Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Networking Technician
Chapter 3
Identifying Network Components
FOUNDATION TOPICS
Media
Network Infrastructure Devices
MEDIA
Network media breaks down into three categories:
Copper
Fiber-optic
Wireless
Each of these categories is divided into subcategories, each with different
specifications and uses.
COPPER
Copper cabling has been used for communication since the mid 1800s
when the telegraph became widely used.
There are three categories of copper cabling:
Coaxial
Unshielded Twisted-pair
Shielded Twisted-pair
Each also has subcategories with different specifications and uses.
COAXIAL CABLE
BNC
F-connector
Category
Maximum
Throughput
Maximum Distance
Cat 3
10 Mbps
100 meters
Cat 5
100 Mbps
100 meters
Cat 5e
1 Gbps
100 meters
Cat 6
1 Gbps
100 meters
Cat 6a
10 Gbps
100 meters
Cat 7
10 Gbps
100 meters
FIBER-OPTIC CABLING
Uses light from an LED or LASER to transmit information through a glass
fiber.
Two categories of fiber-optic cabling:
Multimode fiber
Single-mode fiber
FIBER-OPTIC CONNECTORS
SC Subscriber Connector
LC - Lucent connector
Advantages of
Copper Cabling
Higher bandwidth
Longer distances
Immune to EMI
Better security
Less expensive
Easy to install
Inexpensive tools
CABLE DISTRIBUTION
Components
Entrance facilities
MDF (main distribution frame)
Cross-connect facilities
IDF (intermediate distribution frame)
Backbone wiring
Telecommunications closet
Horizontal wiring
Work area
CABLE DISTRIBUTION
CABLE DISTRIBUTION
CABLE DISTRIBUTION
WIRELESS TECHNOLOGIES
All devices connected to the same AP are considered to be
on the same shared network segment.
HUBS
Hubs operate at Layer 1 of the OSI model and were used to connect
multiple network devices.
They are sometimes called multiport repeaters.
Hubs
BRIDGES
Join two or more LAN segments.
Each LAN segment becomes a separate collision domain.
Bridges analyze source MAC addresses in frames entering the bridge and
populate an internal MAC address table based on those addresses.
Bridges make intelligent forwarding decisions based on the destination
MAC address in the frame.
BRIDGES
SWITCHES
Switches are essentially a multiport bridge. They are usually considered
a Layer 2 device.
They learn MAC addresses and make forwarding decisions based on that
information.
Switches analyze source MAC addresses in frames entering the switch
and populate an internal MAC address table based on those addresses.
Each port represents a collision domain. All ports belong to the same
broadcast domain
Switches
ROUTERS
Routers are Layer 3 devices. They make forwarding decisions based on
logical network address information, usually IP addresses.
Each port on a Router is a separate collision domain AND a separate
broadcast domain.
Routers are typically more feature-rich and support a broader range of
interface types.
ROUTERS
MULTILAYER SWITCHES
Multilayer switches combine features of Layer 2 Switches and Layer 3
Routers.
They can make decisions based on both MAC addresses and IP
addresses.
If configured with VLANs (which will be discussed in Chapter 4) each
port on a multilayer switch can be a collision domain AND a broadcast
domain.
Multilayer Switches
Multilayer switch configured
with virtual LANs (VLANs)
Number of
Collision Domains
Possible
Number of Broadcast
Domains
Possible
OSI Layer of
Operation
Hub
Bridge
1 per port
Switch
1 per port
Multilayer Switch
1 per port
1 per port
3+
Router
1 per port
1 per port
3+
VPN CONCENTRATORS
Companies with locations across multiple sites require secure
communications between those sites.
A Virtual Private Network (VPN) creates a secure, virtual tunnel network
over an untrusted network, like the Internet.
One of the devices that can terminate VPN tunnels, is a VPN
Concentrator, although firewalls typically perform this function now.
There will be more about VPNs in Chapter 12.
VPN CONCENTRATORS
Branch A
VPN
Concentrator
Branch B
VPN
VPN
Concentrator
Concentrator
Headquarters
VPN
Concentrator
Branch C
FIREWALLS
A firewall is primarily a network security appliance. It stands guard at the
entrance to your network, protecting it from malicious Internet traffic.
Firewalls can be software or hardware.
FIREWALLS
DNS SERVERS
Computers and the internet use numbers not names, but people recall
names better than numbers.
A Domain Name System (DNS) server performs the task of taking a
domain name like, www.ciscopress.com and resolving that name into an
IP address that is understood on the network.
This is similar to the contact list on your phone. You rarely dial your best
friends phone number. You just click their name to call them.
DNS SERVERS
DNS HIERARCHY
Root
.com
cisco
amazon
.mil
twitter
navy
af
.edu
army
eku
purdue
cs
math
yale
DHCP SERVERS
Initially, clients on networks needed IP addresses manually configured
(or statically assigned) in order to communicate. This was a hassle and
also led to configuration errors.
DHCP SERVERS
PROXY SERVERS
A proxy server is a device that makes a request on behalf of a client.
Clients are configured to forward their packets, which are seemingly
destined for the Internet, to a proxy server.
The proxy server evaluates the request, if it has a copy of the
information the client is seeking, it replies with the cached copy.
If the requested page is not in the cache, the server forwards the
request to the Internet.
PROXY SERVERS
CONTENT ENGINES
HQ
Branch
Office
Reply
Request
PC
Content
Engine
IP WAN
Server
CONTENT SWITCHES
Internet
Server Farm
VIRTUAL SERVERS
Instead of having several, separate, physical servers, virtualization allows
multiple, virtual instances of servers to exist on a single, powerful server.
A single server can have multiple Microsoft Windows virtual servers
running simultaneously with Linux virtual servers.
VIRTUAL SERVERS
Microsoft
Windows Active
Directory
Linux Web
Server
Single
NIC
Sun Solaris
DNS Server
Virtual Server
Ethernet
Switch
IP Phone
PSTN
SIP
RTP
PBX
Switch
IP WAN
SIP
Gateway
Gateway
SIP
SIP
Call Agent
Analog
Phone
SUMMARY
TCP/IP Stack
Four Layers
Similar purpose as OSI model
SUMMARY
Media
Copper
Fiber-optic
Wireless
SUMMARY
VPN Concentrators
Firewalls
DNS Servers
DHCP Servers
Proxy Servers
Content Engines and Switches