Networking 1 Reviewer
Networking 1 Reviewer
A. MAIN
1 2 3 4 5 6
1.Network devices;
1 2 3 4 5 6
1. Routers (15)
2. Switches (9)
3. Hubs (3)
5. Security (2)
2. End Devices;
1 2 3 4 5
2. Home (28)
4. Industrial (21)
1 2 3
1. Boards (3)
2. Actuators ()
3. Sensors (14)
4. Connections;
1 2
1. Connections
1 2 3 4 5 6 7 8 9 10 11 12
2. Console
3. Copper Straight-Through
4. Copper Cross-Over
5. Fiber
6. Phone
7. Coaxial
8. Serial DCE
9. Serial DTE
10. Octal
12. USB
2. Structured Cabling
5. Miscellaneous (7)
6. Multiuser Connection (1)
Module 1
Module 2
Peer-to-peer
Router CLI Config (Connecting 2 Pc’s)
Steps:
4. Provide the IP address. Type (ip address 192.168.10.1 255.255.255.0) then enter
Steps:
Types of Servers:
(Peer-to-Peer) - This type of network design is only recommended for every small network
Advantage – Easy to set up; Less complex; Lower cost
(End Devices) - Is where a message originates from where it is received. Data originates with an
end device, flows through the network, and arrives at an end device.
(Network Media) - Communication across a network is carried out through a medium which
allows a message to travel from source to destination.
Media Types:
Glass or plastic fibers within cables (fiber-optic cable) - Uses pulses of light
Network diagrams, often called topology diagrams, use symbols to represent devices within the
network.
End Devices:
-Desktop Computer
-Laptop
-Printer
-IP Phone
-Wireless tablet
Intermediary Devices
-Wireless Router
-LAN Switch
-Router
-Multilayer Switch
-Firewall Appliance
Network Media
-Wireless Media
-LAN Media
-WAN Media
(Physical Topology) - Diagrams illustrate the physical location of intermediary devices and cable
installation.
(Logical Topology) - Illustrate devices, ports, and the addressing scheme of the network.
(Small Home Networks) - Connect a few computers to each other and the internet.
(Small Office/Home Office (SOHO)) - Enables computer within a home or remote office to
connect to a corporate network.
The Internet:
-IETF
-ICANN
-IAB
(Intranet) - A private collection of LANs and WANs internal to an organization that is meant to
be accessible only to the organization members or others with authorization.
(Extranet) - Provide secure access to their network for individuals who work for a different
organization that need access to their data on their network.
(Cable) - high bandwidth, always on, internet offered by cable television service providers.
(DSL) - high bandwidth, always on, internet connection that runs over a telephone line.
(Dedicated Leased Line) - Reserved circuits within the service provider’s network that connect
distant offices with private voice and/or data networking.
(Ethernet WAN) - This extends LAN access technology into the WAN.
(DSL) - Business DSL is available in various formats including Symmetric Digital Subscribers Lines
(SDSL).
(Satellite) - This can provide a connection when a wired solution is not available.
-Data
-Voice
-Video
(Network Architecture) - Refers to the technologies that support the infrastructure that moves data
across the network.
4 Basic Characteristics
(Fault Tolerance) - Limits the impact of failure by limiting the number of affected devices. Multiple paths
are required for fault tolerance.
(Scalability) - Can expand quickly and easily to support new users and applications without impacting
the performance of services to existing users.
(Quality of Service (QoS)) - Is the primary mechanism used to ensure reliable delivery of content for all
users.
Recent Trends
(Bring your own device (BYOD)) - Allows users to use their own devices giving them more opportunities
and greater flexibility. (Ex. Laptops, Netbooks, Tablets, Smartphones, E-readers).
(Video Communication) - Calls are made to anyone, regardless of where they are located.
(Cloud Computing) - Allows us to store personal files or backup our data on servers over the internet
4 Types of Clouds:
(Public Clouds) - available to the public through a pay-per-user model or for free.
(Private Clouds) - Intended for a specific organization or entity such as the government.
(Hybrid Clouds) - Made up of two or more Cloud types – Ex. Part custom and part Public.
(Custom Clouds) - Built to meet the needs of a specific industry, such as healthcare or media. Can be
private or public.
(Powerline Networking) - Can allow devices to connect to a LAN where data network cables or wireless
communications are not a viable option.
(Wireless Broadband) - Is another solution for the home and small businesses.
External Threats:
-Zero-day attacks
-Identify theft
Operating Systems:
(Shell) - User Interface that allows users to request specific tasks from the computer (CLI or GUI)
(Kernel) - Communicates between the hardware and manages how hardware resources are used to
meet software requirements.
GUI (Graphical User Interface) - Allows the user to interact with the system using an environment of
graphical icons, menus, and windows.
Purpose of an OS
Access Methods:
(Console) - A physical management port used to access a device to provide maintenance, such as
performing the initial configurations.
(Secure Shell (SSH)) - Establishes a secure remote CLI connection to a device, through a virtual interface,
over a network. Recommended method for remotely connecting to a device.
(Telnet) - Establishes an insecure remote CLI connection to a device over the network. User
authentication, passwords and commands are sent over the network in plaintext.
Terminal Emulation Programs:
(Terminal emulation programs) - Are used to connect to a network device by either a console port or by
an SSH/Telnet connection.
(Uses EXEC Mode) - Allows access to only a limited number of basic monitoring commands.
(Command) - Might require one or more arguments. Determine the keywords and arguments required
for a command, refer to the command syntax.
([x {y | z} ]) - Required choice within an optional element. Spaces are used to clearly delineate parts of
the command.
(Command syntax check) - Verifies that a valid command was entered by the user.
-If the interpreter cannot understand the command being entered, it will provide feedback describing
what is wrong with command
(IOS CLI) - Provides hot keys and shortcuts that make configuring, monitoring, and troubleshooting
easier.
Keystroke:
(Left Arrow or ctrl+B) - Moves the cursor one character to the left.
(Right Arrow or ctrl+P) - Recalls the commands in the history buffer, beginning with the most recent
commands.
(Any other key) - End the display string, returning to privileged EXEC mode.
(Ctrl + C) - When in any configuration mode, ends the configuration mode and returns to
privileged EXEC mode.
(Ctrl + Shift + 6) - All-purpose break sequences used to abort DNS lookups, traceroutes, pings,
etc.
Configuration Files
(Running-config) - Stored in Random Access Memory (RAM). Reflects the current configuration.
Modifying a running configuration affects the operation of Cisco device immediately.
(Alter the Running Configurations) - It changes made to the running config do not have the desired
effect and the running-config has not yet been saved, you can restore the device to its previous
configuration.
Step 1: Open terminal emulation software, such as PuTTY or Tera Term, that is already connected to a
switch.
Step 2: Enable logging in to the terminal Software and assign a name and file location to save the log
file. The figure displays that All session output will be captured to the file specified.
Step 3: Execute the show running config or show startup-config command at the privileged EXEC
prompt. Text displayed in the terminal window will be placed into the chosen file.
Step 4: Disable logging in the terminal software. The figure shows how to disable logging by choosing
the Non session logging option.
IP Addresses:
(Use of IP Addresses) - is the primary means of enabling devices to locate one another and establish
end-to-end communication on the internet.
Structure of an Ipv4 address is called (dotted decimal notation) and is represented by four decimal
numbers between 0 and 255.
IPv4 subnet mask is a (32-bit) value that differentiates the network portion of the address from
the host portion.
IPv6 addresses are (128 bits) in length and written as a string of hexadecimal values.
IPv6 addresses are not case-sensitive and can be written in either lowercase or uppercase.
-Coaxial Cables
-Wireless
-Control Panel
And choose the adapter. Next, right-click and select Properties to display the Local Area Connection
Properties;
Next, click Properties to open the Internet Protocol Version 4 (TCP/IPv4) Properties window. Then
configure the IPv4 address and subnet mask information, and default gateway.
(DHCP) - enables automatic IPv4 address configuration for every end device that is DHCP-enabled.
-Control Panel
Next, right-click and select Properties to display the Local Area Connection Properties.
Next, click Properties to open Internet Protocol Version 4 (TCP/IPv4) Properties window, then
select Obtain an IP Address automatically and Obtain DNS server address automatically.
-Next assign an IPv4 address using the IP address IP-address subnet-mask command.
Communication Fundamentals
-Source (sender)
-Destination (receiver)
Communication Protocols
-Message encoding
-Message size
-Message timing
(Encoding) - Is the process of converting information into another acceptable form for transmission.
Message Timing
(Flow Control) - Manages the rate of data transmission and defines how much information can be sent
and the speed at which it can be delivered.
(Response Timeout) - Manages how long a device waits when it does not hear a reply from the
destination.
(Access method) - Determines when someone can send a message.
3.2 Protocols
Protocol Types:
(Network Communications) - Enable two or more devices to communicate over one or more networks
(Network Security) - Secure data to provide authentication, data integrity, and data encryption.
(Routing) - Enable routers to exchange rout information, compare path information, and select best
path.
Functions:
Protocol:
(Hypertext Transfer Protocol/HTTP) - Governs the way a web server and a web client interact
(Internet Protocol/IP) - Delivers messages globally from the sender to the receiver.
(Ethernet) - Delivers messages from one NIC to another NIC on the same Ethernet Local Area Network
(LAN).
(Internet Protocol Suite or TP/IP) - The most common protocol suite and maintained by the internet
Engineering Task Force (IETF).
(TCP/IP) - An open standard protocol suite that is freely available to the public and can be used by any
vendor.
-Interoperability
-Competition
-Innovation
Internet Standards:
(Internet Society (ISOC)) - Promotes the open development and revolution of the internet.
(Internet Architecture Board (IAB)) - Responsible for management and development of internet
standards.
(Internet Engineering Task Force) - Develops, updates, and maintains internet and TCP/IP
technologies.
(Internet Research Task Force (IRTF)) - Focused on long-term research related to the internet.
(Internet Corporation for Assigned Names and Number (ICANN)) - Coordinates IP address
allocation, the management of domain names, and assignment of other information.
(Internet Assigned Numbers Authority) - Overseas and manages IP address allocation, domain
name management, and protocol identifiers for ICAN.
(Institute of Electrical and Electronics/ IEEE) - Dedicated to creating standards in power and energy,
healthcare, telecommunications, and networking.
(Electronic Industries Alliance/EIA) - Develops standards relating to electrical wiring, connectors, and
the 19-inch racks used to mount networking equipment.
-Foster competition because products from different vendors can work together.
-Prevent technology or capability changes in one layer from affecting other layers above and below.
(Presentation) - Provides a common representation of the data transferred between application layer
devices.
(Session) - Provides services to the presentation layer and to manage data exchange.
(Transport) - Defines services to segment, transfer, and reassemble the data for individual
communications.
(Network) - Provides services to exchange individual pieces of data over the network.
(Data Link) - Describes methods for exchanging data frames over a common media.
(Physical) - Describes the means to activate, maintain, and de-activate physical connections.
(Application) - Represents data to the user, plus encoding and dialing control.
(Network Access) - Controls the hardware devices and media that make up the network.
(Increases speed) - Large amounts of data can be sent over the network without tying up a
communication link.
(Increases efficiency) - Only segments which fail to reach the destination need to be
transmitted, not the entire data stream.
(Sequencing messages) - Is the process of numbering the segments so that the message may be
reassembled at the destination.
(Encapsulation) - Is the process where protocols add their information to the data.
2.Segment
3.Packet
4.Frame
Addresses
(Network layer source and destination addresses) - Responsible for delivering the IP packet from
original source to the destination.
(Data link layer source and destination addresses) - Responsible for delivering the data link frame
from one network interface card (NIC) to another NIC on the same network.
(Source IP address) - The IP address of the sending device, original source of the packet.
(Destination IP address) - The IP address of the receiving device, destination of the packet.
MODULE 4
ETHERNET CONCEPTS
Bandwidth
(Copper cabling) - Is the most common type of cabling used in networks today.
Types of Copper Cabling:
1.The outer jacket protects the copper wires from physical damage.
3.Color-coded plastic insulation electrically isolates the wires from each other
and identifies each pair.
- Better noise protection than UTP; More expensive than UTP, harder to install than UTP.
1.The outer jacket protects the copper wires from physical damage.
4.Color-coded plastic insulation electrically isolates the wires from each other and identifies
each pair.
(Coaxial Cable)
UTP has four pairs of color-coded copper wires twisted together and encased in a flexible plastic
sheath.
Each wire in pair of wires uses opposite polarity. One wire is negative, the other wire is positive.
- RJ-45
- RJ-45 Socket.
- Ethernet Straight-through
▪ Both ends T568A or T568B
▪ Host to Network device
- Ethernet Crossover
▪ One end T568A, other end T568B
▪ Host-to-host, switch-to-switch, Router-to-router
- Rollover
▪ Cisco Proprietary
▪ Host serial port to Router or Switch Console port, using an adapter
-Transmits data over longer distances at higher bandwidth than any other networking media
(Single-Mode Fiber) - Very small core, uses expensive lasers, long-distance applications.
(Multimode Fiber) - Larger core, uses less expensive LEDs, LEDs transmit at different angles, up
to 10 Gbps over 550 meters.
(Enterprise Networks) - Used for backbone cabling applications and interconnecting infrastructure
devices.
(Fiber-to-the-Home (FTTH)) - Used to provide always-on broadband services to homes and small
businesses.
(Long-Haul Networks) - Used by service providers to connect countries and cities.
(Submarine Cable Networks) - Used to provide reliable high-speed, high-capacity solutions cable for
surviving in harsh undersea environments at up to transoceanic distances.
Fiber-Optic Connectors:
(Wireless Media) - It carries electromagnetic signals representing binary digits using radio or
microwave frequencies.
Limitations of Wireless:
- Coverage area
- Interference
- Security
- Shared medium
(Wireless Access point (AP)) - Concentrate wireless signals from users and connect to the existing
copper-based network infrastructure
(Data Link Layer) - Is responsible for communications between end-device network interface cards.
(Logical Link Control (LLC)) - Communicates between the networking software at the upper layers and
the device hardware at the lower layers.
(Media Access Control (MAC)) - Is responsible for data encapsulation and media access control.
6.2 Topologies
(Physical Topology) - Shows physical connections and how devices are interconnected
(Logical Topology) - Identifies the virtual connections between devices using device interfaces and IP
addressing schemes.
WAN Topologies
(Point-to-point) - The simplest and most common WAN topology. Consists of a permanent link between
two endpoints.
(Hub and spoke) - Similar to a star topology where a central site interconnects branch site through
point-to-point links.
(Mesh) - Provides high availability but requires every end system to be connected to every other end
system.
Early Ethernet and Legacy Token Ring technologies provide two additional topologies:
(Bus) - All end systems chained together and terminated on each end.
(Ring) - Each end system is connected to its respective neighbors to form a ring.
Half and Full Duplex Communication
(Half-duplex Communication) - Only allows one device to send or receive at a time on a shared
medium.
(Full-duplex communication) - Allows both devices to simultaneously transmit and receive on a shared
medium.
(Contention-based access) - All nodes operating in half-duplex, competing for use of the medium.
(Controlled access) - Deterministic access where each node has its own time on the medium.
(CSMA/CD) - Operates in half-duplex mode where only one device sends or receives at a time
-Devices transmitting simultaneously will result in a signal collision on the shared media
CSMA/CA
-Operates in half-duplex mode where only one device sends or receives at a time.
-Uses a collision avoidance process to govern when a device can send and what happens if multiple
devices send at the time.
-When transmitting, devices also include the time duration needed for the transmission.
-Other devices on the shared medium receive the time duration information and know how long the
medium will be unavailable.
- Header
- Data
- Trailer
Frame Fields:
Field:
(MAC Sublayer) - Is responsible for data encapsulation and accessing the media.
(Ethernet frame) - Is the internal structure of the ethernet frame.
(Ethernet Addressing) - Includes both a source and destination MAC address to deliver the Ethernet
frame from NIC to Ethernet NIC on the same LAN.
(Ethernet Error detection) - a frame check sequence (FCS) trailer used for error detection
A frame that is less than 64 bytes is considered as (collision fragment or runt frame) and is
automatically discarded.
Frames with more than 1500 bytes of data are considered (jumbo or baby giant frames)
Ethernet MAC address consists of a (48-bit binary) value, expressing using 12 hexadecimal values.