CompTIA Network+ Guide To Networks (MindTap Course List)
CompTIA Network+ Guide To Networks (MindTap Course List)
Figure 3. A web browser (client application) requests a web page from a web server (server
application)
Protocols are the way these networked devices communicate. The 2 primary network
protocols are TCP (transmission Control Protocol) and IP (Internet Protocol), and the
suite of all the protocols an OS uses for communication is the TCP/IP.
Popular client-server applications:
Web services: A web server serves up web pages to clients, uses HTTP
(HyperText Transfer Protocol) and HTTPs (HTTP Secure, which is HTTP layered
by SSL (Secure Socket Layer) or TLS (Transport Layer Security)).
Email services: The client uses SMTP (Simple Mail Transfer Protocol) to send an
email message to the first server (SMTP server). The first server sends the
message on to the receiver’s mail server, which delivers the message to the
receiving client using POP3 (Post Office Protocol v3) or IMAP4 (Internet
Message Access Protocol v4). Using POP3 will download the email to the client
computer and remove it from the server, while IMAP4 only download the email.
A LAN can have several switches. A backbone is a central conduit that connects the
segments of a network (yellow lines).
A LAN needs to communicate with other networks. A router is a device that manages
traffic between two or more networks and find the best path for traffic to get from one
network to another. A home network might use a combination device, which is both a
router and a switch, and perhaps a wireless access point. Don’t confuse this combo
device with a dedicated router device in which each port connects to a different LAN,
the key difference is that a switch belongs to a single LAN, while a router belongs to
multiple LANs. The router acts as a gateway between multiple networks, but a switch
can only communicate within a single network. Infact, routers are often referred to
gateways.
A host is any endpoint device connected to a network that hosts or accesses a resource
such as an application or data. A node is any device connected to a network that can be
addressed on the local network. Hosts are networked devices, nodes are networking
device.
A group of LANs that spread over a wide geographical area is called a WAN (wide area
network).
A group of connected LANs in the same geographical area is known as a MAN
(metropolitan area network)
WLAN (wireless local area network) consists of two or more devices connected
wirelessly.
In addition, there are more sizes of network, such as CAN (campus area network), PAN
(personal area network), SAN (storage area network).
Figure 9. Names for a PDU (Protocol Data Unit) or message as it moves from one layer to
another
A four-layer model similar to the OSI model is the TCP/IP model: application, transport,
internet and link layer. While the OSI model is preferred in reference to theoretical
concepts and troubleshooting techniques, the TCP/IP model is used to refer to the
protocols used at each layer.
2. Module 2: Infrastructure And Documentation
2.1. Components of Structured Cabling
Demarc (demarcation point) is the device where WAN ends and the LAN begins.
MDF (main distribution frame) can refer either to the racks holding the network
equipment or to the room that houses both the racks and the equipment.
Data Room is an enclosed space that holds network equipment. It requires good cooling
and ventilation systems for maintaining a constant temperature.
Racks hold various network equipment, ensure adaquate spacing, access and
ventilation for the devices.
Patch panel provides a central termination point when many patch cables converge in a
single location.
VoIP telephone equipment is the device which converts signals from a campus’s analog
phone equipment into IP data that can travel over the Internet.
IDF (intermediate distribution frame) provides an intermediate connection between the
MDF and end-user equipment on each floor and in each building.
3 basic types of cable installation:
Patch cable: short (3-25 feet) length with connectors at both ends.
Horizontal cabling: connects workstations to the closest data room and to
switches housed in the room.
Backbone cabling: cable or wireless links provide interconnection between the
entrance facility and MDF and between the MDF and IDFs.
The process of designing, implementing and maintaining an entire network is called the
system life cycle.
Requirements analysis: Identify network requirements and business needs.
Design planning: Progress from big picture goals to detailed decisions.
Development and testing: Purchase equipment and test before deploying.
Implementation: Deploy new equipment, replace old ones and test to achieve a
new stable baseline.
Documentation and maintenance: Apply effective monitoring techniques and
keep documentation updated.
Figure 13. Phrases of a network system life cycle
Inventory management refers to the monitoring and maintaining of all network assets.
The first step is to list all the components:
Hardware (including virtual hardware): Configuration files, model number, serial
number, location on the network, and technical support contact.
Software (including operating systems): Version number, vendor, licensing, and
technical support contact.
4 types of software changes:
Installation
Patch
Upgrade
Rollback
Steps for changing software or hardware:
1) Don’t allow patches to be auutomatically installed. You need to fully understand
the impact of any change before you allow that change.
2) Determine whether the patch or upgrade is necessary.
3) Read the vendor’s documentation regarding the patch or upgrade to learn its
purpose, and understand how it will affect the system, whether or not it is
compatible with current hardware and software, and how to apply or undo the
change.
4) Before deploying, test it in a lab to make sure it acts as expected.
5) Determine whether the change should apply to users, network segments, or
devices.
6) Schedule the change for completion during off-hours (unless emergency).
7) Before the change is made, inform system administrators and affected users. If
necessary, prevent users from accessing the system.
8) Back up the current system, software or hardware configuration before making
any modifications.
9) Keep the installation instructions and vendor documentation handy as you
implement the change.
10)After the change is implemented, test the system in real time. Note any
unintended or unanticipated consequences of the modification.
11) If the change was successful, reenable access to the system. If not, revert to the
previous version according to your rollback plan.
12)Inform system administrators and affected users when the change is complete.
13)Record your change in the change management system.
3. Addressing
3.1. Addressing Overview
Data link layer MAC (Media Access Control) address: is embedded on every NIC and
assumed to be unique to that NIC. A MAC address is 48 bits, written as six hex number
separated by colons (00:60:8C:00:54:99). Node on a LAN find each other using their
MAC addresses. Switches check MAC address to determine where to send messages
on the LAN.
Network layer IP address: is used to find any computer in the world if the IP address is
public. For routing purposes, an IP address is used only at the network layer. Routers
check IP addresses to determine which network a message is destined for.
IPv4: 32 bits and are written as 4 decimal numbers called octets (92.106.50.200).
Each octet in binary consists of 8 bits (92 = 0101 1100).
IPv6: 128 bits and eight blocks of hex number
(2001:0DB8:0B80:0000:0000:00D3:9C5A:00CC). Each block contains 16 bits.
Transport layer ports: used to identify one application among several that are running on
a host.
Every host on a network is assigned a unique character-based name called the FQDN
(fully qualified domain name) (susan.company.com). The last 2 parts (company.com)
are called domain name. The first part is the host name (susan), which identifies the
individual computer on the network.
Figure 16. The switch learned ealier which port the destination MAC address is connected to
3.3. IP Addresses
Where switches need MAC addresses to identify devices in a network, routers rely on
IP addresses to locate devices across networks.
You can assign a static IP address to a device, or configure the device to request and
lease a dynamic IP address from a DHCP server, which manages the dynamic
distribution of IP addresses to devices on a network.
A subnet mask is a 32-bit number that helps one computer find another. It is used to
indicate what part of an IP address’s bits are the network portion, called network ID, and
which bits consist of the host portion, called the host ID or node ID. A subnet is a similar
network within a larger network.
A gateway is a device that host uses to access another network. The default gateway is
the routing device that nodes on the network turn to for access to the outside world.
3.3.1. IPv4
Classful IPv4 addresses are categorized into 5 classes: A, B, C, D, E. Class A, B, C can
be used to connect to and access Internet resources. Class D addresses (start with 224
to 239) are used for multicast (one host sends messages to multiple hosts). Class E
addresses (begin with 240 to 254) are reserved for research.
Class A, B, C licensed IP addresses are available for use on the Internet and called
public IP addresses. To conserve, a company can instead use private IP addresses for
devices on its private networks, that is devices do not directly connect to the Internet but
instead communicate through a device such as a router. A router and a web server
might have a public IP address, but laptops, desktops... might all have private IP
addresses. RFC1918 allocated IP addresses for private networks:
Class A: 10.0.0.0 to 10.255.255.255
Class B: 172.16.0.0 to 172.31.255.255
Class C: 192.168.0.0 to 192.168.255.255
Reserved IP addresses:
255.255.255.255: used for broadcast messages.
0.0.0.0: unassigned.
127.0.0.1 to 127.255.255.254: loopback address, used for research or indicate
your own computer.
169.254.0.1 to 169.254.255.254: Automatic Private IP Addressing when a
computer configured for DHCP first connects to the network and unable to lease
an IPv4 address from the DHCP server.
Classless addressing allows the dividing line between network and host portions.
Shifting this dividing line allows for segmenting networks within networks is called
subnetting. With classless addressing, you rely on a variety of subnet mask values to
communicate any number of bits used for the network or host portions.
CIDR (cider) notation takes the network ID or a host’s IP address and follows it with a
forward slash (/), then is followed by the number of bits used for the network ID.
Example: 192.168.89.127/24.
DHCP (Dymanic Host Configuration Protocol) server automatically assigned IP for
devices connecting to the network.
Scope option: set the starting IP address to ending IP address, others are
reserved.
Lease time: a time limit before requiring a host renew a new DHCP IP address.
Primary and secondary DNS server addresses: clients use to match computer
names with IP addresses.
DHCP reservation: IP addresses outside the scope, allow client to have the same
IP address every time it requests one (a static IP address is configured never
requests an IP address).
NAT (Network Address Translation) is the process of substituting the private IP
addresses used by computers on the private network with its own public IP address.
Using NAT, the gateway hides the entire private network’s hosts behind a single public
IP address.
PAT (Port Address Translation) assigns a separate TCP port to each session between a
local host and an Internet host.
2 variations of NAT:
SNAT (Source NAT): the gateway assigns the same public IP address to a host
each time it makes a request to access the Internet.
DNAT (Destination NAT): When a message sent to the public IP address reaches
the router managing DNAT, the destination IP address is changed to the private
IP address of the host inside the network.
IPv6 can autoconfigure its own link local IP address without the help of a DHCPv6
sever. It is called SLAAC (Stateless address autoconfiguration) and similar to APIPA
address in IPv4 bit results in an address the computer can continue to use on the
network.
13 clusters of root DNS servers hold information used to locate the TLD servers.
TLD (Top-Level Domain) servers hold information about the authoritative name
servers owned by organizations.
Figure 22. Queries for name resolution
Step 1: The client computer searches its DNS cache on local computer. If it can’t
find www.mdc.edu there, the resolver sends a DNS query to its local DNS server.
Step 2-3: The local name server queries a root server. The root server responds
to the local name server with a list of IP addresses of TLD name server
responsible for TLD .edu suffix.
Step 4-5: The local name server makes the same request to one of the TLD
name servers responsible for the TLD suffix. The TLD name server responds
with the IP address of the .mdc.edu authoritative server.
Step 6-7: The local name server makes the request to the authoritative name
server, which responds the IP address of www.mdc.edu host.
Step 8: The local name server responds to the client resolver with the requested
IP address.
2 types of DNS requests:
Recursive lookup: A query that demands a resolution or the answer “It can’t be
found.”
Iterative lookup: A query that does not demand resolution.
DNS troubleshooting tools:
ping
ipconfig/ifconfig
hostname
nslookup/dig: allows you to query the DNS database from any computer on the
network and find the host name of a device by specifying its IP address
4. Protocols
4.1. TCP/IP Core Protocols
TCP/IP is a suite of protocols, or standards including TCP, IP, UDP, ARP...
TCP (Transmission Control Protocol) provides reliable data delivery services.
Connection-oriented: TCP use three-way handshake process to establish a TCP
connection.
Sequence and checksum: TCP sends a character string called a checkup, TCP
on the destination host then generate a similar string. If the two checksums fail to
match, the destination asks the source to retransmit the data.
Flow control: it is the process of gauging the appropriate rate of transmission
based on how quickly the recipient can accept data.
Three-way handshake
Figure 24. The three-way handshake
Command on Windows
View: arp -a
Flush: arp -d <IP>
Add static entry: arp -s IP MAC
4.1.7. Ethernet
It is the most popular network technology used on modern LANs. Ethernet II is the
current Ethernet standard.
MTU (maximum transmission unit) is the largest size, in bytes, that routers in a
message’s path will allow at the network layer. It defines the maximum payload size that
a layer 2 frame can encapsulate.
There are notable exceptions
Ethernet frames on a VLAN can have an extra 4-byte field between the Source
address field and the Type field.
Some special-purpose networks allows for a jumbo frame, in which the MTU can
be set above 9000 bytes, depending on the type of Ethernet architecture used.
Public key encryption: encrypted by using a private key known only to the user,
and decrypted by a public key that available through a third-party source (PKI –
public key infrastructure). Alternatively, data can be encrypted with the public key,
and then can only be decrypted with the matching private key. It is also known as
asymmetric encryption. Users use digital certificate, which is small file containing
that user’s verified identification information and the user’s public key, to simplify
and secure key management.
Figure 32. Pubic key encryption
Client-to-site VPN: the tunnel created between the client and the headend
encrypts and encapsulates data. Only the VPN headend needs a static public IP
address. Each remote client on a client-to-site VPN must either run VPN software
to connect to the VPN headend.
Figure 34. Client-to-site VPN
Host-to-host VPN: two computers create a VPN tunnel directly between them.
VPN tunneling approaches:
Full tunnel VPN: Captures all network traffic.
Split tunnel VPN: Only captures traffic desired for the corporate network.
GRE (Generic Routing Encapsulation) is a layer 3 protocol used to transmit messages
through a tunnel, developed by Cisco.
Multipoint VPNs:
mGRE (multipoint GRE) protocol allows the configuration of multiple tunnel
destinations on a single interface.
Requires spoke routers at branch locations to communicate with the hub router
at the headquaters to annouce and collect updated IP address information for
other spoke routers.
DMVPN (Dynamic Multipoint VPN): dynamically creates VPN tunnels between
branch locations as needed rather than requiring constant, static tunnels for site-
to-site connections.
Figure 35. VPN tunneling approaches
6. Wireless Networking
6.1. Characteristic of wireless transmissions
LANs that transmit signals through the air via RF (radio frequency) waves are known as
WLANs (wireless local area networks).
The wireless spectrum is the frequency range of waves used for data and voice
communication. It’s band is between 9kHz and 300GHz.
Kinds of wireless:
RFID (Radio Frequency Identification): store data on a small chip in an RFID tag,
which includes an antenna that can both transmit and receive.
NFC (near-field communication): transfer data wirelessly over very short
distances. The NFC tag collects power by magnetic induction.
Z-Wave is a smart home protocol that provides two basic types of functions:
signaling to manage wireless connections or control to transmit data (commands)
between devices. Devices on the netwok are identify by a 1-byte Node ID, and
the entire network has a 4-byte Network ID.
Bluetooth: unite separate entities, under a single communications standard. It
requires close proximity to form a connection.
ANT+: gathers and tracks information from sensors that are typically embedded
in activity monitoring devices. Unlike bluetooth, ANT+ can also sync data from
multiple devices for the same activity.
IR (infrared): is used primarily to collect data through various sensors. It requires
a nearly unobstructed LOS (line of sight) between the transmitter and receiver.
Channel Management
To allow multiple devices to share the same band, the band is subdivided into channels,
and channels are further subdivided into narrowband channels.
FHSS (frequency hopping spread spectrum): a short burst of data is transmitted
on a particular frequency within the band, and the next burst goes to the next
frequency in the sequence. Ex: bluetooth
DSSS (direct sequence spread spectrum): data streams are divided and
encoded into small chunks, which are spread over all available frequencies within
one of three wide channels, all at the same time. Ex: wifi
Even with the frequency spread of FHSS or DSSS to avoid interference, collisions can
still happen. Each technology has a procedure to follow when it senses a collision.
Antennas
The lack of fixed path requires wireless signals to be transmitted differently than wired
signals. Antenna resolves this problem, it emits the signal as a series of electromagnetic
waves into the atmosphere.
Figure 36. Wireless transmission
Two antennas must be tuned to the same frequency so they can communicate on the
same channel. Receivers must be located within a transmitter’s range to receive signal
consistently. Two basic categories:
Directional antenna: issues wireless signals along a single direction.
Omnidirectional antenna: issues and receives wireless signals with equal
strength and clarity in all directions.
Association and Wireless Topologies
Association is a process involves a number of packet exchanges between access point
and your devices. Besides, your devices also periodically surveys its surroundings for
evidence of an access point, known as scanning.
Active scanning: the client takes the initiative
o The device transmits a special frame (probe) on all available channels
within its frequency range.
o An AP detects the probe frame, issues a probe response for that device.
o The device can agree to associate with that AP.
o The two nodes begin communicating over the frequency channel specified
by the AP.
Passive scanning: the AP takes the initiative
o A wireless-enabled device listens on all channels within its frequency
range.
o The device can choose to associate with the AP.
o The two nodes agree on a frequency channel and begin communicating.
AP and antenna placement: positioning the AP in the center of it’s intended range
increases the strength of the signal for users. Consider what antenna placement will
give the best signal where you want it and reduce the strength of the signal outside your
building or other intended range.
Guest network: The guest network has a separate SSID and passphrase and can be
managed with different rules or time restrictions.
Wireless client isolation: It allows a client onto the network but imposes firewall rules to
restrict that client’s ability to communicate with only the default gateway. If you provide a
guest network, be sure to set up a captive portal. It is the first page a new client sees
when connecting to the guest network, and it usually requires the user to agree to a set
of terms and conditions.
6.3. Troubleshooting
Spectrum analyzer: assess the quality of a wireless signal by scanning a band of
frequencies for signal and noise.
Wi-Fi analyzer: evaluate Wi-Fi network availability as well as help optimize Wi-Fi signal
settings.
Slow connections
Insufficient wireless coverage: If a client is too far from an AP or if there are too
many obstacles between the two nodes, communication might occur, but data
errors become more probable and slow down communication.
RF attenuation/signal loss: If the strength of the signal the AP emits is too low, it
will result in dropped signals as clients roam to the peripheral areas of the AP’s
range. Otherwise, maxed out power levels will result in too much overlap
between AP coverage areas. Begin with a 50% power setting, and make
incremental changes as needed to optimize the amount of overlap between APs.
Also keep in mind that even if a client can receive a signal from a high-powered
AP installed on the other end if the building, the return signal from the client
might not be reliably strong enough to reach the AP, which is called a near–far
effect.
Interference
Channel overlap: Using channels or frequencies that are too close to each other
on the frequency spectrum can interfere with each other’s transmissions. You can
use a Wi-Fi analyzer to determine which channels are being used by nearby
wireless networks, and then utilize a less crowded channel.
Wireless standard specifications
Simultaneous wired and wireless connections
Problem with firmware updates
Incorrect antenna type
Mismatched antenna polarization
Client saturation or overcapacity: A SOHO network’s AP might take 10-15
devices before becoming overwhelmed.
Client disassociation issues: If client is frequently disassociating from the AP,
confirm the AP is not using an overly crowded Wi-Fi channel and consider using
a narrower channel.
Traffic between hosts on VLAN 1 and VLAN 2 must go through the router. The ports for
a VLAN don’t have to be located next to each other, each port is individually configured
to belong to a specific VLAN. All transmissions coming from the connected host will be
associated with the VLAN on that switch’s port.
A switch can support more than one VLAN. A VLAN can include ports from more than
one switch.
Figure 42. 3 switches on a LAN with multiple VLANs