Download Networking.2

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Policies promoting wireless broadband in the United States wikipedia , lookup

Deep packet inspection wikipedia , lookup

Net bias wikipedia , lookup

Internet protocol suite wikipedia , lookup

Distributed firewall wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Wireless security wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Computer network wikipedia , lookup

Network tap wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Networking
15-1
Section Objectives
After completing this section you will be able to:
 Differentiate between peer-to-peer and server-based networks
 Identify commonly used network topologies
 Compare and contrast types of network cabling
 Explain the differences between various network access methods
 Explain how Ethernet works
 Identify OSI model layers and the network devices that work at each layer
 Articulate commonly used network protocols
 Define the purpose and identification of a MAC address and an IP address
 Apply IP addressing concepts
 Define the purpose of DHCP, WINS, and DNS
 Configure an NIC for network connectivity
15-2
Networking Overview
 A network is two or more devices capable of communicating
and sharing resources between them.
 Types of networks:
– PAN (Personal Area Network) – Personal devices such as PDAs can
communicate in close proximity through a wired or wireless network.
– LAN (Local Area Network) – A group of devices sharing resources in a
single area such as a room or a building.
– MAN (Metropolitan Area Network) – Connectivity of sites within a city.
– WAN (Wide Area Network) – Two or more LANs communicating, often
across large distances. The most famous WAN is the Internet.
15-3
Types of Local Area Networks
 Types of LANs:
– Server-Based Network (client-server network)– A type of
LAN wherein users login to a controlling computer, called a
server and is more secure. These networks normally consist
of 10 or more computers.
– Peer-to-Peer Network – A type of LAN wherein each
computer user acts as a server. Each computer stores
password and sharing information for its own resources.
Usually has fewer than 10 computers.
 NOS (Network Operating System) – Special operating system
on a server containing utilities for managing users, resources,
and security.
15-4
Types of Local Area Networks
Server-Based network
Network – Figure 15.1
15-5
Types of Local Area Networks
Peer-to Peer network
Network – Figure 15.2
15-6
Network Topologies
 Physical network topology – How the network is
wired.
 Ethernet – The most common type of network.
 Hub – A device that allows multiple device
connections. Hubs are not as intelligent as switches.
 Switch – A switch looks at each data frame as it comes
through each port.
 Star Topology – Most common network topology.
Each device connects to a central hub or switch.
15-7
Network Topologies
Hub (switch)
Network – Figure 15.4
15-8
Network Topologies
Star topology
Network – Figure 15.5
15-9
Network Topologies
Network topologies
Network – Table 15.2
15-10
Network Media Overview
 Cable or air are used as mediums for transporting
network data.
 The most common types are twisted-pair and fiberoptic, although coax is still used in some old networks.
 Wireless networks use the air to transmit data over
radio frequencies.
15-11
Copper Media
 Twisted-Pair Cable – Network cable of eight copper wires twisted into four
pairs to prevent crosstalk.
– UTP (Unshielded Twisted-Pair) – Most common network cable that
comes in different categories for different uses. Categories 5e and 6. It is
unshielded and more susceptible to interference.
– STP (Shielded Twisted-Pair) – Same as UTP cable, but with extra foil to
prevent outside noise from interfering with data on the cable.
 Crosstalk – Where signals from one wire interfere with the signal on an
adjacent wire.
15-12
Network Cabling
UTP cable
Network – Figure 15.6
15-13
Copper Media
 Plenum cable is treated with Teflon or fire retardant materials
to reduce the risk of fire. It produces less smoke and is less
toxic when burning.
 PVC (polyvinyl chloride) – Cable with a plastic cable insulation
or jacket. PVC is an alternative to Plenum cable.
 Coaxial Cable (coax) – Type of copper network cabling used in
older Ethernet networks as well as mainframe and
minicomputer connections. Has a single, center wire conductor
with an outer braided shield.
15-14
Network Cabling
UTP wiring standards
Network – Figure 15.7
15-15
Network Cabling
RJ-45 pin 1 assignments
Network – Figure 15.8
15-16
Network Cabling
Coax cable with connector
Network – Figure 15.9
15-17
Fiber Media
 Fiber-Optic Cable – An expensive network cabling made of
plastic or glass fibers that carry data in the form of light pulses.
Most often used to connect network devices such as switches
together into a network backbone or for connecting networks
together in a WAN. More secure and not affected by crosstalk
or other interference like copper cable.
– Single-Mode – A type of fiber-optic cabling that sends one light beam
down the cable. Used for longer distance applications.
– Multi-Mode – A type of fiber-optic cabling that allows multiple light
signals to be sent along the same cable. Used for shorter distances.
15-18
Network Cabling
Fiber-optic cable
Network – Figure 15.11
15-19
Access Methods
There are standard rules by which computers on a network must
adhere to in order to communicate. These rules are known as a
common access method.
 CSMA/CD (Carrier Sense Multiple Access/Collision Detect) – A common
access method used by Ethernet.
 Token Passing – The common access method used by fiber and Token Ring
networks.
 Token – Small data packet passed from one networked device to another in
a ring topology.
 CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) – A
common access method used in wireless and Apple networks.
15-20
Ethernet Issues and Concepts
 Two types of transmissions used in Ethernet networks:
 Half Duplex – Allows either the sending or the
receiving device to send data, one device at a time.
Data can travel both ways on a cable, but not at the
same time.
 Full Duplex – Allows the sending and receiving
device to send data simultaneously. Data can travel
both ways on a cable at the same time.
15-21
Network Standards
IEEE 802 standards
Network – Table 15.5
15-22
OSI Model
 OSI Model (Open Systems Interconnect) – A standard
for information transfer across a network that was
developed by the International Standards Organization.
The model has 7 layers.
– Physical Layer – Layer 1 of the OSI model that defines how
bits are sent and received across the network without regard
to their structure.
– Data Link Layer – Layer 2 of the OSI model that accurately
transfers bits across the network by encapsulating (grouping)
them into frames.
– Network Layer – Layer 3 of the OSI model that coordinates
data movement between two devices on separate networks.
15-23
OSI Model
– Transport Layer – Layer 4 of the OSI model that determines details on
how the data is sent, supervises the validity of the transmission, and
defines protocol for structuring messages.
– Session Layer – Layer 5 of the OSI model that manages communication
and administrative functions between two network devices.
– Presentation Layer – Layer 6 of the OSI model that defines how data is
formatted, encoded, converted, and presented from the sender to the
receiver, even though different computer language is used.
– Application Layer – Layer 7 of the OSI model that defines how
applications and the computer interact with a network, and negotiates
services such as authentication, error recovery, and quality of service.
15-24
OSI Model
ISP (Internet Service Provider) – A vendor
that provides connection to the Internet.
15-25
OSI Model
OSI model layers
Network – Figure 15.15
15-26
OSI Model
OSI peer communication
Network – Figure 15.16
15-27
OSI Model
OSI model
Network – Table 15.6
15-28
Networking Protocols
 Network Protocol – Data communication language.
– TCP/IP (Transport Control Protocol / Internet Protocol) –
The most common network protocol used by most companies
and home users as a standard protocol. Used to access the
Internet.
– IPX/SPX (Internetwork Packet Exchange/Sequenced Packet
Exchange) – Original protocol used for connecting to Novell
networks. Now TCP/IP is the standard protocol used.
– NetBEUI (NetBIOS Enhanced User Interface) – Is a nonroutable protocol used in simple networks.
15-29
Network Addressing
Network devices have to be able to identify each other in order
to communicate across a network. They do this through various
network addressing schemes.
 MAC Address – A 48-bit unique number that is burned on the
ROM chip of the NIC.
 IP Address – It is a 32-bit binary number with groups of eight
bits separated by a dot.
15-30
IP Addressing
 Network Number – Portion of an IP address that
represents which network the computer is on.
 Host Number – Portion of an IP address that
represents the specific network device.
 Broadcast Address – IP address used to communicate
with all devices on a particular network.
 Subnet Mask – A number the computer uses to
determine which part of an IP address represents the
network and which portion represents the host.
15-31
Network Addressing
IP Addressing (network and host portions)
Network – Figure 15.17
15-32
IP Addressing
IP addressing (two network example)
Network – Figure 15.18
15-33
IP Addressing
IP addressing information
Network – Table 15.9
15-34
DUN (Dial-Up-Networking)
 DUN (Dial-Up Networking) – A remote computer that dials
into the Internet or a corporation using a modem.
 PPP (Point-to-Point Protocol) – A connection-oriented that
encapsulates data for transmission over various connection
types.
15-35
Dial-up Networking
Network connections
Network – Table 15.10
15-36
Internet Software
Once a connection is established to a remote network
there are several program types that are useful for
accessing data.
 Browser – A program that views web pages across the
Internet. The common browsers include Internet
Explorer, Netscape Navigator, and Mozilla FireFox2.
 Plug-in – An application, such as Macromedia Flash,
designed to work with the browser.
15-37
Wireless Networks Overview
Wireless Networks – Transmit data over air
using either infrared or radio frequencies.
Wireless networks operate at layers 1 and 2 of
the OSI model.
Bluetooth – Wireless technology for PANs.
Piconet – A small network.
15-38
Wireless Networks Types
 There are two main types of wireless networks:
– Ad hoc – Also known as peer-to-peer or IBSS (Independent
Basic Service Set) – An ad hoc wireless network is when at
least two devices such as two computers have wireless NICs.
– Infrastructure – Wireless network that connects multiple
wireless network devices through an Access Point.
 There are three major types of wireless NICs: PC
Card, USB, and PCI.
 Access Point – Is similar to a network hub and
connects wireless network devices.
15-39
Wireless Networks Types
 BSS (Basic Service Set) – Configuration when multiple devices
connect to an access point.
 ESS (Extended Service Set) – The network design when
multiple access points connect to the same main network.
 SSID (Service Set Identifier) – A set of 32 alpha numeric
characters used to differentiate between wireless networks.
 The channel ID (frequency) between the Access Point and the
adapter must match for communication to occur.
15-40
Wireless Networks Types
802.11b/g frequency channels
Network – Table 15.11
15-41
Wireless Network Standards
Modulation – When data is added to a carrier
signal.
IEEE 802.11 standards
Network – Table 15.13
15-42
Wired or Wireless NIC Installation
When installing a NIC, you must configure the
following prior to connecting to the network:
Determine that an appropriate port, slot, or
integrated wireless NIC is available.
Install the appropriate NIC drivers.
Assign the computer an appropriate name and a
workgroup or domain name.
Configure the network protocol and client.
15-43
Configuring Networking
Some key terms to understand when configuring computers for
networking are:
 DHCP (Dynamic Host Configuration Protocol) – A method to
automatically assign IP addresses to network devices from a
pool of IP addresses. A computer requests an address from
another device running DHCP, usually a server, receives it, and
joins the network.
 Default Gateway – The IP address of the Layer 3 device, such
as a router, that is directly connected to its immediate network
and acts as a doorway or director to other remote networks.
15-44
Configuring Networking
 DNS (Domain Name System) Server – Application on a
network server that translates Internet names into IP addresses.
 URL (Universal Resource Locator) – A method of accessing
Internet resources by using a simple, easily remembered name
assigned to an IP address.
 WINS (Windows Internet Naming Service) Server – Keeps
track of IP addresses assigned to a specific computer name. A
user can type in a computer name to connect and the server will
translate it to the computer’s IP address.
15-45
Wired or Wireless NIC Installation
Before installing a wireless NIC, be sure to
confirm the basic configuration settings for the
wireless network.
Install the NIC by following the manufacturer’s
instructions.
Configure the basic wireless network settings to
begin communication on the network.
15-46
Configuring Networking
Default gateway
Network – Figure 15.41
15-47
Network Troubleshooting
Some commands that are useful to a technician when
diagnosing network connection issues:
 Ping – A command used to test TCP/IP communications and determine
if a network path is available. You can type ping and either a domain
name or IP address and connectivity to that device will be tested.
 IPCONFIG – A command used with Windows XP and 2000 to see and
modify the current IP settings.
 NSLOOKUP – An NT, 2000, XP and 2003 Server troubleshooting tool
that displays network domain names and their associated IP addresses.
 Tracert – A command that displays the path a data packet takes through
a network, thus allowing one to see where a fault occurs in larger
networks.
15-48
Network Troubleshooting
Sample network configuration
Network – Figure 15.47
15-49
Network Troubleshooting
IPCONFIG and IPCONFIG /ALL
Network – Figure 15.48
15-50
Network Terminology
Networking Terms and Acronyms To be
Familiar With:
Backbone
Broadband
FDDI
HTML
Packet
TCP
Bandwidth
E-mail
Frame
HTTP
POP
Telnet
Baseband
Fast Ethernet
FTP
Infrared
SNMP
UDP
15-51
Sharing
Network share – A folder that has been shared
and can be accessed from a remote computer.
UNC (Universal Naming Convention) – A
standard way of naming computers and shared
resources on a network. Used at the command
prompt to obtain network shares.
15-52
1-52
Email
 SMTP (Simple Mail Transport Protocol) – is a protocol used
for sending and receiving email. Settings for configuring email
can be obtained from the network administrator or the ISP being
used to connect to the Internet.
 POP3 (Post Office Protocol) and IMAP (Internet Mail Access
Protocol) are methods used to receive email to a person’s
account.
 MAPI (Messaging Application Programming Interface) –
Microsoft’s proprietary alternative email protocol.
15-53