Environment
All existing servers run Windows Server 2016. All client computers run Windows 10 Pro
Enterprise.
The corporate headquarters in New York has multiple file servers; whereas, each
branch office has one file server. Each file server has two hard disks. One disk has the
server’s operating system installed and the other disk stores data files. File server
backups are performed regularly.

The corporate headquarters has a Windows Server Update Services (WSUS) server. All
client computers are configured to receive updates from the WSUS server.

Planned Changes
Northwind Traders plans to open a new branch office in Rio de Janeiro, Brazil. The new
office will be responsible for setting up and managing a new series of Northwind
Traders retail shops throughout Brazil.

The new office in Rio de Janeiro will be responsible for translating all product
information and website data into Portuguese. Those translations will be added to the
Brazilian versions of the Northwind Traders websites by corporate employees of the
new office. These employees will also be responsible for all Brazilian marketing and PR
functions, which will include hiring local manufacturers to update all Northwind Traders
packaging with the Brazilian translations so that those products will be ready for local
markets. Employees will be encouraged to work with additional local partners to
collaborate on packaging, and to develop new products for local and global markets.

Employees of the new Rio branch office will only be allowed to access the Northwind
Traders network through wired connections. Employees will not be able to access the
corporate network outside of the new office, and they will not be able to remove their
network devices from the main building of the new office. There will be standard devices
available on the wired network, including printers, faxes, employee computers, and so
on. Employees with permissions will be able to access Northwind Traders’ corporate
network, any internal Northwind Traders’ websites, and the internet.

The new Rio de Janeiro office will be connected to the corporate network, which runs
Windows Server 2016 and Windows 10 Enterprise.

Module 2 Case Study  Questions


Based on this scenario, please answer the following questions regarding network setup
in the new Rio de Janeiro office.

M2CS01
0.0/1.0 point (graded)

What type of cables should be used in connecting this office to the network? (Select 3)
Coaxial

Twisted Pair

Fiber Optic

USB

Crossover

DVI

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M2CS02
0.0/1.0 point (graded)

What type of network connection should be used?

Wired

Wireless

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
SaveSave Your Answer

M2CS03
0.0/1.0 point (graded)

If the Rio office used wired networking, what would be the benefits they would enjoy?
(Select 3)

It makes it much harder for anyone to access the network

Because it is convenient

To prevent hacking

Because it allows for remote users

It is more flexible

Because it is faster and more reliable

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M2CS04
0.0/1.0 point (graded)

If the Rio office used wireless networking, what would be the benefits they would enjoy?
(Select 3)

It makes it much harder for anyone to access the network


Because it is convenient

To prevent hacking

Because it allows for remote users

It is more flexible

Because it is faster and more reliable

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M2CS05
0.0/1.0 point (graded)

What type of interface card should be used in the Rio computers to access this
network?

Wireless Interface Card (WIC)

Network Interface Card (NIC)

Both

Module 2 Assessment Exam


 Bookmark this page

M206
0.0/1.0 point (graded)
Which layer in the OSI model creates packets of information into bits, or translates bits
into packets of information, by encoding and decoding the information?

Physical layer

Data Link layer

Network layer

Transport layer

Session layer

Presentation layer

Application layer

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M212
0.0/1.0 point (graded)

What is the minimum recommended speed to watch a movie on a video streaming


service, when that movie is in Ultra HD?

5 Mbps
10 Mbps

15 Mbps

20 Mbps

25 Mbps

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M210
0.0/1.0 point (graded)

Fill in the blank. Wireless networking speed is measured by ___________?

Watts

Volts

Mpbs

KW

Ohm
unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M209
0.0/1.0 point (graded)

Which of the following is a device that passes information between two networks, and
can be wireless or wired?

Hub

Bridge

Router

Repeater

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M211
0.0/1.0 point (graded)

What is the minimum recommended speed to watch a movie on a video streaming


service?
5 Mbps

10 Mbps

15 Mbps

20 Mbps

25 Mbps

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M205
0.0/1.0 point (graded)

Which layer in the OSI model builds logical paths to transmit data from one network
device to another network device, including switching, routing, and forwarding?

Physical layer

Data Link layer

Network layer

Transport layer
Session layer

Presentation layer

Application layer

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M204
0.0/1.0 point (graded)

Which layer in the OSI model handles flow control and end-to-end error recovery to
ensure complete data transfer?

Physical layer

Data Link layer

Network layer

Transport layer

Session layer

Presentation layer
Application layer

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M214
0.0/1.0 point (graded)

Which of the wired transmission media contains up to 8 wires inside with each pair of
two wires wound together in order to minimize electromagnetic interference?

Coaxial cables

Twisted pair cables

Fiber optic cables

USB cables

Crossover cables

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer


M208
0.0/1.0 point (graded)

Which of the following is a device that connects two separate computer networks and
enables communications between them?

Hub

Bridge

Router

Repeater

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M207
0.0/1.0 point (graded)

Which of the following is a device that lets nodes communicate to each other?

Hub

Bridge

Router
Repeater

Lesson Overview
 Bookmark this page

In everyday life people follow rules on how to communicate with each other. The postal
service sends letters based on the name and address that is written on the envelope.
People use specific phone numbers to reach the exact person they want to talk to.
These sorts of rules that govern how we communicate are called “protocols.” An
example of a protocol can be seen in the famous movie Star Wars. The golden robot
C3PO is called a “protocol droid” because he is programmed in over 6 million forms of
communication and therefore can communicate with many different types of aliens and
computers. That’s a lot of protocols! Networks are the same way. There are a number of
protocols that control how networks communicate with other devices and networks.

In this lesson you will learn about:

 Network protocols
 Basic types of network protocols
 Which protocols apply to the different layers on a network

Protocol concepts

When devices communicate with one another, they must agree on the
format of the data that will be sent between them. The set of rules that
determines the format is called a protocol. Protocols can also include
advanced techniques for detecting transmission errors then recovering from
them, as well as for encoding and decoding data.

Protocols work by translating information into binary code. Binary code is a


simple computer language that uses 1’s and 0’s to communicate a series of
on/off or yes/no commands. It is easy to send binary code across wired and
wireless networks. Before sending the translated information, protocols add
additional binary code that acts as instructions that explain what to do with
the information.
Protocols often work together in groups. The OSI model discussed in Module
2 is a good example of this. The following list identifies some examples of
the different types of protocols:

Protocols that exist on each network layer


 Bookmark this page

Let's begin by reviewing networking layers and models. As you many recall from an
earlier lesson, the different ways that network engineers set up networking layers are
known as models. There are various networking models available, but two of the most
common models are the Open System Interconnection model, commonly called the OSI
model, and the Transmission Control Protocol/Internet Protocol model, known as the
TCP/IP model.

The OSI model was developed by the International Organization for Standardization
(ISO). It became so popular when it was first released as a teaching tool in the 1980s
that is has become a common standard in networking. OSI is a reference model for
communication between end users in the network.

The TCP/IP model was developed by the United States' Department of Defense to
connect various devices to a common network (Internet). The main purpose behind
developing the protocol was to build a robust and automatically recovering phone line
while on the battlefield. The TCP/IP model eventually was adopted for commercial use,
and today is used by Internet applications such as email, the World Wide Web, File
Transfer Protocol (FTP), and so on.

The OSI Model


The layers of the OSI model are made up of hundreds of protocols. These protocols
each complete small tasks that contribute to the larger data flow that allows people to
communicate and share information across networks. The following chart identifies the
layers of the OSI model.

OSI Model

Layer Protocol Data Function


Unit (PDU)
Host 7. Data High-level APIs, including resource sharing,
layers Application remote file access

6. Translation of data between a networking service


Presentation and an application; including character encoding,
data compression, and encryption/decryption

5. Session Managing communication sessions, such as


continuous exchange of information in the form of
multiple back-and-forth transmissions between two
nodes

4. Transport Segment Reliable transmission of data segments between


(TCP) / points on a network, including segmentation,
Datagram acknowledgment, and multiplexing
(UDP)

Media 3. Network Packet Structuring and managing a multi-node network,


layers including addressing, routing, and traffic control

2. Data Link Frame Reliable transmission of data frames between two


nodes connected by a physical layer

1. Physical Bit Transmission and reception of raw bit streams


over a physical medium

The TCP/IP Model


The following table identifies the layers of the TCP/IP model.
TCP/IP Model

Layer Protocols Function

Application HTTP, DNS, POP3, DHCP Email, file transfers, and so on

Transport TCP UDP Data transfer

Internet IP ARP ICMP Controls routing and paths

Network Ethernet Wi-Fi (802.11) Translates data, sends data


Access
Mobile Broadband

Model Layer Comparison


The OSI model is very famous because it was one of the first models to describe
layered networking. But it is a general model that can be changed to better apply to the
groups of protocols being used. For example, the TCP/IP model is very similar to the
OSI model, but it combines some of the layers.

OSI Model TCP/IP Model

7. Application Layer Application Layer

6. Presentation Layer

5. Session Layer
4. Transport Layer Transport Layer

3. Network Layer Internet Layer

2. Data Link Layer Network Access


Layer

1. Physical Layer

All model layers have protocols that work together to achieve the common goal of that
layer, such as sending data or controlling where data goes. Each protocol performs a
specific task, and all tasks performed across all of the layers achieve the overall action
of networking.

 Bookmark this page


In everyday life people use levels of description to explain where a location is. For
example, there is a difference between Europe and Barcelona. Europe is a continent,
and Barcelona is a city inside a country/region inside the continent of Europe. Computer
networking works in the same way. Information is sent in batches to a large network
location, and then it is send to smaller and smaller locations until the information
reaches its intended destination.

In this lesson you will learn about:

 IP Addressing

 Routing and subnetting

 Ports and how they work

 IPv4 and IPv6 and what they’re used for


IP Addressing

IP stands for Internet Protocol. A protocol controls how information


is sent on a network. It ensures that machines and networks are
sending information to the right places by using IP addresses. IP
addresses are like physical addresses or phone numbers. Anybody
who wants to communicate on a network will need a device that has
an IP address so that they can send communication out from that
address, or receive communication into that address. All network-
capable devices have an individual IP address.

An IP address is a long number that is broken up into four parts,


with each part being separated by a period. For example, one of the
IP addresses for www.microsoft.com is: 23.44.161.156. Each of the
four numbers in an IP address can range from 0 to 255.

IP addresses are assigned to users by their Internet service


providers (ISPs). User IP addresses can change for several reasons:

 If their hardware has changed (such as restarting a router or


modem)
 If a user asks their ISP to change it for them
 If the user is connecting from a different location (such as
logging into wi-fi at a café)

IP addresses can be “static” or “dynamic.” A static IP address never


changes. A dynamic IP address is temporary.

Static IP address

These addresses are associated with an exact physical location which makes it
easier for other computers to find and connect to. A static IP address is a
permanent internet address that will always be the same so long as the user is
connecting from that location. Static IP addresses usually have to be assigned by
request. They may require an additional set-up fee from the ISP.

Dynamic IP address

This address can change each time a computer connects to a network. Dynamic IP
addresses don’t cost users anything extra because they are easier for ISPs to
maintain. Dynamic IP addresses are reliable and run automatically. Their only
disadvantages are that they don’t show up on maps as accurately as static IP
addresses do, and they make it harder to set up large business servers.

It is important to remember that a user’s IP address will change


whenever their physical location changes. A static IP address will
not stay the same if you move from one place to another, simply
because you will be connecting from a different place. If you are at
home, you will be using your home IP address. If you are at an
airport, you will be using an IP address chosen for you by the
airport’s ISP. Dynamic and static IP addresses are different types of
IP addresses that have different uses, but each time a physical
location is changed, a user will be using a different IP address.

IP addresses are obviously very important in helping people send


information back and forth across a network. Without an address,
the information will not reach its destination. That is why the
Internet Protocol (IP) exists. But there is another equally important
protocol that also helps information reach its destination. It is called
the Transmission Control Protocol (TCP). TCP is responsible for
making the network connection reliable so that the internet protocol
can properly route information to the correct location. TCP ensures
that information does not get lost, does not get out-of-order, does
not experience long delays, and does not get duplicated. When TCP
and IP work together, it is known as TCP/IP. When these two
protocols combine, they act as the traffic controller for the Internet.
Routing and Subnetting

One of the main reasons networking exists is to make sure information can be accessed
and shared. A very important part of accessing and sharing information is getting things
to the right place, which is why IP addresses are so important. But networks can be
separated into smaller groups. And each of those smaller groups can have many
devices connected to them. However, if all of these smaller groups and devices used
the same IP address, things would get very confusing, just like in the real world. If all the
post office mail for all the people in an apartment building was put into one big pile, it
would be difficult for a person to find the mail that was meant for them. This is why
networking uses subnets, subnetting, subnet masks, and MAC addresses. Subnets are
smaller groups inside of a network. Subnetting is the action of dividing a network into
these smaller groups. Subnet masks are special numbers that are used to divide a
network address into smaller addresses for the subgroups and devices inside a
network. A MAC address is a network device’s address.

Let’s take a more in-depth look at each of these networking components:

 Subnet. A subnet is a smaller network inside a larger network. Subnets contain


connected network devices in a local area network (LAN) that are physically close to
each other. For example, a company network might have subnets for each department,
such as the Accounting department, the Sales department, the IT department, and so
forth. Subnets improve performance and security, and they make network management
easier. If a large company had only one IP address, routing information to the proper
recipient would take a lot longer because the exact individual recipient would need to be
located each time before the information is sent. When subnets are used, the
information can be sent to the recipient’s subnet, and then the final sorting of where the
information goes will be done from there.

o A subnet’s address is almost identical to the main network’s IP address,


but the numbers will be slightly different. For example, if the main network IP address is
172.16.0.0, the subnet address might be 172.16.55.145.
 Subnetting. Dividing a network into two or more subnets is known as subnetting.
Regular network users are unable to tell if subnets are being used, but they will
experience faster speed plus better security and network maintenance. A network
administrator is usually required to manage subnetting, along with any additional
hardware that is required, such as routers, switches, and hubs. Subnetting only works
when an IP address is accompanied by a subnet mask.

o Subnet mask. A subnet mask is a series of numbers that look similar to


the numbers in an IP address. Both an IP address and a subnet mask have four
sections of numbers, each separated by a period. Subnet masks are used to separate
an IP address from the individual network devices on the network. For example, the IP
address for a LAN will usually be associated with a device like a modem or a router. A
subnet mask enables more than one network device to be used with that IP address,
such as a laptop, phone, and printer. The subnet mask does this by separating the main
IP address into different addresses for each network device. Each of those network
devices would have its own ID. Subnet masks allow information to be sent back and
forth to specific network devices when there is more than one device on the network.
Subnet masks can divide things even more by separating out subnets from the main
network, and then the individual network devices in those subnets. Subnet masks get
information where it needs to go, and they increase security and network speed
because they do not automatically send information to all subnets and devices on the
network.

 MAC address. A network device’s address is called a MAC address, which is


short for Media Access Control address. Just like IP addresses help information get to a
specific network or subnet, MAC addresses help information get to a specific device. A
MAC address is used with an IP address so that information can reach its intended
recipient.

Ports
 Bookmark this page

The port is the first and last stop for information being sent across a network. There is
one port for each application. Ports are not shared by multiple applications. A computer
or application can have many ports (up to 65,536), so a network administrator should
never worry of not having enough ports. When an application is used for the first time,
the next available port is assigned to it.

In networking, you can think of a port as the channel an application uses to send or
receive information. It is an address for a single application on a device. For example,
an email program such as Microsoft Outlook would have a port associated with it. This
identifies the email program so that it can receive information addressed to it, and so
that it can be properly identified as the sender when sending information out. A web
browsing program would have a different port that would act in the same way—
information sent from the browser would be properly identified, and information meant to
be received by that browser would reach it because the port allows it to be located. The
same thing is true for the application that performs document printing on a network. If a
user wants to print, the print instructions are addressed to the specific port that is
associated with the selected printer. If the user’s printer sends a low-ink warning, that
information would originate from the same port.

There are two types of ports—TCP ports and UDP ports. TCP and UDP are two
different types of communication protocols. They give computers specific instructions on
how to send and receive information.

 TCP ports. TCP is short for Transmission Control Protocol. When a computer


uses the TCP protocol, it establishes a connection with another computer and transfers
information directly to that other computer. It does not break the connection until the
transfer is completed. The TCP method of transferring information is very similar to
using a telephone—where you call a person, and don’t hang up until the conversation is
finished. TCP ports send and receive information using the TCP method.
 UDP ports. UDP is short for User Datagram Protocol. When a computer uses
the UDP protocol, it packages the information with precise instructions and sends it out
into the network. Information sent using UDP does not require a direct connection to the
receiving computer. The UDP method of transferring information is very similar to
sending a letter through the post office; you address it properly and trust that it will
reach the right destination. UDP ports send and receive information using the UDP
method.

Applications that require the TCP method will automatically be assigned TCP ports, and
applications that require the UDP method will automatically be assigned UDP ports. A
computer can have up to 65,536 TCP ports, and an additional 65,536 UDP ports.

Lesson Overview
 Bookmark this page

Each of the protocols people use in everyday life have specific rules. For example, a
person must pay for a ticket and collect it from the cashier before he or she can enter a
theater to see a film. And once that person is inside, they must show their ticket to a
theater employee, who rips the ticket and then directs the person to the correct theater.
Think of this as “the movie-going protocol.” In computer networking, similar rules are
used to ensure information is properly handled. These are referred to as “networking
protocols.”
In this lesson you will learn about:

 Domain Name System (DNS)


 Dynamic Host Configuration Protocol (DHCP)
 Address Resolution Protocol (ARP)
 Remote access

Network resolution using DNS


 Bookmark this page

Network Resolution using DNS


The Domain Name Server (DNS) is the system that translates the name of a website
location or a network location to an IP address that computers can recognize. DNS
stores the names of network locations and the IP addresses associated with those
names. When you type a name into your browser URL, the DNS service translates the
words to the IP address, and locates the IP address so that the computer can recognize
it and load that address to your browser.

For example, if a user types bing.com into his or her browser, DNS will look up that
website name and replace it with its associated IP address (204.79.197.200). When
DNS isn’t working, the network doesn’t work. Why? Because networks don’t use
website names or computer names to access those locations; they need the IP address
of the website or the computer. So when DNS isn’t working, the network devices that
are trying to access these network locations get lost because DNS isn’t translating
website names and computer names into IP addresses.
Remote Access
 Bookmark this page

Routing and Remote Access Service (RRAS) supports remote user or site-to-site
connectivity by using Virtual Private Network (VPN) or dial-up connections. RRAS
consists of the following components:

 Remote Access. By using RRAS, you can deploy VPN connections to provide
end users with remote access to your organization's network. You can also create a
site-to-site VPN connection between two servers at different locations.
 Routing. RRAS is a special type of software in a server that enables that server
to act like a router. RRAS makes it possible for network engineers and administrators to
build applications and rules to control network access and services. There are lots of
different ways that RRAS can be configured. RRAS can be used with smaller Local
Area Networks (LANs). with bigger Wide Area Networks (WANs), or even over the
internet. Using RRAS over the internet requires a private and secure connection so that
network administrators can control network access.

Module 3 Case Study


 Bookmark this page

Company Overview
Northwind Traders is a multi-national corporation that owns and operates a global chain
of retail stores. The corporate headquarters is in New York City, and it has branch
offices and retail locations throughout the United States and Europe. The corporate
office has 300 employees, and each of the branch offices has between 50-150
employees.

Existing Environment
All existing servers run Windows Server 2016. All client computers run Windows 10 Pro
Enterprise.

The corporate headquarters in New York has multiple file servers; whereas, each
branch office has one file server. Each file server has two hard disks. One disk has the
server’s operating system installed and the other disk stores data files. File server
backups are performed regularly.

The corporate headquarters has a Windows Server Update Services (WSUS) server. All
client computers are configured to receive updates from the WSUS server.

Planned Changes
Northwind Traders plans to open a new branch office in Rio de Janeiro, Brazil. The new
office will be responsible for setting up and managing a new series of Northwind
Traders retail shops throughout Brazil.

The new office in Rio de Janeiro will be responsible for translating all product
information and website data into Portuguese. Those translations will be added to the
Brazilian versions of the Northwind Traders websites by corporate employees of the
new office. These employees will also be responsible for all Brazilian marketing and PR
functions, which will include hiring local manufacturers to update all Northwind Traders
packaging with the Brazilian translations so that those products will be ready for local
markets. Employees will be encouraged to work with additional local partners to
collaborate on packaging, and to develop new products for local and global markets.

Employees of the new Rio branch office will only be allowed to access the Northwind
Traders network through wired connections. Employees will not be able to access the
corporate network outside of the new office, and they will not be able to remove their
network devices from the main building of the new office. There will be standard devices
available on the wired network, including printers, faxes, employee computers, and so
on. Employees with permissions will be able to access Northwind Traders’ corporate
network, any internal Northwind Traders’ websites, and the internet.

The new Rio de Janeiro office will be connected to the corporate network, which runs
Windows Server 2016 and Windows 10 Enterprise.
Module 3 Case Study  Questions
Based on this scenario, please answer the following questions regarding network setup
in the new Rio de Janeiro office.

M3CS01
0.0/1.0 point (graded)

Which of the following does not need an IP address?

Corporate Network

Router in new Rio office

Employee card readers

Node in new Rio Office

Bridge in new Rio Office

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M3CS02
0.0/1.0 point (graded)

What sort of ports should the nodes in the Rio office use when sending information to
the other offices of the company, located in different countries/regions?

TCP ports
UDP ports

Both TCP and UDP ports

A different type of port

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M3CS03
0.0/1.0 point (graded)

How many subnets should the new Rio office have?

Four

Seven

One

None

As many as the network engineers and executives feel are necessary, based on the
number of local employees and departments

unanswered

Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M3CS04
0.0/1.0 point (graded)

How many subnet masks should this new office have?

12

48

50

None

The number of subnet masks should match the number of networks.

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M3CS05
0.0/1.0 point (graded)

Which of the following does not require a MAC address?

Routers
Bridges

Fiber optic cables

Servers

Printers

Module 3 Assessment Exam


 Bookmark this page

M308
0.0/1.0 point (graded)

Which of the following is true of Dynamic IP addresses? (Select 3)

They are associated with an exact physical location, which makes it easier for other
computers to find and connect to.

They are a permanent internet address that will always be the same so long as the user is
connecting from that location.

They are temporary.

They can change each time a computer connects to a network.

They must be assigned by request.

They are reliable and run automatically.

unanswered
Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M313
0.0/1.0 point (graded)

Which of the following is used with an IP address so information can reach its intended
recipient?

Subnet

Subnet mask

MAC address

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M310
0.0/1.0 point (graded)

Which of the following statements are true about User Datagram Protocol (UDP)?
(Select 2)

It establishes a connection with another computer and transfers information.


It packages the information with precise instructions and sends it out into the network.

It is in charge of breaking the connection when the transfer is complete.

It does not require a direct connection to the receiving computer.

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M301
0.0/1.0 point (graded)

Which protocols control internet-related tasks such as working with web browsers and
network adapters?

Internet protocols

Wireless network protocols

Network routing protocols

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer


M311
0.0/1.0 point (graded)

There are two different types of communication protocols. How many types of ports are
there?

One

Two

Three

Four

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M305
0.0/1.0 point (graded)

Which TCP Model layer controls routing and paths, and uses IP, ARP, and ICMP
protocols?

Application layer

Transport layer

Internet layer
Network Access layer

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M314
0.0/1.0 point (graded)

Fill in the blank. All network-capable devices have _________?

A subnet

A subnet mask

An individual IP address

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M309
0.0/1.0 point (graded)

Which statements are true about Transmission Control Protocol (TCP)? (Select 2)
It is a type of IP protocol.

It ensures information does not get lost, stays in order, and is not duplicated.

It is responsible for making the network connection reliable so IP can properly route
information to the correct location.

It is an address and destination for information.

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M306
0.0/1.0 point (graded)

Which TCP Model layer translates data and sends data, and uses Ethernet Wi-Fi
(802.11) Mobile Broadband protocols?

Application layer

Transport layer

Internet layer

Network Access layer

unanswered
Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M312
0.0/1.0 point (graded)

Which of the following is a smaller network inside a larger network?

Subnet

Subnet mask

MAC address

Lesson Overview
 Bookmark this page

Troubleshooting is a very important tool in making sure anything continues to run


smoothly. In everyday life you would troubleshoot something if a regular plan gets
interrupted by a problem. For example, if a person’s car stopped working, they would
find out what was wrong with it and get the broken part fixed. Network troubleshooting is
done in the same way.

In this lesson you will learn about:

 Why network troubleshooting is important


 The details of general troubleshooting
 How network performance works
 How monitoring, scanning, and security work
 How forensics and detecting intrusions work
General Troubleshooting
Network troubleshooting consists of all the actions and processes a network
administrator uses to locate, identify, and resolve problems in a network. Network
troubleshooting is used when an administrator or engineer wants to optimize or repair a
network. It is commonly used to fix connection issues on network devices. These
actions and processes can be automated or manual. They are used to restore normal
operations to a network as efficiently as possible.

Common types of troubleshooting include:

 Finding and fixing issues around a device’s Internet connectivity or network


connectivity

 Setting the proper configuration for a network management device like a router or
a switch

 Installing devices or other network hardware, such as cables

 Ensuring all network devices and hardware are updated regularly

 Scanning for and removing any viruses on the network, and any network devices

 Adding a printer to the network and configuring it to work properly with other
network devices

Performance

Networking involves the transfer of information from one device to another. The information being
transferred might pass through hundreds of hardware and software components on the network before
reaching its final destination. If there is a problem with any one of these components, network
performance can be negatively affected, or fail entirely.

When a network becomes unresponsive, that is a performance problem. Examples of performance


problems include:

Timeouts
A timeout is when a network request ends without being completed because it took
too long.

Bottlenecks
A bottleneck refers to a limited data flow, where data appears to be “stuck” or
transferring very slowly.
Protocol problems
A protocol problem occurs when a network protocol doesn’t carry out the tasks it’s
supposed to.

Flooding
Flooding occurs when there is too much information being sent and received by the
network.

There are many possible reasons for performance problems on a network.


Performance problems might be caused by hardware or software that is outdated,
or by hardware or software that is not robust enough to handle larger networks
with heavier network traffic. And even if a network has all the right hardware and
software, it might be set up in a way that is extremely inefficient for the way it is
being used. All performance issues require troubleshooting so that the cause can be
identified and resolved.

Monitoring, Scanning, and Security

There are many ways to monitor, scan, and secure a network. The following
network components are designed to help complete such tasks:

Firewall

A firewall is a security system designed to stop unauthorized access


into or out of a private network. A firewall can be hardware or
software, or a combination of both. Firewalls frequently prevent
Internet users from getting into private networks that are also
connected to the internet. Firewalls block information that does not
meet its company’s specific security requirements.

Gateway
A gateway is a point that acts as both a barrier and entrance to
another network. If a network user has access permissions, the user
can go through the gateway. If a network user does not have access
permissions, the gateway will not let the user continue to the other
network. There are different gateway types to suit different
networking needs. Some gateways require a lot of power and
resources, while others do not. It is important to consider what sort
of security tools will be the most efficient and useful for the specific
network you are working to secure.

Proxy Server

In English, the word “proxy” means “go-between.” A proxy server


acts as a go-between between a LAN and the Internet. The proxy
server evaluates requests from client devices, and if they meet
certain requirements, the proxy server forwards them to the
appropriate server. There are different kinds of proxy servers, but
all of them work as a go-between to minimize security risk and
wasted bandwidth. Proxy servers are used by security professionals
and hackers as a way to hide an IP address. If an IP address is
hidden, it cannot be tracked. You may have seen action movies or
TV shows where police try to track a computer or phone user, but
their signal location keeps changing across many different
countries/regions. This would be an example of multiple proxy
servers being used to hide the true location of the user. Hackers,
governments, and some businesses use proxy servers to avoid
tracking. And even some individuals might use a proxy server to
access Internet content that is blocked to users outside a specific
region. Proxy servers can also be used to save bandwidth when
multiple devices need to access the same content. For example, if
multiple users need to run Windows Updates, the proxy server will
access the internet and download the updates for the first user, and
then keep those stored for any future users who want to download
and run those same updates.

Timeouts
Internet Content Filter
An Internet content filter, or simply a content filter, is usually applied as software at
the application layer and it can filter out various types of Internet activities, such as
access to certain Web sites, email, instant messaging, and so on. There are
different types of filters available, but all of them inspect information and approve
or deny access based on pre-set security requirements.

Perimeter Network

A perimeter network is a small network that is set up separately


from a company’s private LAN and the Internet. It is called a
perimeter network because it is usually on the edge of a LAN. A
perimeter network allows users outside a company’s LAN to access
specific services located on the perimeter network. When the
perimeter network is set up properly, those users are blocked from
gaining access to the company LAN. The perimeter network might
house a switch with servers connected to it that offer web, email,
and other services. Perimeter networks create better flexibility and
network security because they allow non-network users to access
the limited information that network users have placed on the
perimeter network. An extranet is a perimeter network where non-
network users like external business partners can access schedules,
FAQs, and other shared data. Another example of a perimeter
network is the public-facing website section of a company’s overall
network. This separate perimeter network gives customers access
to look up product information or contact support agents. In both of
these examples, external users have no access to the network, but
they can still access the limited information they need on the
perimeter network. Network users control and update the files and
information on their perimeter networks.
Lesson Overview
 Bookmark this page

All network administrators rely on network troubleshooting tools. There are many tools
that analyze, diagnose, and in some cases, resolve networking issues. It is important to
know the most commonly-used networking tools that help to troubleshoot most
networking issues.

In this lesson you will learn about:

 ipconfig and netstat tools


 ping, tracert, and pathping tools
 nslookup
 The importance of the host file and the protocols file

ipconfig and netstat


 Bookmark this page

ipconfig and netstat are tools that let us look deeply into the network configuration.
This helps people find network problems when there are performance issues.

ipconfig
When you are troubleshooting a network, it is very important that you find out the IP
configuration for each affected host (network device). ipconfig can find this IP
configuration information on Windows devices. In the module 3 videos, DHCP and DNS
protocols were covered. The ipconfig tool can also be used to update the settings for
the DHCP and DNS protocols.
To see the basic IP configuration for a computer, type command prompt into the
search bar on the bottom left of a Windows 10 computer and press Enter. This will
display a popup of the command prompt window, which is a text-only way to interact
with a computer’s operating system (such as Windows 10, Windows 8.1, and so on).

In the popup window, type ipconfig and press Enter. This will display the basic
configuration settings for that computer. This is the easiest way to figure out a
computer’s IP address.
Typing ipconfig into the command prompt displays a summary of the key network
information concerning that computer, including

 the name of the network adapter (the network interface card)


 the domain name the adapter is using
 the IP address
 the subnet mask
 how the default gateway (router) is configured for the adapter
If you type ipconfig/all into the command prompt, you will see a much more detailed list
of networking information about that computer. The ipconfig tool helps to verify
connection to a network, and to see what types of network settings a network device
has.

netstat
When troubleshooting a network, it is important to know the state of a network device’s
active network connections. This information can be displayed using the netstat tool.
The netstat tool displays information about a computer’s active TCP/IP connections so
you can see the details of how a computer is communicating with other computers.

If you open the command prompt, type in netstat and press Enter, you will see a list of
that computer’s active connections, the ports they use, and the IP addresses and ports
of the other computers.

You can display even more information with the netstat tool by including the following
parameters after the netstat command:

 netstat -n displays local and foreign addresses in IP format.


 netstat -a displays all the TCP/IP connections and ports the computer is
monitoring (this is a long list).
Exercise: ipconfig and netstat
 Bookmark this page

Exercise: ipconfig and netstat


In this optional, non-graded exercise, you can test out the
ipconfig and netstat commands to get familiar with the type
of network information they provide. You can run these
commands on your personal computer.

1. To see the basic IP configuration for a computer, you must first open a Command Promp
windows. To do so, type cmd or command prompt into
the search bar on the bottom left of a Windows 10
computer and press Enter.
2. In the command prompt window, type ipconfig and press Enter. In the resulting
data that is displayed, try and locate the following information:

 the name of the network adapter (the network interface card)

 the domain name the adapter is using

 the IP address

 the subnet mask

 how the default gateway (router) is configured for the adapter

3. Type ipconfig /all into the command prompt and press Enter to see a much
more detailed list of networking information about your computer.

4. Type netstat into the command prompt and press Enter to see a list of your
computer's active connections, the ports they use, and the IP addresses and ports of the other
computers.

5. Type in the following netstat commands to see even more information:

 netstat -n to display local and foreign addresses in IP format.

 netstat -a to display all the TCP/IP connections and ports the computer is
monitoring (this is a long list).

 netstat -e to display protocol statistics, such as the amount of information


sent and received (if errors or discards are more than zero, that may indicate a physical
problem, or too much network traffic).
 netstat -s to display additional IP statistics.

6. Close the Command Prompt window.

 netstat -e displays protocol statistics, such as the amount of information sent


and received (if errors or discards are more than zero, that may indicate a physical
problem, or too much network traffic).
 netstat -s displays additional IP statistics.

ping, tracert, and pathping


 Bookmark this page

Microsoft Windows provides several additional tools to help troubleshoot issues with
device connectivity and data packet routing between devices.

Ping
The ping tool is a very common tool that is used to test connectivity between hosts
(network devices). This command uses the Internet Control Message protocol (ICMP),
which sends an “echo packet” to a destination host and listens for the destination host’s
reply. This is a technical way of saying that one device (device A) simply asks another
device (device B) if it can hear it. If device A receives a reply from device B, then the
two hosts are connected. If device A does not receive a reply from device B, then the
two hosts are not connected. The ping command measures the round-trip time for
messages sent from the originating host to a destination computer that are echoed back
to the originating host.

The ping tool helps to identify where network problems are coming from. For example, if
an office suddenly has no internet connection, the ping tool can be used to find out if the
problem is in a machine in the office, in the network, or in a server of the office’s ISP.

To use the ping tool, open up the command prompt and then type in ping, followed by a
space and then the IP address or DNS name you want to check (using the prior
analogy, this would be device B).
Tracert
After basic connectivity is confirmed with the ping tool, the tracert tool can gather more
details about the path of an information packet—from the sending host to the receiving
host, and all the hosts in between. Tracert determines the path taken to a destination by
sending Internet Control Message Protocol (ICMP) Echo Request messages to the
destination with incrementally increasing Time to Live (TTL) field values. For example,
the tracert tool can be used to find the path from a host in a local area network to a
Netflix host. Tracert is useful if the local device is testing ok but connectivity can’t be
established. For hosts running Linux, the traceroute tool would be used.

To use the tracert tool, open the command prompt, then type tracert followed by the
name of the host at the end of the route you are trying to trace.
Note that you may experience a “timeout” when you use this tool, where a part of the
request took too long. If you see asterisks (star symbols) instead of numbers where the
times are shown, that means you have experienced a timeout. When this happens try
the tracert command again. If timeouts keep occurring, it may be an indication there is a
problem with the router.

Pathping
To take advantage of the benefits of both the ping and tracert commands, pathping was
developed. pathping gives a more detailed picture of the path characteristics from a
specific host to a specific destination. There are several reasons why pathping can take
a long time to complete, including:

 It sends packets to each router on the way to a final destination.


 It tests those routers over a period of time.
 It then computes results based on how long it took the packets to return from
each of the routers they were sent to.

pathping can show the degree of packet loss at any specified router or link, thereby
enabling you to pinpoint links that might be causing network problems.

To use the pathping tool, open the command prompt, type pathping followed by a


space, and the end-host IP address or DNS name, and then press Enter.
Exercise: ping, tracert, and pathping
 Bookmark this page
Exercise: ping, tracert, and pathping
In this optional, non-graded exercise, you can test out the
ping, tracert, and pathping commands to get familiar with
the type of network information they provide. You can run
these commands on your personal computer.

1. To run these commands, you must first open a Command Prompt windows. To do so,
type cmd or command prompt into the search bar on the
bottom left of a Windows 10 computer and press Enter.
2. In the command prompt window, type ping, then a space, and then the IP
address or DNS name you want to try and access. For example, if you want to test the
connectivity with www.microsoft.com, type ping www.microsoft.com and then press Enter.

3. After basic connectivity is confirmed with the ping tool, the Trace Route, or
tracert tool, can gather more details about the path of an information packet—from the
sending host to the receiving host, and all the hosts in between.

To use the tracert tool, type the tracert command followed by the name of the host at
the end of the route you are trying to trace. For example, type tracert
www.microsoft.com and then press Enter.

4. pathping can show the degree of packet loss at any specified router or
link, thereby enabling you to pinpoint links that might be causing network problems.

To use the pathping tool, type the pathping command, followed by a space, and the
end-host IP address or DNS name. For example, type pathping
www.microsoft.com and then press Enter.

nslookup, hosts, and protocols files


 Bookmark this page

A computer’s hosts file and protocols file identify the locations and protocols needed to
send information or start an action. Certain actions can’t get done without first knowing
where to go or what to do.

 Hosts file. The hosts file is a list on your computer that stores names and matching IP
addresses.
 Protocols file. The protocols file is a list on your computer that shows which protocols
are available on your computer.
nslookup
The nslookup tool is very important because it can look up the IP addresses associated
with domain names. It is much easier for network users to remember a domain name
like “www.xbox.com” or “www.microsoft.com.” Without the nslookup tool, every person
in the world would have to memorize specific IP address numbers to get to popular
websites. When users enter in a domain name into their internet browser, nslookup
finds and translates that domain name into the correct IP address.

If the nslookup can’t find this information, that means there is a DNS problem. The
nslookup tool can also contact DNS servers to see if the problem lies on the server or
on the host. The nslookup command-line tool is available only if you have installed the
TCP/IP protocol. You should be familiar with DNS before using this tool.

Telnet
 Bookmark this page

Telnet is a remote tool that lets computers control other computers remotely. This is
useful in networking because Server-client networks that connect users from all around
the world are very popular. Users on these networks might need to work together on a
project even when they are located very far away from each other. Telnet makes this
easier because people can share or take over a program if they need to without having
to worry about being in the same location together. telnet is useful for IT troubleshooting
as well. And even peer-to-peer networks sometimes require tech support to take over
their computers to fix issues. Telnet is built into every router and switch, so it is easy to
set up remote access and control of another computer. Telnet is less secure because it
uses plain text to send information across networks—including passwords and other
sensitive information. It is being replaced with more modern solutions like Secure Shell
(SSH), which is a secure and encrypted way to remote into a network.

Sometimes telnet can be used to check the connection status of ports. This is useful
because you can see if there is a specific port error before going on to other
troubleshooting steps. However, telnet can be blocked by local and external antivirus
software and firewalls. It is best to leave troubleshooting with telnet to more advanced
network engineers until you get more experience in dealing with all the different network
items involved.

Lesson Overview
 Bookmark this page

Troubleshooting usually involves finding the simplest and most common reason
something might not be working, and fixing it. Then, if the problem is still there, you find
the second simplest and most common reason and fix that. When you troubleshoot in
this way, you have a higher chance of resolving the problem much faster.There are lists
of these sorts of solutions that you can work through to resolve a networking problem as
quickly as possible.

In this lesson you will learn about:

 How networking connectivity testing works


 How to troubleshoot devices
 How to troubleshoot wireless networking
 How to troubleshoot wired networking

Networking connectivity testing


 Bookmark this page

Consider the scenario where you’re at a


computer that can’t communicate with
anything. What do you do? One of the basic
solutions to this problem is to test each level
of DNS name resolution and IP connectivity.
Here are the basic network troubleshooting
steps:

1. Open a command prompt.

2. To find out the name of your computer, enter the command **hostname**. If the computer has no
name, this will require troubleshooting from a network specialist.

3. Ping the name of a computer on a different subnet.

 If your computer can complete the ping, everything is properly working, in which
case the problem was likely caused by a user error or application error.

 If the ping fails, then there may be a problem with the router. Continue to step 4
to see if there are further problems.

4. Ping the name of a computer on this subnet.

 If this ping fails, that means there is an issue with name resolution, which means
there may be a problem with the DNS. Continue to step 5 to continue the troubleshooting steps.

5. Ping the IP address of a computer on this subnet.


 This step confirms whether there is a DNS problem. If this ping is successful,
then the problem is a DNS issue. Continue to step 6 to continue the troubleshooting steps.

 If this ping fails, the problem may be in the configuration of the machine you are
using.

6. Ping 127.0.0.1

 127.0.0.1 is the loopback Internet protocol (IP) address, which is also referred to
as the “localhost.” The address is used to establish an IP connection to the same machine or
computer being used by the end-user. This ping is a final check to determine whether your
machine has all the elements it needs for proper networking. If this ping is successful, that
confirms that the problem might be a misconfiguration of your IP address.

 If this ping fails, the machine will need a network specialist to troubleshoot it and
may have to be reimaged.

Troubleshooting devices
 Bookmark this page

When troubleshooting devices, it is important


to start with very basic troubleshooting to
make sure that a simple solution is not
overlooked. One of the most common
networking issues is when users don't realize
they have Airplane Mode turned on. It is a
simple thing to resolve since they just have to
turn Airplane Mode off to fix it. Other common
basic troubleshooting steps include:

1. If a device is not working at all, ensure it is plugged in and charging. If it will still not turn on while
it is plugged in, take it to a hardware repair
specialist.

2. If the device can be turned on but has general or network-specific issues, perform the
following tasks until the issues are resolved:

 Check to make sure Airplane Mode is turned off.

 Go to Windows Update and run updates.

 Use the Windows Defender Virus Scanner to run scans for any viruses and
ensure the device is up-to-date on all virus-related updates.
 Turn off the device, and then turn it back on again.

 Turn off the device, take the battery out, wait 30 seconds while holding the power
button down, and then turn it back on again. Waiting 30 seconds while holding the power button
is a way to make sure that all power is drained from the device so that it is fully turned off. Doing
this might help restore normal device functionality.

3. On modern PCs running Windows, you can use Windows 10 Troubleshooters to guide
you through basic troubleshooting steps. To start Windows 10 Troubleshooters,
type troubleshoot into the search field at the lower-left of your screen. A Troubleshooters
option will appear. Select it, then select the troubleshooter you want to try and follow the
instructions.

4. Contact a network troubleshooting specialist if the problem has not resolved.

Troubleshooting wireless networking


 Bookmark this page

When troubleshooting wireless networking, it is


important to start with very basic troubleshooting to
make sure that a simple solution is not overlooked.
One of the most common networking issues is when
users don't realize they have Airplane Mode turned on.
It is a simple thing to resolve since they just have to
turn Airplane Mode off to fix it. Other common basic
troubleshooting steps include:

1. If hardware related to the wireless networking issue is not working, ensure it is plugged in to a
working power source.

2. Make sure wireless devices that depend on wires to send or boost the wireless signal
have cables that are properly connected at both ends. This applies to devices such as routers,
modems, adapters, and so on.

3. Check to make sure the wires or cables you are using are the right type and are not
frayed or broken.

4. Run test scan on hardware. There is a lot of scanning software available. Usually you
can download hardware scanning software from the website of a device’s original manufacturer.

5. Make sure frequencies are set correctly (2.4/5 GHz) and check for interference.
6. On modern PCs running Windows, you can use Windows 10 Troubleshooters to guide
you through basic troubleshooting steps. To start Windows 10 Troubleshooters,
type troubleshoot into the search field at the lower-left of your screen. A Troubleshooters
option will appear. Select it, then select the troubleshooter you want to try and follow the
instructions.

7. Turn off the device, and then turn it back on again.

8. Turn off the device, take the battery out, wait 30 seconds while holding the power button
down, and then turn it back on again. Waiting 30 seconds while holding the power button is a
way to make sure that all power is drained from the device so that it is fully turned off. Doing this
might help restore normal device functionality.

Troubleshooting wired networking


 Bookmark this page

When troubleshooting wired networking, it is


important to start with very basic
troubleshooting to make sure that a simple
solution is not overlooked. Basic
troubleshooting steps include:

1. If hardware related to the wired networking issue is not working, ensure it is plugged in to a
working power source.

2. Makes sure devices related to the wired networking issue have cables that are connected in at
both ends. This applies to devices such as
modems, servers, bridges, computers, and other devices.

3. Check to make sure the wires or cables you are using are the right type and are not
frayed or broken.

4. Run test scan on hardware. There is a lot of scanning software available. Usually you
can download hardware scanning software from the website of a device’s original manufacturer.

5. On modern PCs running Windows, you can use Windows 10 Troubleshooters to guide
you through basic troubleshooting steps. To start Windows 10 Troubleshooters,
type troubleshoot into the search field at the lower-left of your screen. A Troubleshooters
option will appear. Select it, then select the troubleshooter you want to try and follow the
instructions.

6. Turn off the device, and then turn it back on again.


7. Turn off the device, take the battery out, wait 30 seconds while holding the power button
down, and then turn it back on again. Waiting 30 seconds while holding the power button is a
way to make sure that all power is drained from the device so that it is fully turned off. Doing this
might help restore normal device functionality.

Module 4 Case Study


 Bookmark this page

Company Overview
Northwind Traders is a multi-national corporation that owns and operates a global chain
of retail stores. The corporate headquarters is in New York City, and it has branch
offices and retail locations throughout the United States and Europe. The corporate
office has 300 employees, and each of the branch offices has between 50-150
employees.

Existing Environment
All existing servers run Windows Server 2016. All client computers run Windows 10 Pro
Enterprise.

The corporate headquarters in New York has multiple file servers; whereas, each
branch office has one file server. Each file server has two hard disks. One disk has the
server’s operating system installed and the other disk stores data files. File server
backups are performed regularly.

The corporate headquarters has a Windows Server Update Services (WSUS) server. All
client computers are configured to receive updates from the WSUS server.

Planned Changes
Northwind Traders plans to open a new branch office in Rio de Janeiro, Brazil. The new
office will be responsible for setting up and managing a new series of Northwind
Traders retail shops throughout Brazil.

The new office in Rio de Janeiro will be responsible for translating all product
information and website data into Portuguese. Those translations will be added to the
Brazilian versions of the Northwind Traders websites by corporate employees of the
new office. These employees will also be responsible for all Brazilian marketing and PR
functions, which will include hiring local manufacturers to update all Northwind Traders
packaging with the Brazilian translations so that those products will be ready for local
markets. Employees will be encouraged to work with additional local partners to
collaborate on packaging, and to develop new products for local and global markets.
Employees of the new Rio branch office will only be allowed to access the Northwind
Traders network through wired connections. Employees will not be able to access the
corporate network outside of the new office, and they will not be able to remove their
network devices from the main building of the new office. There will be standard devices
available on the wired network, including printers, faxes, employee computers, and so
on. Employees with permissions will be able to access Northwind Traders’ corporate
network, any internal Northwind Traders’ websites, and the internet.

The new Rio de Janeiro office will be connected to the corporate network, which runs
Windows Server 2016 and Windows 10 Enterprise.

Module 4 Case Study  Questions


Based on this scenario, please answer the following questions regarding network setup
in the new Rio de Janeiro office.

M4CS01
0.0/1.0 point (graded)

What can the network engineers set up to ensure proper security for this new office?
(Select 4)

Firewall

Gateway

Proxy Server

Internet Content Filter

Dual core devices

Perimeter Network

unanswered
Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M4CS02
0.0/1.0 point (graded)

What can the network engineers set up to ensure that the new office’s download
bandwidth is handled efficiently? (Select 2)

Firewall

Gateway

Proxy Server

Internet Content Filter

Perimeter Network

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M4CS03
0.0/1.0 point (graded)

What can the network engineers set up to ensure that customers and partners can only
access the things the company wants them to see?
Firewall

Gateway

Proxy Server

Internet Content Filter

Perimeter Network

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M4CS04
0.0/1.0 point (graded)

If an employee in the new office needs to find the IP address and subnet mask of their
computer, which of the following tools should they use?

nslookup

ipconfig

netstat

ping
telnet

tracert

pathping

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M4CS05
0.0/1.0 point (graded)

If an employee in the new office needs to confirm basic connectivity between their
device and another device, which of the following tools could they use? (Select 2)

nslookup

ipconfig

netstat

ping

telnet

tracert
pathping

Module 4 Assessment Exam


 Bookmark this page

M405
0.0/1.0 point (graded)

Which of the following is a point that acts as both a barrier and entrance to another
network?

a firewall

a gateway

a proxy server

an internet content filter

a perimeter network

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M406
0.0/1.0 point (graded)
Which of the following is the go-between between a LAN and the Internet?

a firewall

a gateway

a proxy server

an internet content filter

a perimeter network

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M415
0.0/1.0 point (graded)

When there is a networking issue with a computer, what are two simple steps you can
take to troubleshoot the problem? (Select 2)

Turn off airplane mode

Test each level of name resolution and IP connectivity

Ensure the device has cables connected at both ends


Turn off the device, and then turn it back on

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M412
0.0/1.0 point (graded)

Which of the following tools can take a long time to run but provides the most detailed
picture of the path characteristics from a specific host to a specific destination?

ipconfig

netstat

Ping

Tracert

pathping

DNS

nslookup

unanswered

Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M404
0.0/1.0 point (graded)

Which of the following is a security system designed to stop unauthorized access into or
out of a private network?

a firewall

a gateway

a proxy server

an internet content filter

a perimeter network

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M402
0.0/1.0 point (graded)

Fill in the blank. A performance issue known as _____________ occurs when network
protocols do not carry out the intended task.
a timeout

a bottleneck

a protocol problem

flooding

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M409
0.0/1.0 point (graded)

Which of the following would you use to find the state of a network device’s active
network connections?

ipconfig

netstat

Ping

Tracert

pathping
DNS

nslookup

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M401
0.0/1.0 point (graded)

Fill in the blank. A performance issue known as _____________ occurs when a network
request ends without being completed because it took too long.

a timeout

a bottleneck

a protocol problem

flooding

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer


M407
0.0/1.0 point (graded)

Which of the following is a small network set up separately from a company’s private
local area network and the Internet?

a firewall

a gateway

a proxy server

an internet content filter

a perimeter network

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

M413
0.0/1.0 point (graded)

Which of the following translates a website location name or network location name to
an IP address that computers can recognize?

ipconfig

netstat
Ping

Tracert

pathping

DNS

nslookup

unanswered

 Bookmark this page

Company Overview
Northwind Traders is a multi-national corporation that owns and operates a global chain
of retail stores. The corporate headquarters is in New York City, and it has branch
offices and retail locations throughout the United States and Europe. The corporate
office has 300 employees, and each of the branch offices has between 50-150
employees.

Existing Environment
All existing servers run Windows Server 2016. All client computers run Windows 10 Pro
Enterprise.

The corporate headquarters in New York has multiple file servers; whereas, each
branch office has one file server. Each file server has two hard disks. One disk has the
server’s operating system installed and the other disk stores data files. File server
backups are performed regularly.

The corporate headquarters has a Windows Server Update Services (WSUS) server. All
client computers are configured to receive updates from the WSUS server.
Planned Changes
Northwind Traders plans to open a new branch office in Rio de Janeiro, Brazil. The new
office will be responsible for setting up and managing a new series of Northwind
Traders retail shops throughout Brazil.

The new office in Rio de Janeiro will be responsible for translating all product
information and website data into Portuguese. Those translations will be added to the
Brazilian versions of the Northwind Traders websites by corporate employees of the
new office. These employees will also be responsible for all Brazilian marketing and PR
functions, which will include hiring local manufacturers to update all Northwind Traders
packaging with the Brazilian translations so that those products will be ready for local
markets. Employees will be encouraged to work with additional local partners to
collaborate on packaging, and to develop new products for local and global markets.

Employees of the new Rio branch office will only be allowed to access the Northwind
Traders network through wired connections. Employees will not be able to access the
corporate network outside of the new office, and they will not be able to remove their
network devices from the main building of the new office. There will be standard devices
available on the wired network, including printers, faxes, employee computers, and so
on. Employees with permissions will be able to access Northwind Traders’ corporate
network, any internal Northwind Traders’ websites, and the internet.

The new Rio de Janeiro office will be connected to the corporate network, which runs
Windows Server 2016 and Windows 10 Enterprise.

Final Case Study  Questions


Based on this scenario, please answer the following questions regarding network setup
in the new Rio de Janeiro office.

FCS01
0.0/1.0 point (graded)

What type of topology should the office use in its Translations department?

Star

Ring
Bus

Tree

Mesh

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

FCS02
0.0/1.0 point (graded)

What should the new office use to communicate with local corporate partners?

Internet

Intranet

Extranet

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

FCS03
0.0/1.0 point (graded)
What privacy measures should the new office install to provide optimum security for its
network? (Select 3)

Firewall

Encryption worms

Perimeter network

Security zone

Lock filters

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

FCS04
0.0/1.0 point (graded)

Which device should the network engineers use to ensure information sent from one
network to another is delivered as fast as possible?

Hub

Switch

Bridge
Router

Gateway

Repeater

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

FCS05
0.0/1.0 point (graded)

What should the network engineer do if users can’t find the network, or experience a
weak network? (Select 2)

Make sure repeaters are being used, and fully functional

Make sure all network cables are working properly

Make sure signal repeaters are spaced properly

Increase the distance between any devices on the same frequency

Move the device that can’t connect so that it is closer to the router or repeater

unanswered

Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

FCS06
0.0/1.0 point (graded)

What actions should the administrator take to protect the network? (Select 5)

Change the system ID

Hide the wireless network

Encrypt all network data

Use CNET downloads to combat malware

Use firewalls

Change the default administrator password

Port main-office security links into the local server

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

FCS07
0.0/1.0 point (graded)
Based on the case study, how should the network engineers set up remote access for
this new office?

They should use RRAS to set up remote access.

They should set up a VPN and route all remote access through that.

They should not set up remote access.

They should use RRAS on a VPN to set up remote access.

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

FCS08
0.0/1.0 point (graded)

Should this new office use DNS?

Yes. The office will connect to the Internet, so it will need to use DNS.

No. The office will connect to the Internet, so it will not need to use DNS.

Yes. The office is not going to connect to the Internet, so it should use DNS.

No. The office is not going to connect to the Internet, so it should not use DNS.

unanswered
Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

FCS09
0.0/1.0 point (graded)

Which model should the network engineers use when setting up the new office?

The OSI model should always be used when setting up new networks.

The TCP model should always be used when setting up new networks.

New networks require a combination of the OSI model and the TCP model.

Network engineers should create or use whichever model will work best for the needs of the
office and company.

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

FCS10
0.0/1.0 point (graded)

If an employee in the new office needs to learn more about the path that information
data is taking from their computer to another device, which of the following tools could
they use? (Select 2)

nslookup
ipconfig

netstat

ping

telnet

tracert

pathping

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

FCS11
0.0/1.0 point (graded)

If an employee in the new office needs to troubleshoot his or her laptop, what are the
first steps the employee should perform?

Run updates and restart the laptop

Run hostname and then telnet

Unplug the laptop and remove the battery


Run Windows Troubleshooting Guides

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

FCS12
0.0/1.0 point (graded)

What is the first thing all employees of the new office should do if they are having
trouble connecting to the network, even though they have already done troubleshooting
steps on their device?

Check for frayed cables

Run hardware scans

See if the hardware is plugged in

Restart the hardware

Final Course Exam


 Bookmark this page

F25
0.0/1.0 point (graded)

Which of the following is a tool used to look up the IP addresses associated with domain
names?
ipconfig

netstat

Ping

Tracert

pathping

DNS

nslookup

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F03
0.0/1.0 point (graded)

Which of the following is an area network that links powerful computers in a cluster so
they can communicate at high speeds?

Wireless Local Area Network (WLAN)

Metropolitan Area Network (MAN)


Campus Area Network (CAN)

Storage Area Network (SAN)

System Area Network

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F11
0.0/1.0 point (graded)

Which of the wired transmission media is used to join two network devices of the same
type?

Coaxial cables

Twisted pair cables

Fiber optic cables

USB cables

Crossover cables

unanswered
Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F05
0.0/1.0 point (graded)

Which of the following is a network that connects multiple star topology networks
together in a bus topology?

Star topology networks

Ring topology networks

Bus topology networks

Tree topology networks

Mesh topology networks

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F04
0.0/1.0 point (graded)

Which of the following is a network that connects all devices on the network together?
Star topology networks

Ring topology networks

Bus topology networks

Tree topology networks

Mesh topology networks

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F24
0.0/1.0 point (graded)

Which of the following do you use to update DHCP and DNS settings?

ipconfig

netstat

Ping

Tracert
pathping

DNS

nslookup

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F10
0.0/1.0 point (graded)

Which of the following can you do to make sure your wireless network is secure?
(Select 3)

Encrypt your data

Use firewalls

Use a router

Use a strong network key

Change cables

unanswered
Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F01
0.0/1.0 point (graded)

Which of the following is a small network that is set up separately from a company’s
private local area network (LAN) and the internet?

Internet

Intranet

Extranet

Perimeter network

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F28
0.0/1.0 point (graded)

Which of the following is a basic troubleshooting step you should try when a computer
cannot communicate with anything?

Turn off airplane mode


Test each level of name resolution and IP connectivity

Ensure the device has cables connected at both ends

Turn off the device, and then turn it back on

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F21
0.0/1.0 point (graded)

Which protocols are used by network routers to identify routers, manage paths between
data sources and data destinations, and make decisions about where to route data?

Internet protocols

Wireless network protocols

Network routing protocols

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F12
0.0/1.0 point (graded)

Which of the wired transmission media are pieces of hardware inside computers that
have special protocols that allow them to communicate to USBs?

Coaxial cables

Twisted pair cables

Fiber optic cables

USB cables

Crossover cables

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F17
0.0/1.0 point (graded)

A port is the first and last stop for information being sent across a network. How many
ports are there for each application?

One

Two
Five

Ten

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F19
0.0/1.0 point (graded)

Routing and Remote Access Services (RRAS) supports which of the following?

Transferring information directly to a computer.

Packaging information with precise instructions and sending it out into the network.

Remote user or site-to-site connectivity by virtual private networks (VPNs) or dial-up


connections.

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F22
0.0/1.0 point (graded)
Fill in the blank. A performance issue known as _____________ occurs when there is
limited data flow, or where data appears to be “stuck” or transferring very slowly.

a timeout

a bottleneck

a protocol problem

flooding

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F20
0.0/1.0 point (graded)

Which of the following is true of Static IP addresses? (Select 3)

They are associated with an exact physical location, which makes it easier for other
computers to find and connect to.

They are a permanent internet address that will always be the same so long as the user is
connecting from that location.

They are temporary.


They can change each time a computer connects to a network.

They must be assigned by request.

They are reliable and run automatically.

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F27
0.0/1.0 point (graded)

Which of the following do you use to find the IP configuration information on Windows
devices?

ipconfig

netstat

Ping

Tracert

pathping

DNS
nslookup

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F02
0.0/1.0 point (graded)

Which of the following is an area network that connects data storage devices to
servers?

Wireless Local Area Network (WLAN)

Metropolitan Area Network (MAN)

Campus Area Network (CAN)

Storage Area Network (SAN)

System Area Network

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer


F06
0.0/1.0 point (graded)

Which of the following is a network that connects each device to a switch or hub with a
dedicated cable?

Star topology networks

Ring topology networks

Bus topology networks

Tree topology networks

Mesh topology networks

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F18
0.0/1.0 point (graded)

Routing is used for which of the following? (Select 3)

LAN-to-LAN

LAN-to-WAN
DHCP

VPN

HTTP

unanswered

Submit

You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.

SaveSave Your Answer

F07
0.0/1.0 point (graded)

Which of the following is a private computer network that provides limited access to
parts of an organization’s internet?

Internet

Intranet

Extranet

Perimeter network
NETWORK HARDWARE AND SOFTWARE

The hardware devices and software used to create networks are located
throughout the world, and even in space! Businesses often set up networks
that connect all their employees in one building. Cable TV companies send
out their TV signals from space satellites that orbit the planet. And many
people from around the world network with each other every day when they
use the Internet. The internet is the largest network in the world. After it
was created in the 1990s, networks increased in popularity with many
network users visiting public websites and file-sharing sites.

Special hardware for networks include routers and network cables. These are
used to move information from one place to another and connect computers
and devices together. Special software for networks enables users to do
useful things and allows data to be transferred from one location on a
network to another.

You might also like