Midterm Exam is on Friday - Chapters 1-4 (2019)
Discussion: Chapter 5 Tour
Activity: Pass out Chapter 5 Study Guides
Discussion: 22.214.171.124: Ethernet
126.96.36.199 (q. 1-2)
Video: Professor Messer: Ethernet Standards (7:45)
Activity: Join My Social Circle
Assignment: Chapter 5 Study Guide 1-2
Discussion: Chapter 4 Tour
Activity: Pass out Chapter 4 Study Guides
Start Chapter 4: Preventive Maintenance
Discussion: 188.8.131.52 (q. 1)
Discussion: 184.108.40.206 Benefits of Preventive Maintenance (q. 2-4)
- Preventive mainenance decisions based on:
- Computer location or environment
- Computer use
- Preventive maintenance:
- Improves data protection
- Extends the life of the components
- Improves equipment stability
- Reduces the number of equipment failures
Video: Professor Messer: Avoid Dust (2:44)
Discussion: 220.127.116.11 Preventive Maintenance Tasks (q. 5-7)
- Address tasks for Hardware:
- Remove dust from the power supply.
- Remove dust from the components inside the computer and peripheral equipment, such as printers.
- Clean the mouse, keyboard, and display.
- Check for and secure any loose cables.
- Address tasks for Software:
- Review and install the appropriate security updates.
- Review and install the appropriate software updates.
- Review and install the appropriate driver updates.
- Update the virus definition files.
- Scan for viruses and spyware.
- Remove unwanted or unused programs.
- Scan hard drives for errors.
- Optimize (defragment) hard drives
Discussion: 18.104.22.168 Clean the Case and Internal Components (q. 8-11)
- Heat sink and fan assembly
- Adapter cards
- Power supply
- Internal drives
Discussion: 22.214.171.124 Inspect the Internal Components (q. 12-13)
Discussion: 126.96.36.199 Environmental Concerns (q. 14-15)
- Allow devices to warm/cool before operating them
- Don't leave in auto outside
- Condensation can cause short circuits
Assignment: Chapter 4 Study Guide 1-15
Homework: Study for Chapter 4, Section 1 Quiz
Video: OSI Model: The Data Link Layer (5:25)
Discussion: 188.8.131.52 Ethernet Encapsulation (q. 3-6)
- LLC Sublayer (review)
- MAC Sublayer (review)
Video: OSI Model - Data Link Layer (5:13)
Discussion: 184.108.40.206 MAC Sublayer (q. 7-9)
Discussion: 220.127.116.11 Ethernet Evolution (q. 10-11)
Discussion: 18.104.22.168 Ethernet Frame Fields (q. 12-15)
Activity: 22.214.171.124 IM - MAC and LLC Sublayers (q. 16)
Activity: 126.96.36.199 IM - Ethernet Frame Fields (q. 17)
Video: Ethernet Frame Structure (3:15)
Lab: 188.8.131.52 Using Wireshark to Examine Ethernet Frames
Assignment: Chapter 5 Study Guide 3-17
||Quiz: Chapter 4, Section 1
BPA Prep & Mid-Term Chapt 1-4 Prep
Discussion: 184.108.40.206 MAC Address and Hexidecimal (q. 18)
- MAC address is 48 bits long in hexadecimal
- Hexadecimal character represents four bits
- Hexadecimal represented by: Ox, H, or h
- Hexadecimal used for IPv6 (128 bits)
- Know how to covert to/from hexadecimal
Video: Decimal to Hexadecimal (5:45)
Activity: Binary-Hexadecimal Practice Worksheet
Discussion: 220.127.116.11 MAC Address: Ethernet Identity (q. 19)
- OUI - Organizational Unique Identifier
- First three bytes
- MAC addresses MUST be unique in every LAN
Discussion: 18.104.22.168 Frame Processing (q. 20)
- BIA - Burned in Address (ROM chip)
- Can assign MAC in modern devices
- Devices will only receive frames with its MAC, Multicast MAC, Broadcast MAC
Discussion: 22.214.171.124 MAC Address Representation (q. 21-22)
- MAC address can be represented:
- Using dashes
- Using colons
- Using period
- Use command: ipconfig /all to view MAC address on Windows
- Use command: ifconfig to view on MAC or Linux
Discussion: 126.96.36.199 Unicast MAC Address (q. 23)
Discussion 188.8.131.52 Broacast MAC Address (q. 25)
- 48 ones in binary
Discussion: 184.108.40.206 Multicast MAC Address (q. 26-28)
- IP (class D) 220.127.116.11 tp 18.104.22.168
- MAC starts with 01-00-5E (OUI portion of address)
(Run through following lab in Packet Tracer first - then go to lab)
Lab: 22.214.171.124 Viewing Network Device MAC Addresses (Start)
Assignment: Chapter 5 Study Guide 18-28
Lab: 126.96.36.199 Viewing Network Device MAC Addresses (Finish)
Discussion: 188.8.131.52 Switch Fundamentals (q. 29-30)
- Switch and bridges are layer 2 devices
- Uses MAC address table to make forwarding decisions
- MAC address table is empty when switch first turned on
- Must learn mac addresses of attached devices
- MAC address table is sometimes called CAM table or switching table.
Discussion: 184.108.40.206 Learning MAC Addresses (q. 31-33)
- MAC address table is empty at switch start-up
- MAC address table is filled in by inspection of SOURCE MAC ADDRESS of frame
- If address is already there, the timer is refreshed. by default 5 minutes.
- If destination MAC address is unknown, switch floods frame out of all ports except one received on.
- If destination is broadcast or multicast, is also sent out all ports except incoming port.
Discussion: 220.127.116.11 Filtering Frames (q. 34)
- As MAC table becomes populated with MAC addresses, switch can direct frames to specific interfaces by matching destination MAC addresses with table entries.
- This allows multiple connections at the same time.
- Conserves bandwidth for other uses/connections.
Video 18.104.22.168 MAC Address Tables (3:09) (q. 35.)
Video 22.214.171.124 Sending a Frame to the Default Gateway (3:01) (q. 36)
Activity 126.96.36.199 Switch It! PRACTICE UNTIL YOU ARE AN EXPERT AT THIS!!!!
- This is the best learning tool in the entire academy
- Slight learning curve to use it
- Make sure you can predict switch operations with ease!!
- Keep practicing until you have done all the problems - about 20 of them
Assignment: Chapter 5 Study Guide 29-38
Chapt 1-4 Midterm Exam (2019)
Binders Due on the 17th - next Friday (2019)
Assignment: Binary to Hexidecimal Worksheet (10 points)
Lab: 188.8.131.52 Viewing the Switch MAC Address Table
Discussion: 184.108.40.206 Frame Forwarding Methods on Cisco Switches (q. 39-40)
- Two forms of switching can be used:
- Store-and-forward switching
- Cut-through switching
- Store-and-forward uses CRC (is value of algorithim of bit 1's in the frame)
- Store-and-forward is required for QOS communication
- If lots of errors, switches can dynamically set themselves for Store-and-Forward
Discussion 220.127.116.11 Cut-Through Switching (q. 41-42)
- Cut-through uses one of two methods:
- Fast-forward switching
- Sends as soon as destination MAC learned
- Fragment-free switching
- Sends as soon as destibation MAC learned, and
- That the frame is at least 64 bytes long
Discussion 18.104.22.168 Memory Buffering on Switches (q. 43-44)
- Switches can buffer frames when there is end device congestion
- Such as NIC speed is slower than switch port speed
- Two types of switch buffering:
- Port-based Memory Buffering
- Shared Memory Buffering
Activity 22.214.171.124 (1 & 2) Frame Forwarding Methods (q. 45)
Discussion: 126.96.36.199 Duplex and Speed Settings (q. 46-48)
- Two common settings each port:
- Usually set to dynamically learn on own
- Error condition can be a Duplex Mismatch. User experiences slow connection.
Discussion: 188.8.131.52 Auto-MDIX (q. 49)
- Do not rely on Auto-MDIX
- Networkers MUST know and use correct cables.
Assignment: Chapter 5 Study Guide 39-49
Video: CES 2019: Top Tech Tour (11:46)
Section 2: Intro to Troubleshooting
Video: Professor Messer: Troubleshooting Common Hardware Problems (15:19)
Discussion: 184.108.40.206 Intro to Troubleshooting Process (q. 16-23)
- Many companies require computer owner to sign liability waiver or pay for backup
- Can be sued for great sums of money
Discussion 220.127.116.11 Step 1: Identify the Problem (q. 24-34)
- Conversation Etiquette
- Open/Closed type questions
- Documenting responses
- Beep Codes
- BIOS Information
- Event Viewer
- Device Manager
- Task Manager
- Diagnostic Tools
Activity: 18.104.22.168 Step 1: Identify the Problem (make sure you can use open/closed ?'s with ease!)
Discussion: 22.214.171.124 Step 2: Establish a Theory of Probable Cause (q. 35-37)
Discussion 126.96.36.199 Step 3: Test the Theory to Determine Cause (q. 38-39)
Discussion 188.8.131.52 Step 4: Establish a Plan to Implement the Solution (q. 40)
Discussion: 184.108.40.206 Step 5: Verify Full System Functionality (q. 41-42)
Discussion 220.127.116.11 Step 6: Document the Findings (q. 43-46)
Discussion 18.104.22.168 Common PC Problems and Solutions (q. 47-52)
Discussion 22.214.171.124 Summary (q. 53)
Assignment: Chapter 4 Study Guide 16-53 (finish)
Homework: Study for Chapter 4 Test
Make up & BPA Prep
Contests: Legal Office Procedures (Shull)
Contest: Visual Basic (Lindsey)
Video: The Best of CES 2019: Only the Cream of the Crop (7:41)
Test: Chapter 4
Test: Semester 1 Mid Term: Chapters 1-3
Binders due tomorrow (2019)
BPA Contest Prep
Record your BPA ID number. Use it everywhere you would normally use your name.
You can use written reference material - no Internet.
Rubric: Judged Contest
Rubric: Non-Judged Written Contests
You can find which contests you're signed-up for on the shared drive. You are responsible for making sure you complete your contests.
When you are not taking a contest exam, you should be preparing for your judged team/individual event!! Please don't waste class time.
Contest: Computer Network Technology (8:00)
Contest: Basic Office Systems 220 (Charles)
Contests: Business Law & Ethics 265 (Lindsy)
Extra Credit/Community Service Hours: Parent/Teacher Info Night 6:30-8:30 (Pizza at 6:00)
The last day of Grading Period 2
Binders due today (2019)
Contest: Computer Security
Contest: Visual Basic
Contest: Information Technology Concepts (open event)
Contest: PC Servicing & Troubleshooting
Contest: Systems Administration using Cisco
Personal Financial Management (Payton & Charles)
Any Contest Make-ups
Last day to prep - forms need to be submitted
||Professional Dress Required
BPA Judged Contests @ CVCC
||BPA Judged Events
Review: Section 2
Quiz: Section 2 Kahoot
Discussion: 126.96.36.199 Destination on Same Network (q. 50-52)
- Hosts use combo of IP address & subnet mask to determine destination local or remote
- All frames contain source & destination MAC and IP address.
- Local destination is on same network
Discussion: 188.8.131.52 Destination Remote Network (q. 53)
- Remote destination is when the IP/subnet mask combo are on another network
- Packets are sent to the default gatreway of the router
PT: 184.108.40.206 Identify MAC and IP Addresses (30 min)
Discussion 220.127.116.11 Introduction to ARP (q. 54)
- ARP - Address Resolution Protocol
- Destination IP are generally known (by virtue of DNS). Not so for MAC addresses.
- ARP discovers what destination MAC is associated with destination IP address.
- ARP maintains table of IP to MAC address mappings.
Discussion 18.104.22.168 ARP Functions (q. 55-57)
- When destination MAC isn't already known, ARP discovers with an ARP request packet
- Only host recognizing own IP address responds to ARP request
- Sends its MAC address back to sending host.
- If destination is on another network, the default gateway sends its MAC address instead.
- The ARP table remembers (caches) these learned MAC/IP combo addresses for a time.
Video 22.214.171.124 ARP Request (2:55) (q. 58-59)
- ARP requests don't have a destination MAC address because MAC address isn't known at this point. Destination MAC address field is empty.
- ARP requests are broadcast and use destination MAC address of all F's.
- ARP frames have a TYPE field value of Ox806 (can see it in Wireshark)
- Routers DO NOT send out broadcasts.
Video 126.96.36.199 ARP Reply (1:57) (q. 60-61)
- Only the device recognizing own IP address responds to ARP request.
- Sends back its MAC address using unicast.
- If no response, frame is dropped.
- Similar process in IPv6 environment.
Video 188.8.131.52 ARP Role in Remote Communication (3:02) (q. 62-63)
- In remote communications, the default gateway sends back MAC to sending host.
Discussion 184.108.40.206 Removing Entries from an ARP Table (q. 64)
- You can clear ARP table entries manually.
- ARP entries are normally only saved for two minutes and then flushed.
Discussion 220.127.116.11 ARP Tables (q. 65-66)
- To view ARP table in Windows, use arp -a command.
- To view ARP table in a router, use show ip arp command.
Assignment: Chapter 5 Study Guide 50-66 (Turn in today)
Review: PT: 18.104.22.168 Identify MAC and IP Addresses
Review Video: CBTNugg 100-101 #09 Welcome to the World of Switching (33:55)
PT: 22.214.171.124 Examine ARP Table
Discussion 126.96.36.199 ARP Broadcasts (q. 67)
- ARP broadcasts add to early morning network congestion
Discussion 188.8.131.52 ARP Spoofing (q. 68)
- ARP creates a security vulnerability called ARP Spoofing/ARP Poisoning
- Attacker responds to ARP requests with own MAC address to capture frames
- This is one of the dangers of rogue routers on networks
- Can also be used in DOS attack
Video: YouTube: How Switches Learn MAC Addresses
Activity: 184.108.40.206 MAC and Choose. (Disregard collecting three old pictures.View them, but don't print them out please)
Discussion 220.127.116.11 Summary
Resource: Fields of a Frame
Video: Cisco Netacad Routing and Switching v6.0 - Chapter 5 (20:10)
Activity: Distribute Chapter 5 Test Study
Assignment: Finish Chapt 5 Study Guide 67-68
Homework Assignment: Study for Chapter 5 Test
Turn in anything due (study guides) before exam.
CCNA Chapter 5 Review PowerPoint
Test: Chapter 5
||BPA Regional Awards Field Trip
BPA Regional Awards Field Trip
Discussion: 18.104.22.168 Summary
CCNA Chapter 5 Review PowerPoint
A+ Chapter 4 Review PowerPoint
IP Addressing and Subnetting for New Users
What is APIPA?