Essential Questions
- How will I know I’ve set up my network and the devices I’ve connected to it correctly?
- What else can I do with my network beyond surfing the Web?
- How can I be sure the users on my network and the information they share on it are safe and secure?
Big Ideas
Using the different types of services available through the Internet requires correctly setting up network devices as well as the Internet-enabled devices you and others use. These devices have different ports identified for optimal use, such as configuring a device to receive email correctly, and you should know what the most well-known ports are so you can set up and manage both the network and the devices on that network.
Once connected to a LAN or WAN, you should understand how the Domain Name System (DNS) and Universal Resource Locators (URLs) are used to identify the IP addresses you learned about last week as you explored dotted decimal notation (IPv4) and hexadecimal numbers (IPv6). But there are many additional possibilities beyond just surfing the Internet. You should understand how all of the network components you’ve been studying, including different hardware, software, and protocols come together to support uses like email, sharing documents through file-transfer protocol (FTP), and others.
Every network should also provide a safe experience for its users and protect the information that is connected to it or shared over it. There are various services that can monitor and keep a network safe.
Connection to Student Lives
Now that you have explored Internet Protocols (IPv4 and IPv6) you may have a better understanding that devices on a network can be identified. But it’s also important that these devices can accurately share information back and forth, because as you well know, the Internet does more than just display web pages. It supports communications through email, hosts videoconferencing through services like Zoom or Google Meet, connects gamers so they can play each other, and many other services. In order for these and other things to take place, the network servers and the devices you use have to be configured correctly.
You’ve probably been accessing information on the Internet through URLs (Uniform Resource Locators) for most of your life–at least most of the time you’ve been in school. You may have been taught to trust information from some domains, like .edu or .gov, more than others, like .com or .org. There are many different types of domains that use the Domain Name System (DNS) and Uniform Resource Locator (URL) protocols that you should understand.
And since you’re getting good at connecting to and using network service, think how many people will want to reach out to you to help them understand network services that you will be able to support, like setting up email accounts, sharing a printer, or even helping to secure a network. Not only will people thank you for your help, some will actually pay you for these skills!
Framing Problem
Students will work throughout the module to ultimately install and configure a SOHO (Small Office Home Office) network in week 4. They should capture decision points for their network solutions during the first three weeks, practicing relevant skills they will apply in week 4.
Cornerstone Assessment
Configure or review Ethernet settings for a NIC (Network Interface Card) by using the Network and Sharing Center (Windows 7 & 8) and/or Network & Internet (Windows 10) settings, depending on which are available. Explain ports and protocols by setting up an email client or by using FTP to share files with a class-related hosted service. See Activity 9-2: Configuring Network Connection Settings in The Official CompTIA A+ Core 1 & Core 2 Instructor Guide and its associated files for detailed steps as one method for practicing configuring network settings. Create brief presentations in various media that provide an overview of different network host services or security appliances and software. Share your presentations with your class and consider how to integrate them into your Help Desk Knowledge Base.
DPI Standards
- NCCTE.2020.II21.02.01 - Compare TCP and UDP ports, protocols, and their purposes.
- NCCTE.2020.II21.02.03 - Install and configure a basic wired/wireless SOHO network.
- NCCTE.2020.II21.02.05 - Summarize the properties and purposes of services provided by networked hosts.
- NCCTE.2020.II22.01.06 - Use Microsoft Windows control panel utilities.
- NCCTE.2020.II22.01.08 - Configure Microsoft Windows networking on a client or desktop.
A+ Standards
TOPIC 8F: Network Services
TOPIC 9A: Configure Network Settings
Knowledge
- How ports and protocols are implemented within a network and how they function and keep data secure
- The uses and limitations of TCP versus UDP
- Well-known port numbers and their description by memory
- DNS hierarchy
- That web browsers request resources using a URL from an HTTP server and how URLs are constructed using the DNS hierarchy
- The use and basic function of TLS (Transport Layer Security)
- Common protocols used in sending email (SMTP, POP3 or IMAP)
- The protocols supporting file and printer sharing on Windows networks versus Mac OS
- Why one might use FTP
- The major roles or categories of network service (e.g., authentication server, DHCP and DNS servers, LDAP, NetBIOS/NetBT)
- When NetBT should be enabled on a network
- Common protocols that support inventory management on a network
- The possible needs for and potential risks for legacy and embedded systems
- How Internet security appliances and software, such as IDS, IPS, and UTM can help protect a network and how they do this, generally
- Two basic ways of implementing network connectivity for IDS and IPS or UTM, their strengths and weaknesses
- How to use Windows to configure Ethernet settings for a NIC (Network Interface Card)
- Why Wake on LAN (WoL) might be used
- How to navigate the Network and Sharing Center (Windows 7 & 8) and Network & Internet (Windows 10) settings
- What a VPN is used for and how a device can be configured to use a VPN
Skills
- Configure an email account using POP and/or IMAP protocols
- Configure a Network Interface Card (NIC) to a wired or wireless access point in Windows
- Check system setup to determine if an onboard NIC is enabled
- Enable or disable 802.11 standards of a wireless network card
- Set up, or explain, Wake on Lan (WoL) and start a computer remotely.
- Use the Network & Internet section of the Settings app in Windows 10 to review and configure wired and wireless settings.
- Configure DHCP by using the Obtain an IP address automatically option in the Internet Protocol Properties
- Configure, or explain, defining an alternative IP address configuration and why you might need to do so.
Vocabulary
Network Services
Port number
Transport Control Protocol (TCP)
Negative Acknowledgement (NACK)
User Datagram Protocol (UDP)
Well-known port numbers
Domain Name System (DNS)
- Top Level Domains (TLDs)
- ICANN
- Fully Qualified Domain Name (FQDN)
- Domain name
- Host name
- DNS server
- Authoritative name server
- Recursive resolver
Web Server
- HyperText Transfer Protocol (HTTP) and HTTPS
- Uniform REsource Locator (URL)
- Intranet
- Extranet
- Secure Sockets Layer (SSL)
- Transport Layer Security (TLS)
- Datagram Transport Layer Security (DTLS)
- Multipurpose Internet Mail Extensions (MIME)
- Simple Mail Transfer Protocol (SMTP)
- Post Office Protocol (POP3)
- Internet Message Access Protocol (IMAP)
File and Printer Sharing
- Server Message Block (SMB) or Common Internet File system (CIFS)
- Apple Filing Protocol (AFP)
- File Transfer Protocol (FTP)
Network Host Services
- Authentication Server
- DHCP and DNS Servers
- Lightweight Directory Access Protocol (LDAP)
- Distinguished name
- Relative distinguished name
- Network Basic Input/Output System (NetBIOS) and NetBIOS over TCP/IP (NetBT)
Inventory Management
- Simple Network Management Protocol (SNMP)
- Agent
- Management Information Base (MIB)
- Endpoint Management Server
- Defense in depth
- syslog
Embedded System
- Closed network
Legacy System
Internet Security Appliances and Software
- Intrusion Detection System (IDS)
- Heuristic techniques
- Snort
- Suricata
- Intrusion Protection System (IPS)
- Unified Threat Management (UTM) appliance
- Antivirus scanner
- Firewall
- Proxy Server
See also (covered in module 5-4C)
Telnet
SSH
Remote Desk Protocol (RDP) port 3389
Configure Network Settings
Network Interface Card (NIC)
Ethernet settings
- Signaling speed
- Half or full duplex
Quality of Service (QoS)
- Roaming Aggressiveness
- Transmit Power
Wake on LAN (WoL)
Wake-on-Wireless Lan (WoWLAN)
Dial-up Connection
Wireless Wide Area Network (WWAN or cellular)
Virtual Private Network
Weekly Map
Monday
Introduction to problem
Online Pre-assessment
Review converting binary to dotted decimal notation
Team meetings to review project plan and goals
Tuesday
Review content resources with whole group
Small group and independent exploration of resources: Network Services and Discussion Activity 8-6
Contribute to team project
Wednesday
Hands-on exploration: Network Connection Settings
Small group and independent exploration of resources: Network Connection Settings and Discussion Activity 9-1
Team progress check with supervisor
Thursday
Hands-on exploration
Activity 9-2: Configuring Network Connection Settings (can be continued to Friday)
Friday
Complete Activity 9-2, if necessary
Review converting binary to hexadecimal
Team progress check with supervisor
Online post-assessment
Monitor progress and adjust project plan as necessary
Lesson Ideas
Students continue their work from the previous week but should be given the opportunity to either configure or at least review Ethernet settings for a NIC (Network Interface Card) preferably in Windows 10 using Network & Internet settings. Students should develop at least a general understanding of Internet connections. The Windows-specific outcomes are from the 1002 objectives. If time is available, they should use Windows networking tools to establish and configure a connection with a workstation or desktop, but this topic is reviewed again in the 1002 course.
Consider having students work in pairs or teams to create documentation about different network host services or security appliances and software.
Potential Resources
The Official CompTIA A+ Core 1 & Core 2 Instructor Guide for Exams 220-1001 and 220-1002
- Topic 8F: Network Services (537-550)
- Activity 8-6: Discussing Network Services (551-552)
- Topic 9A: Configure Network Connection Settings (556-569)
- Activity 9-1: Discussing Network Connection Settings (570)
- Activity 9-2: Configuring Network Connection Settings (571-574)
CompTIA also offers videos for purchase through their website or on ITPro.TV.
Professor Messer at ProfessorMesser.com and YouTube offers numerous free videos of various lengths for many of the topics for the CompTIA 220-1001 A+ Exam. They are easy to understand, narrated videos with visuals. If you are teaching a CompTIA course, the site notes “You’re welcome to use them as much as you’d like, provided you embed the videos with the associated YouTube link or link directly to my site. Please click the “Contact Us” link at the top of our web page and let me know how you’re using them.”
- Professor Messer’s 220-1001 Core 1 CompTIA A+ Training Course videos on ProfessorMesser.com. Search or scroll to find the topics you’re interested in.
- Professor Messer’s CompTIA 220-1001 A+ Training Course playlist on YouTube
Entry Level I.T. Training from Technology Gee
- TCP & UDP Ports and Protocols (Article | Video – 27:38)
- Network Host Services (Article | Video – 19:31)
- Basic Wired/Wireless SOHO Networks (Article | Video – 25:46)
- Microsoft Windows Networking (Article | Video – 17:29) optional
- Microsoft Windows Control Panel (Article | Video – 8:27) optional
Khan Academy
- Computers and the Internet Course:
- Unit: The Internet
- Unit: Addressing the Internet
PowerCert Animated Videos on YouTube
- What is SMTP – Simple Mail Transfer Protocol (3:24)
- POP3 vs IMAP – What’s the difference? (7:50)
- FTP (File Transfer Protocol), SFTP, TFTP Explained (7:54)
- SSL, TLS, HTTP, HTTPS Explained (6:1)
- Wi-Fi Router vs Wireless Access Point (6:26)
- What is a proxy server? (4:43)
- Telnet vs SSH Explained (5:00)
Articles and Other Resources:
Cloudflare, a global networking company, provides a wealth of information on topics related to networks in it’s Learning Center. Consider these and explore others
- What is DNS? | How DNS works from Cloudflare
Networking Tutorials from Lantronix, a global provider of Software as a Service, connectivity, engineering, and IotT services. Some, but minimal, product promotion may appear in this resource.
Tutorials from Cisco:
- The Transport Layer
- Security Concepts
TCP versus UDP
Difference between TCP and UDP. Comparison table by Nitin Sharma on tutorialspoint
TCP vs. UDP – What’s the difference and which protocol is faster? By Kris Koishigawa for freeCodeCamp. Includes a link to How the Internet Works in 5 Minutes video (4:48)
DNS hierarchy
Address Hierarchy, Unit 4, Lab 1 from the Beauty and Joy of Computing
The Internet: IP Addresses & DNS video (6:44) from Code.org
What is DNS and the DNS Hierarchy by Jithin for interserver.net
Transport Layer Security TLS
TLS Basics from Internet Society
What is Transport Layer Security (TLS)? By Zeus Kerravala for NetworkWorld
Protocols for sending email SMTP, POP3, IMAP
A Beginner’s Guide to Email Protocols: SMTP, POP3, and IMAP by Liquid Web, a website hosting company
Email protocols – POP3, SMTP and IMAP Tutorial from SiteGround, an website hosting company
Outlook.com POP3 and SMTP Settings for Microsoft Outlook (2007 or 2010) by Steve Krause for groovypost
How to FTP
How to Connect to FTP Servers in Windows (Without Extra Software) by Chris Hoffman for How-To Geek
How to Use FTP by Jack Lloyd for wikiHow using the FileZilla FTP client
HTTP vs. FTP File Transfer by Jay Darrington for Techwalla