Course Syllabus CSSN 32 Network Installation and Configuration 2
Course Syllabus CSSN 32 Network Installation and Configuration 2
Course Description:
This course provides students with the theoretical knowledge and practical skills necessary to
install, configure, and troubleshoot networks. The focus is on developing a deep understanding
of networking concepts, protocols, tools, and equipment while emphasizing safety standards and
industry best practices.
Course Objectives:
Course Content:
1. Introduction to Networking
4. Installation of Networks
5. Network Configuration
6. Network Security
Assessment Methods:
Required Resources:
1. Textbook:
o Todd Lammle, "CompTIA Network+ Study Guide."
2. Tools and Equipment:
o Routers, switches, and network interface cards (NIC)
o Ethernet cables and crimping tools
o Software: Packet Tracer, Wireshark, or other network simulation tools
Course Schedule:
Instructor:
Types of Networks
Network Topologies
1. Star Topology:
o Devices connected to a central hub or switch.
o Easy to troubleshoot but relies on the central device.
2. Bus Topology:
o All devices share a single communication line.
o Simple but prone to collisions and failures.
3. Ring Topology:
o Devices connected in a circular fashion.
o Each device acts as a repeater.
4. Mesh Topology:
o Every device connects to every other device.
o High reliability but expensive and complex.
5. Hybrid Topology:
o Combines two or more topologies.
IP Addressing Basics
1. IPv4:
o 32-bit address, written as four octets (e.g., 192.168.1.1).
o Limited to ~4.3 billion unique addresses.
2. IPv6:
o 128-bit address, written in hexadecimal (e.g., 2001:0db8::ff00:0042:8329).
o Vastly larger address space.
3. Private vs. Public IP Addresses:
o Private IP: Used within internal networks (e.g., 192.168.x.x).
o Public IP: Assigned for external communications on the internet.
Future of Networking
Emergence of 5G networks.
Increasing role of Software-Defined Networking (SDN).
IoT integration.
Greater focus on cybersecurity and data protection.
TOPIC 2. Networking Equipment and Tools
1. Networking Hardware
Routers:
o Direct data between networks, providing internet connectivity.
o Can include features like firewall settings and port forwarding.
Switches:
o Connect devices in a LAN and facilitate communication by forwarding data to
specific destinations.
o Types: Managed (configurable) and Unmanaged (plug-and-play).
Access Points (APs):
o Extend wireless connectivity within a network.
o Operate on different frequencies (2.4 GHz and 5 GHz) for various coverage
needs.
Modems:
o Convert digital signals to analog for communication over telephone or cable lines
and vice versa.
Hubs:
o Simple devices that broadcast data to all connected devices (mostly obsolete,
replaced by switches).
Cables:
o Coaxial: Used for cable internet and television. Features a single copper
conductor with insulating material.
o Twisted Pair (e.g., CAT5, CAT6, CAT6A):
Common for Ethernet connections.
Shielded Twisted Pair (STP) or Unshielded Twisted Pair (UTP) for
reducing interference.
o Fiber Optic:
High-speed data transmission over long distances using light signals.
Types: Single-mode and Multi-mode.
Connectors:
o RJ45: Standard for Ethernet cabling.
o LC, SC, ST: Used with fiber-optic cables.
3. Networking Tools
Crimping Tools:
o Used for attaching RJ45 connectors to Ethernet cables.
Cable Testers:
o Verify the integrity and connectivity of cables.
Punch-Down Tools:
o Secure network wires into patch panels or keystone jacks.
Network Analyzers:
o Hardware or software tools (e.g., Wireshark) used to monitor and troubleshoot
network traffic.
LAN Testers:
o Detect issues such as broken wires, open circuits, and miswired connections.
4. Relevant Software
Packet Tracer:
o A network simulation tool to design and test network setups.
Wireshark:
o A powerful tool for network analysis and diagnosing performance issues.
TFTP/DHCP Servers:
o Facilitate device configurations during network setup.
Network design involves creating a blueprint for a network's structure to ensure effective
communication, scalability, security, and reliability.
Key objectives:
o Support organizational goals.
o Optimize resource usage.
o Ensure robust performance and security.
Scalability:
o Design networks to accommodate future growth (more users, devices, and
services).
o Use scalable technologies like VLANs and cloud integration.
Redundancy:
o Include backup pathways and failover mechanisms to ensure network uptime.
Cost-Effectiveness:
o Balance high performance with budget constraints.
o Utilize cost-efficient hardware and technologies like virtualization.
Performance:
o Consider bandwidth needs, latency, and load-balancing to maintain quality.
Security:
o Implement firewalls, secure access protocols, and data encryption.
Manageability:
o Use centralized tools for monitoring and configuration (e.g., SNMP, network
management platforms).
3. Design Steps
Assessment:
o Evaluate existing infrastructure, objectives, and requirements.
Topology Selection:
o Choose the network layout: Star, Bus, Ring, or Hybrid, based on organization
needs.
Capacity Planning:
o Estimate the number of devices, bandwidth usage, and server loads.
Device Placement:
o Strategically position routers, switches, access points, and servers.
Cable Management:
o Organize cabling systematically for easy maintenance.
4. Network Topologies
Star Topology:
o Devices connect to a central switch or router.
o Advantage: Easy to manage; disadvantage: Central device failure affects the
entire network.
Bus Topology:
o Devices share a single backbone.
o Advantage: Cost-effective; disadvantage: Difficult to troubleshoot.
Ring Topology:
o Each device connects to two other devices in a circle.
o Advantage: Predictable data paths; disadvantage: A single failure can disrupt the
network unless a dual-ring system is used.
Hybrid Topology:
o Combines multiple topologies (e.g., star-bus hybrid).
o Advantage: Flexibility for complex setups.
5. Structured Cabling
6. IP Addressing
7. Security Design
Site Survey:
o Assess the location to determine the best placement of network components (e.g.,
routers, switches, access points).
o Identify any environmental factors that may interfere with the network (e.g.,
physical obstructions, electromagnetic interference).
Requirements Gathering:
o Determine network size, bandwidth, and connectivity requirements.
o Decide on the number of devices to connect (computers, printers, IoT devices,
etc.).
Network Design:
o Develop a blueprint that specifies the topology, hardware, cabling, and logical
configurations.
Wired Networks:
o Use Ethernet cables (e.g., CAT5, CAT6) for connection.
o Follow structured cabling standards for organized and efficient layouts.
Wireless Networks:
o Utilize access points to provide Wi-Fi connectivity.
o Ensure adequate coverage by considering signal strength and access point
placement.
Hybrid Networks:
o Combine wired and wireless solutions for flexibility.
Tools:
o Cable crimper: To attach RJ45 connectors to cables.
o Cable tester: To verify the integrity of network cables.
o Punch-down tool: To terminate cables at patch panels or keystones.
o Network diagnostic tools (e.g., Fluke tester).
Equipment:
o Switches, routers, and hubs.
o Patch panels, Ethernet cables, and power supplies.
o Wireless access points for wireless connections.
1. Physical Installation:
o Lay down network cables neatly, using cable trays or conduits to prevent tangling.
o Attach connectors to cables (e.g., crimping RJ45 connectors to Ethernet cables).
o Install and mount hardware devices (routers, switches, and access points).
2. Device Configuration:
o Assign static or dynamic IP addresses to devices.
o Configure DHCP, DNS, and routing settings on the router.
o Enable network features like VLANs or Quality of Service (QoS) if needed.
3. Testing and Troubleshooting:
o Test network connectivity between devices using tools like ping or tracert.
o Use cable testers to check for issues with cabling.
o Verify wireless connectivity and signal strength.
4. Documentation:
o Record network configurations, IP addresses, and cabling maps.
o Create a backup of device configurations for future reference.
5. Safety Considerations
Electrical Safety:
o Ensure proper grounding of devices and avoid overloading power outlets.
o Use Uninterruptible Power Supplies (UPS) for critical equipment.
Physical Safety:
o Organize cables to prevent tripping hazards.
o Avoid placing devices in areas with excessive heat or moisture.
Data Security:
o Use secure passwords and encryption for wireless networks.
o Implement firewalls and ensure only authorized personnel can access network
settings.
Connectivity Testing:
o Verify all devices are reachable through the network.
o Test both LAN and WAN connections.
Performance Testing:
o Measure bandwidth and latency using tools like Speedtest or network
monitoring software.
Security Testing:
o Check for open ports and unauthorized devices.
o Ensure encryption protocols (e.g., WPA3 for Wi-Fi) are active.
7. Post-Installation Tasks
Site Survey:
o Assess the location to determine the best placement of network components (e.g.,
routers, switches, access points).
o Identify any environmental factors that may interfere with the network (e.g.,
physical obstructions, electromagnetic interference).
Requirements Gathering:
o Determine network size, bandwidth, and connectivity requirements.
o Decide on the number of devices to connect (computers, printers, IoT devices,
etc.).
Network Design:
o Develop a blueprint that specifies the topology, hardware, cabling, and logical
configurations.
Wired Networks:
o Use Ethernet cables (e.g., CAT5, CAT6) for connection.
o Follow structured cabling standards for organized and efficient layouts.
Wireless Networks:
o Utilize access points to provide Wi-Fi connectivity.
o Ensure adequate coverage by considering signal strength and access point
placement.
Hybrid Networks:
o Combine wired and wireless solutions for flexibility.
Tools:
o Cable crimper: To attach RJ45 connectors to cables.
o Cable tester: To verify the integrity of network cables.
o Punch-down tool: To terminate cables at patch panels or keystones.
o Network diagnostic tools (e.g., Fluke tester).
Equipment:
o Switches, routers, and hubs.
o Patch panels, Ethernet cables, and power supplies.
o Wireless access points for wireless connections.
1. Physical Installation:
o Lay down network cables neatly, using cable trays or conduits to prevent tangling.
o Attach connectors to cables (e.g., crimping RJ45 connectors to Ethernet cables).
o Install and mount hardware devices (routers, switches, and access points).
2. Device Configuration:
o Assign static or dynamic IP addresses to devices.
o Configure DHCP, DNS, and routing settings on the router.
o Enable network features like VLANs or Quality of Service (QoS) if needed.
3. Testing and Troubleshooting:
o Test network connectivity between devices using tools like ping or tracert.
o Use cable testers to check for issues with cabling.
o Verify wireless connectivity and signal strength.
4. Documentation:
o Record network configurations, IP addresses, and cabling maps.
o Create a backup of device configurations for future reference.
5. Safety Considerations
Electrical Safety:
o Ensure proper grounding of devices and avoid overloading power outlets.
o Use Uninterruptible Power Supplies (UPS) for critical equipment.
Physical Safety:
o Organize cables to prevent tripping hazards.
o Avoid placing devices in areas with excessive heat or moisture.
Data Security:
o Use secure passwords and encryption for wireless networks.
o Implement firewalls and ensure only authorized personnel can access network
settings.
Connectivity Testing:
o Verify all devices are reachable through the network.
o Test both LAN and WAN connections.
Performance Testing:
o Measure bandwidth and latency using tools like Speedtest or network
monitoring software.
Security Testing:
o Check for open ports and unauthorized devices.
o Ensure encryption protocols (e.g., WPA3 for Wi-Fi) are active.
7. Post-Installation Tasks
Would you like an example case study or lab exercise to accompany these notes?
TOPIC 6. Network Configuration
Static Configuration:
o IP addresses and settings are manually assigned to each device.
o Suitable for smaller networks with fewer devices.
Dynamic Configuration:
o Uses protocols like DHCP to automatically assign network settings to devices.
o Efficient for large and frequently changing networks.
IP Addressing:
o Assign unique addresses to devices in the network.
o Configurations include:
IPv4 or IPv6 addresses.
Subnet mask to define the network range.
Gateway address for external communication.
Domain Name System (DNS):
o Converts human-readable domain names (e.g., www.example.com) to IP
addresses.
o Configured to point to primary and secondary DNS servers.
Dynamic Host Configuration Protocol (DHCP):
o Automates IP address assignment.
o Reduces administrative overhead and avoids conflicts.
Network Protocols:
o Ensure communication between devices using standardized rules:
TCP/IP for data transfer.
HTTP/HTTPS for web communication.
FTP for file sharing.
Routing Configuration:
o Routers direct data between networks.
o Configurations may include static or dynamic routing (e.g., OSPF, BGP).
Firewall and Security Settings:
o Define access rules to protect the network.
o Control inbound and outbound traffic.
Virtual LANs (VLANs):
o Segregate network traffic into logical groups for improved management and
security.
4. Steps in Network Configuration
1. Physical Setup:
o Ensure hardware devices (e.g., routers, switches) are properly installed and
powered on.
2. Configure Network Devices:
o Access device management interfaces (e.g., web-based GUI, command-line
interfaces).
o Set up basic network settings (IP, subnet, DNS).
3. Wireless Network Configuration (if applicable):
o Configure SSID (network name) and passwords.
o Enable encryption (e.g., WPA3).
o Adjust frequency bands (2.4GHz vs. 5GHz) for optimal performance.
4. Routing and Addressing:
o Configure routing tables in routers for LAN and WAN communication.
o Enable NAT (Network Address Translation) to allow multiple devices to share
one public IP address.
5. Apply Security Features:
o Activate firewalls, intrusion detection/prevention systems (IDS/IPS).
o Implement VPNs for remote secure access.
6. Connectivity Testing:
o Verify device connections using ping, tracert, or other diagnostic tools.
o Test end-to-end communication and access.
Software:
o Cisco Packet Tracer: Simulate and practice network configurations.
o Wireshark: Monitor and analyze network traffic.
o Putty: Access and configure devices via SSH.
Built-in Tools:
o Command Prompt (ping, ipconfig, tracert) for diagnostics.
o GUI tools like Windows Network Settings or macOS System Preferences.
6. Best Practices
Documentation:
o Record all configurations for troubleshooting and future reference.
Testing Before Deployment:
o Use sandbox environments to test configurations.
Regular Updates:
o Keep network device firmware and security protocols updated.
Backup Configuration:
o Save configurations in case of system failure or reset.
Limit Access:
o Restrict admin access to authorized personnel only.
Monitor the Network:
o Continuously monitor performance and logs for anomalies.
7. Common Challenges
IP Address Conflicts:
o Resolve by ensuring unique addresses or using DHCP.
Unreliable Connections:
o Check for cable or wireless signal issues.
Misconfigured Devices:
o Double-check DNS, gateway, and subnet settings.
TOPIC 7. Network Configuration
Static Configuration:
o IP addresses and settings are manually assigned to each device.
o Suitable for smaller networks with fewer devices.
Dynamic Configuration:
o Uses protocols like DHCP to automatically assign network settings to devices.
o Efficient for large and frequently changing networks.
IP Addressing:
o Assign unique addresses to devices in the network.
o Configurations include:
IPv4 or IPv6 addresses.
Subnet mask to define the network range.
Gateway address for external communication.
Domain Name System (DNS):
o Converts human-readable domain names (e.g., www.example.com) to IP
addresses.
o Configured to point to primary and secondary DNS servers.
Dynamic Host Configuration Protocol (DHCP):
o Automates IP address assignment.
o Reduces administrative overhead and avoids conflicts.
Network Protocols:
o Ensure communication between devices using standardized rules:
TCP/IP for data transfer.
HTTP/HTTPS for web communication.
FTP for file sharing.
Routing Configuration:
o Routers direct data between networks.
o Configurations may include static or dynamic routing (e.g., OSPF, BGP).
Firewall and Security Settings:
o Define access rules to protect the network.
o Control inbound and outbound traffic.
Virtual LANs (VLANs):
o Segregate network traffic into logical groups for improved management and
security.
4. Steps in Network Configuration
1. Physical Setup:
o Ensure hardware devices (e.g., routers, switches) are properly installed and
powered on.
2. Configure Network Devices:
o Access device management interfaces (e.g., web-based GUI, command-line
interfaces).
o Set up basic network settings (IP, subnet, DNS).
3. Wireless Network Configuration (if applicable):
o Configure SSID (network name) and passwords.
o Enable encryption (e.g., WPA3).
o Adjust frequency bands (2.4GHz vs. 5GHz) for optimal performance.
4. Routing and Addressing:
o Configure routing tables in routers for LAN and WAN communication.
o Enable NAT (Network Address Translation) to allow multiple devices to share
one public IP address.
5. Apply Security Features:
o Activate firewalls, intrusion detection/prevention systems (IDS/IPS).
o Implement VPNs for remote secure access.
6. Connectivity Testing:
o Verify device connections using ping, tracert, or other diagnostic tools.
o Test end-to-end communication and access.
Software:
o Cisco Packet Tracer: Simulate and practice network configurations.
o Wireshark: Monitor and analyze network traffic.
o Putty: Access and configure devices via SSH.
Built-in Tools:
o Command Prompt (ping, ipconfig, tracert) for diagnostics.
o GUI tools like Windows Network Settings or macOS System Preferences.
6. Best Practices
Documentation:
o Record all configurations for troubleshooting and future reference.
Testing Before Deployment:
o Use sandbox environments to test configurations.
Regular Updates:
o Keep network device firmware and security protocols updated.
Backup Configuration:
o Save configurations in case of system failure or reset.
Limit Access:
o Restrict admin access to authorized personnel only.
Monitor the Network:
o Continuously monitor performance and logs for anomalies.
7. Common Challenges
IP Address Conflicts:
o Resolve by ensuring unique addresses or using DHCP.
Unreliable Connections:
o Check for cable or wireless signal issues.
Misconfigured Devices:
o Double-check DNS, gateway, and subnet settings.
TOPIC 8. Network Security
Network security involves protecting the integrity, confidentiality, and availability of data
as it travels across or is stored on a network.
Aimed at safeguarding networks from unauthorized access, misuse, or breaches.
Protects sensitive data from cyber threats (e.g., hacking, malware, phishing).
Ensures compliance with data protection laws and regulations.
Maintains operational continuity by preventing downtime due to security incidents.
B. Firewalls
C. Encryption
Detects and removes malicious software like viruses, worms, spyware, and ransomware.
Regular updates are essential to address emerging threats.
E. Network Segmentation
1. External Threats:
o Hackers, malware, phishing, ransomware, Distributed Denial of Service (DDoS)
attacks.
2. Internal Threats:
o Insider attacks caused by disgruntled employees or users with weak credentials.
3. Environmental Threats:
o Disruptions due to natural disasters or infrastructure failure.
4. Social Engineering:
o Deceptive practices to trick individuals into revealing sensitive information (e.g.,
phishing).
Minimize downtime.
Ensure network reliability and performance.
Prevent recurring issues and extend the lifespan of network equipment.
A. Connectivity Problems
B. Performance Issues
C. Configuration Errors
D. Hardware Failures
E. Security Threats
1. Systematic Approach:
o Avoid guessing; test and verify each step logically.
2. Backup First:
o Save configurations before making significant changes.
3. Minimize Downtime:
o Prioritize critical systems and users while troubleshooting.
4. Involve the User:
o Verify the issue with users to understand symptoms and impact.
A. Hardware Maintenance
B. Software Updates
C. Performance Tuning
Optimize settings for network traffic prioritization (e.g., Quality of Service - QoS).
Perform load balancing if multiple paths or connections are available.
D. Backups
9. Emerging Trends
Definition: A technology that separates the control plane from the data plane in
networking devices, centralizing network management.
Features:
o Centralized management through software controllers.
o Dynamic provisioning of network resources.
o Enhanced scalability and flexibility.
Applications:
o Data centers.
o Cloud computing infrastructure.
Benefits:
o Reduces operational costs.
o Simplifies network configuration and management.
C. 5G Networks
Definition: The fifth generation of mobile networks, offering significantly faster speeds
and lower latency than 4G.
Features:
o Speeds up to 10 Gbps.
o Latency under 1 millisecond.
Applications:
o Real-time IoT applications.
o Enhanced mobile broadband (eMBB).
o Industry 4.0, autonomous vehicles.
Benefits:
o Supports more devices with improved efficiency.
o Facilitates advanced technologies like AR/VR.
C. Quantum Networking
Edge Computing: Processing data closer to the source (IoT devices, mobile users) to
reduce latency and bandwidth costs.
Green Networking: Emphasizing energy-efficient network designs and renewable-
powered data centers.
Wi-Fi 6 and Beyond: Offering higher speed, capacity, and performance for dense
environments like stadiums and conferences.