ITE8 Chp5
ITE8 Chp5
Concepts
IT Essentials v8.0
Chapter 5 - Sections & Objectives
5.1 Network Components and Types
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Chapter 5 - Sections & Objectives (Cont.)
5.3 Network Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
5.1 Network Components
and Types
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Types of Networks
Network Icons
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Types of Networks
Network Topologies and Description
PAN (personal area network) – Commonly uses
Bluetooth to connect mice, keyboards, phones, and
tablets.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Types of Networks
VLANs
They provide segmentation and organizational flexibility in a switched network.
A group of devices within a VLAN communicate as if each device was attached to the same switch.
VLANs are based on logical connections, instead of physical connections, and they can be
segmented based on factors such as function, team, or application.
For example, a faculty member computer (PC1) is
connected to S2 on VLAN 10.
PC1 could communicate with another faculty
member using PC4 connected to S3.
Notice how both hosts are configured on network
address 192.168.10.0/24.
By default, all switch ports are assigned to VLAN 1.
However, you can assign the PCs to
different VLANs by configuring their interconnecting © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
port.
Types of Networks
VLANs (Cont.)
Figure 2 displays a sample configuration of switch S2.
Notice that we first create the VLANs and assign them names.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Internet Connection Types
DSL, Cable, and Fiber
DSL (digital subscriber line) – always on technology that uses phone lines; voice and data
carried on different frequencies; requires a filter on the port that connects to a phone.
• Very high-speed DSL (VDSL) attains much higher bit rates than DSL. A symmetric link can carry as
much as 26 Mbps in both directions while an asymmetric link can carry as much as 52 Mbps download
and 6 Mbps upload. VDSL2 can carry as much as 100 Mbps in both directions.
Cable – Uses a cable modem to connect to a traditional cable TV network; shares the network with
multiple subscribers.
Fiber – High bandwidth connection used in backbone
networks, large enterprise environments, large data
centers, and now part of some home internet
connections.
In the figure, the cable connection includes a HFC
network in which fiber is used in the last mile to the
user’s home, and at the user’s home the network
switches back to copper coaxial cable (FTTC).
Fiber to the premises (FTTP) brings the fiber to the
customer’s building. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Internet Connection Types
Line of Sight Wireless Internet Service
Line of site wireless – always on technology that uses radio signals for connecting to the
internet.
• Clear path required
• Weather affects signal strength and performance
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Internet Connection Types
Satellite
Satellite – broadband technology for remote areas
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Internet Connection Types
Cellular
Cellular– relies on cell towers to create a network used by cell phones and
connectivity to the internet
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Internet Connection Types
Mobile Hotspot and Tethering
Cell phone option that allows another device to connect to the
internet using Wi-Fi, Bluetooth, or USB cable
• The other device is using the phone’s cellular connection to
connect to the internet
• Called tethering or a hotspot
A mobile hotspot is when a cell phone allows Wi-Fi devices to
connect and use the mobile data network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
5.2 Networking Protocols,
Standards, and Services
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Video Explanation – Transport Layer Protocols
Transport Layer Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Transport Layer Protocols
The TCP/IP Model
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Transport Layer Protocols
TCP
Three basic operations of reliability
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Transport Layer Protocols
UDP
Very little overhead or data checking
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Transport Layer Protocols
Video Explanation – Application Port Numbers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Application Port Numbers
Classify Application Port Numbers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Application Port Numbers
Classify Application Port Numbers (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Wireless Protocols
WLAN Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Wireless Protocols
Bluetooth, NFC, and RFID
Bluetooth
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Wireless Protocols
Cellular Generations
1G/2G – First generation was analog calls only. 2G introduced digital voice, conference calls, and
caller ID with speeds less than 9.6 Kb/s
2.5G – supports web browsing, short audio and video clips with speeds up to 237 Kb/s.
3.5G – supports high-quality streaming video, high-quality video conferencing, and VoIP, at speeds
up to 16 Mb/s.
4G - IPv6, IP-based voice, gaming services, high quality multimedia at speeds up to 672 Mb/s.
LTE (Long Term Evolution) – means it meets the 4G speed standards and improves connectivity
while in motion. Speeds up to 100 Mb/s when mobile and up to 1 Gb/s when stationary.
5G – supports augmented reality (AR), virtual reality (VR), smart homes, smart cars, and data
transfer between devices. Download speeds up to 3 Gb/s; upload speeds up to 1.5 Gb/s.
6G – is currently in development. As of late 2022, no standard yet exists. It will support even faster
speeds required for AR/VR applications, AI applications, and instantaneous communications.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Network Services
Video Explanation – Network Services
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Network Services
Client – Server Roles
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Network Services
DHCP Server
A host needs IP address information before it can send data on the network.
DHCP is the service used by ISPs, network administrators, and wireless routers
to automatically assign IP addressing information to hosts, as shown in the
figure.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Network Services
DHCP Server (Cont.)
DHCP works in a client/server mode,
where DHCP clients request available
IP configurations from a DHCP server.
A DHCP server is configured with a
scope (i.e., a pool or a range) of
addresses that it can lease to
requesting DHCP clients.
As shown in the figure, when the DHCP
client boots (or otherwise wants to join a
network), it initiates the following four-
step process to obtain a lease.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Network Services
DHCP Server (Cont.)
The client must contact the DHCP server periodically to extend the lease.
This lease mechanism ensures that moved or power-off clients do not keep addresses that
they no longer need.
When a lease expires, the DHCP server returns the address to the pool where it can be
reallocated as necessary.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Network Services
DNS Server
A DNS server translates domain names such as cisco.com to an IP address.
Step 1 Step 3
Step 2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Network Services
DNS Server (Cont.)
The five steps in the DNS resolution process are:
Step 4 Step 5
The number is returned back to the client A domain name is resolved to its numeric
for use in making requests of the server. network device address by the DNS
protocol.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Network Services
Print Server
A print server
• Can control multiple printers
• Provides client access to print resources
• Allows centralized print job administration
• Provides feedback to network clients
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Network Services
File Server
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Network Services
Web Server
A web server provides web resources using these protocols
• Hypertext Transfer Protocol (HTTP) operating on TCP port 80
• Secure HTTP (HTTPS) using Secure Sockets Layer (SSL) or Transport Layer Security (TLS)
operating on TCP port 443
How a web page is opened in a browser:
• For this example, use the
http://www.cisco.com/index.html URL.
• First, the browser interprets the three parts of
the URL:
1. http (the protocol or scheme)
2. www.cisco.com (the server name)
3. index.html (the specific filename
requested)
The browser then checks with a DNS to convert www.cisco.com into a numeric address, which it
uses to connect to the server.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Network Services
Web Server (Cont.)
Step 1: Using HTTP requirements, the browser sends a GET request to the server and asks for
the index.html file.
Step 2: The server sends the HTML code for this web page back to the client’s browser.
Step 3: The browser interprets the HTML code and formats the page for the browser window.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Network Services
Mail Server
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Network Services
Proxy Server
Proxy servers act on behalf of a client, thus hiding the real internal host
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Network Services
Authentication Server
Authentication, Authorization, and Accounting (AAA) - Allows access to a network
device or a particular network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Network Services
Syslog Server
Syslog stores network messages sent by networking devices.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Network Services
Load Balancer
Some network servers can experience very heavy loads.
Some examples include streaming media servers, web servers, and email servers.
Often, multiple servers are providing one service in order to provide timely content.
It is placed in front of the servers to ensure each server is being used as much as the
others.
This prevents things like network timeouts and slow responses.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Network Services
Scada
A Supervisory Control and Data Acquisition (SCADA) system is used in an industrial
control system (ICS).
This type of system provides automation for critical services such as national security,
water treatment plants, or power suppliers.
SCADA software runs on a computer to gather data from the devices used by the ICS.
The SCADA manages the devices remotely typically through the use of satellite or
cellular communications.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
5.3 Basic Network Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Basic Network Devices
Video Explanation - Basic Network Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Basic Network Devices
Network Interface Card
Todays computers have wired and/or wireless network capability.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Basic Network Devices
Repeaters, Bridges, and Hubs
Repeaters – Also called extenders
because they regenerate the signal so it
can be sent further.
Hub – Receives data on one port and
sends to all other ports.
Bridge – Divides a network into two or
more segments and tracks which
device is on each segment.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Basic Network Devices
Switches
Ethernet switches record MAC
addresses for each device
connected to the switch.
• Data is sent to a specific device if
the MAC address of that device is
in the MAC address table.
• Managed switches are used in a
company environment and have
additional features.
• Unmanaged switches are used in
home or a small business
network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Basic Network Devices
Wireless Access Points
Wireless access points (APs) – provide
access to a wireless network for a limited
range.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Basic Network Devices
Routers
Routers connect networks.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Security Devices
Video Explanation – Security Devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Security Devices
Firewalls
A firewall protects data and
devices connected to a
network.
Firewalls use access control
lists (ACLs) which are rules
used to determine whether
data is permitted (allowed
through) or denied.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Security Devices
IDS and IPS
An Intrusion Detection System An Intrusion Prevention
(IDS) monitors traffic and is a System (IPS) actively monitors
passive system. traffic and takes action when
needed.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Security Devices
UTMs
Universal Threat Management (UTM) is
an all-in-one security appliance. Features
are vendor-specific, but could include:
• Firewall services
• IDS/IPS services
• Additional security services against Zero
Day, Denial of Service (DoS) Distributed
Denial of Service (DDoS), and spyware
• Proxy and email filtering
• Network access control
• VPN services
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Security Devices
Endpoint Management Server
An endpoint management server monitors end devices such as PCs, laptops, servers, tablets,
printers, etc.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Security Devices
Spam Management
The DNS service is commonly abused by threat actors to assist in their SPAM email
campaigns.
For this reason, DNS servers now use TXT resource records to implement the anti-spam
security features detailed in the table.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Other Network Devices
Legacy and Embedded Systems
A legacy system is a device on the network
no longer supported, but still in operation.
An embedded system is a device built into
something else such as an appliance.
Embedded microchips are contained in
legacy systems and embedded systems.
Legacy systems and embedded systems
could be a security risk.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Other Network Devices
Patch Panel
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Other Network Devices
Power over Ethernet and Ethernet over Power
PoE devices like PoE switches, PoE injectors, Po PoE injector
E
IP cameras, Voice over IP (VoIP) phones, and sw
itc
h
wireless access points (WAPs) are the top five
most popular devices.
Power can also be inserted in the middle of a
cable run using a PoE injector.
There are several IEEE standards for PoE:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
5.4 Network Cables
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Network Tools
Video Explanation – Network Cable Tools
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Network Tools
Network Tools and Descriptions
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Network Tools
Network Tools and Descriptions (Cont.)
Multimeter
Cable Tester
Tone Generator
Wi-Fi analyzer
Loopback adapter –
used to check a port
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Copper Cables and Connectors
Network Taps
Sometimes it is necessary to capture network traffic to analyze it, and this can often be
done with software such as Wireshark.
If this is not possible, a network tap can be used to capture the cable signals and send
them to analyzing software.
A network tap can be passive or active (powered):
• Passive test access point (TAP) - This type of TAP is a box with network ports to carry signals
in and out. Inside, an inductor or optical splitter is used to copy the signal and send it out a
monitor port. The monitor port receives all the traffic from the cable.
• Active TAP - This type of TAP regenerates the signal. Due to the complexity of gigabit
signaling, a passive TAP is unable to be used. Also, some fiber links may become corrupt using
an optical splitter, so an active TAP is used instead.
Network sniffing can also be completed using a special port on a network switch, knowning
as a switched port analyzer (SPAN)/mirror port.
A mirror receives a copy of the traffic that are addressed to a specific port or all other ports.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Copper Cables and Connectors
Cable Types
Cable types used in networking
• Twisted-pair
• Coaxial
• Fiber-optic
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Copper Cables and Connectors
Coaxial Cables
Coaxial cable
• Copper or aluminum
• Used in cable TV systems and
satellite communication systems
• Harder to install, more expensive,
and harder to troubleshoot than
twisted-pair cabling
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
Copper Cables and Connectors
Twisted-Pair Cables
Twisted-pair cabling types
Cat 5e UTP
Cat 6 UTP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Copper Cables and Connectors
Twisted-Pair Wire Schemes
T568A T568B
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
Copper Cables and Connectors
Video Explanation – Build and Test a Network Cable
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
Copper Cables and Connectors
Lab – Build and Test Network Cables
• In this lab, you will build and test a straight-through Unshielded Twisted-Pair
(UTP) Ethernet network cable.
Note: With a straight-through cable, the color of wire used by pin 1 on one end is
the same color used by pin 1 on the other end, and similarly for the remaining
seven pins. The cable will be constructed using either TIA/EIA T568A or T568B
standards for Ethernet. This determines which color wire is to be used on each pin.
Straight-through cables are normally used to connect a host directly to a switch or
a wall plate in an office area.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
Fiber Cables and Connectors
Fiber-Optic Cables
Fiber-Optic cables
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Fiber Cables and Connectors
Types of Fiber Media
Single-mode fiber (SMF)
• Small core
SMF
• Uses laser technology to send one
beam of light
• Long distances
Multimode fiber (MMF)
• Larger core
• Uses LEDs to send light
• Light is injected at different angles MMF
• Cheaper
• Bandwidth up to 10 Gb/s up to 550
meters
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
Fiber Cables and Connectors
Fiber-Optic Connectors
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
5.5 Chapter Summary
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
Conclusion
Chapter 5: Network Concepts
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78