1 / 12

Networking

Networking. CIS 121 Ron Christensen. LAN IP Addresses. home networks use IPs in the 192.168.X.Y range "X" typically is (must be the same on each piece of equipment on your network.) 0 if you are using a Netgear or D-Link routers 1 for Linksys 2 for Belkin 254 for Siemens

rosine
Download Presentation

Networking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Networking CIS 121 Ron Christensen

  2. LAN IP Addresses • home networks use IPs in the 192.168.X.Y range • "X" typically is (must be the same on each piece of equipment on your network.) • 0 if you are using a Netgear or D-Link routers • 1 for Linksys • 2 for Belkin • 254 for Siemens • "Y" can be any number between 0 and 254 • Example • Router = 100 • Computer A = 1 • Computer B = 2 • Printer = 3

  3. LAN IP Addresses

  4. DCHP • Short for Dynamic Host Configuration Protocol, a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have a different IP address every time it connects to the network. In some systems, the device's IP address can even change while it is still connected. DHCP also supports a mix of static and dynamic IP addresses. Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the hassle of manually assigning it a unique IP address.

  5. Static IP • To determine the appropriate IP numbers • open a DOS window on your PC • with WinXP: Start, Run, cmd /k ipconfig /all (enter) • with other OSes: Start, Programs, Command Prompt). Type in: ipconfig /all • This will report your NIC settings, • one of which will be the IP number for your PC (reported as "Address") • as well as the Subnet mask • Gateway • DHCP server • and DNS IPs. • Write down or print out all these numbers. • The easiest way to pick a number for your new node is to just make it 1 larger than the Y on your main PC

  6. Static IP • The easiest way to pick a number for your new node is to just make it 1 larger than the Y on your main PC • The danger here is if you have other equipment on your network (other PCs, PPCs, printers, etc.). • You can check on its availability by using the same DOS window (as described in an earlier slide) while every piece of equipment you ever have connected to your network is turned on – type: ping 192.168.1.3 • If the ping times out then it is probably OK to use.

  7. Network Security • Firewall • A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network which has different levels of trust. http://upload.wikimedia.org/wikipedia/en/3/38/Firewall_%28networking%29.png

  8. Network Security • Access Point (AP) parameters • Change the logon password to the AP. • Set security such as WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected Access) or WPA2. • Change the name of the Access Point from the default. (Most APs are made by Linksys and the default broadcast name is Linksys, very original) • Turn off broadcast of SSID (Service Set Identifier) name.

  9. Network Security • Access Point (AP) parameters (cont) • Use a static IP address instead of a dynamic address assigned by a DHCP server. • Turn on MAC (Media Access Control) address filtering for access. • Disable remote administration.

  10. Network Security • Wardriving • Warchalking

  11. Malware • Phishing • Take the Phishing Test • Pharming • Smishing • SPAM • Spoofing • Viruses • Trojan Horses • Worms

  12. DRM (digital rights management) • Digital rights management technologies attempt to control use of digital media by preventing access, copying or conversion by end users to other formats.

More Related