Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Lesson Overview
The Internet
Intranets
Extranets
VPN
Security Zones
Firewalls
LESSON 1.1
Anticipatory Set:
Intranet
A private network based on Internet protocols such as
TCP/IP but designed for information management within a
company or organization
Extranet
An extension of some combination of corporate, public, and
private intranet using World Wide Web technology to
facilitate communication with the corporations suppliers,
customers, and associates
An extranet allows customers, suppliers, and business
partners to gain limited access to a companys intranet in
order to enhance the speed and efficiency of their business
relationship
LESSON 1.1
VPN
Virtual private network are nodes (nodes are a connection
point, either a redistribution point or a communication
endpoint (some terminal equipment) on a public network
They communicate among themselves using encryption so
that their messages are safe from being intercepted by
unauthorized users
VPNs operate as if the nodes were connected by private
lines. An example would be teachers at home needing
limited access to the school districts intranet would be
given VPN software for their personal laptop
LESSON 1.1
Security Zone
Business/organization's need for physical and logical
boundaries for accessing, controlling, and securing
information throughout an organization's network
The security zone contains hidden settings for how
Microsoft Windows and Internet Explorer manage unsigned
controls
Security changes daily. A must to keep aware of the
updates. Check the webcasts where leading security and
privacy experts in field discuss the issues.
Microsoft has webcasts covering Security Bulletins,
Security Development Lifecycle, Security Intelligence
Report, Security Tools, and more
LESSON 1.1
Firewall
A computer system or network firewall is designed to
permit authorized communications while blocking
unauthorized access
The device is configured to permit or deny computer
applications based upon a set of rules and other criteria
Firewalls are technological barriers designed to prevent
unauthorized or unwanted communications between
computer networks or hosts
LESSON 1.1
Class Activity
Student Activity 1.1: Comparing Internet, Intranet, Extranet
Discuss in groups of three how our subject applies:
Lesson Review
Work in small groups (3-4 students) to complete the
network design activity from Networking Fundamentals
Student Activity NetFund_SA_1.1_1 and
Student Activity NetFund_SA_1.1_2
If time permits, informally present group designs to the
class. Discuss the different designs created.
LE
ESSSSOO
N N1 . 21_. A1
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Lesson Overview
In this lesson, you will learn about:
LANs
Perimeter networks
Addressing
Local loopback IPs
An Internet collection
LESSON 1.1
Perimeter Networks
Addresses
Lesson Review
Class Activity
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Understand VLANs,
Wired LANs, and Wireless
LANs
LESSON 1.1
Lesson Overview
Anticipatory Set
LAN
A local area network (LAN) is a single broadcast domain.
This means the broadcast will be received by every other
user on the LAN if a user broadcasts information on his/her
LAN. Broadcasts are prevented from leaving a LAN by using
a router.
Wired LAN
Wireless LAN
Communications that take place without the use of
interconnecting wires or cables, such as by radio,
microwave, or infrared light
Wireless networks can be installed:
o Peer-to-peer Ad hoc modewireless devices can
communicate with each other
o "Infrastructure" modeallows wireless devices to
communicate with a central node that can communicate
with wired nodes on that LAN
LESSON 1.1
1. Network adapter
2. Ethernet cables
3. Hubs
LESSON 1.1
Advantages
Wired LANs provide superior speed and performance
Disadvantages
Difficult to run cables under the floor or through walls
especially when computers sit in different rooms
Require central devices like hubs or routers to
accommodate more computers, which can be expensive
Generally it costs less than wireless equipment for the
equivalent wired Ethernet products
LESSON 1.1
Application of LANs
Home and small business computer networks can be built
using either wired or wireless technology
Large companies are trying to move toward wireless but
there are more challenges, especially with security
Wired Ethernet has been the traditional choice in homes,
but Wi-Fi wireless technologies are quickly replacing
wired LANs
LESSON 1.1
VLAN
Lesson Review
1. Why is a VLAN sometimes referred to as a logical
network?
2. List the advantages and disadvantages for a wired network
and a wireless network. Give examples of a typical uses for
each.
LE
ESSSSOO
N N1 . 31_. A1
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Lesson Overview
In this lesson, you will review:
Dial-up
Integrated services digital networks (ISDN)
Leased lines
Virtual private networks (VPN)
Wide area networks (WAN)
LESSON 1.1
Anticipatory Set
Apply what you have learned about LANs to this lesson.
1. What have you learned in the past that will help you to
understand WANs?
2. Discuss with your neighbor how you can apply learning
from past experience to this new topic of WANs.
LESSON 1.1
Dial-up Connections
A connection that uses the public switched telephone
networks rather than a dedicated circuit or some other type
of private network.
This is often referred to as plain old telephone service/public
switched telephone service (POTS/PSTN).
Remote server access provides two different types of remote
access connectivity:
o Dial-up remote access
o Virtual private network (VPN) remote access
LESSON 1.1
Leased Lines
A communications channel that permanently connects two or
more locations.
Leased lines are private or dedicated lines, rather than public
ones. Also called dedicated connection and private line.
A leased line is a dedicated telephone line rented from the
phone company. It provides a 24 hour dedicated connection
between two points.
Leased lines can be almost any speed but are typically 2 Mbps.
Higher speed lines are more expensive.
LESSON 1.1
Lesson Review
1. Compare networks and discuss the relationship of a wide
area network to a local area network and a virtual private
network.
2. How do leased lines, dial-up, and ISDN relate to wide area
networks?
3. Discuss your answers with two other students and refine
your thoughts. Share your answers with the class.
L E SSSSOONN 1 1. 3. B1
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Lesson Overview
T1
T3
E1
E3
DSL
Cable and its characteristics (speed, availability)
LESSON 1.1
Anticipatory Set
T1
A high-speed communications line that can handle digital
communications and Internet access at the rate 1.544 Mbps
(megabits per second).
This high-bandwidth telephone line can also transmit text
and images.
Speed is attained through multiplexing 24 separate 64 Kbps
channels into a single data stream.
Commonly used by larger organizations for Internet
connectivity.
LESSON 1.1
T3
A T-carrier that can handle 44.736 Mbps (megabits per
second) or 672 voice channels.
LESSON 1.1
E1
A 2.048 Mbps point-to-point dedicated, digital circuit
provided by the telephone companies in Europe.
The European counterpart of the North American T1 line.
E1 and T1 lines can be interconnected for international
use.
Uses two wire pairs (one for transmit, one for receive) and
time division multiplexing (TDM) to interleave 32 64-
Kbps voice or data channels.
LESSON 1.1
E3
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Understand Wireless
Networking
LESSON 1.1
Lesson Overview
In this lesson, you will learn about:
Wireless networking
Wireless networking standards and their characteristics
802.11a, b, g, n including different GHz ranges
Types of network security
oWPA
oWEP
o802.1X
Point-to-point (P2P) wireless
Wireless bridging
Gigahertz
LESSON 1.1
Anticipatory Set
1. Make a list of all the wireless devices they have seen,
used, or are familiar with. Answer the following
questions relating to the devices in the list.
a. How do they transmit and communicate with other
devices?
b. It is likely that there are many wireless devices in the
same room or area. How are they able to not interfere
with each other ? Or do they interfere with each other?
2. Discuss the uses and security issues of these items
LESSON 1.1
Wireless Telecommunications
Computer networks created without wires such as a local area network
(LAN)
Electromagnetic Waves
The wave, or "disturbance," is invisible and is called the force field.
Without these charged particles, there can be no electric force fields and
thus no electromagnetic waves.
Examples include light, microwaves, X-rays, and TV and radio
transmissions are all kinds of electromagnetic waves.
Negative electrons and positive protons charges cause each other to
move.
Positive charge exerts an attractive force on electronsan electric force.
The velocity makes no difference, the pull or force depends only upon
where you put it.
Electronic devices make use of the range of the electromagnetic
spectrum.
LESSON 1.1
Wireless
Describes communications in
which electromagnetic waves
or RF carry a signal over the
entire communication path.
The frequencies that are
available for use for
communication are a public
resource and are regulated
by the Federal
Communications Commission
in the U.S.
LESSON 1.1
Electronic Modulation
The process of varying one or more properties of a high-frequency
periodic waveform.
In wireless we first take a signal, like a telephone conversation, and then
impress it on a constant radio wave called a carrier.
It modulates a constant frequency in the radio range, which we can't
hear.
Modulation makes voice band and radio band frequencies work together.
Different modulation techniques, such as AM and FM, are different ways
to shape or form electromagnetic radio waves.
LESSON 1.1
802.11b and 802.11g use the 2.4 GHz ISM band (industrial, scientific
and medical), operating in the United States under Part 15 of the US
Federal Communications Commission Rules and Regulations.
Gigahertz is a measure of frequency.
Frequency (temporal frequency ) is the number of occurrences of a
repeating event per unit time.
The duration of one cycle in a repeating event, so the period is the
reciprocal of the frequency.
Because of this choice of frequency band, 802.11b and g equipment may
occasionally suffer interference from microwaves , cordless telephones
and Bluetooth devices.
LESSON 1.1
Wireless Security
Wireless network messages are more susceptible to eavesdropping than
wired networks.
A WEP key uses a passphrase a security code that is produced using
this protocol that allows computers to hide the contents of the
messages from intruders and exchange coded messages.
WPA-PSK (Pre-Shared Key) mode provides strong encryption
protection without the enterprise authentication server and is the easiest
way to deploy WPA to home wireless network using a passphrase.
WPA uses Temporal Key Integrity Protocol (TKIP) to produce unique
encryption keys and automatic rekey each wireless clients from
passphrase and network SSID.
LESSON 1.1
Wireless Bridging
A bridge is used to connect two network segments.
LESSON 1.1
Bridging
A forwarding technique used in packet-switched computer networks.
Can be done wired or wireless and used only in LANs.
Bridging depends on flooding and examination of source addresses in
received packet headers to locate unknown devices.
A network bridge connects multiple network segments at the data link
layer (Layer 2) of the (OSI) Open System Interconnection model.
A switch is a bridge with numerous ports. Switch or Layer 2 switch is
often used interchangeably with bridge.
LESSON 1.1
Bridging (continued)
Another form of bridging, source route bridging, was developed for
token ring networks.
The main purpose of wireless bridging is to connect a wired
Ethernet network segment to a wireless Ethernet network segment .
This is most commonly found in a home wireless router that has a
built-in multiport switch for wired devices, and a wireless
networking WAN connection for DSL or cable for Internet
access.
LESSON 1.1
Lesson Review
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Understand Network
Topologies and Access
Methods
LESSON 1.1
Lesson Overview
Star Mesh
Bus
Ring
LESSON 1.1
Anticipatory Set
Class Activity
Network Topologies
The interconnection of the various elements (links, nodes,
etc.) of computer equipment
Network Topologies can be physical or logical
Topology is the virtual shape or structure of a network,
which does not need to correspond to the actual physical
design of the devices on the computer network.
The physical design of a network including the devices,
location, and cable installation is known as physical
topology.
How data actually transfer in a network, as opposed to its
physical design, is the logical topology, also called signal
topology.
LESSON 1.1
Compare the
logical and physical
topology of the star
Star Network
The topology structure of a star network consists of one
central switch, hub or computer, which acts as a conduit to
transmit messages.
The hub and leaf nodes, and the transmission lines between
them, form a graph with the topology of a star.
An active star network has an active central node that
usually has the means to prevent echo-related problems.
LESSON 1.1
Mesh Networks
Each node in the network acts as an independent router.
A mesh network whose nodes are all connected to each
other is a fully connected network.
The component parts connect to each other via multiple
hops.
Is self-healing and can still operate when one node breaks
down or a connection goes bad
Considered more reliable than other networks
Mobile ad hoc networks (MANET) must deal with the
problems of the mobility of the nodes. Mesh networks do
not have this problem but they are closely related with the
MANET network.
LESSON 1.1
Ring Network
Data travels from node to node, with each node along the
way handling every packet.
It forms a single continuous pathway for signals through
each node.
May be disrupted by the failure of a single link
A node failure or cable break might isolate every node
attached to the ring.
Each machine or computer has a unique address that is
used for identification purposes.
Only one machine can transmit on the network at a time.
LESSON 1.1
Bus Network
A shared communications line
A common backbone to connect all devices that operates
and functions as a shared communication medium
A single cable that devices attach or tap into with an
interface connector
Communicates by sending a broadcast message onto the
wire for all other devices to see, but only the intended
recipient actually accepts and processes the message.
Devices on the bus must first determine that no other
device is sending a packet on the cable before any device
can send a packet.
LESSON 1.1
Hybrid Network
When a combination of two or more topologies are
connected
If two star networks were connected together, they
would exhibit a hybrid network topology.
o A star ring network would be two or more star topologies linked
together using a multistation access unit (MAU) as a centralized
hub.
LESSON 1.1
Lesson Review
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Understand Switches
LESSON 1.1
Lesson Overview
In this lesson, you will learn about:
Switches
Transmission speeds
Data transmission
Cables
Uplink speeds
Managed and unmanaged switches
VLANs
LESSON 1.1
Anticipatory Set
Switches
A computer networking device that connects network segments
Some make it possible to connect different types of networks,
including Ethernet, fiber channel, ATM, ITU-T G.hn and 802.11.
LESSON 1.1
Layer 2 switches are network bridges that process and route data at the
data link layer (layer 2) of the OSI model.
Layer 3 switches (multilayer) process data at the network layer of 3 and
above.
Layer 4 switches allows for policy-based switching and are based on the
OSI "transport" layer. These switches limit different types of traffic on
specific end-user switch ports.
o The Layer 4 network switch does not work with unintelligent or
passive network devices such as hubs and repeaters.
LESSON 1.1
Transmission speed
Data are moved across a
communications channel at
different rates.
The rate is referred to as the
bandwidth.
LESSON 1.1
Data Transmission
A standard 10/100 Ethernet switch operates at the data-link layer of
the OSI model to create a different collision domain for each
switch port.
Ethernet is a family of frame-based computer networking
technologies for local area networks.
In the Ethernet networking protocol a collision domain is a
physical network segment where data packets can "collide" with
one another when being sent.
LESSON 1.1
Cables
A straight-through cable has identical ends.
A crossover cable has different ends.
A PC can be connected to an uplink port with a crossover cable and
to a regular port with a straight-through cable.
LESSON 1.1
Uplink Speeds
Ethernet standards on uplink speeds are of 10Mbps, 100Mbps, 1000
Mbps/1Gbps, 10Gbps since switches come with autosensing in various
combinations.
The access switch members have an uplink module installed.
o There are two ports on each uplink module.
The uplinks are configured to act as trunk ports by connecting the access
switch with the distribution switch.
LESSON 1.1
Lesson Review
Directions to the student:
1. Complete NetFund_SA_2.1A
LE
ESSSSOO
N N2 . 11_. B1
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Understand Switches
LESSON 1.1
Lesson Overview
In this lesson, you will learn about:
Switches
Backplane speed
Hardware redundancy
Layer 2 and layer 3 switches
MAC table
Security options
Switching types
Support
Anticipatory Set
Recall what you learned about networking and switches.
Switches
A switch is a network bridge that processes and routes data at the data
link layer (layer 2) of the OSI model.
Large switches have higher layer issues, router issues, backplanes,
security and redundancy.
Built-in or modular interfaces in large switches make it possible to
connect different types of networks, including Ethernet, Fiber Channel,
ATM, ITU-T G.hn and 802.11.
LESSON 1.1
Layer 2 Switch
Provides the same functionality as bridges
Learns and forwards frames on each port just like a multiport bridge
Multiple switching paths inside the switch can be active at the same
time.
Operates utilizing MAC addresses in its caching table to quickly pass
information from port to port.
LESSON 1.1
Layer 3 Switch
Utilizes IP addresses to perform the functions as layer 2 switches
Are fast routers that do layer 3 forwarding in hardware
Because IP is the most common among all layer 3 protocols today,
most of the layer 3 switches perform IP switching at the hardware level
and forward the other protocols at layer 2 (bridge them).
LESSON 1.1
Bridging
Involves segmentation of local-area networks (LANs) at the Layer
2 level
A multiport bridge learns about the media access control (MAC)
addresses on each of its ports and transparently passes MAC
frames destined to those ports.
Ensures that frames destined for MAC addresses that lie on the
same port as the originating station are not forwarded to the other
ports
LESSON 1.1
Switch Security
Define virtual local area networks
Two basic steps:
1. Defining what users can see
2. Defining where they can connect
What you seeSecurity allows organizations to separate sensitive
clusters of systems from the rest of the network.
What you connectPort security is available on business-class
switches and some allow in-depth settings.
LESSON 1.1
Hardware Redundancy
Occurs when segment C is added to the network connecting switches
A and C
If one of the switches fails, the network will eliminate the point of
failure.
LESSON 1.1
Managed Switches
Provide support for the network through:
o Flexibility
o Security
o Reliability
o Expandability
Switches are supported by their manufacturer and with online manuals.
LESSON 1.1
Circuit switching
Used in voice networks
Not an efficient method for routing any kind of data
Is wasted because no transmission is using the bandwidth of the circuit
100 percent of the time
In circuit failure during a transmission, the entire connection must be
re-established, which means the conversation must start over again.
LESSON 1.1
Packet Switching
Used in data networks
Has no dedicated circuits
Each circuit carries many transmissions at the same time.
Has the ability to route data units over any route
More reliable because if a particular circuit in the network
should fail, the routers in the network route data units
over different circuits.
The protocols have the ability to reassemble the data units
into their proper order.
LESSON 1.1
Switching Principles
Cell relay
Voice
Data transmission
The cell is the data unit.
Voice requires small data units.
o In order to support voice, the data units must be small so that they can
be processed quickly and sent through the network with minimal
delay.
o Whenever there is information to be transmitted, the switch simply
sends the data units.
Data favors large data units.
LESSON 1.1
Lesson Review
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Understand Routers
LESSON 1.1
Lesson Overview
In this lesson, you will learn about:
Directly connected static routes
Dynamic routes (routing protocols)
Default routes, NAT, RRAS
Routing tables
Routing protocol
Routing in Windows Server
Transmission speed considerations
LESSON 1.1
Anticipatory Set
Be creative and think about what a route means to you and what
controls your route through life. There is probably a router telling you
what to do such as a traffic light that tells you to go, slow down, or
stop.
Give other examples of routers and their applications that you have
encountered
Share your answers with two others. Does everyone have router
experiences?
Begin brainstorming how you would use a router in the computer
industry
LESSON 1.1
Routers
A device that selectively interchanges packets of data in two or more
computer networks while connecting the networks
Connected to at least two networks, generally two LANs or WANs or a
LAN and its ISP's network
Wireless routers provide everything that a wired router provides,
including ports for Ethernet connections and the attributes for wireless
security such as Wi-Fi Protected Access (WPA) and wireless MAC
address filtering.
Many wireless routers can be configured for "invisible mode" so that
your wireless network cannot be scanned by outside wireless clients.
LESSON 1.1
Routing
A routing protocol is applied when passing data from one subnet
(interface) to another subnet.
When determining which route is preferable, directly connected
networks have the highest priority, followed by static routes, and
then other routes.
If a corresponding interface command is contained under the router
configuration stanza of that protocol, it is are advertised by IGP
routing protocols, which are directly connected networks.
IGPInterior gateway protocol describes the fact that each system
on the Internet can choose its own routing protocol.
LESSON 1.1
Static Routing
The process of manually entering routes into the routing table through
a configuration file that is loaded when the routing device starts up
Static routes are manually configured and cached when a router starts
up and dont change unless a user changes them.
Static routing does not handle down connections well because they
must be reconfigured manually to repair any lost connectivity.
Does not work well when the routing information has to be changed or
needs to be configured on a large number of routing devices.
LESSON 1.1
Routing Table
Routing Information Base (RIB) is an electronic table (file) or that
is stored in a networked computer or a router.
The routes to network destinations are stored in the routing table.
The function of the routing protocols and static routes is to create
the routing tables.
The most specific route to the destination IP address is the longest
matching route.
The router uses the lowest metric to select the best route when
multiples occur.
The router is free to choose which table entry to use if multiple
entries exist that are the longest match and the lowest metric.
LESSON 1.1
Lesson Review
1. Complete NetFund_SA_2.2
2. Exchange papers and check the answers as the teacher
reviews them
LEESSSSOO
L N N2 . 31 _. A1
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Lesson Overview
In this lesson, you will learn information about:
Anticipatory Set
Network Media types
Media is the actual physical environment through which data travels as
it moves from one component to another and connects network devices.
Two categories of Media are cable network and wireless network.
To determine what transmission media is right for particular networking
environment you need to consider:
o Required throughput
o Cabling distance
o Noise resistance
o Security
o Flexibility
o Plans for growth
LESSON 1.1
Coaxial cables
Were the first cables used in Ethernet networks.
Consists of an insulator that separates the braided inner conductor and
the outer conductor, which is a woven copper braid
Commonly used for cable TV connections and10 Base5 and 10 Base2
Ethernet networks.
Coaxial Thinnet supports a maximum segment length of 185 meters, is
less costly and easier to install
Coaxial Thicknet can send signals up to 500 meters, is costlier and
demands more efforts in installation
The transmission speed these cables provide is between 2.5 Mbps and
10 Mbps.
Coaxial cables are more resistant to EMI than the UTP cable, because
of greater insulation to external interference.
LESSON 1.1
Fiber Optics
Cables are made up of glass or other light transmitting material.
Transmit data in the form of light
A reflective coating that allows light beams to travel without outer
interference covers the glass cable.
The advantages:
o Faster
o Very long distances without the risk of outer interference
At one end of the fiber optics system is a transmitter that accepts
coded electronic pulse data coming from copper wire.
The information is processed and translated into equivalently
coded light pulses.
A light-emitting diode (LED) or an injection-laser diode (ILD)
can be used for generating the light pulses.
LESSON 1.1
Single mode fiber (SMF) optic cable and multi-mode fiber (MMF):
o SMF supports high-speed LAN covering long distances and WAN
spread over different buildings or cities.
o Used in 10GBase-LR Ethernet specification, which runs at the speed of
10 Gbps and allows only one mode of light to transmit.
The multi-mode fiber (MMF) optic cable :
o Used for high-speed networks spread over short distances
o Used for 10GBase-SR Ethernet standard that supports the transmission
speed of 10 Gbps, it allows the light signals to travel in more than one
path
o Less costly than the SMF cable
LESSON 1.1
Wireless communication
The transfer of information over a distance without the
use of physical media
The distances involved may be short (a few meters as in
television remote control) or long (thousands or
millions of kilometers for radio communications)
Wireless communication is considered to be a branch of
telecommunications
LESSON 1.1
External Interference
Interference in telecommunication and electronics refers to anything
that alters, modifies, or disrupts a message as it travels along a channel
between a source and a receiver.
External susceptibility comes from machinery and power cables.
Tightly strapped cabling often causes interference from motors and
solenoids jumping over to the signal cabling and disturbing sensors.
o Jumping occurs when the high current can cause the rapid release
of large volumes of hydrogen, which can be ignited by a nearby
spark.
See examples of external interference from equipment and cables at
www.qedata.se/e_emi_bakgrund.htm.
LESSON 1.1
Interception
Data communication equipment emits modulated signals that carry
information that an eavesdropper or hacker can intercept.
o It is completely undetectable, requires little apparatus, and can be
done at a considerable distance.
Like fiber optics but without the fiber, LED indicators act as little free-
space optical data transmitters.
LESSON 1.1
Lesson Review
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Understand Network
Media Types
Part 2
LESSON 1.1
Lesson Overview
In this lesson, you will learn information about:
Cabling
Category 5e cable
Coaxial cable
RJ-45
Thicknet cable
Thinnet coaxial cable
Twisted pair shielded cable
Unshielded cable
LESSON 1.1
Anticipatory Set
The copper wire is color-coded plastic insulation and they are twisted
in pairs. It is all covered with an outer jacket.
LESSON 1.1
Because of its cost and difficulty with termination, STP is rarely used
in Ethernet networks.
STP is primarily used in Europe.
Because most buildings are already wired with UTP, many
transmission standards are adapted to use it, to avoid costly rewiring
with an alternative cable type.
UTP and STP are not used together.
LESSON 1.1
Coaxial cable
Made of a hollow outer cylindrical conductor surrounding a single inner
wire made of two conducting elements
One element in the center of the cable is a copper conductor.
A layer of flexible insulation surrounds the copper conductor.
Over the insulation is a metallic foil or woven copper braid acting as both
the second wire in the circuit and a shield for the inner conductor .
This second layer/shield helps reduce the amount of outside interference.
LESSON 1.1
Coaxial cable can be cheaper for a physical bus topology because less
cable will be needed.
It is more costly than UTP on a per-unit length and is relatively
inexpensive.
Coaxial cable is less expensive than fiber optic cable.
Can be used over longer distances than twisted-pair cable
Ethernet can run approximately 100 meters using twisted-pair cabling.
Using coaxial cable increases this distance to 500 meters.
Can be run with fewer boosts from repeaters for longer distances
between network nodes than either STP or UTP cable
LESSON 1.1
Wireless communication
Uses radio frequencies (RF) or infrared (IR) waves to transmit data
between devices on a LAN
Wireless signals are electromagnetic waves that can travel through the
vacuum of outer space and through a medium such as air.
A key module is the wireless hub for distributing signals through the
wireless LAN.
A computer can have a wireless adapter card (wireless NIC) installed to
receive the signals from the access point.
LESSON 1.1
Wireless
Distribution
LESSON 1.1
The copper wire is color-coded plastic insulation and the wires are
twisted in pairs. It is all covered with an outer jacket.
LESSON 1.1
Cable Termination
Cables that are terminated with differing standards on each end will not
function normally.
Standard RJ-45 pinouts describe the arrangement of the individual
wires required when connecting connectors to a cable.
RJ-45 is the standard connector for 10Base-T/100Base-TX Ethernet,
ISDN, T1, and modern digital telephone systems.
LESSON 1.1
Demonstration Steps
1. The pins on the RJ-45 plug are numbered 1 to 8.
2. Hold a CAT 5 patch cable in your hand, as if inserting into a jack, with
the contacts facing in the up position; pin 1 will be on the far left.
3. Pin 8 will be the pin on the far right. We follow this orientation when we
define the wiring assignments in the RJ-45 plug.
4. CAT 5 Cable has four twisted pairs within the sheath. Each pair has a
specific color code, and is placed into deliberate pin location within the
RJ-45 plug.
5. In constructing the cable, use identical pin assignments on each end as
the 568-B standard is used in the United States.
LESSON 1.1
1. Group in pairs so each person can attach an RJ-45 end to the category
5e cable.
2. View the YouTube video on making a patch cord with RJ-45
terminators and a category 5e cable wire.
http://www.youtube.com/watch?v=482VtesZwZ8
3. Complete Student Activity 2.3_B with a partner to construct a cable
using the materials provided.
LESSON 1.1
Lesson Review
1. Test the cable.
2. Analyze and correct any problems.
3. Detail the testing and correcting process in a written report.
4. Submit to your instructor.
LE
ESSSSOO
N N3 . 11_. A1
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Lesson Overview
In this lesson, you will learn about:
Internetwork
IETF
ISO/OSI
ITU-T
Protocols
LESSON 1.1
Anticipatory Set
1. Problem: Personal computer use and the Internet have grown very
quickly. Corporations and educational users are developing large
networks and individuals access the Internet in huge numbers. There
is no pattern or organization, and networks have developed without
planning.
Internetwork
A collection of individual networks, connected by intermediate
networking devices, that functions as a single large network
Formed from different kinds of network technologies that can be
interconnected by routers and other networking devices
Offers a solution to three key problems:
o Isolated LANs
o Duplication of resources
o A lack of network management
Many issues including configuration, security, redundancy, reliability,
centralization, and performance, must be adequately dealt with for the
internetwork to function smoothly.
LESSON 1.1
The data enter as they transmit, going down the seven layers, and exit as
they are received at the right, going up the layers.
Image courtesy of The Abdus Salam International Centre for Theoretical Physics.
LESSON 1.1
Protocols
A set of rules that direct the way computers exchange information
Communication protocols enable communication and execute the
functions of one or more of the OSI layers.
o At the physical and data link layers of the OSI model LAN
protocols define communication over the various LAN media.
o At the lowest three layers of the OSI model WAN protocols define
communication over the various wide-area media.
o Routing protocols control the exchange of information between
routers so that the routers can select the proper path for traffic.
o Network protocols apply to various upper-layer protocols.
LESSON 1.1
Encapsulation
The OSI Model Layers and Information Exchange is done by the use
of communication control to communicate with the peer layers in
other computer systems and consists of specific requests and
instructions that are exchanged between peer OSI layers.
The data portion of an information unit at a stated OSI layer can
contain headers that have been passed down from upper layers.
The data that has been passed down from upper layers are appended to
trailers.
The data portion of an information unit at a given OSI layer can
contain headers, trailers, and data from all the higher layers. This is
known as encapsulation.
LESSON 1.1
Lesson Review
Student ActivityNetFund_SA_3.1_A
Understanding Protocols and Services
LESSON 1.1
Class Activity:
How well do you really know the OSI networking model?
1. Test yourself with our OSI Model game.
http://www.gocertify.com/games/osi-game.shtml
2. Complete the review at the end of each game and
record any missed questions with the correct answer
to either turn in or discuss with the whole class.
LE
ESSSSOO
N N3 . 11_. B1
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Lesson Overview
In this lesson, you will learn information about:
Frames
Packets
Segments
TCP
TCP/IP Model
Well-known ports for most-used purposes
LESSON 1.1
Anticipatory Set
If you complete the work, you may review the OSI Networking Game
http://www.gocertify.com/games/osi-game.shtml
LESSON 1.1
TCP/IP
Provides end-to-end connectivity specifying how data should be
formatted, addressed, transmitted, routed, and received
Protocols exist for a variety of communication services between
computers.
The layers near the top are closer to user application, the layers near
the bottom are closer to the physical transmission of the data.
Viewing layers as providing or consuming a service is a method of
abstraction to isolate upper layer protocols.
The lower layers avoid having to know the details of each and every
application and its protocol.
LESSON 1.1
Well-Known Ports
Most services work with TCP/IP by configuring the
server to use a well-known port number.
The client connects from a random high port.
Most of these well-known ports are port numbers below
1,024.
TCP/IP port assignments on Windows are stored in the
\%systemroot%\System32\drivers\etc\services file.
LESSON 1.1
IP responsibilities in UDP
1. Provide connectionless delivery of datagrams
2. Provide fragmentation and reassembly of datagrams to support data links
with different maximum-transmission unit (MTU) sizes
o The maximum transmission unit (MTU) of a communications
protocol of a layer is the size in bytes of the largest protocol data
unit that the layer can pass onward; a packet is encapsulated into one
or more frames, depending upon the MTU size.
LESSON 1.1
IP Packets
All IP packets are structured the same way an IP header followed by a
variable-length data field.
There are 14 fields in an IP packet header.
LESSON 1.1
Lesson Review
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Understand IPv4
LESSON 1.1
Lesson Overview
In this lesson, you will learn about:
APIPA
addressing
classful IP addressing and classless IP addressing
gateway
IPv4
local loopback IP
NAT
network classes
reserved address ranges for local use
subnetting
static IP
LESSON 1.1
Anticipatory Set
1. Write the address range and broadcast address for the following subnet:
Subnet: 192.168.1.128 / 255.255.255.224
Address Range?
Subnet Broadcast Address?
IPv4
A connectionless protocol for use on packet-switched Link Layer
networks like the Ethernet
At the core of standards-based internetworking methods of the Internet
Network addressing architecture redesign is underway via classful
network design, Classless Inter-Domain Routing, and network address
translation (NAT) .
Microsoft Windows uses TCP/IP for IP version 4 (a networking
protocol suite) to communicate over the Internet with other computers.
It interacts with Windows naming services like WINS and security
technologies.
IPsec helps facilitate the successful and secure transfer of IP packets
between computers.
An IPv4 address shortage has been developing.
LESSON 1.1
Network Classes
Provide a method for interacting with the network
All networks have different sizes so IP address space is divided in
different classes to meet different requirements.
Each class fixes a boundary between the network prefix and the host
within the 32-bit address.
LESSON 1.1
Classful Network
Divides the address space for Internet Protocol Version 4 (IPv4) into
five address classes
Each class, coded in the first four bits of the address, defines a different
network size or a different network type.
Design for IPv4 sized the network address as one or more 8-bit
groups, resulting in the blocks of Class A, B, or C addresses.
LESSON 1.1
IPv4 Addresses
Usually written in dot-decimal notation of four octets of the address
expressed in decimals and separated by periods
Base format used in the conversion table. Each octet can be of any of
the different bases
LESSON 1.1
Reserved IP Addresses
Three ranges of address are
reserved for private networks.
Ranges are not routable outside of
private networks.
Private machines cannot directly
communicate with public
networks.
Internet Assigned Numbers
Authority (IANA) reserved three
blocks of IP address space for
private internets.
Confusion results because
different authorities name different
IP numbers for different addresses.
LESSON 1.1
Localhost
The address range 127.0.0.0127.255.255.255 is reserved for localhost
communication (127.0.0.0/8 in CIDR notation).
Addresses within this range should never appear outside a host
computer and packets sent to this address.
Addresses are returned as incoming packets on the same virtual
network device (known as loopback).
Loopback or Localhost 127.0.0.0 (or 127/8) should not be used as an
address for any station; it is used to ping yourself.
LESSON 1.1
Broadcast Address
An address that allows information to be sent to all machines on a given
subnet
Found by obtaining the bit complement of the subnet mask and
performing a bitwise OR operation with the network identifier
Example: To broadcast a packet to an entire IPv4 subnet using the
private IP address space 172.16.0.0/12 (subnet mask 255.240.0.0), the
broadcast address is 172.31.255.255.
LESSON 1.1
Lesson Review
Complete Student Activity NetFund_SA_3.2
LEESSSSOO
L N N3 . 31 _. A1
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Understand IPv6
Part 1
LESSON 1.1
Lesson Overview
In this lesson, you will learn about:
Addressing
Dual IP stack
Gateway
IPv6
Anticipatory Set
Explain why IPv4 is typically insufficient and why IPv6 is more useful.
Tunneling Protocol
Used by computer networks when the delivery network protocol
encapsulates a different payload protocol
Teredo
o A tunneling protocol intended to grant IPv6 connectivity to nodes that
are located behind IPv6-unaware NAT devices.
o Identifies a way of encapsulating IPv6 packets within IPv4 UDP
datagrams that can be routed through NAT devices and on the IPv4
internet.
o 6to4 is an Internet conversion mechanism for migrating from IPv4 to
IPv6, a system that allows IPv6 packets to be transmitted over an IPv4
network with no need to configure explicit tunnels.
Special relay servers are also in place that permit 6to4 networks to
communicate with native IPv6 networks.
LESSON 1.1
IPv6 has all zeroes for the middle 16 bits; thus, they start off with a string of 96
zeroes, followed by the IPv4 address.
LESSON 1.1
ISATAP
Intra-Site Automatic Tunnel Addressing Protocol
An IPv6 transition mechanism meant to transmit IPv6 packets between
dual-stack nodes on top of an IPv4 network
o Uses IPv4 as a virtual nonbroadcast multiple-access network (NBMA)
data link layer, so that it does not require the underlying IPv4 network
infrastructure to support multicast.
o The IP6_ADDRESS structure stores an IPv6 address and the IPv6
subnet size has been standardized by fixing the size of the host
identifier portion of an address to 64 bits to assist an automatic
mechanism for forming the host identifier from Link Layer media
addressing information (MAC address).
LESSON 1.1
Dual IP Stack
Special addresses assigned to IPv6-capable
devices speak both IPv4 and IPv6.
Dual Stack Architecture involves
running IPv4 and IPv6 at the same time
where end nodes and routers/switches run
both protocols.
If IPv6 communication is possible that is
the preferred protocol.
Windows uses a dual-stack architecture as
shown here.
LESSON 1.1
Gateway
A computer program link between two computer programs so they can
share information and bypass certain protocols on a host computer
and/or a network that allows or controls access to another computer or
network
o Default GatewayA way out of the subnet; also known as a router
o Network gatewayAn internetworking system that can join two
networks that use different base protocols and can be implemented
completely in software, completely in hardware, or as a combination
LESSON 1.1
The IPv6 packet header is 40 bits long and consists of Version, Class,
Flow Label, Payload Length, Next Header, Hop Limit, Source
Address, Destination Address, Data, and Payload fields.
LESSON 1.1
Multicast Broadcast
A communication between a single host and multiple receivers
Packets are sent to all interfaces--to every device on a network.
It is a one-to-many association between network addresses and network
endpoints: each destination address identifies a set of receiver endpoints, to which
all information is replicated.
LESSON 1.1
Anycast Broadcast
A communication between a single sender and a list of addresses
It can contain End Nodes and Routers, and packets are sent to an anycast
address.
There is a one-to-"one-of-many" association between network addresses and
network endpoints: each destination address identifies a set of receiver endpoints,
but only one of them is chosen at any given time to receive information from any
given sender.
LESSON 1.1
Lesson Review
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Understand IPv6
Part 2
LESSON 1.1
Lesson Overview
In this lesson, you will learn about:
Ipconfig
Local loopback IP
Ports
Packets
Subnetting
Subnetmask
Anticipatory Set
1. Compare the IPv4 with the IPv6 sections of Ipconfig on this Windows 7
screen.
2. Identify aspects you do not understand.
LESSON 1.1
Ipconfig
An Internet protocol configuration in Microsoft Windows that is a
console application
1. Displays all current TCP/IP network configuration values
2. Refreshes Dynamic Host Configuration Protocol (DHCP)
3. Refreshes domain name system (DNS) settings
Can be utilized to verify a network connection as well as to verify your
network settings
The default displays only the IP address, subnet mask, and default
gateway for each adapter bound to TCP/IP.
There are differences with each version of windows.
LESSON 1.1
Ipconfig in Windows 7 OS
LESSON 1.1
Ipconfig in Vista OS
LESSON 1.1
Ipconfig in Windows XP OS
IPversion4
LESSON 1.1
Port
A process-specific software build serving as a communications endpoint
and used for multitasking
Used by transport layer protocols such as transmission control protocol
(TCP) and user datagram protocol (UDP)
Identified by its port number, the IP address associated with, and the
protocol used for communication
Port numbers are divided into three ranges:
o Well-known ports are from 0 through 1023
o Registered ports are from 1024 through 49151
o Dynamic and private ports are from 49152 through 65535
LESSON 1.1
Packets
A packet mode is a digital networking communications method
grouping all transmitted data into blocks.
Communications links that do not support packets transmit data as a
series of bytes, characters, or bits alone.
When data is formatted into packets, the communication medium bitrate
can be better shared among users.
All data exchanged using IPv6 is contained in packets.
LESSON 1.1
Packets (cont.)
The IPv6 packet is composed of :
o the fixed header
o optional extension headers
o the payloadthe transport layer data carried by the packet
The control information provides data the network needs to deliver to
the user data such as source and destination addresses.
The user data would be the information being sent.
An illustration of this concept is sending a letter in an envelope:
o The envelop has the address.
o The user data is in the envelope.
LESSON 1.1
Private Network
Private network is one scenario that uses a set of standards for private
IP address space.
o Reserved address ranges are for local use.
o Used for homes and small businesses
o Also used in corporate networks not connected directly to the Internet
for security
A NAT gateway is usually used to enable Internet connectivity to
multiple hosts such as a second computer or a video game with IPv4.
IPv6 is designed so that network address translator (NAT) goes away.
LESSON 1.1
Subnets
To subnet an IPv6 global address prefix, either hexadecimal or decimal
methods are used.
To subnet the IPv6 address space, use subnetting techniques to divide
the 16-bit subnet ID field for a 48-bit global.
For global addresses, Internet Assigned Numbers Authority (IANA) or
an ISP assigns an IPv6 address prefix in which the first 48 bits are fixed.
Subnetting the subnet ID field for a 48-bit global address prefix requires
a two-step procedure:
1. Determine the number of bits to be used for the subnetting
2. Enumerate the new subnetted address prefixes
LESSON 1.1
Subnets (cont.)
The number of bits used for subnetting determines the possible number
of new subnetted address prefixes that can allocate portions of network
based on geographical divisions.
Based on the number of bits used for subnetting, a list of the new
subnetted address prefixes can be created with one of these approaches:
1. Enumerate the new subnetted address prefixes by using
hexadecimal representations of the subnet ID and increment.
2. Enumerate the new subnetted address prefixes by using decimal
representations of the subnet ID and increment.
Both methods produce an enumerated list of subnetted address prefixes.
LESSON 1.1
Subnet Mask
A network address plus the bits reserved for identifying the
subnetwork
The bits for the network address are all set to 1.
o Example: 11111111.11111111.11110000.00000000.
Called a mask because it can be used to identify the subnet to which
an IP address belongs by performing a bitwise AND operation on the
mask and the IP address
An IPv6 subnet mask is written in hexadecimal.
A full IPv6 subnet mask uses the same 8-hex-word format as an IPv6
address.
Like IPv4, an IPv6 address has a network portion and a device portion.
Unlike IPv4, an IPv6 address has a dedicated subnetting portion.
LESSON 1.1
Lesson Review
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Lesson Overview
In this lesson, you will learn about:
Anticipatory Set
Name resolution
IP address
o Identifies a computer on a network by a unique address
o A string of four numbers separated by periods is the form of the
address (for example, 192.168.1.42)
Domain name
o Used because people remember words better than numbers (for
example, www.microsoft.com)
o The name has to be assigned to a corresponding IP address to
access a domain name.
A nameserver is a server that implements a name-service protocol,
which maps an identifier to a system-internal, numeric addressing
component.
LESSON 1.1
Resolvers are programs that run on DNS clients and DNS servers and
that create queries to extract information from name servers.
Domains define different levels of authority in a hierarchical structure.
The top is called the root domain. The DNS namespace on the Internet
has the following structure:
The root domain uses a null label, which you write as a single period (.)
and is assigned by organization type and by country/region.
Second-level domain contains the domains and names for organizations
and countries/regions.
A zone is a contiguous portion of a domain of the DNS namespace
whose database records exist and are managed in a particular DNS
database file stored on one or multiple DNS servers.
LESSON 1.1
Lesson Review
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Understand Networking
Services
LESSON 1.1
Lesson Overview
Networking services
DHCP
IPsec
Remote access
LESSON 1.1
Anticipatory Set
Network Services
Installed on one server to provide secure shared resources
to clients
Common network services include:
o Authentication serversthe process by which the system validates a
users logon information
o Directory servicesa service on a network that returns mail addresses
of other users or enables a user to locate hosts and services
o DNSnaming system for computers, services, or any resource
connected to the Internet or a private network
o Network file systemdistributed file system accessed over a network
o E-mail
o Printing
LESSON 1.1
Process:
1. A DHCP-configured client connects to a network and sends a
broadcast query requesting information from a DHCP server.
2. If the request is valid, the server assigns the client an IP address, a
lease (length of time the allocation is valid), and other IP
configuration parameters, such as the subnet mask and default
gateway.
LESSON 1.1
Remote Access
Communication with a data processing facility from a
remote location through a data link
Allows you to extend a network beyond the physical
boundaries of the wired network
Available with three models:
hosting service, software, and appliance
LESSON 1.1
IPsec (continued)
IPsec can be used for protecting any application traffic
across the Internet and is a framework of open standards.
Authentication header (AH) provides connectionless
integrity and data origin authentication for IP datagrams
and provides protection against replay attacks.
Encapsulating security payload (ESP) is a member of the
IPsec protocol suite and provides origin authenticity,
integrity, and confidentiality protection of packets.
LESSON 1.1
Lesson Review
98-366
98-366Networking
NetworkingFundamentals
Fundamentals
Understand TCP/IP
LESSON 1.1
Lesson Overview
In this lesson, you will learn about:
TCP/IP Ping
Tracert Pathping
Telnet Ipconfig
Netstat Protocols
Reserved addresses
Local loopback IP
LESSON 1.1
Anticipatory Set
Experiment with ping and tracert.
1. From the start menu, go to the Run (Win XP) or Search (Win7)
command and type cmd. This brings up a DOS command window.
2. Type ping www.microsoft.com
3. Ping a few of your favorite sites (www.facebook.com, www.bing.com,
www.wikipedia.org , etc.).
4. Now ping a few geographically close websites (local government, local
TV station, local university, etc.).
5. Record the average times to see which "roundtrips" are the fastest.
6. Now experiment with tracert using the same urls.
7. Summarize the results.
8. Summarize your understanding of ping and tracert.
LESSON 1.1
TCP
Provides a communication service between an application and the IP
Provides reliable, ordered delivery of a stream of bytes from a program
on one computer to another program on another computer
Controls segment size, flow control, data exchange rate
Keeps track of the individual units of data transmission, called
segments, that a message is divided into for routing through the network
Applications include e-mail and file transfer, and the Web.
LESSON 1.1
IP
Handles the actual delivery of the data
Works by exchanging pieces of information called packets
For example, when an HTML file is sent from a Web server, the
TCP software layer of that server divides the sequence of bytes of
the file into segments and forwards them individually to the IP
software layer (Internet Layer).
The Internet layer encapsulates each TCP segment into an IP
packet by adding a header that includes (among other data) the
destination IP address.
LESSON 1.1
IP Packets
A sequence of bytes consisting of a header and a body
o The header describes the packet's destination and the routers to use for
forwarding until it arrives at the final destination.
o The body contains the data IP it is transmitting.
IP packets can be lost, duplicated, or delivered out of order.
o TCP detects these problems, requests retransmission of lost packets,
rearranges out-of-order packets, and helps minimize network
congestion.
Individual packets of the same message can be routed on different paths
through the network.
LESSON 1.1
TCP/IP Stack
The TCP or UDP transport
layer 4 sends packets to IP
network layer 3, which adds
its own header and delivers a
"datagram" to a data link
layer 2 protocol.
TCP/IP tools are in layers 7,
6, 5.
LESSON 1.1
Port Numbers
TCP uses port numbers to identify sending and receiving application
end-points on a host.
Three basic categories: well-known, registered, and dynamic/private
Some examples include FTP (21), SSH (22), TELNET (23), SMTP
(25) and HTTP (80).
LESSON 1.1
TCP/IP Tools
Ping: Tests if a particular host is reachable across an IP network;
measures the round-trip time for packets sent from the local host
LESSON 1.1
TCP/IP Tools
Netstat: Displays current TCP/IP network connections and protocol
statistics
LESSON 1.1
TCP/IP Tools
Tracert: Shows the route taken by packets across an IP network
LESSON 1.1
TCP/IP Tools
Ipconfig: Displays all
TCP/IP network
configuration
values and
refreshes DHCP
and DNS settings
/? Command will
play all options
available with
ipconfig
LESSON 1.1
TCP/IP Tools
Pathping: Displays the degree of packet loss along the path
LESSON 1.1
TCP/IP Tools
Telnet: A terminal emulation program for TCP/IP networks
Local loopback IP: Tests the TCP/IP protocol implementation on a
host -special range of addresses (127.0.0.0 to 127.255.255.255) is
set aside
Localhost: Translates to the loopback IP address
127.0.0.1 in IPv4 or ::1 in IPv6
LESSON 1.1
Lesson Review