* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
Download Networks
Distributed firewall wikipedia , lookup
Wireless security wikipedia , lookup
Deep packet inspection wikipedia , lookup
Internet protocol suite wikipedia , lookup
Computer network wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Network tap wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Airborne Networking wikipedia , lookup
UniPro protocol stack wikipedia , lookup
IT ESSENTIALS V. 4.1 Module 8 FUNDAMENTAL NETWORKS 8.0 Introduction 8.1 Explain the principles of networking 1. What are networks? 2. What are social networking sites? 3. What is a conceptual network? 4. Why are computers networked? 5. What is the simplest network? 8.1.1 Define computer networks 6. What is a computer data network? 7. What is a host? 8. 9. What is a peripheral? What type of resources can be shared on a network? How are network devices linked together? 10. 8.1.2 Explain the benefits of networking 11. What are the benefits of networking computers? 12. 13. Systems that are formed by links Websites that allow individuals to link to each other’s pages A set of related ideas To share data and resources Two computers connected by a single cable A collection of hosts connected by networking devices Any device that sends and receives information on the network Devices that are connected to hosts Services, storage space on removable devices, applications Copper cabling, fiber-option cabling, wireless connections 1. 2. 3. 4. Lower costs Increased productivity Fewer peripherals needed Increased communication capabilities 5. Avoid file duplication and corruption 6. Centralized administration 7. Conserver resources A server Document tracking software What manages network resources? What can be used to prevent users from overwriting files or changing files that others are accessing at the same time? Activity: Advantages and Disadvantages of Networking 8.2 Describe Types of Networks 8.2.1 Describe a LAN 14. What is a LAN? A group of interconnected devices that is under the same administrative control 8.2.2 Describe a WAN 15. What is a WAN? A network that connects LANs in geographically separated locations 16. What is the most common example of a The Internet WAN? 17. What interconnects LANs at different Telecommunications service providers locations? 8.2.3 Describe a WLAN 18. In a WLAN, how are access points connected to the network? 19. What is the range for typical WLAN systems? Activity: Network Types 8.2.4 Explain peer-to-peer networks 20. Explain a peer-to-peer network. 21. 22. What is the best environment for peer-topeer networks? What are the disadvantages of peer-topeer networks? 8.2.5 Explain client/server networks 23. Explain a client/server network. 24. 25. Who maintains the server in a client/server network? What is a workgroup? 26. What is a domain? 27. With copper cabling 30 m (98.4 ft) indoors to great distances outdoors depending on the technology used Each device has equivalent capabilities and responsibilities 10 or fewer computers 1. No centralized administration 2. No centralized security 3. Network becomes more difficult to manage as number of computers increase 4. No centralized data storage Client requests information or services from a server. Server provides requested information or service to client. Network administrator A collection of workstations and servers on a LAN that are designed to communicate and exchange data with one another A group of computers and electronic devices with a common set of rules and procedures administered as a unit Domain controller What is a specialized server that manages all security related aspects of users and network resources called? 8.3 Describe basic networking concepts and technologies 8.3.1 Explain bandwidth and data transmission 28. What is bandwidth? The amount of data that can be transmitted within a fixed time period 29. What is a packet? Small chunks of data sent over a computer network 30. What is a header? Information added to each packet that contains the source and destination of the packet 31. How is bandwidth measured? Bits per second 32. What is latency? The amount of time it takes data to travel from source to destination 33. What is simplex mode? Single, one-way transmission; unidirectional 34. What is half-duplex mode? Data flows in one direction at a time 35. 36. What is an example of half-duplex transmission? What is full-duplex mode? 37. What is an example of full-duplex transmission? 38. How does full-duplex increase network performance? 8.3.2 Describe IP addressing 39. What is an IP address? 40. 43. 44. 45. What is another name for the physical address? Can you change a physical address? What is another name for a logical address? How is the logical address assigned? How many bits are in an IP address? What is meant by dotted-decimal notation? 46. 47. What are the two parts of an IP address? What is meant by hierarchical addressing? 48. 49. What are the five classes of IP addresses? Which IP class is used for experimental testing? What does the subnet mask indicate? What is the default subnet mask for Class A? What is the default subnet mask for Class B? What is the default subnet mask for Class C? What is subnetting? What is the main difference between an IP address and a MAC address? 41. 42. 50. 51. 52. 53. 54. 55. 56. What is a frame? 57. What does DHCP do? Worksheet: Identify IP Address Classes 8.3.3 Define DHCP 58. How does DHCP simplify the administration of networks? Two-way radios When data flows in both directions at the same time A telephone call Data can be sent and received at the same time A number that is used to identify a device on the network MAC – Media Access Control No; unless you replace the NIC IP By the network administrator 32 The binary IP address is converted to its decimal value separated by a decimal point network, host The network portion of an IP address indicates the network in which each unique host address is located A, B, C, D, E E The network portion of an IP address 255.0.0.0 255.255.0.0 255.255.255.0 A logical division of a network The MAC address delivers frames on the LAN, while an IP address transports frames outside the LAN A data packet that, along with address information, is added to the beginning and end of a packet before it is transmitted over the network Automatically assigns IP addresses to hosts? Software keeps track of IP addresses ; automatically configures TCP/IP 59. 60. 61. 62. What happens if a computer cannot communicate with the DHCP server? What is the operating systems feature that automatically assigns a private IP? How often does APIPA request an IP address from a DHCP server? What is NAT (network address translation)? 8.3.4 Describe Internet protocols and applications 63. What is a protocol? 64. What are Internet protocols? 65. 66. What do protocol specifications define? What are the main functions of protocols? 67. 72. What is the communication protocol that establishes a connection on the Internet? What is the protocol that provides services for file transfer and manipulation? What is the protocol used to securely connect to a remote network device? What is Telnet used for? What are the protocols used to download e-mail messages from an email server? What is SMTP? 73. Identify the correct port numbers: 74. What is TCP/IP? 68. 69. 70. 71. Activity – Network Protocols 8.3.5 Define ICMP 75. What is ICMP used for? 76. What is used to test connections between Windows automatically assigns a private IP address APIPA – Automatic Private IP Addressing Five-minute intervals The process to convert private IP addresses to public IP addresses to allow local clients to communicate over the Internet A set of rules Sets of rules governing communication within and between computers on a network The format of messages that are exchanged Identifying errors, compressing data, deciding how data is to be sent, addressing data, deciding how to announce sent and received data HTTP FTP SSH To connect to a remote network device POP 3 IMAP A protocol used to send mail in a TCP/IP network 80 - HTTP 443 - HTTPS 20/21 - FTP 22 - SSH 23 - Telnet 110 – POP3 143 -IMAP 25 – TCP A set of public standards that specify how packets of information are exchanged between computers over one or more networks To send control and errors message to computers and servers Ping 77. 78. 79. computers? How does Ping work? An ICMP echo request is sent to a destination computer or network device; the receiving device sends back an ICMP echo reply to confirm connectivity To find the IP address of a host The router deletes it What is another use for ping? What happens if a router does not know where to send a packet? Mod 8 Study Guide – Pt 2 8.4 Describe the physical components of a network 80. What are the most common devices on a Computers, hubs, switches, routers, wireless network? access points 81. What are the most common media used on Twisted pair, fiber optic, radio waves networks? 8.4.1 Identify names and purposes and characteristics of network devices 82. What do hubs do? Extend range of a network by receiving data on one port and regenerating the data and sending it out to all other ports 83. What is another name for a hub? concentrator 84. Why are files broken up into packets before To allow for error checking and easier they are transmitted over the network? retransmission if the packet is lost or corrupted 85. What is a bridge? A device used to filter network traffic between LAN segments 86. What is another name for a switch? Multiport bridge 87. What does a switch do when a frame Compares the address in the frame to its arrives at a port? MAC address table and determines which port to use to forward the frame 88. What do switches connect? Segments of a network 89. What do bridges connect? Entire networks to each other 90. What do routers use to forward frames? IP addresses 91. What do wireless access points provide? Network access to wireless devices 92. What do wireless access points use to Radio waves communicate? 93. What is a multi-purpose device? A device that performs more than one function 8.4.2 Identify names, purposes, and characteristics of common network cables 94. What do coaxial and twisted-pair cable use Copper to transmit data? 95. What does fiber optic cable use to transmit Glass or plastic data? 96. What is twisted pair cable used for? Telephone communication and Ethernet networks 97. Why is the cable twisted? To prevent crosstalk 98. What is crosstalk? Noise generated by adjacent pairs of wires in the cable 99. What is the cancellation effect? A circuit has two wires, with oppositely 100. 101. 102. 103. 104. 105. 106. 107. 108. 109. 110. 111. What are the two basic types of twistedpair cable? What is the most commonly used cable in networks? What is the range of a UTP cable? Why is STP more expensive? What are the two factors used when deterring the category of cable? What is category 3 cable used for? How is Cat 3 terminated? What are the most common network cables used? How are Cat 5 cables terminated? How many pins are in a RJ11 connector? How many pins are in a RJ 45 connector? What is coax cable? 112. What is the coax cable with a maximum length of 500 m? 113. What is the coax cable with a maximum length of 185 m? 114. What is the most commonly used cable for television? 115. What coax cable has the most bandwidth and less susceptibility to interference? 116. Why is fiber-optic not affected by EMI or RFI? 117. What are the two types of fiber-optic cable? Packet Tracer Activity 8.5 Describe LAN topologies and architectures 118. What are the two types of LAN topologies? 119. What is a physical topology? 120. What is a logical topology? 121. What is a LAN architecture? 8.5.1 Describe LAN topologies 122. What does the type of topology determine? 123. Identify the following physical topologies charged magnetic fields. When the wires of the circuit are next to each other, the magnetic fields cancel each other out UPT & STP UTP 100 m (328 ft) Because of the extra shielding 1) Number of wires in the cable 2) Number of twists in the wire Telephone & 10 Mbps LANs RJ11 Cat 5 & Cat 5e RJ 45 6 8 Copper-covered cable surrounded by a heavy shielding Thicknet or 10Base5 Thinnet or 10Base2 RG59 RG6 It is made of glass Multi-mode and single-mode Physical and logical The physical layout of the components on the network Determines how the hosts communicate across a medium All the components that make up the structure of a communications system The capabilities of the network Bus Ring Star mesh 124. Why do you need a terminator in a bus topology? To keep the signal from bouncing back and causing network errors. 125. How does a ring topology work? 126. 127. What is the advantage of a star topology? What is a benefit of a mesh topology? 128. What are the two most common types of logical topologies? How does broadcast topology work? A token travels around the ring, stopping at each host. If the host wants to transmit data, it adds data and destination address to frame. Frame continues around ring until it reaches destination address Easy to troubleshoot Every device is connected to every other device Broadcast and token passing 129. 130. How can a host send data on a taken passing network? 8.5.2 Describe LAN architecture 131. What are the three most common LAN architectures? 132. What is the standard for Ethernet? 133. What is CSMA/CD? 134. 135. What kind of topology does Ethernet use? What topology was originally developed by IBM? 136. What is the token ring referred to and why? 137. What is a MSAU? 138. What is the outer ring of an FDDI network called? 139. How many computers can be supported in an FDDI dual ring network? 140. What does a repeater do? 141. What is the total distance of each length of FDDI cable ring? 8.3 Identify Standards Organizations 142. What do manufacturers use standards for? 143. What organization defines international communication standards? 144. What is IEEE best known for? 145. What is the mission of the IEC? Each host addresses either data to a particular host or all host connected on a network Only if they have the token Ethernet, Token Ring, FDDI 802.3 Carrier Sense Multiple Access with Collision Detection Logical bus & bus or star physical Token ring Star-wired ring because outer appearance of network design is a star Multi-station access unit Primary ring 500 per ring Regenerates a signal 100 km (62 miles) Basis for developing technology CCITT (ITU) Developing standards for the computer and electronics industry To promote international cooperation on all questions related to electrotechnologies Study Guide 8 Part 3 8.7 Identify Ethernet Standards 8.7.1 Explain Cabled Ethernet Standards 146. What is the standard for Ethernet architecture? 147. What is a backoff algorithm? 148. 149. In CSMA/CD, who transmits first? What is 10BaseT technology? 150. What are the advantages of using 10BaseT? 151. What is the maximum length of a 10BaseT segment? What is the difference between 10BaseT and 100Base T? What is another name for 1000BaseT? Why do people use gigabit Ethernet? 152. 153. 154. 8.7.2 Explain wireless Ethernet standards 155. What is the standard for wireless networks? 156. Which wireless standard operates in the 5 GHz radio frequency range with a maximum range of 45.7 m (150 ft)? 157. Which wireless standard operates in the 2.4 GHz radio frequency range with a maximum range of 91 m (300 ft)? 158. Which wireless standard has the longest range? 8.8 Explain OSI and TCP/IP data models 159. What is an architectural model? 160. 161. 162. 163. Who created the TCP/IP model? What are the four layers of the TCP/IP model? How many layers are in the OSI model? What are the layers of the OSI model? 8.8.1 Define the TCP/IP model 164. Where does a message begin in the TCP/IP model? 802.3 A random amount of time in which an end station will start to try network transmission again. First-come, first-served 10 mbps, baseband transmission, twistedpair cabling Inexpensive installation Easier to install Easy to upgrade 100 m (328 ft) Transfer rates are 10 times faster Gigabit Ethernet It is faster which makes it possible to implement bandwidth intensive applications (such as video) 802.11 802.11a 802.11b 802.11n A common frame of reference for explaining Internet communications and developing communication protocols Us Department of Defense Application, Transport, Internet, Network Access 7 Application, Presentation, Session, Transport, Network, Data Link, Physical Application layer 165. 173. What network services are provided to the user at the application layer? What application layer protocol accesses, control, and troubleshoots remote computers and remote devices? What application layer protocol translates domain names to IP addresses? What do the transport layer protocols provide? What two protocols are transport layer? Which transport layer protocol provides for the reliable delivery of data? Which protocol provides source and destination addressing? Which protocol is used for network testing and troubleshooting? How does RIP choose routes? 174. What is ARP used for? 166. 167. 168. 169. 170. 171. 172. 175. What do network access layer protocols describe? 8.8.2 Define the OSI model 176. How many layers are in the OSI model? 177. What is a protocol stack? 178. 179. 180. 181. 182. 183. 184. Where are protocol stacks implemented? Which layer is responsible for providing network access to applications? What happens at the transport layer? At which layer does the segment become a packet? What information is contained in a packet? What information does a frame contain? What are the two mnemonics for the OSI Model? 8.8.3 Compare OSI and TCP/IP OSI Model Activity Study Guide 8 Part 4 8.9 Describe how to configure a NIC and a modem 185. What is required to connect to the Internet? 186. Where can you find a driver for a NIC? Web browsers and email Telnet DNS End-to-end management of the data TCP, UDP TCP IP ICMP Based on the smallest number of routers through with the packet must travel to reach the destination To obtain the MAC address of a node of a network when its IP address is known The standards that hosts use to access the physical media 7 A system that implements protocol behavior consisting of a series of these layers Hardware, software, or both Application Data is broken down into manageable segments for orderly transport across the network Network layer Logical addressing Physical address and error correction information All People Seem To Need Data Processing Please Do Not Throw Sausage Pizza Away NIC Manufacturer’s website 8.9.1 Install or update a NIC driver 187. What is a best practice when running driver updates? 188. 189. What button do you press to expand a category? How do you uninstall a NIC driver? Worksheet: Internet Search for NIC drivers 8.9.2 Attach Computer to Existing Network 190. What is indicated if there are no link lights on a NIC? 191. How do most computers get an IP address? 192. Can two machines have the same IP address? 193. How is the MAC address assigned? 194. What command is used to test connectivity? 195. What command is used to find out what your IP address is? 196. What does a default gateway do? 197. What is telnet? 198. Does telnet support the transport of encrypted data? Lab Packet Tracer 8.9.3 Describe the installation of a modem 199. What is a modem? 200. 201. 202. What is the process of converting analog signals to digital and back again called? What is DUN? What is the handshaking sequence? 203. What is the Hayes Command set based on? 204. 205. Close all applications that are running so they are not using any files associated with the drive update + Double click adapter in Device Manager > Adapter Properties Window > Driver tab > Roll Back Driver Faulty cable, faulty hub, or faulty NIC Automatically from a local DHCP server No By the manufacturer Ping ipconfig Allows a host to communicate outside of your network A protocol that provides remote access to servers and networking devices No An electronic device that transfers data between one computer and another using analog signals over a telephone line Modulation/demodulation Dial-up Networking A series of short communications that occur between two systems A group of instructions that always begin with a set of attention characters Modem control commands ATA What are AT commands? What is the AT command to answer the phone immediately? 206. What AT command signifies pulse dialing? P 8.10 Identify names, purposes, and characteristics of other technologies used to establish connectivity 207. What was the Internet used for in the Data transmission 1990s? 208. What is POTS? 8.10.1 Describe telephone technologies 209. What technology uses standard telephone lines? 210. What are the two major disadvantages of analog telephone technology? 211. 212. 213. 214. 215. 216. 217. 218. What is the maximum bandwidth using an analog modem? What is ISDN (Integrated Services Digital Network)? What are the three services provided by ISDN digital connections? What type of information is carried on the “B” channel? What is the “D” channel used for? Which ISN type uses two 64 Kbps B channels and one 16 Kpbs D channel? Which ISDN type is used mostly in network backbones? What is meant by “always on” technology? 219. 220. What is DSL? What are the two major considerations when selecting DSL? 221. What is the most commonly used DSL technology? What is downstream? In ASDL is the upstream or downstream faster? 222. 223. 8.10.2 224. What is Power Line Communication? 225. Where can power line communications be used? 8.10.3 Define Broadband 226. What is broadband? 227. What is Bluetooth? 228. 229. What is the standard used for Bluetooth? What are the three classifications for Bluetooth devices? What is adaptive frequency hopping (AFH)? 230. Plain Old Telephone System Analog telephone 1. Telephone line cannot be used for voice calls when modem in in use 2. Limited bandwidth (56 Kpbs) 56 kpbs Standard for sending voice, video, and data over normal telephone lines BRI – Basic Rate Interface PRI – Primary Rate Interface BISDN – Broadband ISDN Data, voice, or video Controlling and signaling BRI BISDN There is no need to dial up each time to connect to the Internet Digital Subscriber Line 1. Distance limitations 2. Voice and data carried by DSL must be separated at customer site Asymmetric Digital Subscriber Line (ASDL) Transferring data from server to end user Downstream Using power distribution wires to send and receive data Anywhere there is an electrical outlet Communication method that transmits two or more signals at the same time. Wireless technology that enables devices to communicate over short distances 802.15.1 Class 1, Class 2, Class 3 Allows signal to “hop” around using 231. 232. 234. What does cellular technology enable? How many generations of cellular technology are there? What is the standard used by the worldwide cellular network? What is Quad band technology? 235. What are the four GSM frequencies? 236. What is the data service used to send and receive text messages? What provides increased data rates and improved data reliability? What provides fast download rates? Which generation of cellular technologies allows streaming music and 3D gaming? Which generation of cellular technologies allows Voice over IP How does a cable modem connect your computer to the cable company? Who normally using broadband satellite? 233. 237. 238. 239. 240. 241. 242. 243. How many phone calls can a single cooper pair carry? 244. Why would you use fiber broadband? Worksheet: Answer Broadband Questions 8.10.4 Define VOIP 245. What is VOIP? 246. 247. What is PSTN? What is a disadvantage of COIP? 8.10.5 Define VPN 248. What is a VPN? different frequencies within the Bluetooth range thereby reducing the change of interference when multiple Bluetooth devices are present The transfer of voice, video and data 5 GSM – Global System for Mobile Communications Allows a cellular phone to operate on all four GSM frequencies 850 MHz 900 MHz 1800 MHz 1900 MHz SMS – Short Message Service EDGE – Enhanced Data Rates for GSM Evolution EV-DO – Evolution Data Optimized G3 G3.5 Using the same coax cable that connects your cable TV People who live in rural areas where no other broadband connection is available 6 Faster connection speeds and bandwidth A method to carry telephone calls over the data network and Internet Public Switched Telephone Network If you have a service interruption, the user cannot make phone calls Private network that uses a public network to connect remote sites or users together 249. What is a VPN tunnel? VPN connections from the company’s private network to the remote access user 8.11 Identify and apply common preventive maintenance techniques used for networks 250. What is one of the biggest problems with heat network device in server rooms? 251. What is involved in prevention Checking the various components of a 252. maintenance? What is a counterfeit device? 253. How can you minimize the risk of purchasing counterfeit products? 8.12 Troubleshoot a network 254. What should you do to assess how complicated a problem is? 255. What are the six steps of the troubleshooting process? 8.12.1 Review the troubleshooting process 256. What are some common causes of network problems? 257. 258. 259. 260. 261. 262. 263. 264. network for wear Products that do not originate from an authorized manufacturer or are produced without the approval of a trademark owner Purchase from manufacturers authorized partners or directly from the manufacturer Determine how many computers on the network are experiencing the problem 1. Identify the problem 2. Establish a theory or probable cause 3. Determine an exact cause 4. Implement a solution 5. Verify solution and full system functionality 6. Document findings Loose cable connections, improperly installed NIC, ISP is down, Invalid IP address, low wireless signal strength Ipconfig/all What command is used to display IP addressing information for all network adapters? What command is used to check network Ping connectivity? What command will return a list of hosts in NSLookup a domain? What command will show you the route Tracert taken by packets when they travel across the network? What command will display a list of NetView computers in a workgroup? 8.12.2 Identify common network problems and solutions What is the probable cause if a user cannot Firewall is blocking port 23 telnet into a remote device? Remote device is not configured for telnet access What is the probable cause if the computer Network cable is unplugged has an IP address of 169.254.x.x? Router is powered off NIC is bad What is the probable cause if one user can Gateway address is incorrect log in to the local network but cannot access the Internet? Worksheet: Diagnose a Network Problem