Download Networks

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Net bias wikipedia , lookup

AppleTalk wikipedia , lookup

Distributed firewall wikipedia , lookup

Wireless security wikipedia , lookup

Deep packet inspection wikipedia , lookup

Internet protocol suite wikipedia , lookup

IEEE 1355 wikipedia , lookup

Computer network wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Network tap wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Airborne Networking wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
IT ESSENTIALS V. 4.1
Module 8
FUNDAMENTAL NETWORKS
8.0 Introduction
8.1 Explain the principles of networking
1.
What are networks?
2.
What are social networking sites?
3.
What is a conceptual network?
4.
Why are computers networked?
5.
What is the simplest network?
8.1.1 Define computer networks
6.
What is a computer data network?
7.
What is a host?
8.
9.
What is a peripheral?
What type of resources can be shared on a
network?
How are network devices linked together?
10.
8.1.2 Explain the benefits of networking
11.
What are the benefits of networking
computers?
12.
13.
Systems that are formed by links
Websites that allow individuals to link to
each other’s pages
A set of related ideas
To share data and resources
Two computers connected by a single cable
A collection of hosts connected by
networking devices
Any device that sends and receives
information on the network
Devices that are connected to hosts
Services, storage space on removable
devices, applications
Copper cabling, fiber-option cabling,
wireless connections
1.
2.
3.
4.
Lower costs
Increased productivity
Fewer peripherals needed
Increased communication
capabilities
5. Avoid file duplication and corruption
6. Centralized administration
7. Conserver resources
A server
Document tracking software
What manages network resources?
What can be used to prevent users from
overwriting files or changing files that
others are accessing at the same time?
Activity: Advantages and Disadvantages of Networking
8.2 Describe Types of Networks
8.2.1 Describe a LAN
14.
What is a LAN?
A group of interconnected devices that is
under the same administrative control
8.2.2 Describe a WAN
15.
What is a WAN?
A network that connects LANs in
geographically separated locations
16.
What is the most common example of a
The Internet
WAN?
17.
What interconnects LANs at different
Telecommunications service providers
locations?
8.2.3 Describe a WLAN
18.
In a WLAN, how are access points
connected to the network?
19.
What is the range for typical WLAN
systems?
Activity: Network Types
8.2.4 Explain peer-to-peer networks
20.
Explain a peer-to-peer network.
21.
22.
What is the best environment for peer-topeer networks?
What are the disadvantages of peer-topeer networks?
8.2.5 Explain client/server networks
23.
Explain a client/server network.
24.
25.
Who maintains the server in a client/server
network?
What is a workgroup?
26.
What is a domain?
27.
With copper cabling
30 m (98.4 ft) indoors to great distances
outdoors depending on the technology used
Each device has equivalent capabilities and
responsibilities
10 or fewer computers
1. No centralized administration
2. No centralized security
3. Network becomes more difficult to
manage as number of computers
increase
4. No centralized data storage
Client requests information or services from
a server. Server provides requested
information or service to client.
Network administrator
A collection of workstations and servers on a
LAN that are designed to communicate and
exchange data with one another
A group of computers and electronic devices
with a common set of rules and procedures
administered as a unit
Domain controller
What is a specialized server that manages
all security related aspects of users and
network resources called?
8.3 Describe basic networking concepts and technologies
8.3.1 Explain bandwidth and data transmission
28.
What is bandwidth?
The amount of data that can be transmitted
within a fixed time period
29.
What is a packet?
Small chunks of data sent over a computer
network
30.
What is a header?
Information added to each packet that
contains the source and destination of the
packet
31.
How is bandwidth measured?
Bits per second
32.
What is latency?
The amount of time it takes data to travel
from source to destination
33.
What is simplex mode?
Single, one-way transmission; unidirectional
34.
What is half-duplex mode?
Data flows in one direction at a time
35.
36.
What is an example of half-duplex
transmission?
What is full-duplex mode?
37.
What is an example of full-duplex
transmission?
38.
How does full-duplex increase network
performance?
8.3.2 Describe IP addressing
39.
What is an IP address?
40.
43.
44.
45.
What is another name for the physical
address?
Can you change a physical address?
What is another name for a logical
address?
How is the logical address assigned?
How many bits are in an IP address?
What is meant by dotted-decimal notation?
46.
47.
What are the two parts of an IP address?
What is meant by hierarchical addressing?
48.
49.
What are the five classes of IP addresses?
Which IP class is used for experimental
testing?
What does the subnet mask indicate?
What is the default subnet mask for Class
A?
What is the default subnet mask for Class
B?
What is the default subnet mask for Class
C?
What is subnetting?
What is the main difference between an IP
address and a MAC address?
41.
42.
50.
51.
52.
53.
54.
55.
56.
What is a frame?
57.
What does DHCP do?
Worksheet: Identify IP Address Classes
8.3.3 Define DHCP
58.
How does DHCP simplify the administration
of networks?
Two-way radios
When data flows in both directions at the
same time
A telephone call
Data can be sent and received at the same
time
A number that is used to identify a device on
the network
MAC – Media Access Control
No; unless you replace the NIC
IP
By the network administrator
32
The binary IP address is converted to its
decimal value separated by a decimal point
network, host
The network portion of an IP address
indicates the network in which each unique
host address is located
A, B, C, D, E
E
The network portion of an IP address
255.0.0.0
255.255.0.0
255.255.255.0
A logical division of a network
The MAC address delivers frames on the
LAN, while an IP address transports frames
outside the LAN
A data packet that, along with address
information, is added to the beginning and
end of a packet before it is transmitted over
the network
Automatically assigns IP addresses to hosts?
Software keeps track of IP addresses ;
automatically configures TCP/IP
59.
60.
61.
62.
What happens if a computer cannot
communicate with the DHCP server?
What is the operating systems feature that
automatically assigns a private IP?
How often does APIPA request an IP
address from a DHCP server?
What is NAT (network address translation)?
8.3.4 Describe Internet protocols and applications
63.
What is a protocol?
64.
What are Internet protocols?
65.
66.
What do protocol specifications define?
What are the main functions of protocols?
67.
72.
What is the communication protocol that
establishes a connection on the Internet?
What is the protocol that provides services
for file transfer and manipulation?
What is the protocol used to securely
connect to a remote network device?
What is Telnet used for?
What are the protocols used to download
e-mail messages from an email server?
What is SMTP?
73.
Identify the correct port numbers:
74.
What is TCP/IP?
68.
69.
70.
71.
Activity – Network Protocols
8.3.5 Define ICMP
75.
What is ICMP used for?
76.
What is used to test connections between
Windows automatically assigns a private IP
address
APIPA – Automatic Private IP Addressing
Five-minute intervals
The process to convert private IP addresses
to public IP addresses to allow local clients
to communicate over the Internet
A set of rules
Sets of rules governing communication
within and between computers on a
network
The format of messages that are exchanged
Identifying errors, compressing data,
deciding how data is to be sent, addressing
data, deciding how to announce sent and
received data
HTTP
FTP
SSH
To connect to a remote network device
POP 3 IMAP
A protocol used to send mail in a TCP/IP
network
80 - HTTP
443 - HTTPS
20/21 - FTP
22 - SSH
23 - Telnet
110 – POP3
143 -IMAP
25 – TCP
A set of public standards that specify how
packets of information are exchanged
between computers over one or more
networks
To send control and errors message to
computers and servers
Ping
77.
78.
79.
computers?
How does Ping work?
An ICMP echo request is sent to a
destination computer or network device; the
receiving device sends back an ICMP echo
reply to confirm connectivity
To find the IP address of a host
The router deletes it
What is another use for ping?
What happens if a router does not know
where to send a packet?
Mod 8 Study Guide – Pt 2
8.4 Describe the physical components of a network
80.
What are the most common devices on a
Computers, hubs, switches, routers, wireless
network?
access points
81.
What are the most common media used on Twisted pair, fiber optic, radio waves
networks?
8.4.1 Identify names and purposes and characteristics of network devices
82.
What do hubs do?
Extend range of a network by receiving data
on one port and regenerating the data and
sending it out to all other ports
83.
What is another name for a hub?
concentrator
84.
Why are files broken up into packets before To allow for error checking and easier
they are transmitted over the network?
retransmission if the packet is lost or
corrupted
85.
What is a bridge?
A device used to filter network traffic
between LAN segments
86.
What is another name for a switch?
Multiport bridge
87.
What does a switch do when a frame
Compares the address in the frame to its
arrives at a port?
MAC address table and determines which
port to use to forward the frame
88.
What do switches connect?
Segments of a network
89.
What do bridges connect?
Entire networks to each other
90.
What do routers use to forward frames?
IP addresses
91.
What do wireless access points provide?
Network access to wireless devices
92.
What do wireless access points use to
Radio waves
communicate?
93.
What is a multi-purpose device?
A device that performs more than one
function
8.4.2 Identify names, purposes, and characteristics of common network cables
94.
What do coaxial and twisted-pair cable use Copper
to transmit data?
95.
What does fiber optic cable use to transmit Glass or plastic
data?
96.
What is twisted pair cable used for?
Telephone communication and Ethernet
networks
97.
Why is the cable twisted?
To prevent crosstalk
98.
What is crosstalk?
Noise generated by adjacent pairs of wires
in the cable
99.
What is the cancellation effect?
A circuit has two wires, with oppositely
100.
101.
102.
103.
104.
105.
106.
107.
108.
109.
110.
111.
What are the two basic types of twistedpair cable?
What is the most commonly used cable in
networks?
What is the range of a UTP cable?
Why is STP more expensive?
What are the two factors used when
deterring the category of cable?
What is category 3 cable used for?
How is Cat 3 terminated?
What are the most common network
cables used?
How are Cat 5 cables terminated?
How many pins are in a RJ11 connector?
How many pins are in a RJ 45 connector?
What is coax cable?
112.
What is the coax cable with a maximum
length of 500 m?
113.
What is the coax cable with a maximum
length of 185 m?
114.
What is the most commonly used cable for
television?
115.
What coax cable has the most bandwidth
and less susceptibility to interference?
116.
Why is fiber-optic not affected by EMI or
RFI?
117.
What are the two types of fiber-optic
cable?
Packet Tracer Activity
8.5 Describe LAN topologies and architectures
118.
What are the two types of LAN topologies?
119.
What is a physical topology?
120.
What is a logical topology?
121.
What is a LAN architecture?
8.5.1 Describe LAN topologies
122.
What does the type of topology
determine?
123.
Identify the following physical topologies
charged magnetic fields. When the wires of
the circuit are next to each other, the
magnetic fields cancel each other out
UPT & STP
UTP
100 m (328 ft)
Because of the extra shielding
1) Number of wires in the cable
2) Number of twists in the wire
Telephone & 10 Mbps LANs
RJ11
Cat 5 & Cat 5e
RJ 45
6
8
Copper-covered cable surrounded by a
heavy shielding
Thicknet or 10Base5
Thinnet or 10Base2
RG59
RG6
It is made of glass
Multi-mode and single-mode
Physical and logical
The physical layout of the components on
the network
Determines how the hosts communicate
across a medium
All the components that make up the
structure of a communications system
The capabilities of the network
Bus
Ring
Star
mesh
124.
Why do you need a terminator in a bus
topology?
To keep the signal from bouncing back and
causing network errors.
125.
How does a ring topology work?
126.
127.
What is the advantage of a star topology?
What is a benefit of a mesh topology?
128.
What are the two most common types of
logical topologies?
How does broadcast topology work?
A token travels around the ring, stopping at
each host. If the host wants to transmit
data, it adds data and destination address to
frame. Frame continues around ring until it
reaches destination address
Easy to troubleshoot
Every device is connected to every other
device
Broadcast and token passing
129.
130.
How can a host send data on a taken
passing network?
8.5.2 Describe LAN architecture
131.
What are the three most common LAN
architectures?
132.
What is the standard for Ethernet?
133.
What is CSMA/CD?
134.
135.
What kind of topology does Ethernet use?
What topology was originally developed by
IBM?
136.
What is the token ring referred to and
why?
137.
What is a MSAU?
138.
What is the outer ring of an FDDI network
called?
139.
How many computers can be supported in
an FDDI dual ring network?
140.
What does a repeater do?
141.
What is the total distance of each length of
FDDI cable ring?
8.3 Identify Standards Organizations
142.
What do manufacturers use standards for?
143.
What organization defines international
communication standards?
144.
What is IEEE best known for?
145.
What is the mission of the IEC?
Each host addresses either data to a
particular host or all host connected on a
network
Only if they have the token
Ethernet, Token Ring, FDDI
802.3
Carrier Sense Multiple Access with Collision
Detection
Logical bus & bus or star physical
Token ring
Star-wired ring because outer appearance of
network design is a star
Multi-station access unit
Primary ring
500 per ring
Regenerates a signal
100 km (62 miles)
Basis for developing technology
CCITT (ITU)
Developing standards for the computer and
electronics industry
To promote international cooperation on all
questions related to electrotechnologies
Study Guide 8 Part 3
8.7 Identify Ethernet Standards
8.7.1 Explain Cabled Ethernet Standards
146.
What is the standard for Ethernet
architecture?
147.
What is a backoff algorithm?
148.
149.
In CSMA/CD, who transmits first?
What is 10BaseT technology?
150.
What are the advantages of using 10BaseT?
151.
What is the maximum length of a 10BaseT
segment?
What is the difference between 10BaseT
and 100Base T?
What is another name for 1000BaseT?
Why do people use gigabit Ethernet?
152.
153.
154.
8.7.2 Explain wireless Ethernet standards
155.
What is the standard for wireless
networks?
156.
Which wireless standard operates in the 5
GHz radio frequency range with a
maximum range of 45.7 m (150 ft)?
157.
Which wireless standard operates in the
2.4 GHz radio frequency range with a
maximum range of 91 m (300 ft)?
158.
Which wireless standard has the longest
range?
8.8 Explain OSI and TCP/IP data models
159.
What is an architectural model?
160.
161.
162.
163.
Who created the TCP/IP model?
What are the four layers of the TCP/IP
model?
How many layers are in the OSI model?
What are the layers of the OSI model?
8.8.1 Define the TCP/IP model
164.
Where does a message begin in the TCP/IP
model?
802.3
A random amount of time in which an end
station will start to try network transmission
again.
First-come, first-served
10 mbps, baseband transmission, twistedpair cabling
Inexpensive installation
Easier to install
Easy to upgrade
100 m (328 ft)
Transfer rates are 10 times faster
Gigabit Ethernet
It is faster which makes it possible to
implement bandwidth intensive applications
(such as video)
802.11
802.11a
802.11b
802.11n
A common frame of reference for explaining
Internet communications and developing
communication protocols
Us Department of Defense
Application, Transport, Internet, Network
Access
7
Application, Presentation, Session,
Transport, Network, Data Link, Physical
Application layer
165.
173.
What network services are provided to the
user at the application layer?
What application layer protocol accesses,
control, and troubleshoots remote
computers and remote devices?
What application layer protocol translates
domain names to IP addresses?
What do the transport layer protocols
provide?
What two protocols are transport layer?
Which transport layer protocol provides for
the reliable delivery of data?
Which protocol provides source and
destination addressing?
Which protocol is used for network testing
and troubleshooting?
How does RIP choose routes?
174.
What is ARP used for?
166.
167.
168.
169.
170.
171.
172.
175.
What do network access layer protocols
describe?
8.8.2 Define the OSI model
176.
How many layers are in the OSI model?
177.
What is a protocol stack?
178.
179.
180.
181.
182.
183.
184.
Where are protocol stacks implemented?
Which layer is responsible for providing
network access to applications?
What happens at the transport layer?
At which layer does the segment become a
packet?
What information is contained in a packet?
What information does a frame contain?
What are the two mnemonics for the OSI
Model?
8.8.3 Compare OSI and TCP/IP
OSI Model Activity
Study Guide 8 Part 4
8.9 Describe how to configure a NIC and a modem
185.
What is required to connect to the
Internet?
186.
Where can you find a driver for a NIC?
Web browsers and email
Telnet
DNS
End-to-end management of the data
TCP, UDP
TCP
IP
ICMP
Based on the smallest number of routers
through with the packet must travel to reach
the destination
To obtain the MAC address of a node of a
network when its IP address is known
The standards that hosts use to access the
physical media
7
A system that implements protocol behavior
consisting of a series of these layers
Hardware, software, or both
Application
Data is broken down into manageable
segments for orderly transport across the
network
Network layer
Logical addressing
Physical address and error correction
information
All People Seem To Need Data Processing
Please Do Not Throw Sausage Pizza Away
NIC
Manufacturer’s website
8.9.1 Install or update a NIC driver
187.
What is a best practice when running driver
updates?
188.
189.
What button do you press to expand a
category?
How do you uninstall a NIC driver?
Worksheet: Internet Search for NIC drivers
8.9.2 Attach Computer to Existing Network
190.
What is indicated if there are no link lights
on a NIC?
191.
How do most computers get an IP address?
192.
Can two machines have the same IP
address?
193.
How is the MAC address assigned?
194.
What command is used to test
connectivity?
195.
What command is used to find out what
your IP address is?
196.
What does a default gateway do?
197.
What is telnet?
198.
Does telnet support the transport of
encrypted data?
Lab
Packet Tracer
8.9.3 Describe the installation of a modem
199.
What is a modem?
200.
201.
202.
What is the process of converting analog
signals to digital and back again called?
What is DUN?
What is the handshaking sequence?
203.
What is the Hayes Command set based on?
204.
205.
Close all applications that are running so
they are not using any files associated with
the drive update
+
Double click adapter in Device Manager >
Adapter Properties Window > Driver tab >
Roll Back Driver
Faulty cable, faulty hub, or faulty NIC
Automatically from a local DHCP server
No
By the manufacturer
Ping
ipconfig
Allows a host to communicate outside of
your network
A protocol that provides remote access to
servers and networking devices
No
An electronic device that transfers data
between one computer and another using
analog signals over a telephone line
Modulation/demodulation
Dial-up Networking
A series of short communications that occur
between two systems
A group of instructions that always begin
with a set of attention characters
Modem control commands
ATA
What are AT commands?
What is the AT command to answer the
phone immediately?
206.
What AT command signifies pulse dialing?
P
8.10 Identify names, purposes, and characteristics of other technologies used to establish
connectivity
207.
What was the Internet used for in the
Data transmission
1990s?
208.
What is POTS?
8.10.1 Describe telephone technologies
209.
What technology uses standard telephone
lines?
210.
What are the two major disadvantages of
analog telephone technology?
211.
212.
213.
214.
215.
216.
217.
218.
What is the maximum bandwidth using an
analog modem?
What is ISDN (Integrated Services Digital
Network)?
What are the three services provided by
ISDN digital connections?
What type of information is carried on the
“B” channel?
What is the “D” channel used for?
Which ISN type uses two 64 Kbps B
channels and one 16 Kpbs D channel?
Which ISDN type is used mostly in network
backbones?
What is meant by “always on” technology?
219.
220.
What is DSL?
What are the two major considerations
when selecting DSL?
221.
What is the most commonly used DSL
technology?
What is downstream?
In ASDL is the upstream or downstream
faster?
222.
223.
8.10.2
224.
What is Power Line Communication?
225.
Where can power line communications be
used?
8.10.3 Define Broadband
226.
What is broadband?
227.
What is Bluetooth?
228.
229.
What is the standard used for Bluetooth?
What are the three classifications for
Bluetooth devices?
What is adaptive frequency hopping (AFH)?
230.
Plain Old Telephone System
Analog telephone
1. Telephone line cannot be used for
voice calls when modem in in use
2. Limited bandwidth (56 Kpbs)
56 kpbs
Standard for sending voice, video, and data
over normal telephone lines
BRI – Basic Rate Interface
PRI – Primary Rate Interface
BISDN – Broadband ISDN
Data, voice, or video
Controlling and signaling
BRI
BISDN
There is no need to dial up each time to
connect to the Internet
Digital Subscriber Line
1. Distance limitations
2. Voice and data carried by DSL must
be separated at customer site
Asymmetric Digital Subscriber Line (ASDL)
Transferring data from server to end user
Downstream
Using power distribution wires to send and
receive data
Anywhere there is an electrical outlet
Communication method that transmits two
or more signals at the same time.
Wireless technology that enables devices to
communicate over short distances
802.15.1
Class 1, Class 2, Class 3
Allows signal to “hop” around using
231.
232.
234.
What does cellular technology enable?
How many generations of cellular
technology are there?
What is the standard used by the
worldwide cellular network?
What is Quad band technology?
235.
What are the four GSM frequencies?
236.
What is the data service used to send and
receive text messages?
What provides increased data rates and
improved data reliability?
What provides fast download rates?
Which generation of cellular technologies
allows streaming music and 3D gaming?
Which generation of cellular technologies
allows Voice over IP
How does a cable modem connect your
computer to the cable company?
Who normally using broadband satellite?
233.
237.
238.
239.
240.
241.
242.
243.
How many phone calls can a single cooper
pair carry?
244.
Why would you use fiber broadband?
Worksheet: Answer Broadband Questions
8.10.4 Define VOIP
245.
What is VOIP?
246.
247.
What is PSTN?
What is a disadvantage of COIP?
8.10.5 Define VPN
248.
What is a VPN?
different frequencies within the Bluetooth
range thereby reducing the change of
interference when multiple Bluetooth
devices are present
The transfer of voice, video and data
5
GSM – Global System for Mobile
Communications
Allows a cellular phone to operate on all
four GSM frequencies
850 MHz
900 MHz
1800 MHz
1900 MHz
SMS – Short Message Service
EDGE – Enhanced Data Rates for GSM
Evolution
EV-DO – Evolution Data Optimized
G3
G3.5
Using the same coax cable that connects
your cable TV
People who live in rural areas where no
other broadband connection is available
6
Faster connection speeds and bandwidth
A method to carry telephone calls over the
data network and Internet
Public Switched Telephone Network
If you have a service interruption, the user
cannot make phone calls
Private network that uses a public network
to connect remote sites or users together
249.
What is a VPN tunnel?
VPN connections from the company’s
private network to the remote access user
8.11 Identify and apply common preventive maintenance techniques used for networks
250.
What is one of the biggest problems with
heat
network device in server rooms?
251.
What is involved in prevention
Checking the various components of a
252.
maintenance?
What is a counterfeit device?
253.
How can you minimize the risk of
purchasing counterfeit products?
8.12 Troubleshoot a network
254.
What should you do to assess how
complicated a problem is?
255.
What are the six steps of the
troubleshooting process?
8.12.1 Review the troubleshooting process
256.
What are some common causes of network
problems?
257.
258.
259.
260.
261.
262.
263.
264.
network for wear
Products that do not originate from an
authorized manufacturer or are produced
without the approval of a trademark owner
Purchase from manufacturers authorized
partners or directly from the manufacturer
Determine how many computers on the
network are experiencing the problem
1. Identify the problem
2. Establish a theory or probable cause
3. Determine an exact cause
4. Implement a solution
5. Verify solution and full system
functionality
6. Document findings
Loose cable connections, improperly
installed NIC, ISP is down, Invalid IP
address, low wireless signal strength
Ipconfig/all
What command is used to display IP
addressing information for all network
adapters?
What command is used to check network
Ping
connectivity?
What command will return a list of hosts in
NSLookup
a domain?
What command will show you the route
Tracert
taken by packets when they travel across
the network?
What command will display a list of
NetView
computers in a workgroup?
8.12.2 Identify common network problems and solutions
What is the probable cause if a user cannot
Firewall is blocking port 23
telnet into a remote device?
Remote device is not configured for
telnet access
What is the probable cause if the computer
Network cable is unplugged
has an IP address of 169.254.x.x?
Router is powered off
NIC is bad
What is the probable cause if one user can
Gateway address is incorrect
log in to the local network but cannot
access the Internet?
Worksheet: Diagnose a Network Problem