Welcome To IT Support
Welcome To IT Support
Networking Essentials
Bookmark this page
This course contains text-based content, video discussions, and hands-on activities, all
focused on introducing you to the world of IT networks.
By actively participating in this course, you will learn about the following:
Understanding TCP/IP
COURSE SYLLABUS
The course Syllabus can be downloaded from the Course
Updates page.
COURSE GRADING
There is a graded assessment exam and a graded case study at the end of each
module as well as at the end of the course.
40% of total available points - Course assessment exam. This is the final exam at
the end of the course that has 20 questions covering all modules. You will have one attempt to
answer each course assessment question correctly.
20% of total available points - Case Studies. There is a case study at the end of each
module and at the end of the course. Module case studies include a 5 question exam; the final
case study has a 12 question exam. The questions in each case study exam allow you to apply
the knowledge you have acquired into a real-world networking scenario.
Case Studies
Bookmark this page
Case Studies
Throughout the course you will be tasked with completing a
series of graded case studies that will test your knowledge
on the material that you just covered. There is a case study
at the end of each module, as well as a final case study at
the end of the course.
The questions for each case study will be graded, and your scores will be accumulated
into your final grade for the course.
Lesson Overview
Bookmark this page
People have been communicating all around the world for thousands of years.
Technology has evolved to a level where communication is faster and easier than ever
before. Today, if someone needs to renew their driver’s license, send a gift to a friend in
another country/region, make sure their bills are paid, or even say hello to an astronaut
in space, they can do all of that thanks to computer networking.
What networking is
The benefits of networking
Examples of basic network types
What is networking?
Imagine that networks are the electronic versions of all the post offices
around the world. If you want to send a package to somebody, you put the
correct addresses and postage on it and drop it at the post office. Then the
post office clerk puts special symbols on the package. Those symbols help all
the other post office employees know what to do with that package when it
comes to them. Networks do the same thing, but they do it with computers
instead of physical locations.
Networking allows computer users to share data and interact with each
other, even though they are using two different computers. People can
network with each other anywhere; they can use networking while they are
in the same room, or they can use networking while they are each in two
different countries/regions.
The server controls the level of access that clients have. A user can access a
server file or application from anywhere if they use a client that is connected
to the server’s network and has the proper level of access (usually
password-based).
The following slider tool identifies each of these two basic network types.
Slide the pointer along the bar and stop at each network type to display its
corresponding description.
Lesson Overview
Bookmark this page
There are different types of networks depending on who is using them and what their
needs are. Some networks are available to the public. Some networks are private. And
then there are other networks that combine public and private access, and have special
security tools to protect information.
The Internet
Intranets
Extranets
Security zones, perimeter networks, and firewalls
Lesson Overview
Bookmark this page
Some networks are small, such as a network that connects computers and devices
within a single home or office. This smaller type of network is called a Local Area
Network (LAN). Some networks are big, such as a network that connects computers
and devices across cities, countries/regions, and so on. This larger type of network is
called a Wide Area Network (WAN). The internet is the largest WAN in the world.
LANs connect to WANs. WANs make it possible for a computer in one LAN to share
data with another computer in a different LAN that is farther away.
Different networks are set up in different ways, depending on what is required for each
network. The different ways networks can be set up is called network topology. The size
of a network, number of users, and power requirements help network engineers
understand which network topology to choose when building a network.
This lesson examines these various network types and network topologies.
Local Area Networks (LANs) and Wide Area Networks (LANs) are the most popular
type of area networks. Other area networks include:
Sometimes networks like the ones described above are connected through
the Internet. Doing this allows private network users from all around the
world to access the same network without travelling to the physical location
of the servers. To keep these networks secure, a technology called Virtual
Private Network (VPN) is used. VPN creates an encrypted connection so that
other Internet users are not able to see or access user data or network
activity on that VPN. VPN networks use passwords and other identification
methods so that only approved users may access the network.
Networking topologies
The following slider tool identifies the most common network topologies.
Slide the pointer along the bar and stop at each network topology to display
its corresponding description.
Tree topology networks connect multiple star topology networks together into a bus
topology. Only hub devices connect to the bus. Tree topology is a network
arrangement that supports future network growth. Bus topology is limited in the
number of devices it can support and star topology is limited in the number of
connection points it can support. A network can avoid those limitations with a tree
topology.
Mesh topology networks connect all devices on the network together. Each mesh
network device has special mesh network software installed so that it can
automatically choose the quickest path to the intended recipient. This is called
dynamic routing. Mesh topology is faster and more powerful than other topologies
for several reasons. With mesh topologies data doesn’t have to travel back and
forth between a main server. Mesh topology networks can be quickly expanded by
installing additional wireless mesh connectors. They are self-healing and self-
configuring because they automatically choose the best data paths and
automatically adjust to any newly added devices and wireless mesh connectors.
Mesh topology is ideal for large areas because the more nodes you install, the
bigger and faster it becomes.
Module 1 Case Study
Bookmark this page
Company Overview
Northwind Traders is a multi-national corporation that owns and operates a global chain
of retail stores. The corporate headquarters is in New York City, and it has branch
offices and retail locations throughout the United States and Europe. The corporate
office has 300 employees, and each of the branch offices has between 50-150
employees.
Existing Environment
All existing servers run Windows Server 2016. All client computers run Windows 10 Pro
Enterprise.
The corporate headquarters in New York has multiple file servers; whereas, each
branch office has one file server. Each file server has two hard disks. One disk has the
server’s operating system installed and the other disk stores data files. File server
backups are performed regularly.
The corporate headquarters has a Windows Server Update Services (WSUS) server. All
client computers are configured to receive updates from the WSUS server.
Planned Changes
Northwind Traders plans to open a new branch office in Rio de Janeiro, Brazil. The new
office will be responsible for setting up and managing a new series of Northwind
Traders retail shops throughout Brazil.
The new office in Rio de Janeiro will be responsible for translating all product
information and website data into Portuguese. Those translations will be added to the
Brazilian versions of the Northwind Traders websites by corporate employees of the
new office. These employees will also be responsible for all Brazilian marketing and PR
functions, which will include hiring local manufacturers to update all Northwind Traders
packaging with the Brazilian translations so that those products will be ready for local
markets. Employees will be encouraged to work with additional local partners to
collaborate on packaging, and to develop new products for local and global markets.
Employees of the new Rio branch office will only be allowed to access the Northwind
Traders network through wired connections. Employees will not be able to access the
corporate network outside of the new office, and they will not be able to remove their
network devices from the main building of the new office. There will be standard devices
available on the wired network, including printers, faxes, employee computers, and so
on. Employees with permissions will be able to access Northwind Traders’ corporate
network, any internal Northwind Traders’ websites, and the internet.
The new Rio de Janeiro office will be connected to the corporate network, which runs
Windows Server 2016 and Windows 10 Enterprise.
M1CS01
0.0/1.0 point (graded)
What physical equipment is needed to set up the new office with a network connection?
(Select 3)
Server
Computer
Router
Printer
Cables
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M1CS02
0.0/1.0 point (graded)
What sort of area network(s) should the new office use? (Select 2)
LAN
WAN
MAN
CAN
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M1CS03
0.0/1.0 point (graded)
Client-Server
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M1CS04
0.0/1.0 point (graded)
Internet only
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M1CS05
0.0/1.0 point (graded)
What type of topology should be used to connect this new office to the corporate
network?
Star
Ring
Bus
Tree
Mesh
M115
0.0/1.0 point (graded)
Which of the following is a network that connects all devices with a single cable?
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M105
0.0/1.0 point (graded)
Internet
Intranet
Extranet
Perimeter network
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M109
0.0/1.0 point (graded)
Which of the following is a large type of network that connects large areas, such as
cities or countries/regions, to smaller networks within those areas?
Firewall
Extranet
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M108
0.0/1.0 point (graded)
Which of the following is a small type of network that connects computers and devices
within a single home or office?
Firewall
Extranet
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M110
0.0/1.0 point (graded)
Which of the following is a local area network that uses wireless network technology?
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M111
0.0/1.0 point (graded)
Which of the following is an area network that connects multiple LANs across a city or
county?
Wireless Local Area Network (WLAN)
unanswered
M112
0.0/1.0 point (graded)
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M101
0.0/1.0 point (graded)
The act of setting up new networks usually by installing computers and cables.
The act of sending information back and forth across one or more networks.
Setting up a computer.
Setting up a printer.
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M107
0.0/1.0 point (graded)
Internet
Intranet
Extranet
Perimeter network
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M103
0.0/1.0 point (graded)
Networks can be customized to meet different needs. Network engineers can customize
networks because they understand the basics of how information connects and flows on
a network, and because they understand which hardware devices will enable them to
create different types of network connections.
Networking architecture
Networking layers
Common networking equipment
Networking layers
Bookmark this page
The layered concept of networking was developed in the 1980s to address changes in
technology. In layered networking, layers are established to carry out the different
processing functions that data must go through to successfully travel along a network.
Each layer processes the data and then passes it up or down to the next layer where it
goes through a different process, and so on. This is done until the data is in the proper
format for traveling across a network. Then, once the data has reached the intended
network location or device, it is reverse-processed so that it appears at the receiving
end in its original state.
When thinking about layered networks, it might be helpful to imagine that data being
sent is wrapped in a new envelope every time it moves to a different layer, and each of
those envelopes has instructions that tell the next layer what to do with the data and
where to send it.
The different ways that network engineers set up networking layers are known as
models. There are various networking models, but here we will focus on the Open
System Interconnection model, commonly called the OSI model. The OSI model
became so popular when it was first released as a teaching tool in the 1980s that is has
become a common standard in networking.
The OSI model consists of the following seven layers; the lowest layer is level 1:
5.Session layer. The Session layer establishes, manages, and ends user connections
and manages the interaction between end systems. Service include things like
establishing communications or grouping data. This layer sets up, manages, and ends
connections between applications and deals with coordinating connections and session
times.
4.Transport layer. The Transport layer insulates the three upper layers (layer 5 – layer
7) from having to deal with the complexities of layer 1 – layer 3. It does this by providing
the functions necessary to guarantee a reliable network link. Among other functions, the
Transport layer provides error recovery and flow control between the two end points of
the network connection. This layer basically handles flow control and end-to-end error
recovery, which ensures a complete data transfer.
2.Data Link layer. The Data Link layer ensures the reliability of the physical link
established at layer 1 (the Physical layer). Standards define how data frames (how data
is packaged) are recognized and provide necessary flow control and error handling at
the frame level. The data link layer translates packets of information into bits by
encoding the information being sent, or it translates bits into packets of information by
decoding the bits being received.
1.Physical layer. They Physical layer controls transmission of the raw bitstream over
the transmission medium. Standards for this layer define such parameters as the
amount of signal voltage swing, the duration of voltages (bits), and so on. This layer
transfers the bit stream through the network. This can be done with an electrical signal,
a light signal (such as fiber optics), or a radio signal.
As you can see in the following diagram, information that travels across a network has
to go through several changes. Even the simple task of emailing a picture of a cat to
someone requires many steps. And on each step, the information must be adjusted until
it is in the correct format to send across a network. Once the information has travelled
across the network, it has to be changed back to its original form so that the cat picture
can be accessed in its original format.
Networking equipment
Networks are built and configured in many different ways using servers, computers,
and cables. There are also special hardware devices available that help to make
networks more efficient. Some of the more common devices include:
Hubs
A hub is a device that lets nodes communicate with each other. Each node
connected to the hub can send or receive information through that hub.
However, a hub cannot recognize who is sending the information or who is
supposed to receive it, so it repeats all the data packets it receives so that
all the nodes that are connected to it receive that data, including the node
that sent the information. This can cause a lot of unneeded traffic, especially
on larger networks that send and receive more information. Hubs are also
slow because they cannot send and receive at the same time.
Switches
A switch is a hub that has the added ability to control the flow of network
traffic by reading each data packet’s address information. A switch monitors
which nodes are connected to it, and only sends data packets to a node
when the data packet is addressed to that node. This greatly reduces
unneeded network traffic. Switches can also send and receive at the same
time, which makes them faster than hubs. Switches save bandwidth and
provide higher security by preventing unauthorized users from accessing
data packets.
Bridges
Gateways
Repeaters
Lesson Overview
Bookmark this page
Wireless networking speed is measured in Mbps. Mbps stands for “Megabits per
second.” It measures how fast data can be transferred from one location to another. For
example, if you wanted to send a bunch of pictures to your family over the internet, the
pictures would be sent much faster if you have an internet connection with a higher rate
of Mbps. Older wireless networking speeds are considered too slow for a lot of modern
network activities.
Different wireless communication methods have been developed over the years in order
to keep up with changing technology and user needs. These methods have become
standards of wireless networking and are used all around the world.
To understand where we're at today, it might help to understand how the wireless
communication standard for WLANs has evolved. In the late 1990s, the Institute of
Electrical and Electronics Engineers (IEEE) created the first wireless communication
standard for wireless local area networks (WLAN). It was called 802.11 because that
was the name of the group that developed it. It used a radio signal with a frequency of
2.4 GHz to communicate data across the airwaves). This standard is no longer used
because it is too slow. It had a maximum network bandwidth of 2 Mbps, which is too
slow for most of today’s applications. For example, if someone wants to watch a movie
on a video streaming service, the minimum recommended speed is 5 Mbps for HD, or
25 Mbps for Ultra HD. Viewers would have to have even faster speeds if anyone in their
household wanted to do anything online while the movie was playing.
Let’s take a look at how wireless standards have been evolving:
Wireless technology is extremely flexible and convenient for users. Signals are sent back and forth
across networks all the time. But it is hard to control where those signals travel. Sometimes users who
are nearby might pick up your signals on their devices. Or, there might be a hacker looking for insecure
wireless networks to break into. These are real possibilities with unsecured wireless networks. That is
why wireless network security is so important. It is important to make sure the data you send is
protected.
Here is a basic list of things you can do to make sure your wireless network is secure:
Use firewalls
Firewalls help keep out unwanted and unneeded traffic to your device. You can set
up your wireless router to only accept or send information that is approved by you.
The instruction manual will have information on how to set that up.
Lesson Overview
Bookmark this page
Wired networking is the original form of computer networking. It has been around for over
50 years! It is important to know about the hardware that goes with wired networking.
Making sure a network has the right equipment will prevent it from failing. Wired
computer networking has many benefits, especially when it comes to keeping
information secure.
The following slider tool identifies the most common wired transmission
media. Slide the pointer along the bar and stop at each wired transmission
media to display its corresponding description.
The coaxial (or co-ax) cable was developed to connect TVs to home
antennas. Coaxial cables contain an inner copper wire that is surrounded by
insulation and other shielding. This type of cable is a standard for 10 Mpbs
Ethernet cables.
Twisted pair cables became a popular cable for Ethernet use in the 1990s.
These cables started with 10 Mbps, but advanced with technology to achieve
speeds of 100 Mbps, and later up to 10 Gbps. Twisted pair cables have up to
8 wires inside them. Each pair of two wires is wound together in order to
minimize electromagnetic interference. Twisted pair cables can be
unshielded (UTP) or shielded (STP). Most modern twisted pair cables are
unshielded. Shielded twisted pair cables are more expensive, but some
networks use them when shielded cables are required. Shielded cables are
designed to reduce any outside interference that might interrupt data that is
flowing through the cable.
Fiber optic cables transmit data by sending pulses of light across strands of
glass inside the cable. Fiber optic cables are very useful in wide area
networks (WANs) because they work over long distances and can handle a
heavy volume of data traffic. Different types of fiber optic cables are used
depending on the cost and on the amount of bandwidth the cable must have
to support a network.
USB stands for Universal Serial Bus. USBs are pieces of hardware inside
computers that have special protocols that allow them to communicate to
any other USBs. That is what makes them “universal.” They are “serial”
because they send pieces of data one at a time in sequence. They are called
“buses” because they carry data, just like a bus carries people. Universal
Serial Bus (USB) cables connect computers to keyboards, mice, or other
external devices by connecting the USB in the computer to the USB in the
external device.
A crossover cable is used to join two network devices of the same type, such
as two PCs or two network hubs. The use of crossover cables has diminished
in recent years because most modern routers can connect devices together
on its own.
Company Overview
Northwind Traders is a multi-national corporation that owns and operates a global chain
of retail stores. The corporate headquarters is in New York City, and it has branch
offices and retail locations throughout the United States and Europe. The corporate
office has 300 employees, and each of the branch offices has between 50-150
employees.
Existing Environment
All existing servers run Windows Server 2016. All client computers run Windows 10 Pro
Enterprise.
The corporate headquarters in New York has multiple file servers; whereas, each
branch office has one file server. Each file server has two hard disks. One disk has the
server’s operating system installed and the other disk stores data files. File server
backups are performed regularly.
The corporate headquarters has a Windows Server Update Services (WSUS) server. All
client computers are configured to receive updates from the WSUS server.
Planned Changes
Northwind Traders plans to open a new branch office in Rio de Janeiro, Brazil. The new
office will be responsible for setting up and managing a new series of Northwind
Traders retail shops throughout Brazil.
The new office in Rio de Janeiro will be responsible for translating all product
information and website data into Portuguese. Those translations will be added to the
Brazilian versions of the Northwind Traders websites by corporate employees of the
new office. These employees will also be responsible for all Brazilian marketing and PR
functions, which will include hiring local manufacturers to update all Northwind Traders
packaging with the Brazilian translations so that those products will be ready for local
markets. Employees will be encouraged to work with additional local partners to
collaborate on packaging, and to develop new products for local and global markets.
Employees of the new Rio branch office will only be allowed to access the Northwind
Traders network through wired connections. Employees will not be able to access the
corporate network outside of the new office, and they will not be able to remove their
network devices from the main building of the new office. There will be standard devices
available on the wired network, including printers, faxes, employee computers, and so
on. Employees with permissions will be able to access Northwind Traders’ corporate
network, any internal Northwind Traders’ websites, and the internet.
The new Rio de Janeiro office will be connected to the corporate network, which runs
Windows Server 2016 and Windows 10 Enterprise.
M2CS01
0.0/1.0 point (graded)
What type of cables should be used in connecting this office to the network? (Select 3)
Coaxial
Twisted Pair
Fiber Optic
USB
Crossover
DVI
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M2CS02
0.0/1.0 point (graded)
Wired
Wireless
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
SaveSave Your Answer
M2CS03
0.0/1.0 point (graded)
If the Rio office used wired networking, what would be the benefits they would enjoy?
(Select 3)
Because it is convenient
To prevent hacking
It is more flexible
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M2CS04
0.0/1.0 point (graded)
If the Rio office used wireless networking, what would be the benefits they would enjoy?
(Select 3)
To prevent hacking
It is more flexible
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M2CS05
0.0/1.0 point (graded)
What type of interface card should be used in the Rio computers to access this
network?
Both
M206
0.0/1.0 point (graded)
Which layer in the OSI model creates packets of information into bits, or translates bits
into packets of information, by encoding and decoding the information?
Physical layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M212
0.0/1.0 point (graded)
5 Mbps
10 Mbps
15 Mbps
20 Mbps
25 Mbps
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M210
0.0/1.0 point (graded)
Watts
Volts
Mpbs
KW
Ohm
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M209
0.0/1.0 point (graded)
Which of the following is a device that passes information between two networks, and
can be wireless or wired?
Hub
Bridge
Router
Repeater
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M211
0.0/1.0 point (graded)
10 Mbps
15 Mbps
20 Mbps
25 Mbps
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M205
0.0/1.0 point (graded)
Which layer in the OSI model builds logical paths to transmit data from one network
device to another network device, including switching, routing, and forwarding?
Physical layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M204
0.0/1.0 point (graded)
Which layer in the OSI model handles flow control and end-to-end error recovery to
ensure complete data transfer?
Physical layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M214
0.0/1.0 point (graded)
Which of the wired transmission media contains up to 8 wires inside with each pair of
two wires wound together in order to minimize electromagnetic interference?
Coaxial cables
USB cables
Crossover cables
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
Which of the following is a device that connects two separate computer networks and
enables communications between them?
Hub
Bridge
Router
Repeater
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M207
0.0/1.0 point (graded)
Which of the following is a device that lets nodes communicate to each other?
Hub
Bridge
Router
Repeater
Lesson Overview
Bookmark this page
In everyday life people follow rules on how to communicate with each other. The postal
service sends letters based on the name and address that is written on the envelope.
People use specific phone numbers to reach the exact person they want to talk to.
These sorts of rules that govern how we communicate are called “protocols.” An
example of a protocol can be seen in the famous movie Star Wars. The golden robot
C3PO is called a “protocol droid” because he is programmed in over 6 million forms of
communication and therefore can communicate with many different types of aliens and
computers. That’s a lot of protocols! Networks are the same way. There are a number of
protocols that control how networks communicate with other devices and networks.
Network protocols
Basic types of network protocols
Which protocols apply to the different layers on a network
Protocol concepts
When devices communicate with one another, they must agree on the
format of the data that will be sent between them. The set of rules that
determines the format is called a protocol. Protocols can also include
advanced techniques for detecting transmission errors then recovering from
them, as well as for encoding and decoding data.
Let's begin by reviewing networking layers and models. As you many recall from an
earlier lesson, the different ways that network engineers set up networking layers are
known as models. There are various networking models available, but two of the most
common models are the Open System Interconnection model, commonly called the OSI
model, and the Transmission Control Protocol/Internet Protocol model, known as the
TCP/IP model.
The OSI model was developed by the International Organization for Standardization
(ISO). It became so popular when it was first released as a teaching tool in the 1980s
that is has become a common standard in networking. OSI is a reference model for
communication between end users in the network.
The TCP/IP model was developed by the United States' Department of Defense to
connect various devices to a common network (Internet). The main purpose behind
developing the protocol was to build a robust and automatically recovering phone line
while on the battlefield. The TCP/IP model eventually was adopted for commercial use,
and today is used by Internet applications such as email, the World Wide Web, File
Transfer Protocol (FTP), and so on.
OSI Model
6. Presentation Layer
5. Session Layer
4. Transport Layer Transport Layer
1. Physical Layer
All model layers have protocols that work together to achieve the common goal of that
layer, such as sending data or controlling where data goes. Each protocol performs a
specific task, and all tasks performed across all of the layers achieve the overall action
of networking.
IP Addressing
Static IP address
These addresses are associated with an exact physical location which makes it
easier for other computers to find and connect to. A static IP address is a
permanent internet address that will always be the same so long as the user is
connecting from that location. Static IP addresses usually have to be assigned by
request. They may require an additional set-up fee from the ISP.
Dynamic IP address
This address can change each time a computer connects to a network. Dynamic IP
addresses don’t cost users anything extra because they are easier for ISPs to
maintain. Dynamic IP addresses are reliable and run automatically. Their only
disadvantages are that they don’t show up on maps as accurately as static IP
addresses do, and they make it harder to set up large business servers.
One of the main reasons networking exists is to make sure information can be accessed
and shared. A very important part of accessing and sharing information is getting things
to the right place, which is why IP addresses are so important. But networks can be
separated into smaller groups. And each of those smaller groups can have many
devices connected to them. However, if all of these smaller groups and devices used
the same IP address, things would get very confusing, just like in the real world. If all the
post office mail for all the people in an apartment building was put into one big pile, it
would be difficult for a person to find the mail that was meant for them. This is why
networking uses subnets, subnetting, subnet masks, and MAC addresses. Subnets are
smaller groups inside of a network. Subnetting is the action of dividing a network into
these smaller groups. Subnet masks are special numbers that are used to divide a
network address into smaller addresses for the subgroups and devices inside a
network. A MAC address is a network device’s address.
Ports
Bookmark this page
The port is the first and last stop for information being sent across a network. There is
one port for each application. Ports are not shared by multiple applications. A computer
or application can have many ports (up to 65,536), so a network administrator should
never worry of not having enough ports. When an application is used for the first time,
the next available port is assigned to it.
In networking, you can think of a port as the channel an application uses to send or
receive information. It is an address for a single application on a device. For example,
an email program such as Microsoft Outlook would have a port associated with it. This
identifies the email program so that it can receive information addressed to it, and so
that it can be properly identified as the sender when sending information out. A web
browsing program would have a different port that would act in the same way—
information sent from the browser would be properly identified, and information meant to
be received by that browser would reach it because the port allows it to be located. The
same thing is true for the application that performs document printing on a network. If a
user wants to print, the print instructions are addressed to the specific port that is
associated with the selected printer. If the user’s printer sends a low-ink warning, that
information would originate from the same port.
There are two types of ports—TCP ports and UDP ports. TCP and UDP are two
different types of communication protocols. They give computers specific instructions on
how to send and receive information.
Applications that require the TCP method will automatically be assigned TCP ports, and
applications that require the UDP method will automatically be assigned UDP ports. A
computer can have up to 65,536 TCP ports, and an additional 65,536 UDP ports.
Lesson Overview
Bookmark this page
Each of the protocols people use in everyday life have specific rules. For example, a
person must pay for a ticket and collect it from the cashier before he or she can enter a
theater to see a film. And once that person is inside, they must show their ticket to a
theater employee, who rips the ticket and then directs the person to the correct theater.
Think of this as “the movie-going protocol.” In computer networking, similar rules are
used to ensure information is properly handled. These are referred to as “networking
protocols.”
In this lesson you will learn about:
For example, if a user types bing.com into his or her browser, DNS will look up that
website name and replace it with its associated IP address (204.79.197.200). When
DNS isn’t working, the network doesn’t work. Why? Because networks don’t use
website names or computer names to access those locations; they need the IP address
of the website or the computer. So when DNS isn’t working, the network devices that
are trying to access these network locations get lost because DNS isn’t translating
website names and computer names into IP addresses.
Remote Access
Bookmark this page
Routing and Remote Access Service (RRAS) supports remote user or site-to-site
connectivity by using Virtual Private Network (VPN) or dial-up connections. RRAS
consists of the following components:
Remote Access. By using RRAS, you can deploy VPN connections to provide
end users with remote access to your organization's network. You can also create a
site-to-site VPN connection between two servers at different locations.
Routing. RRAS is a special type of software in a server that enables that server
to act like a router. RRAS makes it possible for network engineers and administrators to
build applications and rules to control network access and services. There are lots of
different ways that RRAS can be configured. RRAS can be used with smaller Local
Area Networks (LANs). with bigger Wide Area Networks (WANs), or even over the
internet. Using RRAS over the internet requires a private and secure connection so that
network administrators can control network access.
Company Overview
Northwind Traders is a multi-national corporation that owns and operates a global chain
of retail stores. The corporate headquarters is in New York City, and it has branch
offices and retail locations throughout the United States and Europe. The corporate
office has 300 employees, and each of the branch offices has between 50-150
employees.
Existing Environment
All existing servers run Windows Server 2016. All client computers run Windows 10 Pro
Enterprise.
The corporate headquarters in New York has multiple file servers; whereas, each
branch office has one file server. Each file server has two hard disks. One disk has the
server’s operating system installed and the other disk stores data files. File server
backups are performed regularly.
The corporate headquarters has a Windows Server Update Services (WSUS) server. All
client computers are configured to receive updates from the WSUS server.
Planned Changes
Northwind Traders plans to open a new branch office in Rio de Janeiro, Brazil. The new
office will be responsible for setting up and managing a new series of Northwind
Traders retail shops throughout Brazil.
The new office in Rio de Janeiro will be responsible for translating all product
information and website data into Portuguese. Those translations will be added to the
Brazilian versions of the Northwind Traders websites by corporate employees of the
new office. These employees will also be responsible for all Brazilian marketing and PR
functions, which will include hiring local manufacturers to update all Northwind Traders
packaging with the Brazilian translations so that those products will be ready for local
markets. Employees will be encouraged to work with additional local partners to
collaborate on packaging, and to develop new products for local and global markets.
Employees of the new Rio branch office will only be allowed to access the Northwind
Traders network through wired connections. Employees will not be able to access the
corporate network outside of the new office, and they will not be able to remove their
network devices from the main building of the new office. There will be standard devices
available on the wired network, including printers, faxes, employee computers, and so
on. Employees with permissions will be able to access Northwind Traders’ corporate
network, any internal Northwind Traders’ websites, and the internet.
The new Rio de Janeiro office will be connected to the corporate network, which runs
Windows Server 2016 and Windows 10 Enterprise.
Module 3 Case Study Questions
Based on this scenario, please answer the following questions regarding network setup
in the new Rio de Janeiro office.
M3CS01
0.0/1.0 point (graded)
Corporate Network
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M3CS02
0.0/1.0 point (graded)
What sort of ports should the nodes in the Rio office use when sending information to
the other offices of the company, located in different countries/regions?
TCP ports
UDP ports
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M3CS03
0.0/1.0 point (graded)
Four
Seven
One
None
As many as the network engineers and executives feel are necessary, based on the
number of local employees and departments
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M3CS04
0.0/1.0 point (graded)
12
48
50
None
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M3CS05
0.0/1.0 point (graded)
Routers
Bridges
Servers
Printers
M308
0.0/1.0 point (graded)
They are associated with an exact physical location, which makes it easier for other
computers to find and connect to.
They are a permanent internet address that will always be the same so long as the user is
connecting from that location.
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M313
0.0/1.0 point (graded)
Which of the following is used with an IP address so information can reach its intended
recipient?
Subnet
Subnet mask
MAC address
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M310
0.0/1.0 point (graded)
Which of the following statements are true about User Datagram Protocol (UDP)?
(Select 2)
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M301
0.0/1.0 point (graded)
Which protocols control internet-related tasks such as working with web browsers and
network adapters?
Internet protocols
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
There are two different types of communication protocols. How many types of ports are
there?
One
Two
Three
Four
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M305
0.0/1.0 point (graded)
Which TCP Model layer controls routing and paths, and uses IP, ARP, and ICMP
protocols?
Application layer
Transport layer
Internet layer
Network Access layer
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M314
0.0/1.0 point (graded)
A subnet
A subnet mask
An individual IP address
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M309
0.0/1.0 point (graded)
Which statements are true about Transmission Control Protocol (TCP)? (Select 2)
It is a type of IP protocol.
It ensures information does not get lost, stays in order, and is not duplicated.
It is responsible for making the network connection reliable so IP can properly route
information to the correct location.
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M306
0.0/1.0 point (graded)
Which TCP Model layer translates data and sends data, and uses Ethernet Wi-Fi
(802.11) Mobile Broadband protocols?
Application layer
Transport layer
Internet layer
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M312
0.0/1.0 point (graded)
Subnet
Subnet mask
MAC address
Lesson Overview
Bookmark this page
Setting the proper configuration for a network management device like a router or
a switch
Scanning for and removing any viruses on the network, and any network devices
Adding a printer to the network and configuring it to work properly with other
network devices
Performance
Networking involves the transfer of information from one device to another. The information being
transferred might pass through hundreds of hardware and software components on the network before
reaching its final destination. If there is a problem with any one of these components, network
performance can be negatively affected, or fail entirely.
Timeouts
A timeout is when a network request ends without being completed because it took
too long.
Bottlenecks
A bottleneck refers to a limited data flow, where data appears to be “stuck” or
transferring very slowly.
Protocol problems
A protocol problem occurs when a network protocol doesn’t carry out the tasks it’s
supposed to.
Flooding
Flooding occurs when there is too much information being sent and received by the
network.
There are many ways to monitor, scan, and secure a network. The following
network components are designed to help complete such tasks:
Firewall
Gateway
A gateway is a point that acts as both a barrier and entrance to
another network. If a network user has access permissions, the user
can go through the gateway. If a network user does not have access
permissions, the gateway will not let the user continue to the other
network. There are different gateway types to suit different
networking needs. Some gateways require a lot of power and
resources, while others do not. It is important to consider what sort
of security tools will be the most efficient and useful for the specific
network you are working to secure.
Proxy Server
Timeouts
Internet Content Filter
An Internet content filter, or simply a content filter, is usually applied as software at
the application layer and it can filter out various types of Internet activities, such as
access to certain Web sites, email, instant messaging, and so on. There are
different types of filters available, but all of them inspect information and approve
or deny access based on pre-set security requirements.
Perimeter Network
All network administrators rely on network troubleshooting tools. There are many tools
that analyze, diagnose, and in some cases, resolve networking issues. It is important to
know the most commonly-used networking tools that help to troubleshoot most
networking issues.
ipconfig and netstat are tools that let us look deeply into the network configuration.
This helps people find network problems when there are performance issues.
ipconfig
When you are troubleshooting a network, it is very important that you find out the IP
configuration for each affected host (network device). ipconfig can find this IP
configuration information on Windows devices. In the module 3 videos, DHCP and DNS
protocols were covered. The ipconfig tool can also be used to update the settings for
the DHCP and DNS protocols.
To see the basic IP configuration for a computer, type command prompt into the
search bar on the bottom left of a Windows 10 computer and press Enter. This will
display a popup of the command prompt window, which is a text-only way to interact
with a computer’s operating system (such as Windows 10, Windows 8.1, and so on).
In the popup window, type ipconfig and press Enter. This will display the basic
configuration settings for that computer. This is the easiest way to figure out a
computer’s IP address.
Typing ipconfig into the command prompt displays a summary of the key network
information concerning that computer, including
netstat
When troubleshooting a network, it is important to know the state of a network device’s
active network connections. This information can be displayed using the netstat tool.
The netstat tool displays information about a computer’s active TCP/IP connections so
you can see the details of how a computer is communicating with other computers.
If you open the command prompt, type in netstat and press Enter, you will see a list of
that computer’s active connections, the ports they use, and the IP addresses and ports
of the other computers.
You can display even more information with the netstat tool by including the following
parameters after the netstat command:
1. To see the basic IP configuration for a computer, you must first open a Command Promp
windows. To do so, type cmd or command prompt into
the search bar on the bottom left of a Windows 10
computer and press Enter.
2. In the command prompt window, type ipconfig and press Enter. In the resulting
data that is displayed, try and locate the following information:
the IP address
3. Type ipconfig /all into the command prompt and press Enter to see a much
more detailed list of networking information about your computer.
4. Type netstat into the command prompt and press Enter to see a list of your
computer's active connections, the ports they use, and the IP addresses and ports of the other
computers.
netstat -a to display all the TCP/IP connections and ports the computer is
monitoring (this is a long list).
Microsoft Windows provides several additional tools to help troubleshoot issues with
device connectivity and data packet routing between devices.
Ping
The ping tool is a very common tool that is used to test connectivity between hosts
(network devices). This command uses the Internet Control Message protocol (ICMP),
which sends an “echo packet” to a destination host and listens for the destination host’s
reply. This is a technical way of saying that one device (device A) simply asks another
device (device B) if it can hear it. If device A receives a reply from device B, then the
two hosts are connected. If device A does not receive a reply from device B, then the
two hosts are not connected. The ping command measures the round-trip time for
messages sent from the originating host to a destination computer that are echoed back
to the originating host.
The ping tool helps to identify where network problems are coming from. For example, if
an office suddenly has no internet connection, the ping tool can be used to find out if the
problem is in a machine in the office, in the network, or in a server of the office’s ISP.
To use the ping tool, open up the command prompt and then type in ping, followed by a
space and then the IP address or DNS name you want to check (using the prior
analogy, this would be device B).
Tracert
After basic connectivity is confirmed with the ping tool, the tracert tool can gather more
details about the path of an information packet—from the sending host to the receiving
host, and all the hosts in between. Tracert determines the path taken to a destination by
sending Internet Control Message Protocol (ICMP) Echo Request messages to the
destination with incrementally increasing Time to Live (TTL) field values. For example,
the tracert tool can be used to find the path from a host in a local area network to a
Netflix host. Tracert is useful if the local device is testing ok but connectivity can’t be
established. For hosts running Linux, the traceroute tool would be used.
To use the tracert tool, open the command prompt, then type tracert followed by the
name of the host at the end of the route you are trying to trace.
Note that you may experience a “timeout” when you use this tool, where a part of the
request took too long. If you see asterisks (star symbols) instead of numbers where the
times are shown, that means you have experienced a timeout. When this happens try
the tracert command again. If timeouts keep occurring, it may be an indication there is a
problem with the router.
Pathping
To take advantage of the benefits of both the ping and tracert commands, pathping was
developed. pathping gives a more detailed picture of the path characteristics from a
specific host to a specific destination. There are several reasons why pathping can take
a long time to complete, including:
pathping can show the degree of packet loss at any specified router or link, thereby
enabling you to pinpoint links that might be causing network problems.
1. To run these commands, you must first open a Command Prompt windows. To do so,
type cmd or command prompt into the search bar on the
bottom left of a Windows 10 computer and press Enter.
2. In the command prompt window, type ping, then a space, and then the IP
address or DNS name you want to try and access. For example, if you want to test the
connectivity with www.microsoft.com, type ping www.microsoft.com and then press Enter.
3. After basic connectivity is confirmed with the ping tool, the Trace Route, or
tracert tool, can gather more details about the path of an information packet—from the
sending host to the receiving host, and all the hosts in between.
To use the tracert tool, type the tracert command followed by the name of the host at
the end of the route you are trying to trace. For example, type tracert
www.microsoft.com and then press Enter.
4. pathping can show the degree of packet loss at any specified router or
link, thereby enabling you to pinpoint links that might be causing network problems.
To use the pathping tool, type the pathping command, followed by a space, and the
end-host IP address or DNS name. For example, type pathping
www.microsoft.com and then press Enter.
A computer’s hosts file and protocols file identify the locations and protocols needed to
send information or start an action. Certain actions can’t get done without first knowing
where to go or what to do.
Hosts file. The hosts file is a list on your computer that stores names and matching IP
addresses.
Protocols file. The protocols file is a list on your computer that shows which protocols
are available on your computer.
nslookup
The nslookup tool is very important because it can look up the IP addresses associated
with domain names. It is much easier for network users to remember a domain name
like “www.xbox.com” or “www.microsoft.com.” Without the nslookup tool, every person
in the world would have to memorize specific IP address numbers to get to popular
websites. When users enter in a domain name into their internet browser, nslookup
finds and translates that domain name into the correct IP address.
If the nslookup can’t find this information, that means there is a DNS problem. The
nslookup tool can also contact DNS servers to see if the problem lies on the server or
on the host. The nslookup command-line tool is available only if you have installed the
TCP/IP protocol. You should be familiar with DNS before using this tool.
Telnet
Bookmark this page
Telnet is a remote tool that lets computers control other computers remotely. This is
useful in networking because Server-client networks that connect users from all around
the world are very popular. Users on these networks might need to work together on a
project even when they are located very far away from each other. Telnet makes this
easier because people can share or take over a program if they need to without having
to worry about being in the same location together. telnet is useful for IT troubleshooting
as well. And even peer-to-peer networks sometimes require tech support to take over
their computers to fix issues. Telnet is built into every router and switch, so it is easy to
set up remote access and control of another computer. Telnet is less secure because it
uses plain text to send information across networks—including passwords and other
sensitive information. It is being replaced with more modern solutions like Secure Shell
(SSH), which is a secure and encrypted way to remote into a network.
Sometimes telnet can be used to check the connection status of ports. This is useful
because you can see if there is a specific port error before going on to other
troubleshooting steps. However, telnet can be blocked by local and external antivirus
software and firewalls. It is best to leave troubleshooting with telnet to more advanced
network engineers until you get more experience in dealing with all the different network
items involved.
Lesson Overview
Bookmark this page
Troubleshooting usually involves finding the simplest and most common reason
something might not be working, and fixing it. Then, if the problem is still there, you find
the second simplest and most common reason and fix that. When you troubleshoot in
this way, you have a higher chance of resolving the problem much faster.There are lists
of these sorts of solutions that you can work through to resolve a networking problem as
quickly as possible.
2. To find out the name of your computer, enter the command **hostname**. If the computer has no
name, this will require troubleshooting from a network specialist.
If your computer can complete the ping, everything is properly working, in which
case the problem was likely caused by a user error or application error.
If the ping fails, then there may be a problem with the router. Continue to step 4
to see if there are further problems.
If this ping fails, that means there is an issue with name resolution, which means
there may be a problem with the DNS. Continue to step 5 to continue the troubleshooting steps.
If this ping fails, the problem may be in the configuration of the machine you are
using.
6. Ping 127.0.0.1
127.0.0.1 is the loopback Internet protocol (IP) address, which is also referred to
as the “localhost.” The address is used to establish an IP connection to the same machine or
computer being used by the end-user. This ping is a final check to determine whether your
machine has all the elements it needs for proper networking. If this ping is successful, that
confirms that the problem might be a misconfiguration of your IP address.
If this ping fails, the machine will need a network specialist to troubleshoot it and
may have to be reimaged.
Troubleshooting devices
Bookmark this page
1. If a device is not working at all, ensure it is plugged in and charging. If it will still not turn on while
it is plugged in, take it to a hardware repair
specialist.
2. If the device can be turned on but has general or network-specific issues, perform the
following tasks until the issues are resolved:
Use the Windows Defender Virus Scanner to run scans for any viruses and
ensure the device is up-to-date on all virus-related updates.
Turn off the device, and then turn it back on again.
Turn off the device, take the battery out, wait 30 seconds while holding the power
button down, and then turn it back on again. Waiting 30 seconds while holding the power button
is a way to make sure that all power is drained from the device so that it is fully turned off. Doing
this might help restore normal device functionality.
3. On modern PCs running Windows, you can use Windows 10 Troubleshooters to guide
you through basic troubleshooting steps. To start Windows 10 Troubleshooters,
type troubleshoot into the search field at the lower-left of your screen. A Troubleshooters
option will appear. Select it, then select the troubleshooter you want to try and follow the
instructions.
1. If hardware related to the wireless networking issue is not working, ensure it is plugged in to a
working power source.
2. Make sure wireless devices that depend on wires to send or boost the wireless signal
have cables that are properly connected at both ends. This applies to devices such as routers,
modems, adapters, and so on.
3. Check to make sure the wires or cables you are using are the right type and are not
frayed or broken.
4. Run test scan on hardware. There is a lot of scanning software available. Usually you
can download hardware scanning software from the website of a device’s original manufacturer.
5. Make sure frequencies are set correctly (2.4/5 GHz) and check for interference.
6. On modern PCs running Windows, you can use Windows 10 Troubleshooters to guide
you through basic troubleshooting steps. To start Windows 10 Troubleshooters,
type troubleshoot into the search field at the lower-left of your screen. A Troubleshooters
option will appear. Select it, then select the troubleshooter you want to try and follow the
instructions.
8. Turn off the device, take the battery out, wait 30 seconds while holding the power button
down, and then turn it back on again. Waiting 30 seconds while holding the power button is a
way to make sure that all power is drained from the device so that it is fully turned off. Doing this
might help restore normal device functionality.
1. If hardware related to the wired networking issue is not working, ensure it is plugged in to a
working power source.
2. Makes sure devices related to the wired networking issue have cables that are connected in at
both ends. This applies to devices such as
modems, servers, bridges, computers, and other devices.
3. Check to make sure the wires or cables you are using are the right type and are not
frayed or broken.
4. Run test scan on hardware. There is a lot of scanning software available. Usually you
can download hardware scanning software from the website of a device’s original manufacturer.
5. On modern PCs running Windows, you can use Windows 10 Troubleshooters to guide
you through basic troubleshooting steps. To start Windows 10 Troubleshooters,
type troubleshoot into the search field at the lower-left of your screen. A Troubleshooters
option will appear. Select it, then select the troubleshooter you want to try and follow the
instructions.
Company Overview
Northwind Traders is a multi-national corporation that owns and operates a global chain
of retail stores. The corporate headquarters is in New York City, and it has branch
offices and retail locations throughout the United States and Europe. The corporate
office has 300 employees, and each of the branch offices has between 50-150
employees.
Existing Environment
All existing servers run Windows Server 2016. All client computers run Windows 10 Pro
Enterprise.
The corporate headquarters in New York has multiple file servers; whereas, each
branch office has one file server. Each file server has two hard disks. One disk has the
server’s operating system installed and the other disk stores data files. File server
backups are performed regularly.
The corporate headquarters has a Windows Server Update Services (WSUS) server. All
client computers are configured to receive updates from the WSUS server.
Planned Changes
Northwind Traders plans to open a new branch office in Rio de Janeiro, Brazil. The new
office will be responsible for setting up and managing a new series of Northwind
Traders retail shops throughout Brazil.
The new office in Rio de Janeiro will be responsible for translating all product
information and website data into Portuguese. Those translations will be added to the
Brazilian versions of the Northwind Traders websites by corporate employees of the
new office. These employees will also be responsible for all Brazilian marketing and PR
functions, which will include hiring local manufacturers to update all Northwind Traders
packaging with the Brazilian translations so that those products will be ready for local
markets. Employees will be encouraged to work with additional local partners to
collaborate on packaging, and to develop new products for local and global markets.
Employees of the new Rio branch office will only be allowed to access the Northwind
Traders network through wired connections. Employees will not be able to access the
corporate network outside of the new office, and they will not be able to remove their
network devices from the main building of the new office. There will be standard devices
available on the wired network, including printers, faxes, employee computers, and so
on. Employees with permissions will be able to access Northwind Traders’ corporate
network, any internal Northwind Traders’ websites, and the internet.
The new Rio de Janeiro office will be connected to the corporate network, which runs
Windows Server 2016 and Windows 10 Enterprise.
M4CS01
0.0/1.0 point (graded)
What can the network engineers set up to ensure proper security for this new office?
(Select 4)
Firewall
Gateway
Proxy Server
Perimeter Network
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M4CS02
0.0/1.0 point (graded)
What can the network engineers set up to ensure that the new office’s download
bandwidth is handled efficiently? (Select 2)
Firewall
Gateway
Proxy Server
Perimeter Network
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M4CS03
0.0/1.0 point (graded)
What can the network engineers set up to ensure that customers and partners can only
access the things the company wants them to see?
Firewall
Gateway
Proxy Server
Perimeter Network
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M4CS04
0.0/1.0 point (graded)
If an employee in the new office needs to find the IP address and subnet mask of their
computer, which of the following tools should they use?
nslookup
ipconfig
netstat
ping
telnet
tracert
pathping
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M4CS05
0.0/1.0 point (graded)
If an employee in the new office needs to confirm basic connectivity between their
device and another device, which of the following tools could they use? (Select 2)
nslookup
ipconfig
netstat
ping
telnet
tracert
pathping
M405
0.0/1.0 point (graded)
Which of the following is a point that acts as both a barrier and entrance to another
network?
a firewall
a gateway
a proxy server
a perimeter network
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M406
0.0/1.0 point (graded)
Which of the following is the go-between between a LAN and the Internet?
a firewall
a gateway
a proxy server
a perimeter network
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M415
0.0/1.0 point (graded)
When there is a networking issue with a computer, what are two simple steps you can
take to troubleshoot the problem? (Select 2)
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M412
0.0/1.0 point (graded)
Which of the following tools can take a long time to run but provides the most detailed
picture of the path characteristics from a specific host to a specific destination?
ipconfig
netstat
Ping
Tracert
pathping
DNS
nslookup
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M404
0.0/1.0 point (graded)
Which of the following is a security system designed to stop unauthorized access into or
out of a private network?
a firewall
a gateway
a proxy server
a perimeter network
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M402
0.0/1.0 point (graded)
Fill in the blank. A performance issue known as _____________ occurs when network
protocols do not carry out the intended task.
a timeout
a bottleneck
a protocol problem
flooding
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M409
0.0/1.0 point (graded)
Which of the following would you use to find the state of a network device’s active
network connections?
ipconfig
netstat
Ping
Tracert
pathping
DNS
nslookup
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M401
0.0/1.0 point (graded)
Fill in the blank. A performance issue known as _____________ occurs when a network
request ends without being completed because it took too long.
a timeout
a bottleneck
a protocol problem
flooding
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
Which of the following is a small network set up separately from a company’s private
local area network and the Internet?
a firewall
a gateway
a proxy server
a perimeter network
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
M413
0.0/1.0 point (graded)
Which of the following translates a website location name or network location name to
an IP address that computers can recognize?
ipconfig
netstat
Ping
Tracert
pathping
DNS
nslookup
unanswered
Company Overview
Northwind Traders is a multi-national corporation that owns and operates a global chain
of retail stores. The corporate headquarters is in New York City, and it has branch
offices and retail locations throughout the United States and Europe. The corporate
office has 300 employees, and each of the branch offices has between 50-150
employees.
Existing Environment
All existing servers run Windows Server 2016. All client computers run Windows 10 Pro
Enterprise.
The corporate headquarters in New York has multiple file servers; whereas, each
branch office has one file server. Each file server has two hard disks. One disk has the
server’s operating system installed and the other disk stores data files. File server
backups are performed regularly.
The corporate headquarters has a Windows Server Update Services (WSUS) server. All
client computers are configured to receive updates from the WSUS server.
Planned Changes
Northwind Traders plans to open a new branch office in Rio de Janeiro, Brazil. The new
office will be responsible for setting up and managing a new series of Northwind
Traders retail shops throughout Brazil.
The new office in Rio de Janeiro will be responsible for translating all product
information and website data into Portuguese. Those translations will be added to the
Brazilian versions of the Northwind Traders websites by corporate employees of the
new office. These employees will also be responsible for all Brazilian marketing and PR
functions, which will include hiring local manufacturers to update all Northwind Traders
packaging with the Brazilian translations so that those products will be ready for local
markets. Employees will be encouraged to work with additional local partners to
collaborate on packaging, and to develop new products for local and global markets.
Employees of the new Rio branch office will only be allowed to access the Northwind
Traders network through wired connections. Employees will not be able to access the
corporate network outside of the new office, and they will not be able to remove their
network devices from the main building of the new office. There will be standard devices
available on the wired network, including printers, faxes, employee computers, and so
on. Employees with permissions will be able to access Northwind Traders’ corporate
network, any internal Northwind Traders’ websites, and the internet.
The new Rio de Janeiro office will be connected to the corporate network, which runs
Windows Server 2016 and Windows 10 Enterprise.
FCS01
0.0/1.0 point (graded)
What type of topology should the office use in its Translations department?
Star
Ring
Bus
Tree
Mesh
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
FCS02
0.0/1.0 point (graded)
What should the new office use to communicate with local corporate partners?
Internet
Intranet
Extranet
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
FCS03
0.0/1.0 point (graded)
What privacy measures should the new office install to provide optimum security for its
network? (Select 3)
Firewall
Encryption worms
Perimeter network
Security zone
Lock filters
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
FCS04
0.0/1.0 point (graded)
Which device should the network engineers use to ensure information sent from one
network to another is delivered as fast as possible?
Hub
Switch
Bridge
Router
Gateway
Repeater
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
FCS05
0.0/1.0 point (graded)
What should the network engineer do if users can’t find the network, or experience a
weak network? (Select 2)
Move the device that can’t connect so that it is closer to the router or repeater
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
FCS06
0.0/1.0 point (graded)
What actions should the administrator take to protect the network? (Select 5)
Use firewalls
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
FCS07
0.0/1.0 point (graded)
Based on the case study, how should the network engineers set up remote access for
this new office?
They should set up a VPN and route all remote access through that.
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
FCS08
0.0/1.0 point (graded)
Yes. The office will connect to the Internet, so it will need to use DNS.
No. The office will connect to the Internet, so it will not need to use DNS.
Yes. The office is not going to connect to the Internet, so it should use DNS.
No. The office is not going to connect to the Internet, so it should not use DNS.
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
FCS09
0.0/1.0 point (graded)
Which model should the network engineers use when setting up the new office?
The OSI model should always be used when setting up new networks.
The TCP model should always be used when setting up new networks.
New networks require a combination of the OSI model and the TCP model.
Network engineers should create or use whichever model will work best for the needs of the
office and company.
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
FCS10
0.0/1.0 point (graded)
If an employee in the new office needs to learn more about the path that information
data is taking from their computer to another device, which of the following tools could
they use? (Select 2)
nslookup
ipconfig
netstat
ping
telnet
tracert
pathping
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
FCS11
0.0/1.0 point (graded)
If an employee in the new office needs to troubleshoot his or her laptop, what are the
first steps the employee should perform?
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
FCS12
0.0/1.0 point (graded)
What is the first thing all employees of the new office should do if they are having
trouble connecting to the network, even though they have already done troubleshooting
steps on their device?
F25
0.0/1.0 point (graded)
Which of the following is a tool used to look up the IP addresses associated with domain
names?
ipconfig
netstat
Ping
Tracert
pathping
DNS
nslookup
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F03
0.0/1.0 point (graded)
Which of the following is an area network that links powerful computers in a cluster so
they can communicate at high speeds?
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F11
0.0/1.0 point (graded)
Which of the wired transmission media is used to join two network devices of the same
type?
Coaxial cables
USB cables
Crossover cables
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F05
0.0/1.0 point (graded)
Which of the following is a network that connects multiple star topology networks
together in a bus topology?
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F04
0.0/1.0 point (graded)
Which of the following is a network that connects all devices on the network together?
Star topology networks
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F24
0.0/1.0 point (graded)
Which of the following do you use to update DHCP and DNS settings?
ipconfig
netstat
Ping
Tracert
pathping
DNS
nslookup
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F10
0.0/1.0 point (graded)
Which of the following can you do to make sure your wireless network is secure?
(Select 3)
Use firewalls
Use a router
Change cables
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F01
0.0/1.0 point (graded)
Which of the following is a small network that is set up separately from a company’s
private local area network (LAN) and the internet?
Internet
Intranet
Extranet
Perimeter network
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F28
0.0/1.0 point (graded)
Which of the following is a basic troubleshooting step you should try when a computer
cannot communicate with anything?
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F21
0.0/1.0 point (graded)
Which protocols are used by network routers to identify routers, manage paths between
data sources and data destinations, and make decisions about where to route data?
Internet protocols
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F12
0.0/1.0 point (graded)
Which of the wired transmission media are pieces of hardware inside computers that
have special protocols that allow them to communicate to USBs?
Coaxial cables
USB cables
Crossover cables
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F17
0.0/1.0 point (graded)
A port is the first and last stop for information being sent across a network. How many
ports are there for each application?
One
Two
Five
Ten
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F19
0.0/1.0 point (graded)
Routing and Remote Access Services (RRAS) supports which of the following?
Packaging information with precise instructions and sending it out into the network.
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F22
0.0/1.0 point (graded)
Fill in the blank. A performance issue known as _____________ occurs when there is
limited data flow, or where data appears to be “stuck” or transferring very slowly.
a timeout
a bottleneck
a protocol problem
flooding
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F20
0.0/1.0 point (graded)
They are associated with an exact physical location, which makes it easier for other
computers to find and connect to.
They are a permanent internet address that will always be the same so long as the user is
connecting from that location.
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F27
0.0/1.0 point (graded)
Which of the following do you use to find the IP configuration information on Windows
devices?
ipconfig
netstat
Ping
Tracert
pathping
DNS
nslookup
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F02
0.0/1.0 point (graded)
Which of the following is an area network that connects data storage devices to
servers?
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
Which of the following is a network that connects each device to a switch or hub with a
dedicated cable?
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F18
0.0/1.0 point (graded)
LAN-to-LAN
LAN-to-WAN
DHCP
VPN
HTTP
unanswered
Submit
You have used 0 of 1 attemptSome problems have options such as save, reset, hints, or show answer.
These options follow the Submit button.
F07
0.0/1.0 point (graded)
Which of the following is a private computer network that provides limited access to
parts of an organization’s internet?
Internet
Intranet
Extranet
Perimeter network
NETWORK HARDWARE AND SOFTWARE
The hardware devices and software used to create networks are located
throughout the world, and even in space! Businesses often set up networks
that connect all their employees in one building. Cable TV companies send
out their TV signals from space satellites that orbit the planet. And many
people from around the world network with each other every day when they
use the Internet. The internet is the largest network in the world. After it
was created in the 1990s, networks increased in popularity with many
network users visiting public websites and file-sharing sites.
Special hardware for networks include routers and network cables. These are
used to move information from one place to another and connect computers
and devices together. Special software for networks enables users to do
useful things and allows data to be transferred from one location on a
network to another.