[go: up one dir, main page]

0% found this document useful (0 votes)
59 views56 pages

Nov. 7 G10

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 56

Directions: Supply a missing letter(s) in the following boxes below to

complete the word(s). Write your answer in your lecture notebook.


I F

R T

E W O K

I L E

E H N E
Set
Router/Wi-fi/Wireless
Access Point/ Repeater
Configuration
Q2_G10_ICT-CSS
Herearesomeoh
tfepoetnaitdlrawbackn
siworkn
igwh
tih
tewrieelssnew
t ork:
 

With wired connections, it’s often easy to determine who is


connected to the network and to restrict access to a specific
building.
Due to the nature of wireless communications, on the other
hand, users can connect to a network without having physical
access to a building.

The potential for intercepting data is high.


Herearesomeoh
tfepoetnaitdlrawbacksn
iworkn
igwh
tih
tewrieelssnew
t ork:
 

Enabling their wireless network adapters, it is possible to


view network activity originating from other computers.
There are technical issues such as finding the correct wireless
network (especially in environments where multiple networks
exist) and providing the proper security credentials to access it.
There are numerous available standards and protocols
related to wireless networks.
Understanding Typical Wireless Configurations

The following are the required components that are necessary to create and use a
wireless network.:

A computer to have a wireless network adapter


 physical network adapter
 the wireless adapter can be built into a computer
Example of Wireless adapter:

Universal Serial Bus PC card-based


(USB) devices
Wireless Adapter Card
Understanding Wireless Network Protocols

Generally, regardless of the types of devices that are


used, must support the same wireless networking
standards.
802.11a, 802.11b, 802.11g, and 802.11n are the most
commonly used wireless standards.
Using Wired Equivalent Privacy (WEP)
The oldest common wireless security method.
Their routers and network adapters are typically
created in WEP for Home and small-business users.
Key lengths are typically measured in bits, with some
common strengths being 128-bit and 256-bit.
Using Wi-Fi Protected Access (WPA)
(WPA) the protocol provides for increased security
over that of the WEP standard.
It is generally seen as a replacement for the less
secure WEP protocol, but WEP is still supported in
operating systems such as Windows Vista for
backward compatibility with devices that do not
support it.
Local Area Connection
LAN (Local Area Network) card will automatically
install when you setup windows 7.
LAN connection is required when you want to share
your pc with others in your HomeGroup.
Steps to configure your PC to a Local Area
Network
Setting Up the LAN
1. Determine the number of computers you want
to connect.
If you are connecting four or fewer computers, you'll
just need a single router, or one switch if you don't need
internet.
If you're connecting more than four computers, you'll
want a router and a switch, or just a switch if you don't
need internet.
2. Determine your network layout. 

If you are installing a permanent LAN solution,


you'll want to keep cable length in mind.
CAT5 Ethernet cables should not run longer than 250
feet.
If you need to cover larger distances, you'll need
switches at regular intervals, or you'll need to use
CAT6 cables.
3. Obtain the network hardware. 
To create a LAN, you'll need a router and/or a network.
The easiest way to create a LAN where every computer
has access to the internet is to use a router, and then add a
network switch if the router doesn't have enough ports.
A router will automatically assign an IP address to every
computer that is connected to it.
Switches are similar to routers but do not automatically
assign IP addresses. Switches typically have many more
Ethernet ports than a router has.
4. Connect your modem to the WAN port on the
router.  This port may be labeled "INTERNET"
instead. This will provide internet access to every
computer that is connected to your LAN.
You can skip this if you're setting up a LAN without
internet access.
You don't need a router at all to create a LAN, but
it makes things easier. If you just use a network
switch, you'll need to manually assign IP addresses to
each computer after connecting them.
5. Connect the switch to a LAN
port on the router
If you're using a network switch
to connect more computers,
connect it to one of the LAN ports
on the router.
You can use any open port on the
switch to make the connection.
When connected, the router will
provide IP addresses for every
computer that is connected to
either device.
6. Find the Ethernet port
on your PC
You can usually find this
on the back of your desktop
tower, or along the side or
back of a laptop.
Slim laptops may not have
an Ethernet port, in which
case you'll need to either
use a USB Ethernet adapter
or connect wirelessly if your
router allows it.
7. Plug one end of an Ethernet
cable into your computer. 

Make sure you're using an


Ethernet cable (RJ45), not a
telephone cable (RJ11).
8. Plug the other end of the cable into an open LAN
port. 

This can be any open LAN port on either the router


or the switch, depending on your LAN setup.
9. Test out your network
(router only). 
If you're using a router, your
work is complete. Once all of
the computers are connected to
a LAN port, they will be
assigned IPs automatically and
will appear on the network.

Ifyou'reusingaswitchandnorouter,you'llstillneedtoassignIPaddressestoeachcomputer.
10. Enable file and printer sharing. 
You won't be able to access
resources on a networked computer
until file and printer sharing is
enabled.
You can select specific files,
folders, and drives to share on each
computer, as well as share access to
printers.
11. Right-click on your
network connection. 
You'll see this in your
System Tray. If you are
connecting your computers
through a switch with no
router, you'll need to
assign each computer on
the network its IP address. the network needs a unique IP address so that information sent
Think of an IP address as a mailing address. Each computer on

across the network reaches the correct destination


This process is handled
automatically if you're
using a router.
12. Click Open Network and Sharing Center.
13. Click the Ethernet
link at the top of the
window. You'll see
this next to
"Connections."
14. Click properties
15. Click Internet Protocol Version 4
(TCP/IPv4).
16. Click properties
17. Click the Use the following
IP address radio button.
18. Type 192.168.1.50 into the IP
address field.
19. On your keyboard press the
tab
20. Type 192.168.0.0 into the
Default gateway field.
21. Click OK. This will
save the settings for that
computer. This computer
is now configured on your
network with a unique IP
address.
22.Open the Internet Protocol Version 4
properties on the next computer.
Follow the steps above on the second computer
to open the Internet Protocol Version 4
(TCP/IPv4) Properties window.
23.Click the Use the following IP address radio
button.
24.Type 192.168.1.51 into the IP address field.
Notice that the final group of numbers has
incremented by 1.
25.Enter the same values for Subnet mask and
Default gateway.
These values should be the same as they were on
the first computer (255.255.0.0 and 192.168.0.0
respectively).
26. Give each additional computer a unique
IP. Repeat these steps for each additional computer,
incrementing the IP address by 1 each time (up to
255). The "Subnet mask" and "Default gateway"
fields should be the same on each computer.
Connecting to a Wireless Network
Unlike wired network connections, the
process of connecting to a wireless network
does not require a physical action such as Figure 1. Viewing a
plugging in a cable. Instead, users must list of available
wireless networks
choose which wireless network they would  

like to connect from those that are within


range.
When you have installed and configured a
wireless network adapter on the computer,
the Network And Sharing Center shows the
connection in the display.
If the adapter is not currently connected
to a specific wireless network, you can The details also show whether the network is security-enabled or unsecured. You can click

click the Connect To A Network link.


Connect to connect to a particular wireless network. If security information is required for the
network (and it has not yet been stored on the local computer), Windows Vista prompts you to
provide the necessary details.
Figure 2. Providing
network security information
when connecting to a
wireless network.

It is also possible to access wireless network settings by right-clicking the wireless network icon in the
system tray (if it is available) and choosing the Connect or Disconnect option. The Connect option
automatically displays the wireless network connection screen. This method is useful if multiple wireless
networks are available, and you would like to change connections quickly.
 
Viewing Wireless Network Connection Status Details

1. Right Click Network and Sharing Icon in your taskbar.

2. Click Open and Network Sharing Center


3. Click Change adapter settings
4. Right Click the wifi name
5. Click Status
6. To configure security
settings, click Wireless
Properties,
7. Click the Security tab.
8. Click Ok.
Activity:
Directions: Write FACT if the statement is true and
BLUFF if it is false. Write your answer in your answer
sheet.
1._______ Due to the nature of wireless communications, on the other hand, it is possible for users to
connect to a network without having physical access to a building.
2._______ Enabling their wireless network adapters, it is impossible to view network activity originating
from other computers.
3._______ Key lengths are typically measured in byte.
4._______ LAN connection is required when you want to share your pc with others in your Home Group.
5._______ The potential for intercepting data is low.
6._______ There are numerous available standards and protocols related to wireless networks.
7._______ There are technical issues such as finding the correct wireless network (especially in
environments where multiple networks exist) and providing the proper security credentials to access it.
8._______ To create a LAN, you'll need a router and/or a network.
9._______ WEP is the newest common wireless security method.
10._______ With wired connections, it’s often easy to determine who is connected to the network and to
restrict access to a specific building.
Activity:
Directions: Write FACT if the statement is true and BLUFF if it
is false. Write your answer in your answer sheet.
FACT Due to the nature of wireless communications, on the other hand, it is possible for users to
1._______
connect to a network without having physical access to a building.
BLUFF
2._______ Enabling their wireless network adapters, it is impossible to view network activity originating
from other computers.
BLUFF
3._______ Key lengths are typically measured in byte.
FACT
4._______ LAN connection is required when you want to share your pc with others in your Home Group.
5._______
BLUFF The potential for intercepting data is low.
FACT There are numerous available standards and protocols related to wireless networks.
6._______
FACT There are technical issues such as finding the correct wireless network (especially in
7._______
environments where multiple networks exist) and providing the proper security credentials to access it.
8._______
FACT To create a LAN, you'll need a router and/or a network.
9._______
BLUFF WEP is the newest common wireless security method.
10._______
FACT With wired connections, it’s often easy to determine who is connected to the network and to
restrict access to a specific building.
Directions: Supply a missing word(s) in the paragraph below on
obtaining the network hardware. Choose your answer inside the box,
and write your answer in your answer sheet.
Ethernet ports hub network switch
network router IP Address
OBTAINING NETWORK HARDWARE
To create a LAN, you'll need a 1. _______________ and/or a network. These
pieces of hardware are the 2. “______________" of your LAN, and all of your
computers will be connected to them. The easiest way to create a LAN where
every computer has access to the internet is to use a router, and then add a 3.
___________________ if the router doesn't have enough ports. A router will
automatically assign an 4. ______________ to every computer that is connected
to it. Switches are similar to routers but do not automatically assign IP
addresses. Switches typically have many more 5. ________________ than a
router has.
OBTAINING NETWORK HARDWARE

To create a LAN, you'll need a 1. _______________


ROUTER and/or a
network. These pieces of hardware are the 2.
“______________"
NETWORK of your LAN, and all of your computers
will be connected to them. The easiest way to create a LAN
where every computer has access to the internet is to use a
router, and then add a 3. ___________________
HUB if the router
doesn't have enough ports. A router will automatically assign
an IP
4. ADDRESS
______________ to every computer that is connected to
it. Switches are similar to routers but do not automatically
assign IP addresses. Switches typically have many more 5.
________________
ETHERNET than a router has.
PORTS
ASSESSMENT
Instructions:
1. Follow the given steps on configuring security/firewall.
2. Screenshot/Take a picture of every step that you are going to perform.
3. Create a slide presentation showing the steps you have performed
4. Include the written steps in every screenshot/picture you have performed.
5. Save it using the filename {GROUPNAME_Q2-ACTIVITY1_ICT10}.
Configure wireless settings.
a. On your start button, click control panel, click network, click
network and sharing center, on your access type internet click
the wireless network connection.
b. Click the Details button to view more information about the
connection.
c. Look for the IPv4 Default Gateway IP address in the details
window. Plug this IP address into your web browser's address
bar.
d. You’ll need to log in with your username and password
combination.
Check the manual of your router or perform
a web search for its model number and
“default password.”
You can reset your router's password to the
default.
Once you logged in, you can now browse
your router configuration pages and configure
them in settings.
E. The most typical
username is “admin”. The
most typical passwords are
“admin” and “password”.
Many routers will only require a
username and a blank password,
and some allow you to leave all
fields blank.
If you can’t figure out the correct
IP address, your username, or
password, search for the router
model online to see what the
default login is.
If it has been changed,
press the Reset button on
the back of the router for
(10 to 30 seconds as
directed in the instructions
for the router model) to
restore factory defaults and
try again.
Open the wireless settings.
When you log in to your router,
you will be taken to the router's
main menu or status screen.
There will be several options to
choose from.
The internet section can
usually be left at default settings
unless you received specific
instructions from your internet
service provider.
 The wireless section will allow
you to set up your wireless
network.
F. Enter a name for your
wireless network.
In the wireless section,
you should see a field
labeled SSID or Name.
Enter a unique name for
your wireless network.
This is what other
devices will see when
scanning for networks.
G. Check the box to
enable SSID broadcast.
This will essentially “turn
on” the wireless network so
that it may be readily seen
by anyone in range of the
signal.
H. Choose a security
method.
Choose from the list of
available security options.
For the best security,
choose WPA2-PSK as the
encryption method.
This is the most difficult
security to crack and will
give you the most
protection from hackers
and intruders.
I. Create a passphrase.
Once you’ve chosen your
security method, enter in a
passphrase for the network.
This should be a difficult
password, with a combination of
letters, numbers, and symbols.
Don’t use any passwords that
could be easily deduced from your
network name or from knowing
you
J. Save your settings.
Once you are finished
naming and securing
your wireless network,
click the Apply or Save
button.
The changes will be
applied to your router.

You might also like