This chapter provides an overview of how the Internet operates, including its structure, connection methods, and application protocols. It discusses various types of Internet connections such as DSL, cable, fiber, Wi-Fi, and cellular, as well as the role of Internet Service Providers (ISPs). Additionally, it covers basic router configuration and the importance of updating firmware for optimal performance.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
5 views119 pages
CompTIAA+The Internet v2
This chapter provides an overview of how the Internet operates, including its structure, connection methods, and application protocols. It discusses various types of Internet connections such as DSL, cable, fiber, Wi-Fi, and cellular, as well as the role of Internet Service Providers (ISPs). Additionally, it covers basic router configuration and the importance of updating firmware for optimal performance.
Overview • In this chapter, you will learn how to: – Explain how the Internet works – Connect to the Internet – Use Internet application protocols – Troubleshoot an Internet connection
Connection Concepts (1 of 2) • Connecting to an ISP requires: – Hardware for connectivity – Software (protocols) • Governs the connection and data flow
• With most ISPs, a DHCP server will provide
your computer with the proper TCP/IP information – The router to which you connect at the ISP is the default gateway
Connecting to the Internet • Computers commonly connect to an ISP through their wired or wireless router – Customer purchased router will have an Ethernet connection to a box that interconnects it with the ISP’s network – Customer leased a router from ISP will often have a built-in modem – The connection to the ISP could use one of many wired or wireless technologies • The modem takes care of the details
Cable (1 of 2) • Cable Internet connections – Theoretically available anywhere you can get cable TV – Connections start with an RG-6 or RG-59 cable coming into your house – The cable connects to a cable modem that then connects to a small home router or your network interface card (NIC) via Ethernet
Fiber (1 of 4) • DSL providers developed two popular services – Fiber-to-the-node (FTTN) – Fiber-to-the premises (FTTP) • Both services provide Internet (and often Internet and telephone services over the same connection) – Makes them head-to-head competitors with the cable companies
Fiber (2 of 4) • FTTN – The fiber connection runs from the provider to a box somewhere in your neighborhood • This box connects to your home or office using normal coaxial or Ethernet cabling • FTTP – Runs from the provider straight to a home or office, using fiber the whole way • Once inside the home or office, you can use any standard cabling (or wireless) to connect your PCs to the Internet
Satellite (2 of 3) • Coax cable runs from the dish to your satellite modem • Satellite modem has an RJ-45 connection – Use to connect directly to your computer or to a router • Both satellites and the costs to develop and launch them have shrunk – Resulting in a surge of interest in satellite Internet services that use a very large number of satellites in low Earth orbit
Satellite (3 of 3) • Several downsides for satellites – Upfront cost of the dish and installation – The signal can also degrade or drop entirely in foul weather such as rain and snow – Many providers also have usage limits – Satellite latency • How long it takes the signal to make the round-trip
Connection to the Internet (1 of 4) • Two choices for an Internet connection: – Connecting a single computer – Connecting a network of computers • Connecting a single computer – For wireless, you connect to the WAP using the provided information • Perform security configuration – For wired, you run a cable from whatever type of box is provided to the computer
Connection to the Internet (4 of 4) • All home routers use a technology called Network Address Translation (NAT): – NAT presents an entire LAN of computers to the Internet as a single machine by showing only your public IP address – NAT acts as a firewall, protecting your internal network from probing or malicious users
Basic Router Configuration (1 of 8) • Navigate to the router utility web page • Enter the router username and password credentials to open the router configuration utility – The router’s home configuration page displays – From these pages, you can change any of the router’s settings • UPnP • Changing Default Credentials • Setting Static IP Addresses
Basic Router Configuration (4 of 8) • Universal plug and play (UPnP) – Finds and connects to other UPnP devices – Common UPnP devices include media servers and printers – Feature enables seamless interconnectivity at the cost of somewhat lowered security – Leave it disabled if you don’t need it • Changing Default Credentials – Change defaults so that unauthorized users cannot have access to the router
Basic Router Configuration (7 of 8) • Setting static IP addresses – In cases where you want a stable IP address to host your own sites and service – Most ISPs enable you to order a static IP address (for an extra monthly charge)
Updating Firmware (1 of 2) • Updating firmware – Update the firmware of the router to the latest version – A firmware update gone bad can brick your router. This rarely happens, but you should keep it in mind when doing a firmware update
Using the Internet • Once you’ve established a connection to the Internet, you need applications to get anything done • These applications all use one or more application protocols to communicate with the servers that power them
Internet Application Protocols (1 of 5) • Most application developers turn to well- known application protocols • Web browsers – Use the Hypertext Transfer Protocol (HTTP) to transfer Web pages and related resources • E-mail clients – Use Post Office Protocol 3 (POP3) or Internet Message Access Protocol (IMAP) to receive e-mail – Use Simple Mail Transfer Protocol (SMTP) to send e-mail
Internet Application Protocols (2 of 5) • Each protocol has its own rules and its own port numbers – Hypertext Transfer Protocol Secure (HTTPS) • Looks like HTTP from Web browser point of view • HTTPS uses its own port: 443 • Web address starts with https
Browsing the Web • To download resources – Browser interacts with Web servers using the HTTPS protocol on port 443 and HTTP on port 80 – It’s important to make sure browsers are secure
Pop-up and Ad Blockers (1 of 2) • Pop-ups is a new windows that open when you visit a site – Generally contain ads • Ability to block pop-ups and advertisements – Built directly into some browsers – Available from a browser extensions
Browsing Data (1 of 3) • Main kinds of data our browsers accumulate: – A running list (history) of each page we visit – Scripts running on sites we visit (i.e., cookies and local storage) – Site-specific settings and passwords we configure – Form data (such as our postal address) that we enable the browser to auto-fill – Cached copies of recently downloaded resources – A list of recently downloaded files
Internet Options (1 of 3) • Microsoft Internet Options – Contains a grab-bag of settings that affect Internet Explorer, Microsoft Edge, and potentially any other program that uses the Internet • As of June 2022 Internet Explorer is no longer supported in the most common version of Windows 10 • CompTIA exam objectives for Windows 10 still test on the Internet Options applet content
Internet Options (2 of 3) • The Internet Options applet has seven tabs – General tab controls the most basic features of Internet Explorer – Security tab enables you to adjust security settings for a particular zone – Privacy tab controls privacy matters – Content tab controls what is displayed – Connections tab is for setting up a connection – Programs and Advanced tabs • These two are not used much today
Communicating with Others • CompTIA A+ 1102 exams only focus on the two of the oldest and most business-oriented ways to stay in touch with people: – E-mail – VoIP
VoIP (1 of 2) • Use Voice over IP (VoIP) to make voice calls over your computer network – Most common VoIP application protocol is Session Initiation Protocol (SIP) – Two popular ways to set up a VoIP system • Using dedicated VoIP phones • Or using a small VoIP phone adapter – True VoIP phones have RJ-45 connections • Plug directly into the network • Offer advanced features such as HD-quality audio and video calling
Remote Access • Take advantage of remote access technologies – To manage servers and workstations – Use them to train users or troubleshoot their problems • You will almost certainly need to configure some resource to ensure it’s available remotely
Telnet and SSH • Telnet is a terminal emulation program for TCP/IP networks that uses port 23 – Sends passwords and usernames as clear text – Use Telnet as a last resort • Secure Shell (SSH) has replaced Telnet – SSH uses port 22, and the entire connection is encrypted (tunneling) – SSH is encrypted, but its security is only as strong as your password
Remote Desktop (3 of 5) • Windows offers an alternative to VNC – Remote Desktop Connection • Provides control over a remote server with a fully graphical interface • Microsoft Remote Assistance (MSRA) – Enables you to give anyone control of your desktop or take control of anyone else’s desktop – Can do anything you would do from the actual computer
Video-Conferencing Software • Make it easy for someone to share windows or even their entire desktop with whoever else is on the call • Enable you to give someone else on the call control of your desktop • Can use this feature to help a user troubleshoot a problem just like you would in Remote Assistance
Virtual Private Networks (1 of 5) • VPNs set up an encrypted tunnel between the two point over the open Internet – An encrypted tunnel requires endpoints – Software running on a computer or a dedicated Internet appliance must act as an endpoint • VPNs require a protocol – That protocol uses a tunneling protocol • Adds the capability to ask for an IP address from a local DHCP server to give the tunnel an IP address that matches the subnet of the local LAN
Virtual Private Networks (5 of 5) • Pro: VPN connections are convenient • Con: They can give an attacker an easy way to get into your network – Especially if they steal a user’s credentials or a user device configured to automatically log in
Remote Monitoring and Management (RMM) • Builds on the capabilities of desktop or endpoint management software – Layering in robust monitoring and management of your network – Includes network devices and servers
File Transfer Protocol (3 of 4) • TFTP – Trivial FTP (TFTP) is an old, bare-bones file transfer protocol – Lacks many FTP features • Authentication and listing files – Not popular but good for downloading system images to boot a device from the network – Uses UDP port 69 – Has its own built-in mechanisms for avoiding errors
File Transfer Protocol (4 of 4) • SFTP – Secure FTP network protocol transfers files over an encrypted SSH connection – Written as an extension of SSH • Can find SFTP client and server support built into SSH software such as the popular OpenSSH
Embedded Systems • Computers that do not look like computers • Embedded systems have been built into all kinds of stuff – Appliances, game consoles, cars, medical equipment, missiles, equipment in factories • Over time, many of these computers have evolved into networked smart devices – Are both more capable and cause new problems
The Internet of Things (2 of 3) • We can control a smart thermostat from any device connected to the Internet – Computer at the office or your smartphone on the commute • Nest thermostat features – Can use the Internet all on its own • To report when it ran the heater or air conditioner • To automatically adjust its usage to the real-time price of electricity in your area
Internet Troubleshooting (1 of 2) • Most Internet connection problems are network connection problems • Internet setup for a SOHO environment – Box from your ISP such as a cable/DSL modem, fiber ONT, etc. – Box connects via Ethernet cable to a home router – Router is usually 802.11 capable and includes four Ethernet ports – Some computers in the network connect through a wire and some connect wirelessly
Limited Connectivity • Limited connectivity points to a DHCP problem, assuming you’re connected to a DHCP server – Run ipconfig and see if you have an APIPA address – If you do, you either have problems with the DHCP server or you are not connected to the network • If you don’t have a DHCP server and your router is your DHCP server, restarting it – Try setting up your NIC statically
Local Connectivity (1 of 3) • Local connectivity means you can access network resources but not the Internet – This is a classic symptom of a downed DHCP server • You mPing your default gateway to see if it responds • If it’s successful, look at its configuration through the router’s configuration Web page—especially the WAN side connection – Might also have a problem with your router
Slow Network Speeds (1 of 3) • Your Internet connection has a maximum speed at which it can transfer – If you divide that connection between multiple programs trying to use the Internet, all of your programs will connect very slowly – Open a command prompt and type netstat, which shows all the connections between your computer and any other computer
Slow Network Speeds (2 of 3) • If everyone on the network is getting slow Internet connectivity, check the router • You can control what’s going through your router using Quality of Service (QoS) – QoS enables you to limit the bandwidth for certain types of data based on application protocol, the IP address of a computer, and other criteria
Latency and Jitter • Any real-time application can prove unworkable if you have high latency • The higher the latency the more problems – Noticeable delays on VoIP calls • Jitter is caused by latency fluctuations – Can garble audio or video signals – Can break the connection • Can assess latency with tools like ping, tracert/traceroute, pathping