SOHO Network Setup Tutorial

junaidahmedsaba 7,653 views 104 slides Oct 31, 2017
Slide 1
Slide 1 of 104
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104

About This Presentation

SMALL OFFICE IT NETWORK SETUP


Slide Content

Small Office Home Office (SOHO)
IT Network Setup

SOHO Course Outline
•Understanding Network Abbreviations
•Chapter 1: Understanding Networks
•Chapter 2: Network Components
•Chapter 3: Network Terminologies
•Chapter 4: SOHO Network Lab
•Chapter 5: SOHO Network Configurations
•Chapter 6: Email Setup Configurations
•Chapter 7: Network File share
•Chapter 8: Advanced Google search operators

Understanding Network Abbreviations

•ACK: Acknowledgement
•ACL: Access Control List
•AP: Access Point
•bps: Bits Per Second
•Bps: Bytes Per Second
•CAT-5: Category-5
•CLI: Command line interface
•DHCP: Dynamic Host Configuration Protocol
•DNS: Domain Name Service
•DSL: Digital Subscriber Line
•FTP: File Transfer Protocol
•Gbps: Gigabits per Second
•GHz: Gigahertz
•GPS: Global Positioning System
•HTML: HyperText Markup Language
•HTTP: HyperText Transfer Protocol
•HTTP-S: HyperText Transfer Protocol-Secure
•IM: Instant Messaging

•IP: Internet Protocol
•IPSec: IP Security
•IPv4: Internet Protocol version 4
•IT: Information Technology
•LAN: Local Area Network
•LOS: Line of Sight
•MAC: Media Access Control
•Mbps: Megabits Per Second
•MHz: Megahertz
•MODEM: Modulator-Demodulator
•MX: Mail Exchange
•NIC: Network Interface Card
•NMS: Network Management System
•NOC: Network Operations Center
•NTP: Network Time Protocol
•PABX: Private Automatic Branch Exchange
•PING: Packet Internet Gopher

•PK: Public Key
•PKI: Public Key Infrastructure
•POTS: Plain Old Telephone System
•PSTN: Public Switched Telephone Network
•QoS: Quality of Service
•RADIUS: Remote Authentication Dial-In User Service
•R&D: Research and Development
•RF: Radio Frequency
•RFC: Request for Change
•RFI: Request for Information
•RFP: Request for Proposal
•RFU: Ready for Use
•RTS: Real-Time Service
•SLA: Service Level Agreement
•SMS: Service Management System
•SMTP: Simple Mail Transfer Protocol
•SNMP: Simple Network Management Protocol
•SOP: Standard Operating Procedure

•SSH: Secure Socket Shell
•SSL: Secure Socket Layer
•SW: Software
•TCP: Transmission Control Protocol
•TCP/IP: Transmission Control Protocol/Internet Protocol
•TTL: Time To Live
•VoIP: Voice-over-IP
•WAN: Wide Area Network

Chapter 1:
Understanding Networks

What is a network?
•Networking is the concept of joining two
or more hosts using shared media like
hubs, switches routers, etc.
•Network is defined as the set of
computers and peripherals connected
together using a medium (wired or
wireless).
•Connection between them can be a
direct connection(i.e. through a cable) or
a indirect connection.(i.e. through a
switch/router )
•The communication between the
computers and peripherals using a
predefined set of protocols/rules .

Lets start with the word networking itself. Lets
take an example of deliberated intended
communication via a phone call.
You as a source want to call via your
mobile/home phone to a friend number to
discuss a matter, you are networking here.
Its a network of people talking to each other. so,
in computer networking basically computers
talking to each other.

Post Office network, a real world example

Client and Server:
•Client:
“A program or a terminal, which requests for
information or resources from another program
or computer called Server.”
•Server:
“A program or a computer that provides the
resources or information to the other client
terminals in the network”

ServerServerClient ComputerClient Computer
You can run Ping from a client computer to test the
connection to any host, such as a printer or a server:
The server sends an Echo Reply back to the client computer
The client computer sends an Echo Request to the server
You check the details of the Echo Reply to
determine the quality of the connection
Pinging LONDON (192.168.2.10) with 32 bytes of data:
Reply from 192.168.2.10: bytes=32 time<10ms TTL=128
Reply from 192.168.2.10: bytes=32 time<10ms TTL=128
Reply from 192.168.2.10: bytes=32 time<10ms TTL=128
Reply from 192.168.2.10: bytes=32 time<10ms TTL=128
Ping statistics for 192.168.2.10:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = Oms, Maximum = Oms, Average = Oms
What Is Ping?

LAN vs. WAN
LAN, stands for local area network.
WAN, stands for wide area network.
Two types of networks that allow for interconnectivity
between computers.
LANs are for smaller, more localized networking, in a
home, business, school, etc.
WANs cover larger areas, such as cities, and even allow
computers in different nations to connect.
LANs are typically faster and more secure than WANs, but
WANs enable more widespread connectivity. And while
LANs tend to be owned, controlled and managed in-
house by the organization where they are deployed,
WANs typically require two or more of their constituent
LANs to be connected over the public Internet or via a
private connection established by a third-party
telecommunications provider.

LAN WAN
Stands ForLocal Area Network Wide Area Network
CoversLocal areas only (e.g., homes,
offices, schools)
Large geographic areas (e.g.,
cities, states, nations)
DefinitionLAN (Local Area Network) is a
computer network covering a
small geographic area, like a
home, office, school, or group of
buildings.
WAN (Wide Area Network) is a
computer network that covers a
broad area (e.g., any network
whose communications links
cross metropolitan, regional, or
national boundaries over a long
distance).
SpeedHigh speed (1000 mbps) Less speed (150 mbps)
Data transfer
rates
LANs have a high data transfer
rate.
WANs have a lower data transfer
rate compared to LANs.
ExampleThe network in an office building
can be a LAN
The Internet is a good example of
a WAN
TechnologyTend to use certain connectivity
technologies, primarily Ethernet
and Token Ring
WANs tend to use technologies
like MPLS, ATM, Frame Relay for
connectivity over longer distances
ConnectionOne LAN can be connected to
other LANs over any distance via
telephone lines and radio waves.
Computers connected to a wide-
area network are often connected
through public networks, such as
the telephone system. They can
also be connected through leased
lines or satellites.
Comparison chart

Components of LAN
1.Switch
2.Cable
3.Network interface card
switch
Cable
NIC

Cables
•Fiber Optic cable
•Twisted pair cable
Twisted pair comes in two categories :
1. Cat 5e - 100 mbps
2. Cat 6 - 1000 mbps

Fiber optic cable
•Can carry large information over long
distance
•Use light signals to transfer data
Fiber-Optic

Twisted pair cable
•Uses electrical signals to transfer data
•Twisted pair cable comes in two formats:
1. UTP (Unshielded Twisted Pair)
2. STP (Shielded Twisted Pair)
•STP comes with extra copper braids to insulate
data from electrical interferences
•Used in factory floors
•UTP is used mostly in office
Twisted-Pair
Unshielded (UTP)
Shielded (STP)

Network Interface Card(NIC)
•Each NIC has an address called mac (media access
control) address burnt into the chip at the time of
manufacture
• Also called hardware address because it cannot be
changed
•Each mac address is unique in the world & in
hexadecimal format [0-9, A-F]
•E.g.
1A.2B.CC.2A.FF.3C
vendor vendor
ID defined

•Vendor ID is given to manufacture by the body in
US
•Vendor Defined portion is given to each NIC by
the manufacturer
•To see mac address
• Start Run cmd ipconfig/all
•Mac address is used by PCs to communicate on
the LAN; IP address between networks.

TCP/IP

Protocol
•Protocols are languages by which hosts communicate
on networks
•E.g. :
1. Transmission Control Protocol/Internet Protocol
2. Internetwork Packet Exchange/Sequenced

Packet Exchange (IPX/SPX)
3. NetBIOS Enhanced User Interface (NetBEUI)
4. AppleTalk

TCP/IP
TCP
•Transmission control protocol
•Helps to transfer data between hosts
•Similar to registered post/normal mail
in the case of postal mail

IP
•Internet protocol
•Used to identify a PC on the network
•Also called logical address
•Can be changed
•Similar to P.O Box, as in the case of postal mail
•Eg.192.168.1.1
•Maximum values will be 255

Class of IP
Class Range Subnet Mask NID HID
A 0 to
127.x.y.z
255.0.0.0 0 to 127.0.0.0x.y.z
B 128 to
191.x.y.z
255.255.0.0 128 to 191.x.0.0y.z
C 192 to
223.x.y.z
255.255.255.0 192.223.x.y.0z
D 224 to
225.x.y.z
Not used for network
Used for research
purpose

Rules and regulations regarding IP addressing
•All host portion can’t be ‘0’, Represents the
NID
•All host portion can’t be all 255; Represents
the broadcast ID of the network
•No IP address shall start with 127, used to
troubleshoot TCP/IP
eg:127.0.0.1 is called loopback address or
myself for the PC
•Host portion should be unique

Private IP and Public IP
•The current IP we are using is IPV4
•IPV4 are of 2 Types
1. Public
2. Private
•We can have 4.2 billion IP address with it
•World population is 7 billion and we are
running out of IPs on the internet
•To conserve IP addresses, we use
concept public IP and private IP

Private IP
•Used on LAN
A: 10.0.0.1
10.255.255.254…………..1 n/w
B: 172.16.0.1
172.31.255.254…………..16 n/w
C: 192.168.0.1
192.168.255.254…………256 n/w
Public IP
•Used by ISPs on the internet
•All IPs outside the Pvt range are called public
IP

Arp (Address Resolution Protocol)
•Protocol used dynamically to convert IP
address to mac address, for PCs to
communicate on the LAN
•Operates through broadcast
•To see arp cache of a PC
>arp -a
•To delete cache manually
>arp -d

Tcp/ip port
•In addition to IP, PCs use port nos to
communicate
•Ports are channel through thro which PCs
communicate.
•A server or a PC can have more than one
application or service running on it
•To identify the service, we assign ports to it.
•Port are numbered from 1 to 65,535
•1~1024 are well known port, reserved for TCP/IP

•For custom application we can use port numbers
between 1025 to 65,535
•E.g.
Web server : 80
FTP : 20,21
SMTP : 25
Telnet : 23
POP3 : 110
•To see ports open on a pc
>netstat

Types of communication
•Unicast - one to one
- i.e. Single PC to single PC communication
•Broadcast – One PC to all PCs on network
- Broadcast mainly precedes a unicast
- Broadcast reduces the network speed
•Multicast - One to some PCs on the network
- e.g. Videoconferencing

Types of communication
BroadcastUnicast
Multicast

What is IP Address?
•Internet Protocol Address (or IP Address) is an unique
address that computing devices use to identify itself
and communicate with other devices in the Internet
Protocol network. Any device connected to the IP
network must have an unique IP address within its
network. An IP address is analogous to a street address
or telephone number in that it is used to uniquely
identify a network device to deliver mail message.
•The traditional IP Addresses (IPv4) uses a 32-bit
number to represent an IP address. Each number can
be zero to 255. For example, 1.160.10.240 could be an
IP address.

Static Versus Dynamic IP Addresses
•An IP address can be static or dynamic.
A static IP address will never change and it is a
permanent Internet address. A dynamic IP
address is a temporary address that is
assigned each time a computer or device
accesses the Internet.

Difference between public and
private IP address
•A public IP address is an IP address that can be accessed
over the Internet. Like postal address used to deliver a
postal mail to your home, a public IP address is the globally
unique IP address assigned to a computing device. Your
public IP address can be found at What is my IP
Address page. Private IP address on the other hand is used
to assign computers within your private space without
letting them directly expose to the Internet. For example, if
you have multiple computers within your home you may
want to use private IP addresses to address each computer
within your home. In this scenario, your router get the
public IP address, and each of the computers, tablets and
smartphones connected to your router (via wired or wifi)
get a private IP address from your router
via DHCP protocol.

Chapter 2:
Network Components

SOHO Network (multiple machines
and Multi- function Printer)
Ethernet Cable
DSL/Cable
Modem
Wall Jack
Wireless Router

Cable or DSL Modem
•A cable Modem is the interface by
which you connect to the internet
via your ISP e.g. Bell, Rogers.
•Router connects to the cable
modem so your computers can all
share the same internet
connection.
•Some cable modems have built in
wireless. You might not need the
router you bought.

Router
•A device that transfers data packets along
networks.
•Located at places where two or more networks
connect.
•Assign IP addresses on the network.
•Uses protocols to communicate with each other.
•Configures the best route between any two hosts.

Switch
•Central component of a network.
•Built-in to router or can be a separate device.
•Expands the Numbers of ports needed in network
•Interconnects computers in a local network.
•Routes information from one network type to another.

Router Buying Guideline
•Faster speeds
•Increased range / Coverage area
•LAN Ports, USB ports
•More devices connected at once
•Versatile new features e.g. Parental controls,
Prioritizing devices, Port forwarding, MU-
MIMO (multi-user, multi-input/multi-output)
etc

Router Buying Guideline

Printer Buying Guideline
•Categories: Laser, Inkjet, Multifunction/All-in-one
etc
•Specifications: Resolution, Print speeds,
Connectivity, Paper handling etc
•Better to go for Laser based printers because in
long run they are cost effective. Moreover All in
one multifunction printers come up with SCAN,
Copier and FAX function as well. Which you can
use for SCAN to Email or SCAN to USB features.

Desktop/Laptop Buying Guideline

Media Connectors
•RJ –45 (Registered Jack)
–has eight (8) pins.
–How to make cables. You need
RJ 45 connectors, tester,
Punching machine and Cable roll
Cat 5/6.
–You can buy cables from Canada
computers etc.

Types of Ethernet LAN
•Ethernet - 10 mbps - Obsolete
•Fast Ethernet - 100 mbps
- Few Old devices still used
•Gigabit Ethernet - 1000 mbps
- Current speed of network
•10 giga - 10,000 mbps
- Currently used between server and
switch; also used between switches.
- We shall be using this a couple of
years from now.

Data rate units
Name Symbol bit per second
bit per second
(formula)
bit per second bps 1 1
byte per second Bps 8 8
kilobit per secondKbps 1,000 10
3
megabit per secondMbps 1,000,000 10
6
gigabit per secondGbps 1,000,000,000 10
9

Chapter 3:
Network Terminologies

IP addressing
•Computers/devices connected on a TCP/IP network are
identified by a special 32 bit address called IP address.
•IP address is categorized into two namely Internal and
External for the following reasons
–Effective routing of data packets in a network
–IP addresses of host machines in a network do not conflict with
anyone’s Internet address
•IP address of a computer running Windows Operating System
can be found by typing in “ipconfig” at the command
prompt.

Assigning an IP address - 1
•To verify the connection,
follow the sequence below
–Press StartControl
PanelNetwork and
Internet
connectionsNetwork
Connections.
–Right-click the Local Area
Connection (renamed here
as “Home Network”) and
select Properties from the
menu to view the Internet
protocol.
–Select Internet Protocol and
choose Properties in the
tab given below

Assigning an IP address - 2
•To assign the IP address
–Select Use the following IP address,
and then type the desired class of IP
address.
–Enter the gateway and the DNS
servers as well as given by the ISP.
–Click OK, and then click Close
–Note: To share the single internet
connection, Liza will need to install
another NIC card on her home
system.
–She can give the internal IP of the
home computer to other computers
on her network as the default
gateway to share the Internet
connection

Network services :DHCP
•The allocation is done from the
DHCP server IP database on the
local network.
•DHCP uses a client-server model
•Advantages:
–Reliable
–Client configuration
becomes easier
Dynamic Host Configuration Protocol (DHCP) is an IP
standard that helps in allocating the IP address of a client
dynamically.

DHCP (continuous)
Static IP address
IP Address does not change - good for web
servers, email servers, other local or Internet
servers and network printers etc.
Dynamic IP address
Requires DHCP server to obtain an IP address to
all your desktops, laptops, smart phone and
network devices.

Network services: DNS
•Domain Name Service (DNS) is a Internet
Directory Service that helps to map names to
IP address and vice versa.
•Email delivery is controlled by the DNS
•If the computer cannot access DNS then the
web browser will fail to find websites and
email communication will fail to take place.
•The DNS system consists of three types:
–Data ; also called resource records
–Server; also called as name server
–Internet Protocol

Deciding on a Network Architecture
•Network topology is the way in which the
network is laid out. It refers to the
configuration of cables, computers, and other
peripherals.
•Considerations while choosing a topology:
–Communication Requirement
–Financial Feasibility
–Length of cable required
–Scalability in the future
–Type of cable used

Internet access technologies
•xDSL
–It is a common term used for the many combinations of DSL or
Digital Subscriber Line technology.
–Speed ranges from 128Kb/s to 1.5Mb/s for most home users.
•Broadband Cable (Cable modem)
–It is a device connected to the cable TV network connection in a
home.
–It is broadcast-oriented.
–The bandwidth estimates range upwards of 30Mb/s
•Fibre Optic Internet
–Connection is carried by modulated light through an optic fibre.
–Down and upload speeds range from 10mgbs to 10gbps

Internet access technologies – contd..
•Wireless / 3G or 4G LTE dongles
–Provide widespread access to a large number of
subscribers in a relatively remote areas where cable
network is missing.
–Works via a satellite TV service provider or a cellular
phone network while you are on roads.
–Bandwidth can range from a few kilobits a second to
many megabits.

Chapter 4:
SOHO Network Lab

Lab: Home Network (single machine)
USB/Ethernet
Cable
DSL/Cable
Modem
Wall Jack

Lab: Home Network (multiple machines)
USB/Ethernet
Cable
DSL/Cable
Modem
Wall Jack
Router

Home Network (multiple machines)
Ethernet Cable
DSL/Cable
Modem
Wall Jack
Router

Home Wireless Network
Ethernet Cable
DSL/Cable
Modem
Wall Jack
Router

https://www.youtube.com/watch?v=EWTJKcg7Pj8
Example

Chapter 5:
SOHO Network Configurations

Wireless Security Checklist
Change the default wireless network name or SSID
Change the default password
Enable MAC address filtering
Enable encryption

How to Access the Web-Based Utility
To access the web-based utility, launch the web browser on
your computer, and enter the Router’s default IP address,
192.168.2.1, in the Address field. Then, press Enter.
A password request screen will appear. (Non-Windows XP
users will see a similar screen.) Leave the User name field
blank. The first time you open the Web-based utility, use
the default password admin. (You can set a new password
from the Administration tab’s Management screen.) Click
OK to continue.
Password Screen

WEP
•Wired Equivalent Privacy
•WEP provides security by encrypting data over
radio waves.
•Created in 1999 to secure wireless access
points.
•Major weakness uses static encryption key.
That one key is used by all users, to transmit
every packet being transmitted.

WEP
•Possible for an eves dropper to intercept
enough WEP packets to deduce the key.
•This can be mitigated by periodically changing
the WEP key.
•With good computing power hacker can
compromise the key in a few seconds.
•So WPA was developed as replacement in
2003 and with full IEEE 802.11 std as WPA 2

WPA
•Recommended encryption to be used on
wireless.
•WiFi protected Access.
•WPA uses TKIP (Temporal Integrity Protocol)
which changes key automatically.
•WPA2 is having an encryption algorithm name
CCMP build into WPA, making it more secure.
•WPA becomes vulnerable when weak
passphrases are used.

WPA
•WPA requires a bit more processing power
than WEP.
•TKIP creates a unique encryption key, using
the SSID and passphrase. This is changed
constantly.
•Another option for TKIP is AES (Advanced
Encryption Standard)

Chapter 6:
Email Setup Configurations

Free vs. Paid Email
•Perception, or how prospects and current
customers view a company and its overall
brand.
•Productivity and employees’ overall ability to
achieve day-to-day tasks, as well as long-term
projects, Guaranteed Uptime.
•Performance on both short-term and long-
term goals within an organization, 24/7
Support.

Free vs. Paid Email
•Domain name
If there’s one thing you must drop some cash on, it’s a
custom domain name for your website, complete with
an attached email address.
•Web hosting
Lock down a custom domain name, Paid Web hosting
services offer a higher quality product and better
customer support. This is especially important when it
comes to the host’s uptime.
•Email
So you’ve got your custom domain name, and the
personalized email address that comes with it.

Free vs. Paid Email
•Custom Email Address
Businesses that use the free version of email can
only send emails
as [email protected]. Notice how
your bank, insurance company and airline never
use consumer email addresses. The reason they
don’t is because it looks cheap. For US$5 a month
you can have an email
[email protected]. It looks
much more professional and is worth it for the
branding value alone.

Email Setup

Email Setup

Email Setup

Email Setup

Email Setup

Chapter 7:
Network File share

What is File sharing
•Sharing of data on a network.
•Allows multiple users to
access a particular file/folder
by enabling them to
–Read
–Modify
–Copy or,
–Print it.
•These users may have the
same or different ranks of
access privileges.

Types of File sharing
•Default share
–Does not provide security.
–Requires no configuration.
–Requires share designation.
–Default local share or Default network share.
•Restricted share
–Provides security by limiting the number of users
accessing the share at a particular time.
–Designate specific users to access the share.
–Allot permissions to control user activity on the share
(offline/online)

How to share a folder?
•Right-click the folder to be shared , and
click Properties.
•Click the Sharing tab in the folder
properties dialog box.
•Click Share this folder, and then in Share
name, type the name of the share
•In Comment, type a description for the
shared folder. This description is visible
to users who browse across the network.
•In User limit, the user can make any
changes required.

Configuring shared folder permissions
To set, view, change, or remove file and folder permissions
1.Click Start, click My Computer, and then locate the file or folder whose
permissions need to be set.
2.Right-click the file or folder, click Properties, and then click the Security tab.
3.To set permissions for a group or for a user that does not appear in the
Group or user names box, click Add, type the name of the group or of the
user that needs permissions for, and then click OK.
4.To allow or to deny a permission, select the Allow or the Deny check box in
the Permissions for User or Group box, where User or Group is the name of
the user or group.
5.To remove the group or user from the Group or user names box, click
Remove.
6.Click OK.

Chapter 7:
Advanced Google search operators

Advanced search operators
•https://www.google.com/advanced_search
•http://www.googleguide.com/advanced_oper
ators_reference.html

Advanced search operators

Example
•http://searchengineland.com/top-10-search-
modifiers-why-they-matter-what-they-are-
how-to-use-them-173343

The End