Introduction
Transcription
Introduction
Not for distribution to students Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5th edition Copyright 2005 Prentice-Hall The Chapter z This chapter is a survey of the key concepts we will see in this course z The rest of the book essentially fleshes out the concepts we will see in this chapter 2 Not for distribution to students 1 Not for distribution to students The Chapter z Networking is a Head Game z There is a lot of information to master z There are many TLAs (three-letter acronyms) z For design and troubleshooting, you must know everything to do anything. 3 Learning Objectives z By the end of this chapter, you should be able to z Discuss the First Bank of Paradise (FBP), our running case study for this book. z Discuss the major types of networked applications. z List the eight elements of networks. z Explain the major types of networks in businesses: LANs, WANs, internets, intranets, and extranets. 4 Not for distribution to students 2 Not for distribution to students Learning Objectives z By the end of this chapter, you should be able to z Discuss major concerns for network managers: staffing, network architecture, standards, security, wireless networking, efficiency, and quality of service (QoS). z Explain the elements and operation of a small home PC network using a LAN. 5 Learning Objectives z By the end of this chapter, you should be able to z Use some key hands-on network management tools, including bandwidth measurement services, ping, ping 127.0.0.1, tracert, ipconfig, winipconfig, nslookup, and the use of Windows Calculator to compute dotted decimal notation IP addresses. 6 Not for distribution to students 3 Not for distribution to students First Bank of Paradise (FBP) z The book’s running case study z Composite mid-size bank in Hawaii z Banks are fairly “typical” firms, although they have stronger need for security z Warren Chun is the chief information officer (CIO) z Yvonne Champion is the network manager 7 First Bank of Paradise (FBP), Continued z Annual Revenues: $4 Billion z Operations z z 50 Branches z 350 ATMs (Automated Teller Machines) Network z 500 Ethernet switches z 400 Routers 8 Not for distribution to students 4 Not for distribution to students First Bank of Paradise (FBP), Continued z z Computers z 2,000 desktop and notebook user PCs z 200 Windows servers z 30 Unix servers z 10 Novell NetWare file servers Information Systems Staff z 150 people 9 Figure 1-1: Networked Applications at the First Bank of Paradise z Networked Applications are Applications Made Possible by Networking z z E-mail, etc. Users Only Care About Applications z The rest is just details to them 10 Not for distribution to students 5 Not for distribution to students Figure 1-1: Networked Applications at the First Bank of Paradise, Continued z E-Commerce z Buying and selling on the Internet z Users typically interact with databases z Customers will soon be able to talk to customer representatives while online 11 Figure 1-1: Networked Applications at the First Bank of Paradise, Continued z Transaction Processing z Simple, highlystructured, and highvolume interactions, such as check processing z Built around databases z External settlement networks 12 Not for distribution to students 6 Not for distribution to students Figure 1-1: Networked Applications at the First Bank of Paradise, Continued z Transaction Processing z Back-office transaction processing applications z Accounting, payroll, purchasing, human resources, etc. z Functional databases in individual departments 13 Figure 1-1: Networked Applications at the First Bank of Paradise, Continued z Office Applications z Word processing, spreadsheeting, etc. z E-mail, instant messaging (IM), and Web access 14 Not for distribution to students 7 Not for distribution to students Figure 1-2: Elements of a Network Message (Frame) Application Application Client Station Switch Server Station Networks connect Switch applications Trunk on different stations. AccessApplications Switch are all users care about Line Trunk Line Line Mobile Client Station Switch Outside World Router Mobile Client Station 15 Figure 1-2: Elements of a Network, Continued Message (Frame) Application Application Client Station Switch Server Station Networks connect stations: Switch clients (fixed and mobile) and servers Trunk Access Switch Line Trunk Line Line Mobile Client Station Switch Outside World Router Mobile Client Station 16 Not for distribution to students 8 Not for distribution to students Figure 1-2: Elements of a Network, Continued Message (Frame) Application Application Client Station Switch Stations (and routers) usually communicate Access Switch by sendingLine messages called frames Mobile Client Station Trunk Line Server The path Station a frame takes Switch is called its data link Trunk Line Switch Outside World Router Mobile Client Station 17 Network Medium z Unshielded Twisted Pair (UTP) Cable RJ 45 connector 18 Not for distribution to students 9 Not for distribution to students Network Medium z Shielded Twisted Pair (STP) Cable 19 Network Medium z Coaxial Cable 50 Ohms (75 Ohms for Cable TV) BNC connector 20 Not for distribution to students 10 Not for distribution to students Network Medium z Optical Fiber 21 Figure 1-2: Elements of a Network, Continued Message (Frame) Application Application Client Station Switch Switch Trunk Access Switch Switches Linemove frames Trunk Line to or closer to the destinationLine station Mobile Client Station Server Station Outside World Switches handle a packet sequentially Switch Router Mobile Client Station 22 Not for distribution to students 11 Not for distribution to students Figures 1-6 and 1-7: Workgroup and Core Switches 19 inches (48 cm) wide 19 inches (48 cm) wide Small Switches (Stacked): Workgroup Switches To Link Stations To Network Central Core Switch 23 Data Source: www.dlink.com.tw Not for distribution to students 24 12 Not for distribution to students Data Source: www.dlink.com.tw Data Source: www.dlink.com.tw Not for distribution to students 25 26 13 Not for distribution to students 27 Data Source: www.dlink.com.tw Figure 1-2: Elements of a Network, Continued Message (Frame) Application Application Client Station Switch Access Line Server Station Routers connect networks Switch to the outside world; Trunk Switch Treated just like stations Line Trunk Line Mobile Client Station Outside World Switch Mobile Client Station Router 28 Not for distribution to students 14 Not for distribution to students Figure 1-2: Elements of a Network, Continued Client Station Switch Server Station Switch Access Switch Line Mobile Client Station Trunk Line Trunk Line Switch Trunk Line Outside World Router Mobile Client Station 29 Figure 1-2: Elements of a Network (Recap) z Applications (the only element that users care about) z Stations z z Clients Servers z Switches z Routers z Transmission Lines z z z Trunk lines Access Lines Messages (Frames) Never talk about an Innovation “reducing cost,” “increasing speed,” etc. without specifying which element is cheaper or faster. For example, multiplexing only reduces the cost of trunk lines; other costs are not decreased 30 Not for distribution to students 15 Not for distribution to students Figure 1-3: Multiplexing in a Packet-Switched Network Trunk line multiplexes the messages of different conversations AC Client Station A AC AC BD BD Mobile Client Station B AC AC Trunk Line Access Line AC This reduces trunk line costs through cost sharing by users Server Station C BD BD Router D 31 LANs and WANs z LANs transmit data within corporate sites z WANs transmit data between corporate sites z Each LAN or WAN is a single network WAN 32 Not for distribution to students 16 Not for distribution to students Figure 1-4: The First Bank of Paradise’s Wide Area Networks (WANs) North Shore Operations OC3 Private Line T3 T3 Bank has multiple facilities connected by multiple WANs Headquarters 33 Frame-Relay z 使用虛擬線路(Permanent Virtual Circuits;PVC)供企業 做網路傳輸之網路服務 z 價格較專線便宜 z 適合多點互連 z 使用第二層傳輸 34 Not for distribution to students 17 Not for distribution to students Private Line - Hinet Data Source: www.hinet.net 35 Private Line - Sparq Data Source: www.sparq.com.tw Not for distribution to students 36 18 Not for distribution to students Figure 1-5: Local Area Network (LAN) in a Large Building Multi-floor Office Building The bank has multiple LANs—one at each site 37 Figure 1-5: Local Area Network (LAN) in a Large Building, Continued Wall Jack Workgroup Switch Workgroup Switch To WAN Router Core Switch 38 Not for distribution to students 19 Not for distribution to students Internets z Most firms have multiple LANs and WANs. z They must create internets z An internet is a collection of networks connected by routers so that any application on any host on any single network can communicate with any application on any other host on any other network in the internet. Application Application LAN WAN Router LAN Router 39 Figure 1-8: Internet with Three Networks Host A R1 Packet Network X Network Z A packet goes all the way across the internet; It’s path is its route Network Y Route A-B R2 Host B 40 Not for distribution to students 20 Not for distribution to students Figure 1-8: Internet with Three Networks, Continued z Messages in single networks (LANs or WANs) are called frames z Message in internets are called packets z z Travel from the source host to the destination host across the entire internet Within a single network, the packet is encapsulated in (carried in) the network’s frame Packet Package (Packet) Truck (frame) Frame 41 Figure 1-8: Internet with Three Networks, Continued Frame X Details in Network X Packet Data Link A-R1 Switch Host A Switch Server Host Switch X1 Mobile Client Host Switch X2 Route A-B Router R1 Network X 42 Not for distribution to students 21 Not for distribution to students Figure 1-8: Internet with Three Networks, Continued Details in Network Y To Network X Route A-B Router R1 Frame Y Data Link R1-R2 Packet Router R2 To Network Z Network Y 43 Figure 1-8: Internet with Three Networks, Continued Data Link R2-B Details in Network Z Packet Frame Z Switch Z1 Host B Switch Router R2 Switch Z2 Mobile Client Hosts Switch Router Network Z 44 Not for distribution to students 22 Not for distribution to students Figure 1-8: Internet with Three Networks, Continued z In this internet with three networks, in a transmission, z z z There is one packet There are three frames (one in each network) If a packet in an internet must pass through N networks, z z How many packets will be sent? How many frames must carry the packet? 45 Figure 1-8: Internet with Three Networks, Continued z Lower-case internet is any internet z Upper-case Internet is the global Internet 46 Not for distribution to students 23 Not for distribution to students Figure 1-11: The Internet Webserver User PC Access Line The Internet Backbone (Multiple Carriers) Access Line Router NAP ISP 2 NAP ISP 4 NAP ISP 1 ISP 3 Internet Service Provider For User PC NAP = Network Access Point Internet Service Provider For Webserver 47 Figures 1-9 and 1-10: Routers 19 inches (48 cm) wide 19 inches (48 cm) wide Small Routers Stacked For Branch Offices Large Routers for Large Sites and ISPs 48 Not for distribution to students 24 Not for distribution to students Router Products Data Source: www.dlink.com.tw 49 Router Products Data Source: www.dlink.com.tw Not for distribution to students 50 25 Not for distribution to students Figure 1-12: The Internet, internets, Intranets, and Extranets z internets versus the Internet z Intranets z z Internal internet for use within an organization z Based on the TCP/IP standards created for the Internet Extranets z Connect multiple firms z Only some computers from each firm are on the extranet z Use TCP/IP standards 51 Recap z z Switches versus Routers z Switches move frames through single networks (LANs or WANs) z Routers move packets through internets Messages z Messages in single networks are called frames z Messages in internets are called packets z Packets are encapsulated within frames 52 Not for distribution to students 26 Not for distribution to students Figure 1-13: Major Network Technical Concerns z Network Architecture z A broad plan for how the firm will connect all of its computers within buildings (local area networks), between sites (wide area networks), and to the Internet z New systems must fit the rules of the architecture z Undisciplined growth in the past z No overall plan 53 Figure 1-13: Major Network Technical Concerns, Continued z Network Architecture z Legacy networks z Use obsolete technologies that do not fit the long-term architecture z Many exist in the bank z Too expensive to replace quickly; must live with many for awhile 54 Not for distribution to students 27 Not for distribution to students Figure 1-13: Major Network Technical Concerns, Continued z Network Architecture z Scalability z The ability of selected technologies to be able to handle growth efficiently Poor Scalability Cost Per Bit Good Scalability Demand 55 Figure 1-13: Major Network Technical Concerns, Continued z Standards z Standards govern message interactions between pairs of entities (Figure 1-14) z For example, HTTP request and response messages for WWW access Webserver HTTP Request Message Client PC Browser Client Program HTTP Response Message Webserver Application Server Program 56 Not for distribution to students 28 Not for distribution to students Figure 1-13: Major Network Technical Concerns, Continued z Standards z Standards create competition z This reduces costs z It also stimulates the development of new features z Protects the business if the main vendors go out of business 57 Figure 1-13: Major Network Technical Concerns, Continued z Standards z Competing standards organizations create incompatible standards z FBP will standardize to save money z LANs: FBP will standardize on Ethernet (some legacy LAN technologies are still in use) z WAN standards: will have fewer but still two to four z Internetworking: will standardize on TCP/IP 58 Not for distribution to students 29 Not for distribution to students Figure 1-13: Major Network Technical Concerns, Continued z Security z A Major Problem z Many attacks z Growing trend toward criminal attackers 59 Figure 1-15: Firewalls Allowed Legitimate Border Packet Firewall Attacker Hardened Server Hardened Client PC Border firewall should pass legitimate packets Log File Legitimate Packet Legitimate Host Internal Corporate Network 60 Not for distribution to students 30 Not for distribution to students Figure 1-15: Firewalls, Continued Border firewall should deny (drop) Hardened and log Server attack packets Border Firewall Attack Packet Denied Attack Packet Hardened Client PC Log File Network Management Console Attacker Legitimate Host Internal Corporate Network 61 Figure 1-13: Major Network Technical Concerns, Continued z Security z Virtual Private Networks (VPNs) (Figure 1-16) z Provide communication over the Internet with added security z Cryptographic protection for confidentiality (eavesdroppers cannot read) z Cryptographic authentication (confirms sender’s identity) 62 Not for distribution to students 31 Not for distribution to students Figure 1-16: Virtual Private Networks (VPNs) Site-to-Site VPN Using Gateway Client VPN Remote Access Gateway PC 1 VPN Using Corporate Gateway Site B VPN Gateway Internal Server Corporate Site A Internet Host-to-Host VPN Remote Client PC 2 Remote Client PC 3 63 Figure 1-13: Major Network Management Concerns, Continued z Wireless Communication z To improve mobility z Drive-by hackers can eavesdrop on internal communication z Drive-by hackers can break into the network bypassing firewalls Drive-By Hacker 64 Not for distribution to students 32 Not for distribution to students Figure 1-13: Major Network Technical Concerns, Continued z Need for Efficiency z User demand is growing rapidly z Budgets are growing slowly if at all z For projects, need burning justification z Still add new services by squeezing maximum payback from each dollar User Demand Money/ Demand Budget Time 65 Figure 1-13: Major Network Technical Concerns, Continued z Quality of Service (QoS) QoS z Numerical objectives for performance z Transmission speed in bits per second (bps) z z z A bit is a single one or zero NOT bytes per second Increase by factors of 1000, not 1024 z kilobits per second (kbps)—lower-case k z Megabits per second (Mbps) z Gigabits per second (Gbps) z Terabits per second (Tbps) 66 Not for distribution to students 33 Not for distribution to students Figure 1-13: Major Network Technical Concerns, Continued z Quality of Service z z z z For Transmission Speed, have 1 to 3 places BEFORE the decimal point. Example z .5 Mbps is wrong New z 500 kbps is correct Not in the Book Example z 2,300 Mbps is wrong z 2.3 Gbps is correct Example z 473.2 Mbps is correct 67 Figure 1-13: Major Network Technical Concerns, Continued z Quality of Service z Typical transmission speeds in most firms: z LANs: 100 Mbps to each desktop z WANs: most site-to-site links only are 56 kbps to a few megabits per second because long-distance transmission is very expensive and so must be used more sparingly LANs: 100 Mbps WANs: 56 kbps to a few Mbps 68 Not for distribution to students 34 Not for distribution to students Figure 1-13: Major Network Technical Concerns, Continued z Quality of Service z Congestion, Throughput, Latency, and Response Time z Congestion: when there is too much traffic for the network’s capacity z Throughput: The speed users actually see (often much less than rated speed) z Individual throughput is less than total throughput on shared-speed links 69 Figure 1-13: Major Network Technical Concerns, Continued z Quality of Service z Congestion, Throughput, Latency, and Response Time z Latency: delay (usually measured in milliseconds or ms) z Within corporations, latency is typically under 60 ms 90% of the time z On the Internet, typically 30 ms to 150 ms 70 Not for distribution to students 35 Not for distribution to students Figure 1-13: Major Network Technical Concerns, Continued z Quality of Service z Congestion, Throughput, Latency, and Response Time z Response Time z The time to get a response after a user issues a command z A quarter second or less is good 71 Figure 1-13: Major Network Technical Concerns, Continued z Availability z Availability is the percentage of time a network can be used z Downtime: when the user cannot use the network z Want 24x7 availability z Telephone network gives 99.999% availability z Typical networks reach 98% today 72 Not for distribution to students 36 Not for distribution to students Figure 1-13: Major Network Technical Concerns, Continued z Error Rate z Measured as the percentage of messages damaged or lost z Substantial error rates can disrupt applications z Substantial error rates generate more network traffic because of retransmissions 73 Pat Lee’s Home Network z Pat Lee is a vice president at FBP z Wants a network in her home z z Family’s main computer is the downstairs PC z Daughter Emily has a PC in her room z Wants to connect both to the Internet through a broadband (high-speed) cable modem service Perspective z A small LAN but has all the key network elements 74 Not for distribution to students 37 Not for distribution to students Figure 1-18: Pat Lee’s Home Network 1. Coaxial Cable to ISP 2. Cable Modem 3. UTP Cord 4. Access Router 75 Figure 1-22: Home Network Access Router About 4 inches (10 cm) Wide Power Jack for External Power Switch Ports UTP Cords Run to Stations WAN Port UTP Cord Runs to Cable Modem 76 Not for distribution to students 38 Not for distribution to students Figure 1-18: Pat Lee’s Home Network, Continued 6. A1-BD-33-6E-C7-BB PC in Emily’s Room 5. UTP Cord 5. UTP Cord 6. B2-CD-13-5B-E4-65 PC in Study 77 Figure 1-18: Pat Lee’s Home Network, Continued 6. A1-BD-33-6E-C7-BB PC in Emily’s Room 7. File Sharing 6. B2-CD-13-5B-E4-65 PC in Study 78 Not for distribution to students 39 Not for distribution to students Figure 1-18: Pat Lee’s Home Network, Continued 6. A1-BD-33-6E-C7-BB PC in Emily’s Room 8. Printer Sharing 6. B2-CD-13-5B-E4-65 PC in Study 79 Figure 1-19: Network Interface Cards (NICs) (Photo) Internal NIC. Installed inside systems unit. Plugged into expansion slot on the mother board. PC Card NIC. Installed in PC Card slot in notebook and some PDAs. 80 Not for distribution to students 40 Not for distribution to students Internal NIC RJ-45 Jack PCI Connector Pins 81 Computer Mother Board z Mother Board PCI Slots for Expansion Boards (NICs, etc.) Slots for RAM Not for distribution to students Slot for Microprocessor (Pentium 4) 82 41 Not for distribution to students Mother Board and Expansion Boards Expansion Board (NIC) Connector Expansion Slots Mother Board 83 Figure 1-20: Unshielded Twisted Pair (UTP) Cord With RJ-45 Connector (Photo) 4-Pair Unshielded Twisted Pair (UTP) Industry Standard Pen 8-Pin RJ-45 Connector UTP Cord 84 Not for distribution to students 42 Not for distribution to students Figure 1-21: UTP Cord RJ-45 Connector and Jack UTP Cord --About as thick as a pencil --Rugged and Flexible RJ-45 Jack On a Wall On a Switch or On a NIC RJ-45 Connector 85 z Unshielded Twisted Pair (UTP) Cable Category 5E to 1G (Gigabit Ethernet) Category 6, 7 in progress RJ 45 connector Not for distribution to students 86 43 Not for distribution to students Figure 1-23: Logical Functions of the Access Router Cable Modem Access Router Router Function DHCP Server Function NAT Function Switch Function DHCP=Dynamic Host Configuration Protocol NAT=Network Address Translation 87 Figure 1-24: Ethernet Switch Operation Switching Table Port Host 10 A1-44-D5-1F-AA-4C 13 B2-CD-13-5B-E4-65 15 C3-2D-55-3B-A9-4F 16 D4-47-55-C4-B6-9F Ethernet Switch UTP UTP UTP UTP D4-47-55-C4-B6-9F Frame To C3… Frame To C3… A1-44-D5-1F-AA-4C C3-2D-55-3B-A9-4F B2-CD-13-5B-E4-65 88 Not for distribution to students 44 Not for distribution to students Figure 1-25: Frames and Packets Cable Modem Packet in DOCIS Frame Internal Router Access Router Packet is always carried (encapsulated) in a frame A1-BD-33-6E-C7-BB IP address = 192.168.0.3 PC in Emily’s Room Packet in Ethernet Frame B2-CD-13-5B-E4-65 IP address = 192.168.0.2 PC in Study 89 Figure 1-26: Dynamic Host Configuration Protocol (DHCP) Cable Modem ISP DHCP Server 1. IP Address = 60.47.112.6 Access Router A1-BD-33-6E-C7-BB PC in Emily’s Room The ISP only Gives each home a Single IP address B2-CD-13-5B-E4-65 PC in Study A DHCP Server provides User PCs with a temporary IP Address each time the user connects to the Internet 90 Not for distribution to students 45 Not for distribution to students Figure 1-26: Dynamic Host Configuration Protocol (DHCP), Continued Cable Modem ISP DHCP Server 1. IP Address = 60.47.112.6 A1-BD-33-6E-C7-BB IP address = 192.168.0.3 PC in Emily’s Room Internal DHCP Server Access Router 2. IP Address = 192.168.0.3 2. IP Address = 192.168.0.2 The access router’s Internal DHCP server Gives private IP Addresses to each PC B2-CD-13-5B-E4-65 IP address = 192.168.0.2 PC in Study 91 Figure 1-27: Network Address Translation (NAT) 2. Packet from 60.47.112.6 Webserver IP address= 123.7.86.285 Cable Modem Internal NAT Module Access Router The access router’s NAT module translates between the private IP addresses and the single ISP-given IP address 1. Packet from 192.168.0.2 PC in Study 192.168.0.2 92 Not for distribution to students 46 Not for distribution to students Figure 1-27: Network Address Translation (NAT), Continued 3. Packet to 60.47.112.6 Webserver IP address= 123.7.86.285 Cable Modem Internal NAT Module Access Router 4. Packet to 192.168.0.2 PC in Study 192.168.0.2 93 Figure 1-28: The Domain Name System (DNS), Continued DNS Table Originating Host’s DNS Resolver Host Name … … Voyager.cba.hawaii.edu … IP Address … … 128.171.17.13 … DNS Request Message “The host name is Voyager.cba.hawaii.edu” DNS Response Message “The IP address is 128.171.17.13” DNS Host 94 Not for distribution to students 47 Not for distribution to students Figure 1-29: Converting Binary IP Addresses to Dotted Decimal Notation Binary IP Address 8-Bit Segments Convert Segments to Decimal Dotted Decimal Notation 01111111101010110001000100001101 01111111 10101011 00010001 00001101 127 171 17 13 127.171.17.13 95 IP Address 96 Not for distribution to students 48 Not for distribution to students Figure 1-30: Windows Calculator 1. Open Calculator, which is in the Program Group Accessories 2. Select View, Scientific 97 Figure 1-30: Windows Calculator 4. Enter data on keypad (Limit is 8 bits for Binary) 3. Enter initial data type here Dec = Decimal Bin = Binary 98 Not for distribution to students 49 Not for distribution to students Figure 1-30: Windows Calculator 6. Observe answer 5. Enter final data type here, observe results Initial zeros are dropped, so answer is 0001 0111 99 ADSL Example - 架站之應用 Data Source: www.hinet.net Not for distribution to students 100 50 Not for distribution to students ADSL Example - 與視訊會議設備之結合 Data Source: www.hinet.net 101 ADSL Example -無線上網之應用 Data Source: www.hinet.net Not for distribution to students 102 51 Not for distribution to students ADSL Example - 與IP-VPN網路的搭配 Data Source: www.hinet.net 103 Topics Covered z The First Bank of Paradise z Networked Applications z Packet switching and Multiplexing z LANs versus WANs z Within a site versus between sites 104 Not for distribution to students 52 Not for distribution to students Elements of a Network Message (Frame) Application Application Client Station Switch Server Station Switch Access Line Switch Mobile Client Station Trunk Line Trunk Line Switch Outside World Router Mobile Client Station 105 Topics Covered z Internets z z z Package (Packet) Routers Packets carried within frames Truck (frame) Categories z Internets z The Internet: ISPs and NATs z Intranets z Extranets 106 Not for distribution to students 53 Not for distribution to students Topics Covered z Network Architecture z The Need z Legacy Networks z Scalability z Standards z Need for Efficiency 107 Topics Covered z Security z Firewalls z VPNs z Wireless Communication 108 Not for distribution to students 54 Not for distribution to students Topics Covered z Quality of Service (QoS) z Numerical objectives that must be met z Speed and throughput z Latency z Response time z Availability z Error rate 109 Topics Covered: Pat Lee’s Home Network 6. A1-BD-33-6E-C7-BB PC in Emily’s Room 2. Cable Modem 1. Coaxial Cable to ISP 3. UTP Cord 5. UTP Cord 4. Access Router 7. File Sharing 5. UTP Cord 6. B2-CD-13-5B-E4-65 PC in Study 8. Printer Sharing 110 Not for distribution to students 55 Not for distribution to students Topics Covered: Pat Lee’s Home Network z DHCP z NAT z DNS 111 Not for distribution to students 56