Living Online: Internet and Computing Core Certification Guide
Living Online: Internet and Computing Core Certification Guide
Living Online: Internet and Computing Core Certification Guide
Global Standard 4
Living
Online
• Web-based Model
− Can use Internet as network "backbone" to connect with others around the
globe
− Networking over Internet is called internetworking
− Need only browser and Internet connection
− Slash notation used to indicate how many bits used for network prefix
− Networking devices use network and host portions to determine
◦ Which network particular host resides
◦ Whether network is local or remote
− When two or more LANs connecting using public network, WAN created
− Digital Subscriber Line (DSL) and cable Internet also rely on packet switching
− Has been available throughout most of the world but has largely been
superseded by cable and DSL services
− Provide company with way to expand its private network beyond immediate
geographic area by forming secure wide area network
− Reliable and secure but expensive
− Multiple open tabs – browsers provide for tabbed browsing, to have several
web pages open at one time
◦ Each open web page represents open connection with web server, and uses certain
amount of network resources
− Offer many firewall features such as inspecting all incoming transmissions for
security threats
− When firewall used in conjunction with antivirus software, personal computer
very secure, provided user updates frequently
− Many operating systems now include built-in desktop firewall software
− One way to secure network is to block all incoming ports on firewall, and then
open only specific ports that correspond to types of communications network
administrator wants to allow into network
◦ If LAN users allowed to view web pages, then administrator must open port 80 on
firewall and then port 53 to locate web pages using DNS
◦ Configuration of firewall ports affects all communications coming into and going
out from LAN
WiFi Protected Provides most secure encryption, but requires modern wireless
Access 2 (WPA2) equipment. All new wireless networking hardware supports
WPA2.
− Most hubs and switches include LED indicator for each port, and indicator
lights up when device properly connected to port
− Broadband modems also include indicator lights for: power on, sending
signal, receiving signal, PC activity, and Online
◦ Visually inspect modem to ensure all appropriate lights on
1. Click Start.
2. In Search box, type: cmd and press ENTER.
3. In command prompt window, type: ipconfig and press ENTER.
4. Look for line that begins "IPv4 Address …" to find three required settings.
1. Click Start.
2. In the Search box, type: cmd and press ENTER.
3. In command prompt window, type: ping [ip_address] (IP address of system
you are trying to reach) and press ENTER.
4. Look for reply messages to verify connectivity.
© CCI Learning Solutions Inc. 68
Network Troubleshooting
• Troubleshooting Security Settings
− Security settings can also cause connectivity issues.
− Wireless Security
− Most use encryption scheme to protect access to network and network
resources
− If having difficulty gaining access to wireless network, make sure you know
correct passphrase and that you are entering it correctly
− Participating on encrypted wireless network requires that client and access
point using same encryption scheme
a. WEP
c. WPA
b. WEP2
d. WPA2