ITE7 Chp5
ITE7 Chp5
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Chapter 5 - Sections & Objectives (Cont.)
▪ 5.3 Network Devices
• Explain the purpose of devices on a network.
• Explain basic network devices.
• Explain security devices.
• Explain other network devices.
▪ 5.4 Network Cables
• Explain the characteristics of network cables.
• Describe networking tools and their purpose.
• Explain the purpose and characteristics of common types of copper network cables and connectors.
• Explain the purpose and characteristics of common types of fiber network cables and connectors.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
5.1 Network Components
and Types
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Types of Networks
Network Icons
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Types of Networks
Network Topologies and Description
▪ PAN (personal area network) – Commonly uses
Bluetooth to connect mice, keyboards, phones, and
tablets.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Types of Networks
Network Topologies and Description
▪ WMN (wireless mesh network) – Connects
multiple wireless access points together to expand
the wireless network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Internet Connection Types
Brief History of Connection Technologies
▪ Analog telephone access (dialup) – uses an analog
modem to call another modem.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Internet Connection Types
DSL, Cable, and Fiber
▪ DSL (digital subscriber line) – always on
technology that uses phone lines; voice and data
carried on different frequencies; requires a filter on
the port that connects to a phone.
▪ Cable – Uses a cable modem to connect to a
traditional cable TV network; shares the network with
multiple subscribers.
▪ Fiber – High bandwidth connection used in
backbone networks, large enterprise environments,
large data centers, and now part of some home
internet connections.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Internet Connection Types
Line of Sight Wireless Internet Service
▪ Line of site wireless – always on technology that uses radio signals for connecting to the
internet.
• Clear path required
• Weather affects signal strength and performance
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Internet Connection Types
Satellite
▪ Satellite – broadband technology for remote areas
• Uses a satellite dish
• Not a good solution for time-sensitive applications like gaming, Voice over Internet
Protocol (VoIP), and video conferencing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Internet Connection Types
Cellular
▪ Cellular– relies on cell towers to create a network used by cell phones and
connectivity to the internet
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Internet Connection Types
Mobile Hotspot and Tethering
▪ Cell phone option that allows another device to connect to the
internet using Wi-Fi, Bluetooth, or USB cable
• The other device is using the phone’s cellular connection to
connect to the internet
• Called tethering or a hotspot
▪ A mobile hotspot is when a cell phone allows Wi-Fi devices to
connect and use the mobile data network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
5.2 Networking Protocols,
Standards, and Services
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Video Explanation – Transport Layer Protocols
Transport Layer Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Transport Layer Protocols
The TCP/IP Model
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Transport Layer Protocols
TCP
▪ Three basic operations of reliability
• Numbering and tracking of data segments
• Acknowledgment of received data
• Retransmitting any unacknowledged data after a
period of time.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Transport Layer Protocols
UDP
▪ Very little overhead or data checking
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Transport Layer Protocols
Video Explanation – Application Port Numbers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Application Port Numbers
Classify Application Port Numbers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Application Port Numbers
Classify Application Port Numbers (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Wireless Protocols
WLAN Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Wireless Protocols
Bluetooth, NFC, and RFID
▪ Bluetooth
• Up to 7 devices to create a PAN
• 802.15.1
• 2.4 to 2.485 GHz radio frequency range
▪ RFID
• Passive or active tags used to identify items
• Passive – rely on RFID reader to activate and read
• Active – have a battery to broadcast the ID up to
100 meters
• 125 MHz to 960 MHz radio frequency range
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Wireless Protocols
Cellular Generations
▪ 1G/2G – First generation was analog calls only. 2G introduced digital voice, conference calls, and
caller ID with speeds less than 9.6 Kb/s
▪ 2.5G – supports web browsing, short audio and video clips with speeds up to 237 Kb/s.
▪ 4G - IPv6, IP-based voice, gaming services, high quality multimedia at speeds up to 672 Mb/s
▪ LTE (Long Term Evolution) – means it meets the 4G speed standards and improves connectivity
while in motion. Speeds up to 100 Mb/s when mobile and up to 1 Gb/s when stationary.
▪ 5G – supports augmented reality (AR), virtual reality (VR), smart homes, smart cars, and data
transfer between devices. Download speeds up to 3 Gb/s; upload speeds up to 1.5 Gb/s.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Network Services
Video Explanation – Network Services
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Network Services
Client – Server Roles
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Network Services
DHCP Server
▪ A DHCP server provides IP addressing information.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Network Services
DNS Server
▪ A DNS server translates domain names such as cisco.com to an IP address.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Network Services
Print Server
▪ A print server
• Can control multiple printers
• Provides client access to print resources
• Allows centralized print job administration
• Provides feedback to network clients
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Network Services
File Server
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Network Services
Web Server
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Network Services
Mail Server
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Network Services
Proxy Server
▪ Proxy servers act on behalf of a client, thus hiding the real internal host
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Network Services
Authentication Server
▪ Authentication, Authorization, and Accounting (AAA) - Allows access to a network
device or a particular network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Network Services
Syslog Server
▪ Syslog stores network messages sent by networking devices.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
5.3 Basic Network Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Basic Network Devices
Video Explanation - Basic Network Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Basic Network Devices
Network Interface Card
▪ Todays computers have wired and/or wireless network capability.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Basic Network Devices
Repeaters, Bridges, and Hubs
▪ Repeaters – Also called
extenders because they
regenerate the signal so it can be
sent further.
▪ Hub – Receives data on one port
and sends to all other ports.
▪ Bridge – Divides a network into
two or more segments and tracks
which device is on each segment.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Basic Network Devices
Switches
▪ Ethernet switches record MAC
addresses for each device
connected to the switch.
• Data is sent to a specific device if
the MAC address of that device is
in the MAC address table.
• Managed switches are used in a
company environment and have
additional features.
• Unmanaged switches are used in
home or a small business
network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Basic Network Devices
Wireless Access Points
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Basic Network Devices
Routers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Security Devices
Video Explanation – Security Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Security Devices
Firewalls
▪ A firewall protects data and
devices connected to a network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Security Devices
IDS and IPS
An Intrusion Detection System An Intrusion Prevention
(IDS) monitors traffic and is a System (IPS) actively monitors
passive system. traffic and takes action when
needed.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Security Devices
UTMs
▪ Universal Threat Management (UTM) is
an all-in-one security appliance. Features
are vendor-specific, but could include:
• Firewall services
• IDS/IPS services
• Additional security services against Zero
Day, Denial of Service (DoS) Distributed
Denial of Service (DDoS), and spyware
• Proxy and email filtering
• Network access control
• VPN services
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Security Devices
Endpoint Management Server
▪ An endpoint management server monitors end devices such as PCs, laptops, servers, tablets,
printers, etc.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Other Network Devices
Legacy and Embedded Systems
▪ A legacy system is a device on the network no
longer supported, but still in operation.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Other Network Devices
Patch Panel
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Other Network Devices
Power over Ethernet and Ethernet over Power
▪ Power over Ethernet (PoE) is a standard Po
PoE injector
for providing power to devices such as E
sw
itc
APs, cameras, or IP phones through a h
cable.
▪ A PoE injector can be connected to a
cable and a second cable is used to
connect a device that receives power from
the injector.
Network cable
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Other Network Devices
Cloud-based Network Controller
▪ A cloud-based network controller
is a remote device used to
manage network devices like
access points or switches.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
5.4 Network Cables
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Network Tools
Video Explanation – Network Cable Tools
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Network Tools
Network Tools and Descriptions
▪ Wire strippers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Network Tools
Network Tools and Descriptions (Cont.)
▪ Multimeter
▪ Tone Generator
▪ Loopback adapter –
used to check a port
▪ Cable Tester © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
▪ Wi-Fi analyzer
Copper Cables and Connectors
Cable Types
▪ Cable types used in networking
• Twisted-pair
• Coaxial
• Fiber-optic
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Copper Cables and Connectors
Coaxial Cables
▪ Coaxial cable
• Copper or aluminum
• Used in cable TV systems and
satellite communication systems
• Harder to install, more expensive,
and harder to troubleshoot than
twisted-pair cabling
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Copper Cables and Connectors
Twisted-Pair Cables
▪ Twisted-pair cabling types
• Unshielded twisted-pair (UTP)
• Shielded twisted-pair (STP)
▪ UTP
• Most common UTP cabling
• Four pairs of color-coded wires
• Prone to electromagnetic interference
(EMI) and radio frequency
interference (RFI)
▪ STP
• Better protection against EMI and RFI
STP cabling
• More expensive and harder to install
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Copper Cables and Connectors
Twisted-Pair Category Ratings
Cat 5 UTP
Cat 5e UTP
Cat 6 UTP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Copper Cables and Connectors
Twisted-Pair Wire Schemes
T568A T568B
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Copper Cables and Connectors
Video Explanation – Build and Test a Network Cable
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Copper Cables and Connectors
Lab – Build and Test Network Cables
In this lab, you will build and test a straight-through Unshielded Twisted-Pair (UTP)
Ethernet network cable.
Note: With a straight-through cable, the color of wire used by pin 1 on one end is
the same color used by pin 1 on the other end, and similarly for the remaining
seven pins. The cable will be constructed using either TIA/EIA T568A or T568B
standards for Ethernet. This determines which color wire is to be used on each pin.
Straight-through cables are normally used to connect a host directly to a switch or
a wall plate in an office area.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Fiber Cables and Connectors
Fiber-Optic Cables
▪ Fiber-Optic cables
• Use light to transmit signals
• Not affected by EMI or RFI
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Fiber Cables and Connectors
Types of Fiber Media
▪ Single-mode fiber (SMF)
• Small core
SMF
• Uses laser technology to send one
beam of light
• Long distances
▪ Multimode fiber (MMF)
• Larger core
• Uses LEDs to send light
• Light is injected at different angles MMF
• Cheaper
• Bandwidth up to 10 Gb/s up to 550
meters
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Fiber Cables and Connectors
Fiber-Optic Connectors
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
5.5 Chapter Summary
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Conclusion
Chapter 5: Network Concepts
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
Section 5.5
New Terms and Commands
• PAN • Satellite • Client-Server roles
• LAN • Cellular • DHCP server
• VLAN • Mobile hotspot and tethering • DNS server
• WLAN • TCP • Print server
• WMN • UDP • File server
• MAN • Port numbers • Web server
• WAN • 802.11 WLAN protocol • Mail server
• VPN • Bluetooth • Proxy server
• SVI • NFC • Authentication server
• VLAN • RFID • Syslog server
• DSL • Zigbee • NIC
• Cable • Z-Wave • Repeater
• Fiber • 1G/2G, 2.5G, 3G, 3.5G, 4G, • Bridge
• Line of Sight Wireless LTE, and 5G • Hub
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
Section 5.5
New Terms (cont.)
• Switch • Wire cutter • T568B
• Wireless access point • Wire stripper • RJ-45 connector
• Router • Crimper • SMF
• Firewall • Punch down tool • MMF
• IDS • Multimeter • ST connector
• IPS • Cable tester • SC connector
• UTM • Loopback • LC connector
• Endpoint management server • Tone generator • Duplex multimode LC
• Legacy system • Wi-Fi analyzer connectors
• Embedded system • Coaxial cable
• Patch panel • UTP
• Power over Ethernet • STP
• Ethernet over Power • Fiber-optic cable
• Cloud-based network controller • T568A
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70