2.4 Explain common TCP and UDP ports, protocols, and their purpose
1. The ISP provides the information on the SMTP, and POP server addresses. You need to feed this information to the mail client while configuring to send and receive e-mail.
2. Given below are the basic commands that are used with FTP:
1. get to copy one file from the remote machine to the local machine
2. mget to copy multiple files from the remote machine to the local machine;
3. put to copy one file from the local machine to the remote machine
4. mput to copy multiple files from the local machine to the remote machine;
5. ‘p’ is used to request help or information about the FTP commands, and ls is used to list directory contents.
3. Remote Desktop Protocol (RDP)
a. The minimum requirement for setting up Remote Desktop host running RDP (Remote Desktop Protocol) is Windows XP Professional or later. The minimum requirements for the Client computer is Windows 9x or above. A Windows XP Home can act as client but not as a host. Note that the computer that offers the local resources to a remote user is called a host computer or simply the host. The computer that connects to the host computer is called a client computer or simply, client. The host computer runs remote desktop (RDP).
b. RDP servers are built into Windows operating systems; an RDP server for Linux also exists. By default, the server listens on TCP port 3389.
c. Remote Desktop uses Remote Desktop Protocol (RDP), which in turn uses port 3389. By configuring the router to forward traffic on port 3389 to the host computer running RDP, one should be able to access the host remotely. If the host computer is on a publicly accessible IP address, there is no need for port forwarding. Remote client can access the host directly using host’s public IP address. The port forwarding is usually configured on the router that communicates with the external network (Internet)
d. To enable RDP on Windows XP Professional computer Right-click My Computer, click Properties, and then click the Remote tab. Turn on Remote Desktop by selecting the check box Allow users to remotely connect to this computer. Designate users by clicking the Select Remote Users... button.
2.5 Compare and contrast wireless networking standards and encryption types
1. Wireless Networking
The generic standard that defines wireless LAN technologies is 802.11. Specifically, the following standards exist:
a. 802.11: applies to wireless LANs and provides 1 or 2 Mbps transmission in the 2.4 GHz band.
b. 802.11a: an extension to 802.11 that applies to wireless LANs and provides up to 54 Mbps in the 5GHz band. This higher frequency compared to 802.11b shortens the range of 802.11a networks. Because 802.11a and 802.11b utilize different frequencies, the two technologies are incompatible with each other.
c. 802.11b (initially referred to as 802.11 or Wi-Fi): an extension to 802.11 that applies to wireless LAN and provides up to 11 Mbps transmission in the 2.4 GHz band.
d. 802.11g: applies to wireless LANs and provides 20+ Mbps in the 2.4 GHz band.802.11g is backwards compatible with 802.11b.
e. 802.11n support data rates of over 100 Mbps. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal intensity. 802.11n equipment will be backward compatible with 802.11g gear.
2. The 802.11n high throughput (HT) standard defines three modes of operation: a legacy (non-HT) mode, a greenfield (HT-only) mode, and a mixed mode where HT protection mechanisms ensure that transmissions can be detected by both old 802.11a/g/b devices and new 802.11n devices.
3. In mixed mode, HT protection requires that 802.11n devices send a legacy preamble, followed by an HT preamble. The legacy preamble lets 802.11a/b/g devices to avoid transmitting over HT frames sent by 802.11n devices.
4. These HT protection mechanisms significantly reduce an 802.11n WLAN's throughput, but they are necessary to avoid collisions between older 802.11a/b/g devices and newer 802.11n devices. If you knew that no legacy devices were present, you could configure your access point (AP) to operate in greenfield (HT-only) mode, eliminating this overhead.
5. Bluetooth Class 3 supports speeds up to 1m at 2.4GHz (1mW power output max)
6. Bluetooth Class 2 supports speeds up to 10m at 2.4GHz (2.5mW power output max)
7. Bluetooth Class 1 supports speeds up to 100m at 2.4GHz (100mW power output max)
8.WPA, short for Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve upon the security features of WEP (Wired Equivalent Privacy). The technology is designed to work with existing Wi-Fi products that have been enabled with WEP.
9. To secure the router from unauthorized access you need to change the default login/password on a router soon after the router is installed. Secondly, ensure to set encryption such as WPA2 so that only authorized users will be able to access the wireless network
10. WEP, short for Wireless Equivalent Protection, is a security protocol designed to provide protection equivalent to wired LANs. WPA is an improved security protocol compared to WEP.
11. Infrared technology allows computing devices to communicate via short-range wireless signals. With infrared, computers can transfer files and other digital data bidirectionally. Infrared communications span very short distances. Place two infrared devices within a few feet (no more than 5 meters) of each other when networking them. Unlike Wi-Fi and Bluetooth technologies, infrared network signals cannot penetrate walls or other obstructions and work only in the direct "line of sight."
2.6 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings
1. SSID, short for service set identifier, a unique identifier attached to the header of packets sent over a WLAN. The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. WEP together with SSID, provides basic protection for the wireless network.
2. To limit the number of computers to a known few, configuring MAC filtering is a very good option. This is configured on the wireless router and not on the client computers. Any wireless network, SSID needs to be configured on the wireless router. Note that if the router broadcasts SSID, then the clients will automatically learn about the wireless network. If the SSID broadcast is disabled on the router, you need to configure the clients with proper SSID (same as that of the router SSID).
3. For local administrators, only the built-in administrator account can be used to perform a remote install. Since this account is disabled by default, please use the "net user administrator /active:yes" command from the command console. This will enable this account to install applications remotely.
4. QoS stands for quality of service. In SOHO environment, QoS is normally set at router level. If you want to enforce QoS policies in your network, make sure you use a router, which is equipped with QoS software.
5. Adding the port exception
a. Click Start, click Run, type wscui.cpl, and then click OK.
b. In Windows Security Center, click Windows Firewall.
c. Click the Exceptions tab, and then click Add Port to display the Add a Port dialog box.
d. Type a descriptive name for the port exception and the port number that your program uses, and then select either the TCP or UDP protocol.
e. Click OK to close the Add a Port dialog box.
6. NAT (Short fo rNetwork Address Translation) is used to map internal IP addresses to external IP addresses. Typicaaly, a router or a Firewall is used for this purpose.
7. Turning OFF SSID is the easiest thing to do to prevent people outside of the premises from accessing a wireless network. Note that for WPA encryption, you need to configure it on the wireless router and on all the workstations. To enable MAC filtering, you need to gather the MAC addresses of all client computers, and feed it into the wireless router.
8. If you use a disk drive that was previously configured as a dynamic drive in another computer, it may show up as foreign drive. You need to import the foreign drive to show up in the drive manager as local.
2.7 Compare and contrast Internet connection types and features
1. ISDN:ISDN BRI (Basic Rate Interface) will have two B channels, each can carry data up to 64Kbps, aggregating to 128 Kbps.
2. Infrared technology allows computing devices to communicate via short-range wireless signals. With infrared, computers can transfer files and other digital data bidirectionally. Infrared communications span very short distances. Place two infrared devices within a few feet (no more than 5 meters) of each other when networking them. Unlike Wi-Fi and Bluetooth technologies, infrared network signals cannot penetrate walls or other obstructions and work only in the direct "line of sight."
3. A DSL model most commonly uses normal telephone line (Twisted Pair or TP) for connecting to the Internet.
4. As the name implies, in asynchronous digital subscriber service (known as ASDL), the download speeds are much greater than the upload speeds. This is done based on the usage trends of Internet. Most users tend to download much more than what usually upload.