Está en la página 1de 323

LESSON 1.

98-366 Networking Fundamentals

Understand the Concepts


of the Internet, Intranet,
and Extranet
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview

In this lesson, you will learn about:

The Internet
Intranets
Extranets
VPN
Security Zones
Firewalls
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set:

1. Discuss how the Internet was created by the US


Department of Defense, when the project started, and the
impact it has had on society

2. Discuss the uses of a virtual private network (VPN) and


relate sample situations where it is used
LESSON 1.1

98-366 Networking Fundamentals

In 1962 ARPA opened a computer research program and


appointed an MIT scientist named John Licklider to lead
it. He had just published his first memorandum on the
"Galactic Network" concept ... a futuristic vision where
computers would be networked together and would be
accessible to everyone.

In October 1969, Internet messaging programs (IMPs)


were installed in computers at both UCLA and Stanford.
UCLA students would 'login' to Stanford's computer,
access its databases and try to send data.
LESSON 1.1

98-366 Networking Fundamentals

The experiment was successful and the fledgling


network had come into being

By December 1969 ARPANET comprised four host


computers with the addition of research centers in Santa
Barbara and Utah

This was the beginning of the Internet


LESSON 1.1

98-366 Networking Fundamentals

Access to the Internet was now available and it was


hypertext document servers and Mosaic, the graphical
browser, that became the killer application that made the
Internet popular and useful to the general public

This worldwide computer network allows people to


communicate and exchange information

The Internet is not owned by any particular company or


person
LESSON 1.1

98-366 Networking Fundamentals

Intranet
A private network based on Internet protocols such as
TCP/IP but designed for information management within a
company or organization

One of the key advantages of an intranet is the broad


availability and use of software applications unique to the
needs of a corporation

It is also a computer network and includes some of the


same technologies as the Internet
LESSON 1.1

98-366 Networking Fundamentals

Intranet uses include providing access to software


applications; document distribution; software
distribution; access to databases; and training

An intranet is so named because it looks like a World


Wide Web site and is based on the same technologies,
yet is strictly internal and confidential to the
organization and is not connected to the Internet proper

Some intranets also offer access to the Internet, but such


connections are directed through a firewall that protects
the internal network from the external Web
LESSON 1.1

98-366 Networking Fundamentals

Extranet
An extension of some combination of corporate, public, and
private intranet using World Wide Web technology to
facilitate communication with the corporations suppliers,
customers, and associates
An extranet allows customers, suppliers, and business
partners to gain limited access to a companys intranet in
order to enhance the speed and efficiency of their business
relationship
LESSON 1.1

98-366 Networking Fundamentals

VPN
Virtual private network are nodes (nodes are a connection
point, either a redistribution point or a communication
endpoint (some terminal equipment) on a public network
They communicate among themselves using encryption so
that their messages are safe from being intercepted by
unauthorized users
VPNs operate as if the nodes were connected by private
lines. An example would be teachers at home needing
limited access to the school districts intranet would be
given VPN software for their personal laptop
LESSON 1.1

98-366 Networking Fundamentals


LESSON 1.1

98-366 Networking Fundamentals

Security Zone
Business/organization's need for physical and logical
boundaries for accessing, controlling, and securing
information throughout an organization's network
The security zone contains hidden settings for how
Microsoft Windows and Internet Explorer manage unsigned
controls
Security changes daily. A must to keep aware of the
updates. Check the webcasts where leading security and
privacy experts in field discuss the issues.
Microsoft has webcasts covering Security Bulletins,
Security Development Lifecycle, Security Intelligence
Report, Security Tools, and more
LESSON 1.1

98-366 Networking Fundamentals

Firewall
A computer system or network firewall is designed to
permit authorized communications while blocking
unauthorized access
The device is configured to permit or deny computer
applications based upon a set of rules and other criteria
Firewalls are technological barriers designed to prevent
unauthorized or unwanted communications between
computer networks or hosts
LESSON 1.1

98-366 Networking Fundamentals

Discuss how the business would achieve creating security


zones through the use of firewalls and VPNs for their
intranet and extranets.
LESSON 1.1

98-366 Networking Fundamentals

Class Activity
Student Activity 1.1: Comparing Internet, Intranet, Extranet
Discuss in groups of three how our subject applies:

1. As an example use the DMV (Department of Motor Vehicles):


Us as customers (drivers license renewal & vehicle registration renewal)
Internet
Highway Patrol as suppliers (vehicle ticket information) & as business partners
(they request current vehicle registration information)
DMV extranet & their own intranet
Smog check stations as suppliers (they provide smog certificates direct to DMV)
VPN to DMV extranet
Auto dealers as business partners (new car registration)
VPN to DMV extranet & their own intranet
2. Think and list examples of businesses that would use the same technology
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review
Work in small groups (3-4 students) to complete the
network design activity from Networking Fundamentals
Student Activity NetFund_SA_1.1_1 and
Student Activity NetFund_SA_1.1_2
If time permits, informally present group designs to the
class. Discuss the different designs created.
LE
ESSSSOO
N N1 . 21_. A1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand the Local Area


Networks (LANs)
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn about:

LANs
Perimeter networks
Addressing
Local loopback IPs
An Internet collection
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set: Class Activity


Two students draw a slip of paper from the box. Arrange
yourselves in order at the front of the room. Two more
students select numbers and add to the network forming.
The student with number 1: Tell a secret to number 2.
Continue to pass information from one student to the next
until the message reaches the end of the network.
When the last person receives the message, repeat it to the
class.
Describe how this process is similar and different to a
computer passing information throughout a network.
LESSON 1.1

98-366 Networking Fundamentals

Just as people network and talk to each other and spread


information, computers can network and talk to each other and
share information.
LESSON 1.1

98-366 Networking Fundamentals

LANs - Local Area Networks

Computer networks ranging in size from two computers in


a home to a few computers in a single office to hundreds
or even thousands of devices spread across several
buildings.

They function to link computers together and provide


shared access to printers, file servers, and other services.
LESSON 1.1

98-366 Networking Fundamentals

A group of computers and other devices dispersed over


a relatively limited area and connected by a
communications link that enables any device to interact
with any other on the network.
LANs commonly include PCs and shared resources
such as laser printers and large hard disks.
The devices on a LAN are known as nodes (individual
pieces of equipment.)
o Nodes are connected by wireless and by cables and through
which messages are transmitted
LESSON 1.1

98-366 Networking Fundamentals

LANs in turn may be plugged into larger networks, such as


larger LANs or wide area networks (WANs), connecting
many computers within an organization to each other and/or
to the Internet.
The physical media that connect devices, interfaces on the
individual devices that connect to the media, protocols that
transmit data across the network, and software that
negotiates, interprets, and administers the network and its
services are all a part of the LAN.
LESSON 1.1

98-366 Networking Fundamentals

Perimeter Networks

A perimeter network is a specialized network. Usually a


physical subnet outside of the main firewall allowing a
business to expose their services to the Internet.
LESSON 1.1

98-366 Networking Fundamentals

Addresses

A unique identifier is assigned to each node on a network.


A computing address defines a range of discrete addresses:
o each of which may correspond to a physical or virtual
memory register
o a network host
o peripheral device, disk sector, or other physical entity.
Just as people have addresses, computer memory and
networks have addresses.
LESSON 1.1

98-366 Networking Fundamentals

Reserved address ranges for local use


Address ranges are reserved by IANA for private intranets,
and not routable to the Internet.

The Internet Assigned Numbers Authority (IANA)


Allocates ranges of numbers to various registries in order to
enable them to each manage their particular address space.
LESSON 1.1

98-366 Networking Fundamentals

Local Loopback IPs


127.0.0.1 is the loopback address in IP
Loopback is a test mechanism of network adapters.
Messages sent to 127.0.0.1 do not get delivered to the
network.
Instead, the adapter intercepts all loopback messages and
returns them to the sending application.
IP applications often use this feature to test the behavior of
their network interface.
LESSON 1.1

98-366 Networking Fundamentals

An Internet Connection Sharing


ICS is a collection of technologies that work together to
enable multiple devices on a private network to share a
single Internet connection.
Microsoft uses the class C reserved IP range for
implementing a SOHO (small office/home office)
networkwhere one computer shares its Internet
connection with other computerssimilar to
Microsoft's printer sharing noted in the video.
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

Complete this review activity on the same paper with the


flow chart you used for the applied learning.
1. Summarize a local area network
2. Add any questions you have about the lesson
Turn in this paper as your ticket out the door
LESSON 1.1

98-366 Networking Fundamentals

Class Activity

Student activity 1.2_A: Local Area Network Components.


View the video shown on the next slide.
Using form SA 1.2_A label the components of the LAN
created in the video.
LESSON 1.1

98-366 Networking Fundamentals


LE
ESSSSOO
N N1 , 21_. B1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand VLANs,
Wired LANs, and Wireless
LANs
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview

In this lesson, you will review:

Wired local area networks


Wireless local area networks
Virtual local area networks (VLANs)
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set

Explain why wireless networks are so popular,


especially in homes
Describe the elements that make up a wireless network
What is the opposite of a wireless network?
LESSON 1.1

98-366 Networking Fundamentals

LAN
A local area network (LAN) is a single broadcast domain.
This means the broadcast will be received by every other
user on the LAN if a user broadcasts information on his/her
LAN. Broadcasts are prevented from leaving a LAN by using
a router.

Wired LAN

An electronic circuit or hardware grouping in which the


configuration is determined by the physical interconnection
of the components
LESSON 1.1

98-366 Networking Fundamentals

Wireless LAN
Communications that take place without the use of
interconnecting wires or cables, such as by radio,
microwave, or infrared light
Wireless networks can be installed:
o Peer-to-peer Ad hoc modewireless devices can
communicate with each other
o "Infrastructure" modeallows wireless devices to
communicate with a central node that can communicate
with wired nodes on that LAN
LESSON 1.1

98-366 Networking Fundamentals

Sample example of a wireless LAN design:


LESSON 1.1

98-366 Networking Fundamentals

Wired LANs: Advantages


Most wired LANs are built with inexpensive hardware:

1. Network adapter

2. Ethernet cables

3. Hubs
LESSON 1.1

98-366 Networking Fundamentals

Advantages
Wired LANs provide superior speed and performance

Disadvantages
Difficult to run cables under the floor or through walls
especially when computers sit in different rooms
Require central devices like hubs or routers to
accommodate more computers, which can be expensive
Generally it costs less than wireless equipment for the
equivalent wired Ethernet products
LESSON 1.1

98-366 Networking Fundamentals

Wireless LANS: Advantages


Easy access to the Internet in public places
Less expensive to install and maintain
Alleviates the need to run wiring through buildings
Disadvantages
The data transfer rate will decrease as computers are added
Lower wireless bandwidth means video streaming will be
slow
Security is more difficult to guarantee and requires
configuration
LESSON 1.1

98-366 Networking Fundamentals

Application of LANs
Home and small business computer networks can be built
using either wired or wireless technology
Large companies are trying to move toward wireless but
there are more challenges, especially with security
Wired Ethernet has been the traditional choice in homes,
but Wi-Fi wireless technologies are quickly replacing
wired LANs
LESSON 1.1

98-366 Networking Fundamentals

VLAN

A virtual LAN, known as a VLAN, is a group of hosts


with a common set of requirements that communicate
regardless of their physical location
Sometimes called a logical network
Has the same attributes as a physical LAN, but allows for
end stations to be grouped together even if they are not
located on the same network switch
Network reconfiguration can be done through software
LESSON 1.1

98-366 Networking Fundamentals

The VLAN controller can change or add workstations and


manage load balancing and bandwidth allocation more
easily than with a physical picture of the LAN
Network management software keeps track of relating the
virtual picture of the local area network with the actual
physical picture
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review
1. Why is a VLAN sometimes referred to as a logical
network?
2. List the advantages and disadvantages for a wired network
and a wireless network. Give examples of a typical uses for
each.
LE
ESSSSOO
N N1 . 31_. A1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand Wide Area


Networks (WANs)
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will review:

Dial-up
Integrated services digital networks (ISDN)
Leased lines
Virtual private networks (VPN)
Wide area networks (WAN)
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set
Apply what you have learned about LANs to this lesson.

1. What have you learned in the past that will help you to
understand WANs?
2. Discuss with your neighbor how you can apply learning
from past experience to this new topic of WANs.
LESSON 1.1

98-366 Networking Fundamentals

Dial-up Connections
A connection that uses the public switched telephone
networks rather than a dedicated circuit or some other type
of private network.
This is often referred to as plain old telephone service/public
switched telephone service (POTS/PSTN).
Remote server access provides two different types of remote
access connectivity:
o Dial-up remote access
o Virtual private network (VPN) remote access
LESSON 1.1

98-366 Networking Fundamentals

With dial-up remote access, a remote access client uses


the telecommunications infrastructure to create a
temporary physical circuit or a virtual circuit to a port
on a remote access server.
After the physical or virtual circuit is created, the rest of
the connection parameters can be negotiated.
LESSON 1.1

98-366 Networking Fundamentals

ISDN - Integrated Services Digital Network


A high-speed digital communications network evolving
from existing telephone services.
Designed to replace the current telephone network
An ISDN communication channel carries voice, circuit, or
packet conversations. The B channel is the fundamental
component of ISDN interfaces. It carries 64,000 bits per
second in either direction.
The most common kind of ISDN interface available in the
United States is BRI, which contains two B channels, each
with 64-kbps capacity, and a single D channel (16-kbps) that
is used for signaling and call progress messages.
LESSON 1.1

98-366 Networking Fundamentals

Leased Lines
A communications channel that permanently connects two or
more locations.
Leased lines are private or dedicated lines, rather than public
ones. Also called dedicated connection and private line.
A leased line is a dedicated telephone line rented from the
phone company. It provides a 24 hour dedicated connection
between two points.
Leased lines can be almost any speed but are typically 2 Mbps.
Higher speed lines are more expensive.
LESSON 1.1

98-366 Networking Fundamentals

VPN - Virtual Private Network


Computer devices (nodes) on a public network that
communicate among themselves using encryption
technology so that their messages are as safe from being
intercepted and understood by unauthorized users as if the
nodes were connected by private lines.
VPN client uses an IP (Internet protocol) internetwork to
create a virtual point-to-point connection with a remote
access server acting as the VPN server.
A server-based computer can be a remote-access server so
that other users can connect to it by using VPN, and then
access shared files on your local drives or on your network.
LESSON 1.1

98-366 Networking Fundamentals

Basic VPN Requirements


User Permission. Enable a user to access the VPN
IP Configuration. The VPN server should have a static IP
address and assign the arrange of IP addresses to VPN
clients.
The VPN server must also be configured with DNS (Domain
Name System) and WINS (Windows Internet Name Service)
server addresses to assign to the VPN client during the
connection
Data Encryption. Data carried on the public network should
be rendered unreadable to unauthorized clients on the
network
LESSON 1.1

98-366 Networking Fundamentals

Basic VPN Requirements (continued)


The TCP/IP (transmission control protocol/Internet protocol)
is a common protocol used in public networks
Firewall Ports. VPN server behind the firewall requires port
implementation
Interface(s) for VPN server. If using a router, only one NIC
(network interface controller) is needed. If the network
doesn't have a router or the VPN is also a gateway, the
computer must have at least two interfaces, one connecting
to the Internet and another connecting to the LAN.
One interface for VPN client. The interface can be a dial-in
modem, or a dedicated connection to the Internet
LESSON 1.1

98-366 Networking Fundamentals

WAN - Wide Area Network


Geographically widespread network
Relies on communications capabilities to link the various
network segments
Can consist of a number of linked LANs (local area
networks) or it can be one large network
Used to connect LANs and other types of networks
together, so that users and computers in one location can
communicate with users and computers in other locations
LESSON 1.1

98-366 Networking Fundamentals

LAN to a Wide Area Network


LESSON 1.1

98-366 Networking Fundamentals


LESSON 1.1

98-366 Networking Fundamentals

Lesson Review
1. Compare networks and discuss the relationship of a wide
area network to a local area network and a virtual private
network.
2. How do leased lines, dial-up, and ISDN relate to wide area
networks?
3. Discuss your answers with two other students and refine
your thoughts. Share your answers with the class.
L E SSSSOONN 1 1. 3. B1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understanding Wide Area


Networks
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview

In this lesson, you will learn about:

T1
T3
E1
E3
DSL
Cable and its characteristics (speed, availability)
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set

Pass sample cables around the class. Share with another


student and answer if and where you have seen these
cables before.
Review how a LAN would be designed for the
classroom. How do you imagine the design for a WAN
is different?
LESSON 1.1

98-366 Networking Fundamentals

T1
A high-speed communications line that can handle digital
communications and Internet access at the rate 1.544 Mbps
(megabits per second).
This high-bandwidth telephone line can also transmit text
and images.
Speed is attained through multiplexing 24 separate 64 Kbps
channels into a single data stream.
Commonly used by larger organizations for Internet
connectivity.
LESSON 1.1

98-366 Networking Fundamentals

T3
A T-carrier that can handle 44.736 Mbps (megabits per
second) or 672 voice channels.
LESSON 1.1

98-366 Networking Fundamentals

E1
A 2.048 Mbps point-to-point dedicated, digital circuit
provided by the telephone companies in Europe.
The European counterpart of the North American T1 line.
E1 and T1 lines can be interconnected for international
use.
Uses two wire pairs (one for transmit, one for receive) and
time division multiplexing (TDM) to interleave 32 64-
Kbps voice or data channels.
LESSON 1.1

98-366 Networking Fundamentals

E3

A carrier service with capacity for 34.368 Mbps


The E3 lines is the European counterpart to the US T3
Europe has a counterpart for every T-carrier leased line
capability
A speed capacity of 34.368 Mbps
o Interesting since E1 is faster than a T1 and E2 is faster than a T2
but E3 is slower than a T3
E2 through E5 lines provide multiple E1 channels
LESSON 1.1

98-366 Networking Fundamentals

DSL - Digital Subscriber Line


Provides high-speed transmissions over standard copper
telephone wiring
The data throughput of consumer DSL services ranges from
384 Kbps to 20 Mbps in the direction to the customer
o Depends upon technology, line conditions, and service-level.
The data throughput in the reverse directionfrom
customer to the service provideris lower
o Asymmetric digital subscriber line (ADSL) is the most common
DSL service provided but still with limited availability
o Symmetric digital subscriber line (SDSL) provides equal speed in
both directions
LESSON 1.1

98-366 Networking Fundamentals

Cable Internet Access through CATV

Has become a viable alternative and many cable


companies are offering both a home and a business-
class connection.
LESSON 1.1

98-366 Networking Fundamentals

Reflection Class Activity

1. With a partner discuss the similarities and differences


between T1, T3, E1, E3.
2. Create a table showing the similarities and differences.
3. Indentify North American (T-carrier) and European (E-
carrier).
4. Include such items as number of lines, number of channels,
& max data rate.
5. Discuss why such ranges exist and describe situations that
would require the various options.
LESSON 1.4
1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand Wireless
Networking
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn about:
Wireless networking
Wireless networking standards and their characteristics
802.11a, b, g, n including different GHz ranges
Types of network security
oWPA
oWEP
o802.1X
Point-to-point (P2P) wireless
Wireless bridging
Gigahertz
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set
1. Make a list of all the wireless devices they have seen,
used, or are familiar with. Answer the following
questions relating to the devices in the list.
a. How do they transmit and communicate with other
devices?
b. It is likely that there are many wireless devices in the
same room or area. How are they able to not interfere
with each other ? Or do they interfere with each other?
2. Discuss the uses and security issues of these items
LESSON 1.1

98-366 Networking Fundamentals

Wireless Telecommunications
Computer networks created without wires such as a local area network
(LAN)

The telecommunications network employ interconnections between


nodes implemented without the use of wires

Wireless telecommunications networks are accomplished with some type


of remote information transmission system
LESSON 1.1

98-366 Networking Fundamentals

Wireless Telecommunications (continued)

This implementation takes place at the physical level or "layer" of the


network where the waves are like radio waves.

Waveform refers to the shape and form of a carrier signal such as a


radio wave. A wave is a disturbance that travels through space and
time moving in a solid, liquid, or gaseous medium.

This carrier signal uses the same basic protocol as a modulating


signal.
LESSON 1.1

98-366 Networking Fundamentals

Electromagnetic Waves
The wave, or "disturbance," is invisible and is called the force field.
Without these charged particles, there can be no electric force fields and
thus no electromagnetic waves.
Examples include light, microwaves, X-rays, and TV and radio
transmissions are all kinds of electromagnetic waves.
Negative electrons and positive protons charges cause each other to
move.
Positive charge exerts an attractive force on electronsan electric force.
The velocity makes no difference, the pull or force depends only upon
where you put it.
Electronic devices make use of the range of the electromagnetic
spectrum.
LESSON 1.1

98-366 Networking Fundamentals

Wireless
Describes communications in
which electromagnetic waves
or RF carry a signal over the
entire communication path.
The frequencies that are
available for use for
communication are a public
resource and are regulated
by the Federal
Communications Commission
in the U.S.
LESSON 1.1

98-366 Networking Fundamentals

Electronic Modulation
The process of varying one or more properties of a high-frequency
periodic waveform.
In wireless we first take a signal, like a telephone conversation, and then
impress it on a constant radio wave called a carrier.
It modulates a constant frequency in the radio range, which we can't
hear.
Modulation makes voice band and radio band frequencies work together.
Different modulation techniques, such as AM and FM, are different ways
to shape or form electromagnetic radio waves.
LESSON 1.1

98-366 Networking Fundamentals

Electronic Modulation (continued)


Wireless network technologies are used in phones, laptop computers,
automobiles, and public transportation.
High-speed wireless Internet connection services designed to be used
from arbitrary locations refers to "mobile broadband.
Wi-Fi hotspots provides connectivity over a limited radius around
fixed wireless access points.
The data rate of a computer network connection is measured in units of
bits per second (bps).
One Mbps equals one megabyte per second.
Network equipment makers rate their products using related, larger
units of Kbps, Mbps, and Gbps.
Network outages happen due to limits of the service provider coverage
area or obstructions from geography, or even inside larger buildings.
LESSON 1.1

98-366 Networking Fundamentals

Institute of Electrical and Electronics Engineers (IEEE)


Creates standards to ensure compatibility.
The IEEE created the 802 project to develop the standards which are used
today. There have been many changes and additions.
IEEE 802 standards define only certain technologies.
Most important IEEE 802 standards is the 802.11, wireless networksit
defines standards for wireless LAN communication.
IEEE 802.11 is a set of standards carrying out wireless local area network
(WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands.
The base current version of the standard is IEEE 802.11-2007. They are
created and maintained by the IEEE LAN/MAN Standards Committee (IEEE
802).
LESSON 1.1

98-366 Networking Fundamentals

Popular Protocols Defined by the 802.11b and


802.11g

802.11-1997 was the first wireless networking standard.


802.11b was the first widely accepted one, followed by
802.11g and then by 802.11n.
802.11n is a new multistreaming modulation technique.
The 802.11 family includes over-the-air modulation, which means to change
or vary.
LESSON 1.1

98-366 Networking Fundamentals

802.11b and 802.11g use the 2.4 GHz ISM band (industrial, scientific
and medical), operating in the United States under Part 15 of the US
Federal Communications Commission Rules and Regulations.
Gigahertz is a measure of frequency.
Frequency (temporal frequency ) is the number of occurrences of a
repeating event per unit time.
The duration of one cycle in a repeating event, so the period is the
reciprocal of the frequency.
Because of this choice of frequency band, 802.11b and g equipment may
occasionally suffer interference from microwaves , cordless telephones
and Bluetooth devices.
LESSON 1.1

98-366 Networking Fundamentals

Both 802.11 and Bluetooth control their interference by using spread


spectrum modulation.
Bluetooth uses a frequency hopping signaling method, while 802.11b
and 802.11g use the direct sequence spread spectrum signaling and
orthogonal frequency division multiplexing methods, respectively.
802.11a uses the 5 GHz U-NII (Unlicensed National Information
Infrastructure) band, which offers at least 19 non-overlapping channels
rather than the 3 offered in the 2.4 GHz ISM frequency band.
Depending on the environment, channels may have better or worse
performance with higher or lower frequencies.
LESSON 1.1

98-366 Networking Fundamentals

WEP and WPA


Wireless security protocols widely used by wireless networking devices
WEPWired Equivalent Privacy or Weak Encryption Protocol
o Designed to provide equivalent level of security as a wired network
WPAWi-Fi Protected Access (WPA and WPA2)
o A certification program to designate compliance with the security
protocol to secure wireless computer networks
o Implements the majority of the IEEE 802.11i standard
The Wi-Fi Alliance intended WPA as an intermediate measure to take
the place of WEP pending the preparation of 802.11i
IEEE 802.11 wireless networks are NOT secured by WEP as it is easily
broken
LESSON 1.1

98-366 Networking Fundamentals

Wireless Security
Wireless network messages are more susceptible to eavesdropping than
wired networks.
A WEP key uses a passphrase a security code that is produced using
this protocol that allows computers to hide the contents of the
messages from intruders and exchange coded messages.
WPA-PSK (Pre-Shared Key) mode provides strong encryption
protection without the enterprise authentication server and is the easiest
way to deploy WPA to home wireless network using a passphrase.
WPA uses Temporal Key Integrity Protocol (TKIP) to produce unique
encryption keys and automatic rekey each wireless clients from
passphrase and network SSID.
LESSON 1.1

98-366 Networking Fundamentals

Wireless Bridging
A bridge is used to connect two network segments.
LESSON 1.1

98-366 Networking Fundamentals

Bridging
A forwarding technique used in packet-switched computer networks.
Can be done wired or wireless and used only in LANs.
Bridging depends on flooding and examination of source addresses in
received packet headers to locate unknown devices.
A network bridge connects multiple network segments at the data link
layer (Layer 2) of the (OSI) Open System Interconnection model.
A switch is a bridge with numerous ports. Switch or Layer 2 switch is
often used interchangeably with bridge.
LESSON 1.1

98-366 Networking Fundamentals

Bridging (continued)
Another form of bridging, source route bridging, was developed for
token ring networks.
The main purpose of wireless bridging is to connect a wired
Ethernet network segment to a wireless Ethernet network segment .
This is most commonly found in a home wireless router that has a
built-in multiport switch for wired devices, and a wireless
networking WAN connection for DSL or cable for Internet
access.
LESSON 1.1

98-366 Networking Fundamentals

Point-to-Point Protocol (PPP)


A data link protocol commonly used to establish a direct connection
between two networking nodes
Provides compression, transmission encryption privacy, and connection
authentication
Used over many types of physical networks including serial cable, phone
line, trunk line, cellular telephone, specialized radio links, and fiber optic
links such as links
Internet service providers (ISPs) use PPP for customers dial-up access.
Internet service providers (ISPs) use two encapsulated forms of PPP to
connect Digital Subscriber Line (DSL) Internet service.
Point-to-Point Protocol over Ethernet (PPPoE)
Point-to-Point Protocol over ATM (PPPoA)
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

Compare WEP and WPA by creating a list of the advantages and


disadvantages of each
Discuss the various wireless transmission methods
LESSON 1.5
1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand Network
Topologies and Access
Methods
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview

In this lesson, you will learn about:

Network topologies and access methods

Star Mesh

Bus
Ring
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set

We previously discussed networks such as local area


networks and this leads to the topic of topologyhow the
network is structured.

1. Draw a network that includes: 3 computers , 2 desktops


and a laptop, and a network printer.
2. Be prepared to show your drawing and tell what network
topology is being used.
LESSON 1.1

98-366 Networking Fundamentals

Class Activity

Use the mind map during the PowerPoint presentation


to record information about the different types of
network topologies. Be sure to include information
about which topology types are appropriate for various
situations.
LESSON 1.1

98-366 Networking Fundamentals

Network Topologies
The interconnection of the various elements (links, nodes,
etc.) of computer equipment
Network Topologies can be physical or logical
Topology is the virtual shape or structure of a network,
which does not need to correspond to the actual physical
design of the devices on the computer network.
The physical design of a network including the devices,
location, and cable installation is known as physical
topology.
How data actually transfer in a network, as opposed to its
physical design, is the logical topology, also called signal
topology.
LESSON 1.1

98-366 Networking Fundamentals

Compare the
logical and physical
topology of the star

If a hub is used, then the


topology is a physical star
and a logical bus.

If switch is used, then the


topology is a physical star
and a logical star.

If IBM MAU is used, then


the topology is a physical
star and a logical ring.
LESSON 1.1

98-366 Networking Fundamentals

Star Network
The topology structure of a star network consists of one
central switch, hub or computer, which acts as a conduit to
transmit messages.
The hub and leaf nodes, and the transmission lines between
them, form a graph with the topology of a star.
An active star network has an active central node that
usually has the means to prevent echo-related problems.
LESSON 1.1

98-366 Networking Fundamentals

By connecting all of the systems to a central node, the star


topology reduces the chance of network failure.
The central hub rebroadcasts all transmissions received
from any peripheral node to all peripheral nodes on the
network when applied to a bus-based network.
All peripheral nodes may thus communicate with all others
by transmitting to, and receiving from, the central node
only.
Isolation of a peripheral node from all others occurs when
there is a failure of a transmission, but the rest of the
systems will be unaffected.
Each node (file servers, workstations, and peripherals) is
designed to be connected directly to a central network hub,
switch, or concentrator.
LESSON 1.1

98-366 Networking Fundamentals

Data on a star network passes through the hub, switch, or


concentrator before continuing to its destination.
The functions of the network are controlled and managed
by the hub, switch, or concentrator, and it acts as a
repeater.
The twisted pair cable is the most often used although it
can be used with coaxial cable or optical fiber cable.
LESSON 1.1

98-366 Networking Fundamentals

Mesh Networks
Each node in the network acts as an independent router.
A mesh network whose nodes are all connected to each
other is a fully connected network.
The component parts connect to each other via multiple
hops.
Is self-healing and can still operate when one node breaks
down or a connection goes bad
Considered more reliable than other networks
Mobile ad hoc networks (MANET) must deal with the
problems of the mobility of the nodes. Mesh networks do
not have this problem but they are closely related with the
MANET network.
LESSON 1.1

98-366 Networking Fundamentals

Originally developed for military applications


Wireless networks are typical of mesh architectures.
The mesh network can support multiple functions such as
client access, backhaul service, and scanning in mobile
applications.
Increased power has enabled the mesh nodes to become
more modular.
One node or device can contain multiple radio cards or
modules, allowing the nodes to be customized to handle a
unique set of functions and frequency bands.
Game theory methods that analyze strategies for the
allocation of resources and routing of packets have aided
mesh networks.
LESSON 1.1

98-366 Networking Fundamentals

Ring Network
Data travels from node to node, with each node along the
way handling every packet.
It forms a single continuous pathway for signals through
each node.
May be disrupted by the failure of a single link
A node failure or cable break might isolate every node
attached to the ring.
Each machine or computer has a unique address that is
used for identification purposes.
Only one machine can transmit on the network at a time.
LESSON 1.1

98-366 Networking Fundamentals

Even though computers on a home network can be


arranged in a circle shape, it does not mean that it presents
a ring topology.
By sending data on a counter clockwise ring FDDI (fiber
distributed data interface) networks circumvent a node
failure or cable break.
802.5 networks, also known as Token Ring networks,
avoid the weakness of a ring topology altogether.
o They actually use a star topology at the physical layer and a multi-
station access unit (MAU) to imitate a ring at the data-link layer.
The signal can be boosted or repeated as the computers
connected to the ring act to strengthen the signals that
transverse the network.
LESSON 1.1

98-366 Networking Fundamentals

Bus Network
A shared communications line
A common backbone to connect all devices that operates
and functions as a shared communication medium
A single cable that devices attach or tap into with an
interface connector
Communicates by sending a broadcast message onto the
wire for all other devices to see, but only the intended
recipient actually accepts and processes the message.
Devices on the bus must first determine that no other
device is sending a packet on the cable before any device
can send a packet.
LESSON 1.1

98-366 Networking Fundamentals

Bus mastering is supported by many bus architectures that


enable a device connected to the bus to initiate transactions.
Devices with Ethernet communicate like they were in chat
room, which is called carrier sense multiple access/
collision detection (CSMA/CD).
Two packets are sometimes sent (two cards talk) at the same
time.
The cards arbitrate on their own to decide which one will
resend its packet first when this collision occurs.
All PCs share the data transfer capacity of that bandwidth
(wire ) if they are on a bus network.
LESSON 1.1

98-366 Networking Fundamentals

Advantages of a Bus Network


Easy to implement and extend
Well-suited for temporary or small networks not
requiring high speeds (quick and easy setup)
Cost effective; only a single cable is used
Cheaper than other topologies
Easy identification of cable faults
LESSON 1.1

98-366 Networking Fundamentals

Disadvantages of Bus Networks


Limited cable length and number of stations
Only one packet can remain on the bus during one clock
pulse
If there is a problem with the cable, the entire network
breaks down.
Performance degrades as additional computers are added or
with heavy traffic
Slower data transfer rate than other topologies
It works best with limited number of nodes
LESSON 1.1

98-366 Networking Fundamentals

Hybrid Network
When a combination of two or more topologies are
connected
If two star networks were connected together, they
would exhibit a hybrid network topology.
o A star ring network would be two or more star topologies linked
together using a multistation access unit (MAU) as a centralized
hub.
LESSON 1.1

98-366 Networking Fundamentals

Two or more star


topologies
connected using a
bus trunk would be
a star-bus network.
A multi-station
access unit
(MSAU) connects
a group of
computers to a
token ring local
area network.
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

Use the Student Activity brain map document


Work in small groups (34 students) to discuss the
completed brain map
Select a presenter to tell about the network topology
applications which your group decided was appropriate
for various scenarios
Share one scenario and describe how the topology your
group selected is ideal for this scenario
LE
ESSSSOO
N N2 . 11_. A1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand Switches
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn about:
Switches
Transmission speeds
Data transmission
Cables
Uplink speeds
Managed and unmanaged switches
VLANs
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set

A traditional light switch control has only 2 settingson or off. A


dimmer switch control allows for variations of light intensity. Think
about these two variations of controls and what you have already
learned about network hubs and switches. Explain what you think the
difference is between a network hub and switch.
Form groups of three to discuss your answers.
LESSON 1.1

98-366 Networking Fundamentals

Switches
A computer networking device that connects network segments
Some make it possible to connect different types of networks,
including Ethernet, fiber channel, ATM, ITU-T G.hn and 802.11.
LESSON 1.1

98-366 Networking Fundamentals

Layer 2 switches are network bridges that process and route data at the
data link layer (layer 2) of the OSI model.
Layer 3 switches (multilayer) process data at the network layer of 3 and
above.
Layer 4 switches allows for policy-based switching and are based on the
OSI "transport" layer. These switches limit different types of traffic on
specific end-user switch ports.
o The Layer 4 network switch does not work with unintelligent or
passive network devices such as hubs and repeaters.
LESSON 1.1

98-366 Networking Fundamentals

Open System Interconnection (OSI)


A way of subdividing a communications system into smaller parts
(called layers)
Layers are defined when services are provided to the layer above it and
receive services from the layer below it.
On each layer an instance provides services to the instances at the
layer above and requests service from the layer below.
A repeater is an electronic device that receives a signal and retransmits
it to the other side of an obstruction or to a higher level or at a higher
power so that the signal can cover greater distances.
LESSON 1.1

98-366 Networking Fundamentals

Transmission speed
Data are moved across a
communications channel at
different rates.
The rate is referred to as the
bandwidth.
LESSON 1.1

98-366 Networking Fundamentals

Data Transmission
A standard 10/100 Ethernet switch operates at the data-link layer of
the OSI model to create a different collision domain for each
switch port.
Ethernet is a family of frame-based computer networking
technologies for local area networks.
In the Ethernet networking protocol a collision domain is a
physical network segment where data packets can "collide" with
one another when being sent.
LESSON 1.1

98-366 Networking Fundamentals

A network collision is where one particular device sends a packet on a


network segment, forcing every other device on that same segment to
pay attention to it.
The hub runs in half duplex sharing bandwidth, resulting in collisions,
which would then necessitate retransmissions.
o A half duplex is a system where only one device can talk to another at
one timethey take turns talking.
Using a switch is called microsegmentation.
o Allows for dedicated bandwidth with every computer on point-to-
point connections
o Can run in full duplex with no collisions
LESSON 1.1

98-366 Networking Fundamentals

Cables
A straight-through cable has identical ends.
A crossover cable has different ends.
A PC can be connected to an uplink port with a crossover cable and
to a regular port with a straight-through cable.
LESSON 1.1

98-366 Networking Fundamentals

Uplink Speeds
Ethernet standards on uplink speeds are of 10Mbps, 100Mbps, 1000
Mbps/1Gbps, 10Gbps since switches come with autosensing in various
combinations.
The access switch members have an uplink module installed.
o There are two ports on each uplink module.
The uplinks are configured to act as trunk ports by connecting the access
switch with the distribution switch.
LESSON 1.1

98-366 Networking Fundamentals

Managed and Unmanaged Switches


An unmanaged switch is also called dumbit allows all traffic to
go through the network and the administrator has no control.
The system administrator can take control of the network with a
managed switch and allow ports to talk to other ports or none at all.
The switch's benefits over a hub include full bandwidth to each port
and methods to deal with collisions.
The ports are allowed to talk to the print server or the personal
computers.
A managed switch has its own IP address, and has a telnet and maybe
a web-based interface to monitor and secure access to each port on the
switch.
A managed switch can also be used to enable or disable specific ports
without unplugging a cable.
LESSON 1.1

98-366 Networking Fundamentals

A managed switch can have virtual LANS (VLANs), which separate


ports on a switch into different switches.
A managed switch can tell you about excessive usage on certain ports.
A managed switch can be used to limit the number of IP addresses
that one port can service.
LESSON 1.1

98-366 Networking Fundamentals

Virtual LAN (VLAN)


Allows a separate logical network connectivity from a physical
connectivity
Not limited by its physical connectivity
All users belong to a single broadcast domain and can communicate
with each other at the data link layer or layer 2.
Can be used to segment a complex network into smaller units for better
manageability, improved performance, and security
The ability to move is much simpler because of the dynamic nature of
VLANsno physical changes to network topology are necessary.
Security domains can be constructed to provide various levels of
security in the network.
LESSON 1.1

98-366 Networking Fundamentals

Virtual LAN using VLANs to create broadcast domains across switches


LESSON 1.1

98-366 Networking Fundamentals

Hubs vs. Switches

A hub is like an ordinary junction box and just passes


along what it receives to all the other ports
(connections) on the hub.
A switch is more intelligent and is selective about
where it passes data.
o It learns where certain equipment is located and passes
along the data only to the ports that need to receive it,
allowing multiple interactions at once.
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review
Directions to the student:

1. Complete NetFund_SA_2.1A
LE
ESSSSOO
N N2 . 11_. B1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand Switches
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn about:
Switches

Backplane speed
Hardware redundancy
Layer 2 and layer 3 switches
MAC table
Security options
Switching types
Support

Capabilities of hubs vs. switches


LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set
Recall what you learned about networking and switches.

1. Explain when you would use a hub rather than a switch


2. List reasons for using an unmanaged switch

Form a group of three and discuss your responses


LESSON 1.1

98-366 Networking Fundamentals

Switches
A switch is a network bridge that processes and routes data at the data
link layer (layer 2) of the OSI model.
Large switches have higher layer issues, router issues, backplanes,
security and redundancy.
Built-in or modular interfaces in large switches make it possible to
connect different types of networks, including Ethernet, Fiber Channel,
ATM, ITU-T G.hn and 802.11.
LESSON 1.1

98-366 Networking Fundamentals

Layer 2 Switch
Provides the same functionality as bridges
Learns and forwards frames on each port just like a multiport bridge
Multiple switching paths inside the switch can be active at the same
time.
Operates utilizing MAC addresses in its caching table to quickly pass
information from port to port.
LESSON 1.1

98-366 Networking Fundamentals


LESSON 1.1

98-366 Networking Fundamentals

Layer 3 Switch
Utilizes IP addresses to perform the functions as layer 2 switches
Are fast routers that do layer 3 forwarding in hardware
Because IP is the most common among all layer 3 protocols today,
most of the layer 3 switches perform IP switching at the hardware level
and forward the other protocols at layer 2 (bridge them).
LESSON 1.1

98-366 Networking Fundamentals

Bridging
Involves segmentation of local-area networks (LANs) at the Layer
2 level
A multiport bridge learns about the media access control (MAC)
addresses on each of its ports and transparently passes MAC
frames destined to those ports.
Ensures that frames destined for MAC addresses that lie on the
same port as the originating station are not forwarded to the other
ports
LESSON 1.1

98-366 Networking Fundamentals

Switch Security
Define virtual local area networks
Two basic steps:
1. Defining what users can see
2. Defining where they can connect
What you seeSecurity allows organizations to separate sensitive
clusters of systems from the rest of the network.
What you connectPort security is available on business-class
switches and some allow in-depth settings.
LESSON 1.1

98-366 Networking Fundamentals

Hardware Redundancy
Occurs when segment C is added to the network connecting switches
A and C
If one of the switches fails, the network will eliminate the point of
failure.
LESSON 1.1

98-366 Networking Fundamentals

Managed Switches
Provide support for the network through:
o Flexibility
o Security
o Reliability
o Expandability
Switches are supported by their manufacturer and with online manuals.
LESSON 1.1

98-366 Networking Fundamentals

Three Types of Switching


Circuit
Packet
Cell Relay

Circuit switching
Used in voice networks
Not an efficient method for routing any kind of data
Is wasted because no transmission is using the bandwidth of the circuit
100 percent of the time
In circuit failure during a transmission, the entire connection must be
re-established, which means the conversation must start over again.
LESSON 1.1

98-366 Networking Fundamentals

Packet Switching
Used in data networks
Has no dedicated circuits
Each circuit carries many transmissions at the same time.
Has the ability to route data units over any route
More reliable because if a particular circuit in the network
should fail, the routers in the network route data units
over different circuits.
The protocols have the ability to reassemble the data units
into their proper order.
LESSON 1.1

98-366 Networking Fundamentals

Switching Principles
Cell relay
Voice
Data transmission
The cell is the data unit.
Voice requires small data units.
o In order to support voice, the data units must be small so that they can
be processed quickly and sent through the network with minimal
delay.
o Whenever there is information to be transmitted, the switch simply
sends the data units.
Data favors large data units.
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

1. Why it is preferable to use a switch rather than a hub?


2. List reasons for using a managed switch versus an unmanaged switch.
LESSON 21 . 2
1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand Routers
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn about:
Directly connected static routes
Dynamic routes (routing protocols)
Default routes, NAT, RRAS
Routing tables
Routing protocol
Routing in Windows Server
Transmission speed considerations
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set

Be creative and think about what a route means to you and what
controls your route through life. There is probably a router telling you
what to do such as a traffic light that tells you to go, slow down, or
stop.
Give other examples of routers and their applications that you have
encountered
Share your answers with two others. Does everyone have router
experiences?
Begin brainstorming how you would use a router in the computer
industry
LESSON 1.1

98-366 Networking Fundamentals

Routers
A device that selectively interchanges packets of data in two or more
computer networks while connecting the networks
Connected to at least two networks, generally two LANs or WANs or a
LAN and its ISP's network
Wireless routers provide everything that a wired router provides,
including ports for Ethernet connections and the attributes for wireless
security such as Wi-Fi Protected Access (WPA) and wireless MAC
address filtering.
Many wireless routers can be configured for "invisible mode" so that
your wireless network cannot be scanned by outside wireless clients.
LESSON 1.1

98-366 Networking Fundamentals

Data can be transmitted through the router from place to place at a


measured kilobits transmission speed called the bandwidth .
Each interface on a router will impact overall performance, especially
WAN connections.
Data rate and data speed are the same in terms of transmission speed.
Compared to data transmission, bandwidth or "capacity" means how
wide the pipe is and how quickly the bits can be sent.
These "speeds" are aggregate speeds. The data on the multiple signal
channels are assigned by channel for different uses.
Data transmission speed (or bandwidth) is measured in kilobits, 1,000s
of bits per second, or megabits, Mbps, millions of bits per second.
Because of software and protocols, actual transfers are considerably
lower.
LESSON 1.1

98-366 Networking Fundamentals

Routing
A routing protocol is applied when passing data from one subnet
(interface) to another subnet.
When determining which route is preferable, directly connected
networks have the highest priority, followed by static routes, and
then other routes.
If a corresponding interface command is contained under the router
configuration stanza of that protocol, it is are advertised by IGP
routing protocols, which are directly connected networks.
IGPInterior gateway protocol describes the fact that each system
on the Internet can choose its own routing protocol.
LESSON 1.1

98-366 Networking Fundamentals

Static Routing
The process of manually entering routes into the routing table through
a configuration file that is loaded when the routing device starts up
Static routes are manually configured and cached when a router starts
up and dont change unless a user changes them.
Static routing does not handle down connections well because they
must be reconfigured manually to repair any lost connectivity.
Does not work well when the routing information has to be changed or
needs to be configured on a large number of routing devices.
LESSON 1.1

98-366 Networking Fundamentals

Dynamic Routing Protocols


Software applications that dynamically discover network destinations
and how to get to them
Have the ability to adapt to logical network topology changes,
equipment failures, or network outages.
1. A router will learn routes to all directly connected networks first.
2. Secondly it will learn routes from other routers that run the same
routing protocol.
3. Next the router sorts through its list of routes and selects one or more
best routes for each network destination it knows or has learned.
4. Finally, dynamic protocols will distribute this best route information
to other routers running the same routing protocol.
LESSON 1.1

98-366 Networking Fundamentals

Routing Table
Routing Information Base (RIB) is an electronic table (file) or that
is stored in a networked computer or a router.
The routes to network destinations are stored in the routing table.
The function of the routing protocols and static routes is to create
the routing tables.
The most specific route to the destination IP address is the longest
matching route.
The router uses the lowest metric to select the best route when
multiples occur.
The router is free to choose which table entry to use if multiple
entries exist that are the longest match and the lowest metric.
LESSON 1.1

98-366 Networking Fundamentals

TCP/IP network routers use the routing table to calculate the


destinations of messages it is responsible for forwarding.
A computer must have an IP address to communicate with other
computers and servers on the Internet.
An IP address (Internet protocol) is a unique 32-bit number that
identifies the location of your computer on a network.
With the growth of the Internet and increased use, the number of
available IP addresses is not enoughredesign for the address format
to allow for more possible addresses is being developed (IPv6) and it
will require modification of the entire infrastructure of the Internet.
LESSON 1.1

98-366 Networking Fundamentals

The network address translation (NAT) is the process of modifying


network address information while in transit across a traffic routing
device.
LESSON 1.1

98-366 Networking Fundamentals

Routing and Remote Access in Windows Server


Routing and remote access service (RRAS) in Windows Server
supports remote user or site-to-site connectivity.
RRAS is an open platform for routing and networking.
By using secure VPN connections, routing services are provided to
businesses in LAN and WAN environments or over the Internet.
Routing is used for multiprotocol LAN-to-LAN, LAN-to-WAN, VPN,
and network address translation (NAT) routing services.
By using RRAS, VPN connections can be deployed to provide end
users with remote access to your organization's network.
A site-to-site VPN connection between two servers at different
locations can also be created.
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

1. Complete NetFund_SA_2.2
2. Exchange papers and check the answers as the teacher
reviews them
LEESSSSOO
L N N2 . 31 _. A1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand Media Types


Part 1
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn information about:

Network media types


Cable types and their characteristics
Fiber optics
Susceptibility to external interference
Susceptibility to electricity
Susceptibility to interception
LESSON 1.1

98-366 Networking Fundamentals

Activating prior knowledge


1. Compare these 2 images of cables.
2. Discuss the implications of each in your small group.
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set
Network Media types
Media is the actual physical environment through which data travels as
it moves from one component to another and connects network devices.
Two categories of Media are cable network and wireless network.
To determine what transmission media is right for particular networking
environment you need to consider:
o Required throughput
o Cabling distance
o Noise resistance
o Security
o Flexibility
o Plans for growth
LESSON 1.1

98-366 Networking Fundamentals

Common Network Cable Media


Twisted-pair cable (shielded, unshielded, stranded copper, solid core
copper)
Coaxial cable and RFI
Fiber-optic cable
Wireless
LESSON 1.1

98-366 Networking Fundamentals

Twisted pair cables


Available unshielded (UTP) or shielded (STP)
STP is used in noisy environments where the shield is around each of
the wire pairs, plus an overall shield protects against excessive
electromagnetic interference.
A variation of STP, known as ScTP for "screened twisted pair" or FTP
for "foil twisted pair," uses only the overall shield and provides more
protection than UTP, but not as much as STP.
Both UTP and STP come in Stranded and Solid wire.
o The stranded copper wire is very flexible.
o Solid wire cable has less attenuation and can span longer distances.
LESSON 1.1

98-366 Networking Fundamentals


LESSON 1.1

98-366 Networking Fundamentals

Coaxial cables
Were the first cables used in Ethernet networks.
Consists of an insulator that separates the braided inner conductor and
the outer conductor, which is a woven copper braid
Commonly used for cable TV connections and10 Base5 and 10 Base2
Ethernet networks.
Coaxial Thinnet supports a maximum segment length of 185 meters, is
less costly and easier to install
Coaxial Thicknet can send signals up to 500 meters, is costlier and
demands more efforts in installation
The transmission speed these cables provide is between 2.5 Mbps and
10 Mbps.
Coaxial cables are more resistant to EMI than the UTP cable, because
of greater insulation to external interference.
LESSON 1.1

98-366 Networking Fundamentals

Fiber Optics
Cables are made up of glass or other light transmitting material.
Transmit data in the form of light
A reflective coating that allows light beams to travel without outer
interference covers the glass cable.
The advantages:
o Faster
o Very long distances without the risk of outer interference
At one end of the fiber optics system is a transmitter that accepts
coded electronic pulse data coming from copper wire.
The information is processed and translated into equivalently
coded light pulses.
A light-emitting diode (LED) or an injection-laser diode (ILD)
can be used for generating the light pulses.
LESSON 1.1

98-366 Networking Fundamentals

Fiber optic cable construction has these elements: core, cladding,


coating, strengthening fibers, and a cable jacket.
The center is glass fiber, the second ring is a fiber coating, and third ring
is a thermoplastic over coating or buffer, the fourth ring is an Aramid
strength member and the last ring has a PVC jacket or a fluoride co-
polymer jacket.
LESSON 1.1

98-366 Networking Fundamentals

Single mode fiber (SMF) optic cable and multi-mode fiber (MMF):
o SMF supports high-speed LAN covering long distances and WAN
spread over different buildings or cities.
o Used in 10GBase-LR Ethernet specification, which runs at the speed of
10 Gbps and allows only one mode of light to transmit.
The multi-mode fiber (MMF) optic cable :
o Used for high-speed networks spread over short distances
o Used for 10GBase-SR Ethernet standard that supports the transmission
speed of 10 Gbps, it allows the light signals to travel in more than one
path
o Less costly than the SMF cable
LESSON 1.1

98-366 Networking Fundamentals

Wireless communication
The transfer of information over a distance without the
use of physical media
The distances involved may be short (a few meters as in
television remote control) or long (thousands or
millions of kilometers for radio communications)
Wireless communication is considered to be a branch of
telecommunications
LESSON 1.1

98-366 Networking Fundamentals

External Interference
Interference in telecommunication and electronics refers to anything
that alters, modifies, or disrupts a message as it travels along a channel
between a source and a receiver.
External susceptibility comes from machinery and power cables.
Tightly strapped cabling often causes interference from motors and
solenoids jumping over to the signal cabling and disturbing sensors.
o Jumping occurs when the high current can cause the rapid release
of large volumes of hydrogen, which can be ignited by a nearby
spark.
See examples of external interference from equipment and cables at
www.qedata.se/e_emi_bakgrund.htm.
LESSON 1.1

98-366 Networking Fundamentals

Electromagnetic interference (EMI)


Undesirable electromagnetic emission or any electrical or electronic
disturbance.
EMI can be man-made or natural and interrupts, obstructs, or otherwise
degrades or limits the effective performance of electronics and electrical
equipment.
The source may be any object, artificial or natural, that carries rapidly
changing electrical currents, such as an electrical circuit, the Sun or the
Northern Lights.
LESSON 1.1

98-366 Networking Fundamentals

Twisted pairs susceptibility to electromagnetic interference greatly


depends on the pair twisting schemes staying intact during the
installation.
As a result, twisted pair cables usually have stringent requirements
for maximum pulling tension as well as minimum bend radius.
The fragility of twisted pair cables makes installation practices an
important part of ensuring the cables performance.
LESSON 1.1

98-366 Networking Fundamentals

Interception
Data communication equipment emits modulated signals that carry
information that an eavesdropper or hacker can intercept.
o It is completely undetectable, requires little apparatus, and can be
done at a considerable distance.
Like fiber optics but without the fiber, LED indicators act as little free-
space optical data transmitters.
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

Create a list of the networks in your home, school, or place of work.


Speculate about the types of interference susceptibility that each might
be vulnerable to.
Compare your ideas with your partner.
LE
ESSSSOO
N N2 . 31_. B1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand Network
Media Types
Part 2
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn information about:

Cabling
Category 5e cable
Coaxial cable
RJ-45
Thicknet cable
Thinnet coaxial cable
Twisted pair shielded cable
Unshielded cable
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set

1. Recall what you learned about cables yesterday.


2. On paper list everything you remember about twisted pair cables.
3. Share your answers in a group and present to the class if time allows.
LESSON 1.1

98-366 Networking Fundamentals

Preparing for a Class Activity


Students will make a cable at the end of this review using a
category 5 cable and RJ-45 terminators.
Keep notes on the demonstration and presentation for your cable
making.
LESSON 1.1

98-366 Networking Fundamentals

Unshielded twisted pair cable (UTP)


8 individual copper wires covered by an insulating material
Used for many different networks.

The copper wire is color-coded plastic insulation and they are twisted
in pairs. It is all covered with an outer jacket.
LESSON 1.1

98-366 Networking Fundamentals

UTP is the most common form of twisted pair wiring.


It is less expensive and easier to work with than STP.
It is used in Ethernet 10Base-T and 100Base-T networks, as well as
in home and office telephone wiring.
Two insulated copper wires are twisted around each other to decrease
crosstalk or electromagnetic induction between pairs of wires.
Every signal on a twisted pair involves both the wires.
Twisted pair is installed in two or more pairs, all within a single
cable, to offer multiple connections to computers.
UTP cable is typically installed using a registered jack 45 (RJ-45)
connector.
The RJ-45 is an eight-wire connector used commonly to connect
computers onto a local area network (LAN), especially Ethernets.
LESSON 1.1

98-366 Networking Fundamentals

Types of UTP Cabling


Category 1Used for telephone communications
Category 2Data speed at 4 Mbps per second
Category 3Speeds of 10 Mbps, used for 10BASE-T
Category 4For Token Ring transmit data at 16 Mbps
Category 5Can transmit data at speeds up to 100 Mbps
Category 5e Used in networks running at speeds up to 1000 Mbps (1
gigabit per second [Gbps])
Category 6Consists of four pairs of 24 American wire gauge (AWG)
copper wires and fastest standard for UTP
LESSON 1.1

98-366 Networking Fundamentals

Shielded twisted-pair (STP)


Used in Ethernet networking and has shielding, cancellation, and wire
twisting with each pair of wires wrapped in a metallic foil
The four pairs of wires are wrapped in an overall metallic braid or foil,
generally 150-ohm cable.
LESSON 1.1

98-366 Networking Fundamentals

Because of its cost and difficulty with termination, STP is rarely used
in Ethernet networks.
STP is primarily used in Europe.
Because most buildings are already wired with UTP, many
transmission standards are adapted to use it, to avoid costly rewiring
with an alternative cable type.
UTP and STP are not used together.
LESSON 1.1

98-366 Networking Fundamentals

Coaxial cable
Made of a hollow outer cylindrical conductor surrounding a single inner
wire made of two conducting elements
One element in the center of the cable is a copper conductor.
A layer of flexible insulation surrounds the copper conductor.
Over the insulation is a metallic foil or woven copper braid acting as both
the second wire in the circuit and a shield for the inner conductor .
This second layer/shield helps reduce the amount of outside interference.
LESSON 1.1

98-366 Networking Fundamentals

Coaxial cable can be cheaper for a physical bus topology because less
cable will be needed.
It is more costly than UTP on a per-unit length and is relatively
inexpensive.
Coaxial cable is less expensive than fiber optic cable.
Can be used over longer distances than twisted-pair cable
Ethernet can run approximately 100 meters using twisted-pair cabling.
Using coaxial cable increases this distance to 500 meters.
Can be run with fewer boosts from repeaters for longer distances
between network nodes than either STP or UTP cable
LESSON 1.1

98-366 Networking Fundamentals

Wireless communication
Uses radio frequencies (RF) or infrared (IR) waves to transmit data
between devices on a LAN
Wireless signals are electromagnetic waves that can travel through the
vacuum of outer space and through a medium such as air.
A key module is the wireless hub for distributing signals through the
wireless LAN.
A computer can have a wireless adapter card (wireless NIC) installed to
receive the signals from the access point.
LESSON 1.1

98-366 Networking Fundamentals

Applications of wireless data communication


Accessing the Internet using a cellular phone
Establishing Internet connection over satellite
Beaming data between two handheld computing devices
Wireless keyboard and mouse for the PC
Wireless LAN (WLAN) use radio waves (902 MHz)
Microwaves (2.4 GHz)
IR waves (820 nanometers [nm]) for communication
LESSON 1.1

98-366 Networking Fundamentals

Wireless
Distribution
LESSON 1.1

98-366 Networking Fundamentals


LESSON 1.1

98-366 Networking Fundamentals

Demonstration and Class Activity Preparation


Unshielded twisted pair cable (UTP) cable has eight individual copper
wires covered by an insulating material; used for many different
networks.

The copper wire is color-coded plastic insulation and the wires are
twisted in pairs. It is all covered with an outer jacket.
LESSON 1.1

98-366 Networking Fundamentals

Color coding of wiring pairs


LESSON 1.1

98-366 Networking Fundamentals

Network Cabling Standards


The Electronic Industries Alliance (EIA) developed standards in 1991
for the cabling used in telecommunications applications.
In 1995 it was updated by the EIA and later replaced with the current
TIA/EIA 568-B standard.
LESSON 1.1

98-366 Networking Fundamentals

T568A and T568B


Based on TIA/EIA-568-B.1-2001, the wiring schemes define the
pin out, or order of connections, for wires in eight-pin modular
connector plugs and jacks.
LESSON 1.1

98-366 Networking Fundamentals

The wiring assignments in the RJ-45 plug are important. A colored


wire must be placed in a specific pin location in the plug in order
for the cable to meet the standard.
It is these wiring assignments that differ between the T568A and
T568B standard.
The only difference between T568A and T568B is that pairs 2 and
3 (orange and green) are swapped.
Both configurations wire the pins "straight through," i.e., pins 1
through 8 on one end are connected to pins 1 through 8 on the
other end.
The same sets of pins are paired in both configurations: pins 1 and
2 form a pair, as do 3 and 6, 4 and 5, and 7 and 8.
LESSON 1.1

98-366 Networking Fundamentals

Cable Termination
Cables that are terminated with differing standards on each end will not
function normally.
Standard RJ-45 pinouts describe the arrangement of the individual
wires required when connecting connectors to a cable.
RJ-45 is the standard connector for 10Base-T/100Base-TX Ethernet,
ISDN, T1, and modern digital telephone systems.
LESSON 1.1

98-366 Networking Fundamentals

Demonstration Steps
1. The pins on the RJ-45 plug are numbered 1 to 8.
2. Hold a CAT 5 patch cable in your hand, as if inserting into a jack, with
the contacts facing in the up position; pin 1 will be on the far left.
3. Pin 8 will be the pin on the far right. We follow this orientation when we
define the wiring assignments in the RJ-45 plug.
4. CAT 5 Cable has four twisted pairs within the sheath. Each pair has a
specific color code, and is placed into deliberate pin location within the
RJ-45 plug.
5. In constructing the cable, use identical pin assignments on each end as
the 568-B standard is used in the United States.
LESSON 1.1

98-366 Networking Fundamentals

Deciding to use T568 A or T568 B


1. If the installation is residential, choose T568A unless other
conditions apply.
2. If there is preexisting voice/data wiring (remodel, moves, adds,
changes), duplicate this wiring scheme on any new connection.
3. If project specifications are available, use the specified wiring
configuration.
4. If components used within the project are internally wired either
T568A or T568B, duplicate this wiring scheme.

Circulate and carefully inspect the finished demonstration cable.


LESSON 1.1

98-366 Networking Fundamentals

Student Activity 2.3_B

1. Group in pairs so each person can attach an RJ-45 end to the category
5e cable.
2. View the YouTube video on making a patch cord with RJ-45
terminators and a category 5e cable wire.
http://www.youtube.com/watch?v=482VtesZwZ8
3. Complete Student Activity 2.3_B with a partner to construct a cable
using the materials provided.
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review
1. Test the cable.
2. Analyze and correct any problems.
3. Detail the testing and correcting process in a written report.
4. Submit to your instructor.
LE
ESSSSOO
N N3 . 11_. A1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand the OSI Model


Part 1
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn about:

Internetwork
IETF
ISO/OSI
ITU-T
Protocols
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set
1. Problem: Personal computer use and the Internet have grown very
quickly. Corporations and educational users are developing large
networks and individuals access the Internet in huge numbers. There
is no pattern or organization, and networks have developed without
planning.

2. Assignment: Think about how you might resolve the complicated


issues that have arisen. List some of your ideas for unclogging and
making the Internet smoother for corporations, educational
institutions, and individuals.
LESSON 1.1

98-366 Networking Fundamentals

Internetwork
A collection of individual networks, connected by intermediate
networking devices, that functions as a single large network
Formed from different kinds of network technologies that can be
interconnected by routers and other networking devices
Offers a solution to three key problems:
o Isolated LANs
o Duplication of resources
o A lack of network management
Many issues including configuration, security, redundancy, reliability,
centralization, and performance, must be adequately dealt with for the
internetwork to function smoothly.
LESSON 1.1

98-366 Networking Fundamentals

ISO (International Organization for Standardization)


The world's largest developer and publisher of International Standards.
ISO is now considered the primary architectural model for
intercomputer communications.
OSI (Open System Interconnection model)
Defines a networking framework for implementing protocols in seven
layers
ITU-T (International Telecommunications Union-Telecommunication)
The standardization division of the ITU that develops communications
recommendations for all analog and digital communications
IETF (Internet Engineering Task Force)
Charged with studying technical problems facing the Internet and
proposing solutions to the Internet Architecture Board ; the standards
agency for TCP/IP
LESSON 1.1

98-366 Networking Fundamentals

Open System Interconnection (OSI) Reference


Model
How information from a software
application in one computer moves
through a network medium to a
software application in another
computer.
In the International Organization for
Standardization Open Systems
Interconnection (ISO/OSI) model
for network communications, WNet
functions operate across the
presentation and session layers.
LESSON 1.1

98-366 Networking Fundamentals

The data enter as they transmit, going down the seven layers, and exit as
they are received at the right, going up the layers.

Image courtesy of The Abdus Salam International Centre for Theoretical Physics.
LESSON 1.1

98-366 Networking Fundamentals

Characteristics of the OSI Layers


Each of the seven layers of the OSI reference model can be divided into
two categories: upper layers and lower layers.
Application issues implemented only in software is part of the upper
layer of the OSI model. It is the highest layer and closest to the end
user.
Software applications that contain a communications component are
used both by the users and the application layer process.
LESSON 1.1

98-366 Networking Fundamentals

Protocols
A set of rules that direct the way computers exchange information
Communication protocols enable communication and execute the
functions of one or more of the OSI layers.
o At the physical and data link layers of the OSI model LAN
protocols define communication over the various LAN media.
o At the lowest three layers of the OSI model WAN protocols define
communication over the various wide-area media.
o Routing protocols control the exchange of information between
routers so that the routers can select the proper path for traffic.
o Network protocols apply to various upper-layer protocols.
LESSON 1.1

98-366 Networking Fundamentals

OSI Model and Communication Between Systems


The OSI layers are where information being transferred from a software
application in one computer system to a software application in another
must pass.
The application layer then passes the information to the presentation layer
(Layer 6), which sends the data to the session layer (Layer 5), and so on
down to the physical layer (Layer 1).
At the physical layer, the data are placed on the physical network medium
and are relayed across the medium to System 2.
The physical layer of System 2 removes the data from the physical
medium, and then passes the information up to the data link layer (Layer
2), which passes it to the network layer (Layer 3), and so on, until it
reaches the application layer (Layer 7) of System 2.
Lastly, the application layer of System 2 passes the data to the recipient
application to complete the communication process.
LESSON 1.1

98-366 Networking Fundamentals

Interaction Between OSI Model Layers


A specified layer in the OSI model generally communicates with
three other OSI layers:
o the layer directly above it
o the layer directly below it
o its peer layer in other networked computer systems
The data link layer in System 1, communicates with the network
layer of System 1, the physical layer of System 1, and the data link
layer in System 2.
LESSON 1.1

98-366 Networking Fundamentals

OSI Layer Services


One OSI layer communicates with another layer to make use of
the services provided by the second layer.
The services provided by adjacent layers help a given OSI layer
communicate with its peer layer in other computer systems.
Three basic elements are involved in layer services:
1. The service userLayer that requests services from the
next OSI layer
2. The service provider Layer that provides services to
service users
3. The service access point (SAP) Intangible place at which
one OSI layer can request the services of another layer.
LESSON 1.1

98-366 Networking Fundamentals

Encapsulation
The OSI Model Layers and Information Exchange is done by the use
of communication control to communicate with the peer layers in
other computer systems and consists of specific requests and
instructions that are exchanged between peer OSI layers.
The data portion of an information unit at a stated OSI layer can
contain headers that have been passed down from upper layers.
The data that has been passed down from upper layers are appended to
trailers.
The data portion of an information unit at a given OSI layer can
contain headers, trailers, and data from all the higher layers. This is
known as encapsulation.
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

Student ActivityNetFund_SA_3.1_A
Understanding Protocols and Services
LESSON 1.1

98-366 Networking Fundamentals

Class Activity:
How well do you really know the OSI networking model?
1. Test yourself with our OSI Model game.
http://www.gocertify.com/games/osi-game.shtml
2. Complete the review at the end of each game and
record any missed questions with the correct answer
to either turn in or discuss with the whole class.
LE
ESSSSOO
N N3 . 11_. B1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand the OSI Model


Part 2
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn information about:
Frames
Packets
Segments
TCP
TCP/IP Model
Well-known ports for most-used purposes
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set

Review and discuss the role of the following items in OSI:


application presentation
session transport
network data link
physical

If you complete the work, you may review the OSI Networking Game

http://www.gocertify.com/games/osi-game.shtml
LESSON 1.1

98-366 Networking Fundamentals

The Internet Protocol Suite


Includes Transmission Control Protocol (TCP) and Internet Protocol
(IP) and is referred to as TCP/IP model.
Defines general guidelines and implementations of specific networking
protocols to enable computers to communicate over a network for common
applications (electronic mail, terminal emulation, and file transfer)
Each layer of the TCP/IP model corresponds to layers of the seven-layer
OSI reference model proposed by the ISO.
Ipsec (Internet Protocol Security) is a dual mode, end-to-end, security
scheme operating at the Internet Layer of the Internet Protocol Suite or
OSI model Layer 3.
LESSON 1.1

98-366 Networking Fundamentals


The TCP/IP is shown in relation to the OSI
seven layers.

TCP delivers an unstructured stream of


bytes identified by sequence numbers
with stream data transfer.
LESSON 1.1

98-366 Networking Fundamentals

TCP/IP
Provides end-to-end connectivity specifying how data should be
formatted, addressed, transmitted, routed, and received
Protocols exist for a variety of communication services between
computers.
The layers near the top are closer to user application, the layers near
the bottom are closer to the physical transmission of the data.
Viewing layers as providing or consuming a service is a method of
abstraction to isolate upper layer protocols.
The lower layers avoid having to know the details of each and every
application and its protocol.
LESSON 1.1

98-366 Networking Fundamentals

Transmission Control Protocol (TCP)


Assembles bytes into segments and passes to IP for delivery
Provides end-to-end reliable packet delivery through an internetwork
Mechanisms deal with lost, delayed, duplicate, or misread packets.
Time-out mechanisms detect lost packets and request retransmission.
Provides proficient flow control.
o When sending responses back to the source, the receiving TCP process
indicates the highest sequence number it can receive without
overflowing its internal buffers.
Full-duplex operation processes can both send and receive at the same
time.
o Multiplexing means that numerous concurrent upper-layer
conversations can be occurring over a single connection.
LESSON 1.1

98-366 Networking Fundamentals

Each host on a TCP/IP network is assigned a unique 32-bit logical


address that is divided into two main parts:
1. Network number identifies a network and must be assigned by
the Internet Network Information Center (InterNIC) if the network
is to be part of the Internet
2. Host number identifies a host on a network and is assigned by the
local network administrator
LESSON 1.1

98-366 Networking Fundamentals

Internet Protocol (IP)


A network layer (Layer 3) protocol that contains addressing information
and some control information that enables packets to be routed
IP is documented in RFC 791 Request For Comments for Internet
Protocol, the specification for how traffic travels over the internet and is
the primary network layer protocol in the Internet protocol suite
Allows large data transfer so file applications do not have to cut data into
blocks
LESSON 1.1

98-366 Networking Fundamentals

Well-Known Ports
Most services work with TCP/IP by configuring the
server to use a well-known port number.
The client connects from a random high port.
Most of these well-known ports are port numbers below
1,024.
TCP/IP port assignments on Windows are stored in the
\%systemroot%\System32\drivers\etc\services file.
LESSON 1.1

98-366 Networking Fundamentals

Examples of known services and ports


FTP 20,21 data transfer
SSH 22 secure shell
telnet 23 telnet protocol
DNS 53 domain name service
SMTP 25 simple mail transfer protocol
DHCP 67,68 dynamic host configuration protocol
TFTP 69 trivial file transfer protocol
HTTP 80 hypertext transfer protocol
POP2/3 109, 110 post office protocol 2, 3
NNTP 119 network news transfer protocol
IMAP4 143 internet message access protocol
HTTPS 443 hypertext transfer protocol over SSL/TLS
LESSON 1.1

98-366 Networking Fundamentals

User Datagram Protocol (UDP)


Part of the Internet Protocol suite
Programs running on different computers on a network
can send short messages known as datagrams to one
another.
A datagram is a self-sufficient and self-contained message
sent through the network whose arrival, arrival time, and
content are not guaranteed.
UDP can be used in networks where TCP is traditionally
implemented but is not reliable.
Datagrams may go missing without notice, or arrive in a
different order from the one in which they were sent.
LESSON 1.1

98-366 Networking Fundamentals

IP responsibilities in UDP
1. Provide connectionless delivery of datagrams
2. Provide fragmentation and reassembly of datagrams to support data links
with different maximum-transmission unit (MTU) sizes
o The maximum transmission unit (MTU) of a communications
protocol of a layer is the size in bytes of the largest protocol data
unit that the layer can pass onward; a packet is encapsulated into one
or more frames, depending upon the MTU size.
LESSON 1.1

98-366 Networking Fundamentals

IP Packets
All IP packets are structured the same way an IP header followed by a
variable-length data field.
There are 14 fields in an IP packet header.
LESSON 1.1

98-366 Networking Fundamentals

A packet and a frame are both packages of data moving through a


network.
A packet exists at Layer 3 of the OSI Model, a frame exists at Layer 2
of the OSI Model.
Layer 2 is the Data Link Layer the best-known protocol in this
layer is Ethernet.
Layer 3 is the Network Layer the best-known protocol in this layer
is IP (Internet Protocol).
The TCP segment, encapsulates all higher level protocols above it, a
segment at the transport layer and the TCP counterparts for these
three items.
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

Complete Student Activity NetFund_SA_3.1_B.


LESSON 31 . 2
1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand IPv4
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn about:
APIPA
addressing
classful IP addressing and classless IP addressing
gateway
IPv4
local loopback IP
NAT
network classes
reserved address ranges for local use
subnetting
static IP
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set

1. Write the address range and broadcast address for the following subnet:
Subnet: 192.168.1.128 / 255.255.255.224
Address Range?
Subnet Broadcast Address?

2. Check your answer with those provided by the instructor. If it is


different, review the method of how you derived the answer with your
group and correct your understanding.
LESSON 1.1

98-366 Networking Fundamentals

IPv4
A connectionless protocol for use on packet-switched Link Layer
networks like the Ethernet
At the core of standards-based internetworking methods of the Internet
Network addressing architecture redesign is underway via classful
network design, Classless Inter-Domain Routing, and network address
translation (NAT) .
Microsoft Windows uses TCP/IP for IP version 4 (a networking
protocol suite) to communicate over the Internet with other computers.
It interacts with Windows naming services like WINS and security
technologies.
IPsec helps facilitate the successful and secure transfer of IP packets
between computers.
An IPv4 address shortage has been developing.
LESSON 1.1

98-366 Networking Fundamentals

Network Classes
Provide a method for interacting with the network
All networks have different sizes so IP address space is divided in
different classes to meet different requirements.
Each class fixes a boundary between the network prefix and the host
within the 32-bit address.
LESSON 1.1

98-366 Networking Fundamentals

Classful Network
Divides the address space for Internet Protocol Version 4 (IPv4) into
five address classes
Each class, coded in the first four bits of the address, defines a different
network size or a different network type.
Design for IPv4 sized the network address as one or more 8-bit
groups, resulting in the blocks of Class A, B, or C addresses.
LESSON 1.1

98-366 Networking Fundamentals

Classless Interdomain Routing (CIDR)


A tactic of assigning IP addresses and routing Internet Protocol
packets
Allocates address space to Internet service providers and end users on
any address bit boundary, instead of on 8-bit segments
IP addresses consist of two groups of bits in the address:
1. Most significant part is the network address, which identifies a
whole network or subnet
2. Least significant part is the host identifier, which specifies a
particular host interface on that network
LESSON 1.1

98-366 Networking Fundamentals

Under supernetting, the classful subnet masks are extended so that a


network address and subnet mask could specify multiple Class C subnets
with one address.
For example, if 1,000 addresses were needed, 4 Class C networks could
be supernetted together:

The subnet 192.60.128.0 includes all the addresses from 192.60.128.0 to


192.60.131.255.
LESSON 1.1

98-366 Networking Fundamentals

IPv4 Addresses
Usually written in dot-decimal notation of four octets of the address
expressed in decimals and separated by periods
Base format used in the conversion table. Each octet can be of any of
the different bases
LESSON 1.1

98-366 Networking Fundamentals

Reserved IP Addresses
Three ranges of address are
reserved for private networks.
Ranges are not routable outside of
private networks.
Private machines cannot directly
communicate with public
networks.
Internet Assigned Numbers
Authority (IANA) reserved three
blocks of IP address space for
private internets.
Confusion results because
different authorities name different
IP numbers for different addresses.
LESSON 1.1

98-366 Networking Fundamentals

IANA Reserved Blocks


LESSON 1.1

98-366 Networking Fundamentals

Automatic Private IP Addressing (APIPA)


When the address block was reserved, no standards existed for
mechanisms of address auto-configuration.
Filling the void, Microsoft created APIPA implementation.
APIPA will automatically assign an Internet Protocol address to a
computer on which it is installed.
APIPA has been deployed on millions of machines and has become a de
facto standard in the industry.
IETF defined a formal standard for this functionality, RFC 3927,
entitled Dynamic Configuration of IPv4 Link-Local Addresses.
LESSON 1.1

98-366 Networking Fundamentals

Localhost
The address range 127.0.0.0127.255.255.255 is reserved for localhost
communication (127.0.0.0/8 in CIDR notation).
Addresses within this range should never appear outside a host
computer and packets sent to this address.
Addresses are returned as incoming packets on the same virtual
network device (known as loopback).
Loopback or Localhost 127.0.0.0 (or 127/8) should not be used as an
address for any station; it is used to ping yourself.
LESSON 1.1

98-366 Networking Fundamentals

Broadcast Address
An address that allows information to be sent to all machines on a given
subnet
Found by obtaining the bit complement of the subnet mask and
performing a bitwise OR operation with the network identifier
Example: To broadcast a packet to an entire IPv4 subnet using the
private IP address space 172.16.0.0/12 (subnet mask 255.240.0.0), the
broadcast address is 172.31.255.255.
LESSON 1.1

98-366 Networking Fundamentals

On a Class A, B, or C subnet, the broadcast address always ends in 255.


Today, there are several driving forces for the acceleration of IPv4
address exhaustion:
o Mobile devices
o Always-on devices
o Rapidly growing number of Internet users
LESSON 1.1

98-366 Networking Fundamentals

A Gateway Computer Program


A link between two computer programs allowing them to share
information and bypass certain protocols on a host computer
A telecommunications gateway is a computer or a network that allows
or controls access to another computer or network.
A default gateway is a way out of the subnet and it is also known as a
router.
All traffic that needs to be routed out of the subnet is done through the
hosts routing tables.
LESSON 1.1

98-366 Networking Fundamentals

Static vs. Dynamic IP Addresses


Static IP address
o When a computer is configured to use the same IP address every time
it powers up
o Manually assigned to a computer by an administrator
Dynamic IP address
o When the computer's IP address is set automatically
o Assigned either by the computer interface or host software itself, as in
Zeroconf, or assigned by a server using Dynamic Host Configuration
Protocol (DHCP)
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review
Complete Student Activity NetFund_SA_3.2
LEESSSSOO
L N N3 . 31 _. A1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand IPv6
Part 1
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn about:

Addressing

Dual IP stack
Gateway

IPv6

ipv4toipv6 tunneling protocols to ensure backwards compatibility


LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set

Explain why IPv4 is typically insufficient and why IPv6 is more useful.

Form groups of three to discuss your answers.


LESSON 1.1

98-366 Networking Fundamentals

Tunneling Protocol
Used by computer networks when the delivery network protocol
encapsulates a different payload protocol
Teredo
o A tunneling protocol intended to grant IPv6 connectivity to nodes that
are located behind IPv6-unaware NAT devices.
o Identifies a way of encapsulating IPv6 packets within IPv4 UDP
datagrams that can be routed through NAT devices and on the IPv4
internet.
o 6to4 is an Internet conversion mechanism for migrating from IPv4 to
IPv6, a system that allows IPv6 packets to be transmitted over an IPv4
network with no need to configure explicit tunnels.

Special relay servers are also in place that permit 6to4 networks to
communicate with native IPv6 networks.
LESSON 1.1

98-366 Networking Fundamentals

IPv6 has all zeroes for the middle 16 bits; thus, they start off with a string of 96
zeroes, followed by the IPv4 address.
LESSON 1.1

98-366 Networking Fundamentals

ISATAP
Intra-Site Automatic Tunnel Addressing Protocol
An IPv6 transition mechanism meant to transmit IPv6 packets between
dual-stack nodes on top of an IPv4 network
o Uses IPv4 as a virtual nonbroadcast multiple-access network (NBMA)
data link layer, so that it does not require the underlying IPv4 network
infrastructure to support multicast.
o The IP6_ADDRESS structure stores an IPv6 address and the IPv6
subnet size has been standardized by fixing the size of the host
identifier portion of an address to 64 bits to assist an automatic
mechanism for forming the host identifier from Link Layer media
addressing information (MAC address).
LESSON 1.1

98-366 Networking Fundamentals

Dual IP Stack
Special addresses assigned to IPv6-capable
devices speak both IPv4 and IPv6.
Dual Stack Architecture involves
running IPv4 and IPv6 at the same time
where end nodes and routers/switches run
both protocols.
If IPv6 communication is possible that is
the preferred protocol.
Windows uses a dual-stack architecture as
shown here.
LESSON 1.1

98-366 Networking Fundamentals

Dual IP Stack (continued)


A common dual-stack migration strategy used to create the transition from
the core to the edge
Enables two TCP/IP protocol stacks on the WAN core routers,
secondly perimeter routers and firewalls, next the server-farm routers,
and finally the desktop access routers.
Allows dual protocol stacks on the servers and then the edge computer
systems.
Socket can accept connections from both IPv6 and IPv4 TCP clients
connecting to port 5001.
This can be seen with IPconfig on an Windows XP or later OS.
LESSON 1.1

98-366 Networking Fundamentals

Gateway
A computer program link between two computer programs so they can
share information and bypass certain protocols on a host computer
and/or a network that allows or controls access to another computer or
network
o Default GatewayA way out of the subnet; also known as a router
o Network gatewayAn internetworking system that can join two
networks that use different base protocols and can be implemented
completely in software, completely in hardware, or as a combination
LESSON 1.1

98-366 Networking Fundamentals

GLBP (Gateway Load Balancing Protocol)


Provides automatic router backup for IPv6 hosts configured with a
single default gateway on an IEEE 802.3 LAN
Benefits include load sharing, multiple virtual routers, preemption,
and authentication.
Can operate at any level of the OSI model depending on the types of
protocols they support.
Appears at the edge of a network, capabilities like firewalls tend to be
integrated with it.
A broadband router often serves as the network gateway although
ordinary computers can also be configured to perform equivalent
functions on home networks.
LESSON 1.1

98-366 Networking Fundamentals

Internet Protocol version 6 (IPv6)


An Internet Protocol version designed to succeed IPv4 with an Internet
Layer protocol for packet-switched internetworks
The main driving force for the redesign of Internet protocol is the
foreseeable IPv4 address exhaustion
IPv6 has a large address space and supports 2128 (about 3.41038)
addresses
Provides flexibility in allocating addresses and routing traffic, adding a
column.
Implements new features that simplify aspects of address assignment
and network renumbering.
Subnet size has been standardized as 64 bits, expanded addressing
moves us from 32-bit address to a 128-bit addressing method.
LESSON 1.1

98-366 Networking Fundamentals

Convert from Hexadecimal to


Binary
Translate each hexadecimal digit into its 4-bit
binary equivalent.
Hexadecimal numbers have either and 0x
prefix or an h suffix.

For example, the hexadecimal number:


0x3F7A
translates to
0011 1111 0111 1010
LESSON 1.1

98-366 Networking Fundamentals

The IPv6 packet header is 40 bits long and consists of Version, Class,
Flow Label, Payload Length, Next Header, Hop Limit, Source
Address, Destination Address, Data, and Payload fields.
LESSON 1.1

98-366 Networking Fundamentals

IPv6 Broadcasting Methods


Unicast Broadcast
A communication between a single host and a single receiver
Packets sent to a unicast address are delivered to the interface identified by that
address.
There is a one-to-one association between network address and network
endpoint: each destination address uniquely identifies a single receiver endpoint.
LESSON 1.1

98-366 Networking Fundamentals

Multicast Broadcast
A communication between a single host and multiple receivers
Packets are sent to all interfaces--to every device on a network.
It is a one-to-many association between network addresses and network
endpoints: each destination address identifies a set of receiver endpoints, to which
all information is replicated.
LESSON 1.1

98-366 Networking Fundamentals

Anycast Broadcast
A communication between a single sender and a list of addresses
It can contain End Nodes and Routers, and packets are sent to an anycast
address.
There is a one-to-"one-of-many" association between network addresses and
network endpoints: each destination address identifies a set of receiver endpoints,
but only one of them is chosen at any given time to receive information from any
given sender.
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

Complete Student Activity 3.3_A


LEESSSSOO
L N N3 . 31 _. B1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand IPv6
Part 2
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn about:

Ipconfig

Local loopback IP
Ports

Packets

Subnetting

Subnetmask

Reserved address ranges


LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set
1. Compare the IPv4 with the IPv6 sections of Ipconfig on this Windows 7
screen.
2. Identify aspects you do not understand.
LESSON 1.1

98-366 Networking Fundamentals

Ipconfig
An Internet protocol configuration in Microsoft Windows that is a
console application
1. Displays all current TCP/IP network configuration values
2. Refreshes Dynamic Host Configuration Protocol (DHCP)
3. Refreshes domain name system (DNS) settings
Can be utilized to verify a network connection as well as to verify your
network settings
The default displays only the IP address, subnet mask, and default
gateway for each adapter bound to TCP/IP.
There are differences with each version of windows.
LESSON 1.1

98-366 Networking Fundamentals

Ipconfig in Windows 7 OS
LESSON 1.1

98-366 Networking Fundamentals

Ipconfig in Vista OS
LESSON 1.1

98-366 Networking Fundamentals

Ipconfig in Windows XP OS
IPversion4
LESSON 1.1

98-366 Networking Fundamentals

Loopback Device in TCP/IP


A virtual network interface executed in software only, not connected to
any hardware
Any traffic that a computer program sends to the loopback interface is
immediately received on the same interface.
IPv6 assigns only a single address for this function, 0:0:0:0:0:0:0:1 (also
written as ::1), having the ::1/128 prefix.
The loopback device is 127.0.0.1 for IPv4.
The standard reserved domain name for these addresses is localhost.
Pinging the special address loopback interface is a standard test of the
functionality of the IP stack in the operating system.
LESSON 1.1

98-366 Networking Fundamentals

Port
A process-specific software build serving as a communications endpoint
and used for multitasking
Used by transport layer protocols such as transmission control protocol
(TCP) and user datagram protocol (UDP)
Identified by its port number, the IP address associated with, and the
protocol used for communication
Port numbers are divided into three ranges:
o Well-known ports are from 0 through 1023
o Registered ports are from 1024 through 49151
o Dynamic and private ports are from 49152 through 65535
LESSON 1.1

98-366 Networking Fundamentals

Sample Ports and Allocations


LESSON 1.1

98-366 Networking Fundamentals

Packets
A packet mode is a digital networking communications method
grouping all transmitted data into blocks.
Communications links that do not support packets transmit data as a
series of bytes, characters, or bits alone.
When data is formatted into packets, the communication medium bitrate
can be better shared among users.
All data exchanged using IPv6 is contained in packets.
LESSON 1.1

98-366 Networking Fundamentals

Packets (cont.)
The IPv6 packet is composed of :
o the fixed header
o optional extension headers
o the payloadthe transport layer data carried by the packet
The control information provides data the network needs to deliver to
the user data such as source and destination addresses.
The user data would be the information being sent.
An illustration of this concept is sending a letter in an envelope:
o The envelop has the address.
o The user data is in the envelope.
LESSON 1.1

98-366 Networking Fundamentals

Unique Local Addresses (ULA)


Included in Internet protocol IPv6.
The address block fc00::/7 has been reserved by IANA as described in
RFC 4193.
Defined as unicast in character and contain a 40-bit random number in
the routing prefix to prevent collisions when two private networks are
interconnected.
Despite being inherently local in usage, the IPv6 address scope of
unique local addresses is global.
LESSON 1.1

98-366 Networking Fundamentals

Private Network

Private network is one scenario that uses a set of standards for private
IP address space.
o Reserved address ranges are for local use.
o Used for homes and small businesses
o Also used in corporate networks not connected directly to the Internet
for security
A NAT gateway is usually used to enable Internet connectivity to
multiple hosts such as a second computer or a video game with IPv4.
IPv6 is designed so that network address translator (NAT) goes away.
LESSON 1.1

98-366 Networking Fundamentals

Private Network (cont.)


Since IPv6 addresses are 128 bits long, the theoretical maximum address
space if all addresses were used is 2128 addresses.
o This number, when fully expressed is 3.4*1038 or
340,282,366,920,938,463,463,374,607,431,768,211,456.
o That's about 340 trillion, trillion, trillion addresses.
LESSON 1.1

98-366 Networking Fundamentals

Subnets
To subnet an IPv6 global address prefix, either hexadecimal or decimal
methods are used.
To subnet the IPv6 address space, use subnetting techniques to divide
the 16-bit subnet ID field for a 48-bit global.
For global addresses, Internet Assigned Numbers Authority (IANA) or
an ISP assigns an IPv6 address prefix in which the first 48 bits are fixed.
Subnetting the subnet ID field for a 48-bit global address prefix requires
a two-step procedure:
1. Determine the number of bits to be used for the subnetting
2. Enumerate the new subnetted address prefixes
LESSON 1.1

98-366 Networking Fundamentals

Subnets (cont.)
The number of bits used for subnetting determines the possible number
of new subnetted address prefixes that can allocate portions of network
based on geographical divisions.
Based on the number of bits used for subnetting, a list of the new
subnetted address prefixes can be created with one of these approaches:
1. Enumerate the new subnetted address prefixes by using
hexadecimal representations of the subnet ID and increment.
2. Enumerate the new subnetted address prefixes by using decimal
representations of the subnet ID and increment.
Both methods produce an enumerated list of subnetted address prefixes.
LESSON 1.1

98-366 Networking Fundamentals

Subnet Mask
A network address plus the bits reserved for identifying the
subnetwork
The bits for the network address are all set to 1.
o Example: 11111111.11111111.11110000.00000000.
Called a mask because it can be used to identify the subnet to which
an IP address belongs by performing a bitwise AND operation on the
mask and the IP address
An IPv6 subnet mask is written in hexadecimal.
A full IPv6 subnet mask uses the same 8-hex-word format as an IPv6
address.
Like IPv4, an IPv6 address has a network portion and a device portion.
Unlike IPv4, an IPv6 address has a dedicated subnetting portion.
LESSON 1.1

98-366 Networking Fundamentals

Why Use IPv6?


IPv6 has a vastly larger address space than IPv4.
o Results from a 128-bit address (IPv4 uses only 32 bits)
Other benefits of IPv6:
o Stateless address autoconfiguration
o Multicast and mobility
o Mandatory network layer security
o Simplified processing by routers
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

Complete Student Activity 3.3_B


L EE SS SS O
L ONN 31 .. 14

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand Names Resolution


LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn about:

Domain name resolution


Name resolution process steps
DNS
WINS
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set

1. List the host name of 4 of your favorite websites, such as


www.microsoft.com.
2. Visit http://www.hcidata.info/host2ip.htm
3. Enter the host names, one at a time, and click on the Find IP Address
button.
4. Record the IP address for each site.
5. Describe the process of how the computer finds the IP address from a
host name.
6. Describe the process of how the computer finds a host name from an IP
address.
LESSON 1.1

98-366 Networking Fundamentals

Name resolution
IP address
o Identifies a computer on a network by a unique address
o A string of four numbers separated by periods is the form of the
address (for example, 192.168.1.42)
Domain name
o Used because people remember words better than numbers (for
example, www.microsoft.com)
o The name has to be assigned to a corresponding IP address to
access a domain name.
A nameserver is a server that implements a name-service protocol,
which maps an identifier to a system-internal, numeric addressing
component.
LESSON 1.1

98-366 Networking Fundamentals

How WINS Works


By default, when a system is configured to use WINS for its name
resolution, it adheres to h-node for name registration.

1. Checks to see if it is the local machine name


2. Checks its cache of remote names. Any name that is resolved is placed
in a cache where it remains for 10 minutes.
3. Tries the WINS Server
4. Tries broadcasting
5. Checks the LMHOSTS file to determine if the system is configured to
use the LMHOSTS file

6. Tries the HOSTS file and then a DNS, if so configured


LESSON 1.1

98-366 Networking Fundamentals

Domain Name System (DNS)


The Internet maintains two principal namespaces, the domain name
hierarchy and the Internet protocol (IP) address system.
The domain name system maintains the domain namespace and
translates between these two namespaces.
Internet name servers implement the domain name system.
A DNS name server is a server that stores the DNS records, such as
address (A) records, name server (NS) records, and mail exchanger
(MX) records for a domain name.
LESSON 1.1

98-366 Networking Fundamentals

Resolvers are programs that run on DNS clients and DNS servers and
that create queries to extract information from name servers.
Domains define different levels of authority in a hierarchical structure.
The top is called the root domain. The DNS namespace on the Internet
has the following structure:
The root domain uses a null label, which you write as a single period (.)
and is assigned by organization type and by country/region.
Second-level domain contains the domains and names for organizations
and countries/regions.
A zone is a contiguous portion of a domain of the DNS namespace
whose database records exist and are managed in a particular DNS
database file stored on one or multiple DNS servers.
LESSON 1.1

98-366 Networking Fundamentals

DNS defines two types of name servers:


A primary name server gets the data from locally stored and
maintained files.
To change a zone, such as adding subdomains or resource records, you
change the zone file at the primary name server.
A secondary name server gets the data across the network from
another name server.
The process of obtaining this zone information (that is, the database
file) across the network is referred to as a zone transfer.
LESSON 1.1

98-366 Networking Fundamentals

Host Name Resolution Process


Resolves a host name to an IP address before the source host sends the
initial IP packet
The default order for domain name resolution
1. Hosts FileThere is a file called HOSTS to convert domain names to
IP addresses and entries in the HOSTS file dominate mappings that are
resolved via a DNS server.
2. Domain Name System Used for converting domain names to their
corresponding IP addresses. The operating system will connect to the
DNS server and return to you the IP address for the domain name you
queried it with.
3. NetbiosThis only applies to Windows machines and will only be
used to map names to IP addresses if all previous methods failed.
Windows tries NetBIOS name resolution first, then host name
resolution.
LESSON 1.1

98-366 Networking Fundamentals

NetBIOS over TCP/IP Name Resolution


<Methods>
b-nodebroadcasts are used for both name registration and name
resolution.
p-nodeuses point-to-point communications with a name server to
resolve names.
m-nodefirst uses b-node and then, if necessary, p-node to resolve
names.
h-nodefirst uses p-node for name queries and then b-node if the name
service is unavailable or if the name is not registered in the database.
LESSON 1.1

98-366 Networking Fundamentals

Reverse Lookup of the DNS Namespace


Within the in-addr.arpa domain, special
pointer (PTR) resource records are
added to associate the IPv4 addresses
to their corresponding host names.
To find a host name for the IPv4 address
157.54.200.2, a DNS client sends a
DNS query for a PTR record for the
name 2.200.54.157.in-addr.arpa.
LESSON 1.1

98-366 Networking Fundamentals

All the Methods Used by TCP/IP for Windows XP and


Windows Server 2003 for Resolving Host Names
LESSON 1.1

98-366 Networking Fundamentals

DNS name resolution is both iterative and recursive resolution.


1. The user types in a DNS name into a Web browser, which causes a
DNS resolution request to be made from her client machines
resolver to a local DNS name server.
2. That name server agrees to resolve the name recursively on behalf
of the resolver, but uses iterative requests to accomplish it.
3. These requests are sent to a DNS root name server, followed in
turn by the name servers for .edu, someschool.edu, and
compsci.someschool.edu.
4. The IP address is passed to the local name server and back to the
users resolver and finally, her Web browser software.
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

Complete Student Activity NetFund_SA_3.4


LESSON 31 . 5
1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand Networking
Services
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview

In this lesson, you will learn about:

Networking services
DHCP
IPsec
Remote access
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set

Most schools use DHCP to manage student access to


networks.
What happens when you log on?
List all of the services a computer network provides when
using DHCP.
What IP address do you start with?
LESSON 1.1

98-366 Networking Fundamentals

Network Services
Installed on one server to provide secure shared resources
to clients
Common network services include:
o Authentication serversthe process by which the system validates a
users logon information
o Directory servicesa service on a network that returns mail addresses
of other users or enables a user to locate hosts and services
o DNSnaming system for computers, services, or any resource
connected to the Internet or a private network
o Network file systemdistributed file system accessed over a network
o E-mail
o Printing
LESSON 1.1

98-366 Networking Fundamentals

DHCPDynamic Host Configuration Protocol


An autoconfiguration protocol used on IP networks
Provides a central way to configure the network settings of all
of your networked computers
If your operating system is configured to use DHCP, users
just need to plug in the network cable and are ready to go.
DHCP can configure:
o IP address, network mask, DNS address, WINS server address, host
name, domain name, gateway address, time server address, print
server address
Keeps track of computers connected to the network and
prevents two computers from being configured with the same
IP address
LESSON 1.1

98-366 Networking Fundamentals

Methods of Allocating IP Addresses


Dynamicrequires use of DHCP
APIPAautomatically assigns an address as a last resort
Staticmanually assigns an address by an administrator
DHCP operations fall into four basic phases:
o IP discovery
o IP lease offer
o IP request
o IP lease acknowledgement
LESSON 1.1

98-366 Networking Fundamentals

Where a DHCP client and server are on the same subnet,


communication is processed through UDP broadcasts.
Where the client and server are on different subnets, IP
discovery and IP request messages are sent via UDP
broadcasts and IP lease offer and IP lease
acknowledgement messages are sent via unicast.

Process:
1. A DHCP-configured client connects to a network and sends a
broadcast query requesting information from a DHCP server.
2. If the request is valid, the server assigns the client an IP address, a
lease (length of time the allocation is valid), and other IP
configuration parameters, such as the subnet mask and default
gateway.
LESSON 1.1

98-366 Networking Fundamentals

Remote Access
Communication with a data processing facility from a
remote location through a data link
Allows you to extend a network beyond the physical
boundaries of the wired network
Available with three models:
hosting service, software, and appliance
LESSON 1.1

98-366 Networking Fundamentals

Remote Access Server


Sometimes called a communication server; is set up to
handle users seeking access to network remotely
Associated with a firewall server to ensure security and a
router that can forward requests
In transport mode, only the payload (the data you transfer)
of the packet is encrypted and/or authenticated
The transport and application layers are always secured by
hash, so they cannot be modified in any way.
LESSON 1.1

98-366 Networking Fundamentals

Internet Protocol Security (IPsec)


A protocol suite for securing Internet protocol (IP)
communications by authenticating and encrypting each IP
packet of a data stream
Includes protocols for establishing mutual authentication
between agents at the beginning of the session and
negotiation of cryptographic keys to be used during the
session
Protects data flows between a pair of hosts (computer users
or servers), between a pair of security gateways (routers or
firewalls), or between a security gateway and a host
LESSON 1.1

98-366 Networking Fundamentals

IPsec (continued)
IPsec can be used for protecting any application traffic
across the Internet and is a framework of open standards.
Authentication header (AH) provides connectionless
integrity and data origin authentication for IP datagrams
and provides protection against replay attacks.
Encapsulating security payload (ESP) is a member of the
IPsec protocol suite and provides origin authenticity,
integrity, and confidentiality protection of packets.
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

Student Activity NetFund_SA_3.5


LESSON 31 . 6
1

98-366
98-366Networking
NetworkingFundamentals
Fundamentals

Understand TCP/IP
LESSON 1.1

98-366 Networking Fundamentals

Lesson Overview
In this lesson, you will learn about:

TCP/IP Ping
Tracert Pathping
Telnet Ipconfig
Netstat Protocols
Reserved addresses
Local loopback IP
LESSON 1.1

98-366 Networking Fundamentals

Anticipatory Set
Experiment with ping and tracert.
1. From the start menu, go to the Run (Win XP) or Search (Win7)
command and type cmd. This brings up a DOS command window.
2. Type ping www.microsoft.com
3. Ping a few of your favorite sites (www.facebook.com, www.bing.com,
www.wikipedia.org , etc.).
4. Now ping a few geographically close websites (local government, local
TV station, local university, etc.).
5. Record the average times to see which "roundtrips" are the fastest.
6. Now experiment with tracert using the same urls.
7. Summarize the results.
8. Summarize your understanding of ping and tracert.
LESSON 1.1

98-366 Networking Fundamentals

Internet Protocol Suite


Two original components
o TCP Transmission Control Protocol
o IP Internet Protocol
TCP operates at a higher level, concerned only with the two end systems
such as the Web browser and a Web server.
IP handles lower-level transmissions from computer to computer as a
message makes its way across the Internet.
LESSON 1.1

98-366 Networking Fundamentals

TCP
Provides a communication service between an application and the IP
Provides reliable, ordered delivery of a stream of bytes from a program
on one computer to another program on another computer
Controls segment size, flow control, data exchange rate
Keeps track of the individual units of data transmission, called
segments, that a message is divided into for routing through the network
Applications include e-mail and file transfer, and the Web.
LESSON 1.1

98-366 Networking Fundamentals

IP
Handles the actual delivery of the data
Works by exchanging pieces of information called packets
For example, when an HTML file is sent from a Web server, the
TCP software layer of that server divides the sequence of bytes of
the file into segments and forwards them individually to the IP
software layer (Internet Layer).
The Internet layer encapsulates each TCP segment into an IP
packet by adding a header that includes (among other data) the
destination IP address.
LESSON 1.1

98-366 Networking Fundamentals

IP Packets
A sequence of bytes consisting of a header and a body
o The header describes the packet's destination and the routers to use for
forwarding until it arrives at the final destination.
o The body contains the data IP it is transmitting.
IP packets can be lost, duplicated, or delivered out of order.
o TCP detects these problems, requests retransmission of lost packets,
rearranges out-of-order packets, and helps minimize network
congestion.
Individual packets of the same message can be routed on different paths
through the network.
LESSON 1.1

98-366 Networking Fundamentals

TCP/IP Stack
The TCP or UDP transport
layer 4 sends packets to IP
network layer 3, which adds
its own header and delivers a
"datagram" to a data link
layer 2 protocol.
TCP/IP tools are in layers 7,
6, 5.
LESSON 1.1

98-366 Networking Fundamentals

Port Numbers
TCP uses port numbers to identify sending and receiving application
end-points on a host.
Three basic categories: well-known, registered, and dynamic/private
Some examples include FTP (21), SSH (22), TELNET (23), SMTP
(25) and HTTP (80).
LESSON 1.1

98-366 Networking Fundamentals

TCP/IP Tools
Ping: Tests if a particular host is reachable across an IP network;
measures the round-trip time for packets sent from the local host
LESSON 1.1

98-366 Networking Fundamentals

TCP/IP Tools
Netstat: Displays current TCP/IP network connections and protocol
statistics
LESSON 1.1

98-366 Networking Fundamentals

TCP/IP Tools
Tracert: Shows the route taken by packets across an IP network
LESSON 1.1

98-366 Networking Fundamentals

TCP/IP Tools
Ipconfig: Displays all
TCP/IP network
configuration
values and
refreshes DHCP
and DNS settings

/? Command will
play all options
available with
ipconfig
LESSON 1.1

98-366 Networking Fundamentals

TCP/IP Tools
Pathping: Displays the degree of packet loss along the path
LESSON 1.1

98-366 Networking Fundamentals

TCP/IP Tools
Telnet: A terminal emulation program for TCP/IP networks
Local loopback IP: Tests the TCP/IP protocol implementation on a
host -special range of addresses (127.0.0.0 to 127.255.255.255) is
set aside
Localhost: Translates to the loopback IP address
127.0.0.1 in IPv4 or ::1 in IPv6
LESSON 1.1

98-366 Networking Fundamentals

Lesson Review

Student Activity NetFund_SA_3.6

También podría gustarte