Transcript of ITE 50 Chapter6
Before You Begin: Assign Information ClassificationCisco
Confidential
Cisco Confidential
6.2 Describe types of networks
6.3 Describe basic networking concepts and technologies
6.4 Describe the physical components of a network
6.5 Describe LAN topologies
6.6 Identify Ethernet standards
6.7 Explain OSI and TCP/IP data models
6.8 Describe how to configure a NIC and connect to a network
6.9 Identify names, purposes, and characteristics of other
technologies used to establish connectivity to the Internet
6.10 Identify and apply common preventive maintenance techniques
used for networks
6.11 Troubleshoot a network
Chapter 6 Objectives
The purpose of this chapter is to provide an overview of network
principles, standards, and purposes.
After completing this chapter, students will meet these
objectives:
Explain the principles of networking
Describe types of networks
Describe the physical components of a network
Describe LAN topologies and architectures
Identify Ethernet standards
Describe how to configure a NIC and a modem
Identify names, purposes, and characteristics of other technologies
used to establish connectivity
Identify and apply common preventive maintenance techniques used
for networks
Troubleshoot a network
Cisco Confidential
Mail delivery system
The Internet
Computers can be linked by networks to share data and
resources.
*
6.1.1.1 Explain the principles of networking
Websites that allow individuals to link to each other’s pages are
called social networking sites. A set of related ideas can be
called a conceptual network. The connections you have with all your
friends can be called your personal network.
Converged data networks can include general purpose computers, such
as PCs and servers, as well as devices with more specific
functions, including printers, phones, televisions, and game
consoles.
All data, voice, video, and converged networks share information
and use various methods to direct how this information flows. The
information on the network goes from one place to another,
sometimes via different paths, to arrive at the appropriate
destination.
The public transportation system is similar to a data network. The
cars, trucks, and other vehicles are like the messages that travel
within the network. Each driver defines a starting point (source)
and an ending point (destination). Within this system, there are
rules such as stop signs and traffic lights that control the flow
from the source to the destination.
After completing this section, students will meet these
objectives:
Define computer networks
Explain the benefits of networking
Teaching Strategy: The mail system allows messages to travel
between any place that can be reached. The telephone system allows
worldwide voice, fax, and Internet connections. Public
transportation moves people and packages from source to
destination. Each of these has a way of getting into and out of the
network and a means of directing traffic. It is much the same with
computer networks.
Presentation_ID
Cisco Confidential
Computer Networks
A computer data network is a collection of hosts connected by
networking devices such as computers, printers, scanners,
smartphones, and file and print servers.
Resources shared across networks include different types of
services, storage devices, and applications.
Network devices link together using a variety of connections:
Copper cabling
Fiber-optic cabling
Wireless connection
Lower cost licensing
6.1.1.1 Define computer networks
A host is any device that sends and receives information on the
network. Peripherals are devices that are connected to hosts. Some
devices can serve either as hosts or peripherals.
Computer networks are used globally in businesses, homes, schools,
and government agencies. Many of the networks are connected to each
other through the Internet.
Resources shared across networks include:
Services, such as printing or scanning
Storage space on removable devices, such as hard drives or optical
drives
Applications, such as databases
Print documents using shared printers
Synchronize the calendar between your computer and your smart
phone
Different types of network media:
Copper cabling uses electrical signals to transmit data between
devices.
Fiber-optic cabling uses glass or plastic wire, also called fiber,
to carry information as light pulses.
Wireless connection uses radio signals, infrared technology
(laser), or satellite transmissions.
6.1.1.2 Explain the benefits of networking
The benefits of networking computers and other devices include
lower costs and increased productivity. With networks, resources
can be shared, which results in less duplication and corruption of
data.
Fewer peripherals needed – Printers, scanners, and backup devices
can be shared among the network users.
Increased communication capabilities - Collaboration tools
facilitate communicate between users; Examples: e-mail, forums and
chats, voice and video, and instant messaging.
Avoid file duplication and corruption - Servers store data and
share it with network users. Confidential or sensitive data can be
protected and shared with the users who have permission to access
that data. Document tracking software can be used to prevent users
from changing files that others are accessing at the same
time.
Lower cost licensing – The site license allows a group of people or
an entire organization to use the application for a single
fee.
Centralized administration - Fewer people needed to manage the
network. Lower cost to the company. Easier data backup to a central
location.
Conserve resources - Data processing is distributed across many
computers to prevent overloading one computer with processing
tasks.
6.1.1.3 Activity – Advantages and Disadvantages of Networking
Presentation_ID
Cisco Confidential
Types of Networks
LAN (Local Area Network): A group of interconnected computers under
one administrative control group that governs the security and
access control policies that are in force on the network.
WLAN (Wireless Local Area Network): A group of wireless devices
that connect to access points within a specified area. Access
points are typically connected to the network using copper
cabling.
*
6.2.1 Types of Networks
6.2.1.1 Describe a LAN
Local Area Network (LAN) refers to a group of interconnected
computers that is under the same administrative control. In the
past, LANs were considered to be small networks that existed in a
single physical location. Although LANs can be as small as a single
local network installed in a home or small office, over time, the
definition of LANs has evolved to include interconnected local
networks consisting of many hundreds of hosts, installed in
multiple buildings and locations.
In this context, the word “Local” in Local Area Network refers to
local consistent control rather than being physically close to each
other. Devices in a LAN may be physically close, but it is not a
requirement.
6.2.1.2 Describe a WLAN
Traditionally, in a LAN, devices are connected together using
copper cabling. In some environments, installing copper cabling may
not be practical, desirable, or even possible. In these situations,
wireless devices are used to transmit and receive data using radio
waves. These networks are called wireless LANs, or WLANs.
WLAN coverage can be limited to the area of a room or can have
greater range.
As with LANs, you can share resources such as files and printers,
and access the Internet on a WLAN.
6.2.1.3 PANs
Cisco Confidential
Types of Networks
MAN (Metropolitan Area Network): Network that spans across a large
campus or a city. Consisting of various buildings interconnected
through wireless or fiber optic backbones.
WAN (Wide Area Network): Connections of multiple smaller networks
such as LANs that are in geographically separated locations. The
most common example of a WAN is the Internet.
6.2.1.4 MANs
6.2.1.5 WANs
*
Cisco Confidential
*
6.2.1.6 Explain peer-to-peer networks
Individual users are responsible for their own resources and can
decide which data and devices to share. There is no central point
of control or administration in the network.
Peer-to-peer networks work best in environments with ten or fewer
computers.
Peer-to-peer networks have several disadvantages:
There is no centralized network administration which makes it
difficult to determine who controls resources on the network.
There is no centralized security. Each computer must use separate
security measures for data protection.
The network becomes more complex and difficult to manage as the
number of computers on the network increases.
There may be no centralized data storage. Separate data backups
must be maintained. This responsibility falls on the individual
users.
Peer-to-peer networks still exist inside larger networks today.
Even on a large client network, users can still share resources
directly with other users without using a network server. In your
home, if you have more than one computer, you can set up a
peer-to-peer network.
6.2.1.7 Explain client/server networks
Servers on a client/server network commonly perform some of the
processing work for client machines; for example, sorting through a
database before delivering only the records requested by the
client.
In a client/server model, the servers are maintained by network
administrators. Data backups and security measures are implemented
by the network administrator. The network administrator also
controls user access to the network resources. All of the data on
the network is stored on a centralized file server. Shared printers
on the network are managed by a centralized print server. Network
users with the proper permissions can access both the data and
shared printers. Each user must provide an authorized username and
password to gain access to network resources that they are
permitted to use.
A workgroup is a collection of workstations and servers on a LAN
that are designed to communicate and exchange data with one
another. Each workstation controls the user accounts, security
information, and access to data and resources for that
computer.
A domain is a group of computers and electronic devices with a
common set of rules and procedures administered as a unit. A domain
does not refer to a single location or specific type of network
configuration. The computers in a domain are a logical grouping of
connected computers that can be located in different locations in
the world. A specialized server called a domain controller manages
all security-related aspects of users and network resources,
centralizing security and administration.
For data protection, an administrator performs a routine backup of
all the files on the servers. If a computer crashes, or data is
lost, the administrator can easily recover the data from a recent
backup.
6.2.1.8 Activity – Matching Network Types
Presentation_ID
Cisco Confidential
Bandwidth and Latency
Bandwidth is the amount of data that can be transmitted within a
fixed time period.
Bandwidth is measured in bits per second and is usually denoted by
the following:
bps - bits per second
Kbps - kilobits per second
Mbps - megabits per second
Gbps - gigabits per second
Latency is the amount of time it takes data to travel from source
to destination.
Data is transmitted in one of three modes:
Simplex (Unidirectional transmission) is a single, one-way
transmission.
Half-duplex allows data to flow in one direction at a time.
*
6.3.1.1 Explain bandwidth
Data is sent in small chunks called packets.
A packet has a header, containing the source and destination of the
packet.
A header has sequencing information so that the packets can be
assembled at the destination.
Bandwidth can be compared to highway traffic flow
On a highway, cars represent the data.
Number of lanes represents the number of cars that could travel on
the highway at the same time.
An eight-lane highway allows four times as many cars as a two-lane
highway.
The amount of time it takes data to travel from source to
destination is called latency. Like a car traveling across town
that encounters stop lights or detours, data is delayed by network
devices and cable length. Network devices add latency when
processing and forwarding data. When surfing the Web or downloading
a file, latency does not normally cause problems. Time critical
applications, such as Internet telephone calls, video, and gaming,
can be significantly affected by latency.
6.3.1.2 Data transmission
Simplex (Unidirectional transmission) is a single, one-way
transmission.
Example: The signal sent from a TV station to your TV.
Half-duplex allows data to flow in one direction at a time.
Simultaneous transmission in two directions is not allowed.
Example: Two-way radios, police or emergency mobile radios
Full-duplex allows data to flow in both directions at the same
time.
Bandwidth is measured in only one direction. 100 Mbps full-duplex
means a bandwidth of 100 Mbps in each direction.
A telephone conversation is an example of full-duplex
communication. Both people can talk at the same time, and can still
hear each other.
Broadband technologies, such as digital subscriber line (DSL) and
cable, operate in full-duplex mode. Broadband allows multiple
signals to travel on the same wire simultaneously.
Full-duplex networking technology increases network performance
because data can be sent and received at the same time. Example:
With DSL, users can download data and talk on the telephone at the
same time.
Presentation_ID
Cisco Confidential
IP Addressing - IPV4
An IP address is a unique number that is used to identify a network
device and is represented as a 32-bit binary number, divided into
four octets (groups of eight bits):
Example: 10111110.01100100.00000101.00110110
An IP address is also represented in a dotted decimal format.
Example: 190.100.5.54
When a host is configured with an IP address, it is entered as a
dotted decimal number, such as 192.168.1.5. This IP address must be
unique on a network to ensure data can be sent/received.
IP Classes
Class A: Large networks, implemented by large companies and some
countries
Class B: Medium-sized networks, implemented by universities
Class C: Small networks, implemented by ISP for customer
subscriptions
Class D: Special use for multicasting
Class E: Used for experimental testing
*
6.3.2.2 IPv4
An IP address is a number that is used to identify a device on the
network.
Each device on a network has a unique IP address.
A network device is referred to as a host or node.
Each host must have an IP address within the same network to be
able to communicate with each other.
The IP address is similar to the mailing address of a person. It is
known as a logical address because it is logically assigned based
on the host location. The IP address, or network address, is based
on the local network and is assigned to each host by a network
administrator. This process is similar to the local government
assigning a street address based on the logical description of the
city or village and neighborhood.
An IP address consists of a series of 32 binary bits (ones and
zeros). The 32 bits are grouped into four 8-bit bytes called
octets.
Example: 10111110.01100100.00000101.00110110
An IP address is also represented in a dotted decimal format.
Example: the binary IP address shown above is 190.100.5.54
When a host is configured with an IP address, it is entered as a
dotted decimal number, such as 192.168.1.5. Imagine if you had to
enter the 32-bit binary equivalent of this:
11000000101010000000000100000101. If just one bit were mistyped,
the address would be different and the host may not be able to
communicate on the network.
Unique IP addresses on a network ensure that data can be sent to
and received from the correct network device.
The logical 32-bit IP address is hierarchical and is composed of
two parts. The first part identifies the network and the second
part identifies a host on that network. Both parts are required in
an IP address. As an example, if a host has IP address
192.168.18.57, the first three octets, 192.168.18, identify the
network portion of the address, and the last octet, 57 identifies
the host. This is known as hierarchical addressing, because the
network portion indicates the network on which each unique host
address is located. Routers only need to know how to reach each
network and not the location of each individual host.
Class A - Large networks, implemented by large companies and some
countries. First octet is from 1-127. 127.0.0.0 is a special
network reserved for testing. 127.0.0.1 is a loopback
address.
Class B - Medium-sized networks, implemented by universities. First
octet is from 128-191.
Class C - Small networks, implemented by ISP for customer
subscriptions. First octet is from 192-223.
Class D - Special use for multicasting. First octet is from
224-240.
Class E - Used for experimental testing
Presentation_ID
Cisco Confidential
Private Addresses - IETF reserved some Internet address space for
private networks.
Private networks have no connection to public networks.
Private network addresses are not routed across the Internet.
Class A - 10.0.0.0 to 10.255.255.255
Class B - 172.16.0.0 to 172.31.255.255
Class C - 192.168.0.0 to 192.168.255.255
6.3.2.2 IPV4
Private Addressing
Cisco Confidential
Subnet Masks
The subnet mask is used to indicate the network and the host
portion of an IP address.
The default subnet masks for three classes of IP addresses.
255.0.0.0 - Class A, which indicates that the first octet of the
IPv4 address is the network portion.
*
6.3.2.2 Subnet Masks
If an organization owns one Class B network but needs to provide IP
addresses for four LANs, the organization will subdivide the Class
B network into four smaller parts by using subnetting, which is a
logical division of a network. The subnet mask specifies how it is
subdivided. An experienced network administrator typically performs
subnetting. After the subnetting scheme has been created, the
proper IP addresses and subnet masks can be configured on the hosts
in the four subnetted LANs. These skills are taught in the Cisco
Networking Academy courses related to CCNA level networking
skills.
Manual IP address configuration
In a network with a small number of hosts, it is easy to manually
configure each device with the proper IP address.
A network administrator who understands IP addressing should assign
the addresses and should know how to choose a valid address for a
particular network.
To manually enter an IP address on a host, go to the TCP/IP
settings in the Properties window for the Network Interface Card
(NIC). The NIC is the hardware that enables a computer to connect
to a network. It has an address called the Media Access Control
(MAC) address. Whereas the IP address is a logical address that is
defined by the network administrator, a MAC address is "burned-in"
or permanently programmed into the NIC when it is manufactured. The
IP address of a NIC can be changed, but the MAC address never
changes.
The main difference between an IP address and a MAC address is that
the MAC address is used to deliver frames on the LAN, while an IP
address is used to transport frames outside the LAN. A frame is a
data packet, along with address information added to the beginning
and end of the packet before transmission over the network. Once a
frame is delivered to the destination LAN, the MAC address is used
to deliver the frame to the end host on that LAN.
Dynamic IP address configuration
If more than a few computers comprise the LAN, manually configuring
IP addresses for every host on the network can be time-consuming
and prone to errors. In this case, the use of a Dynamic Host
Configuration Protocol (DHCP) server would automatically assign IP
addresses and greatly simplify the addressing process.
Presentation_ID
Cisco Confidential
IPv6 address - 128 bits or 32 hexadecimal values.
32 hexadecimal values are further subdivided into eight fields of
four hexadecimal values separated by colons.
IPv6 address has a three-part hierarchy
Global prefix, also called a site prefix, is the first three blocks
of the address.
Subnet ID includes the fourth block of the address.
Interface ID includes the last four blocks of the address.
6.3.2.3 IPV6
As an example, if a host has an IPv6 address
3ffe:6a88:85a3:08d3:1319:8a2e:0370:7344, the global prefix address
is fe80:6a88:85a3, the subnet ID address is 08d3, and the interface
ID address is 1319:8a2e:0370:7344.
An IPv6 address can be abbreviated with the following rules:
Omit leading zeroes in a 16-bit value.
*
Cisco Confidential
IP address
Subnet mask
Default gateway
*
6.3.2.4 Static Addressing
In a network with a small number of hosts, it is easy to manually
configure each device with the proper IP address.
A network administrator who understands IP addressing should assign
the addresses and should know how to choose a valid address for a
particular network.
To manually enter an IP address on a host, go to the TCP/IP
settings in the Properties window for the Network Interface Card
(NIC). The NIC is the hardware that enables a computer to connect
to a network. It has an address called the Media Access Control
(MAC) address. Whereas the IP address is a logical address that is
defined by the network administrator, a MAC address is "burned-in"
or permanently programmed into the NIC when it is manufactured. The
IP address of a NIC can be changed, but the MAC address never
changes.
The main difference between an IP address and a MAC address is that
the MAC address is used to deliver frames on the LAN, while an IP
address is used to transport frames outside the LAN. A frame is a
data packet, along with address information added to the beginning
and end of the packet before transmission over the network. Once a
frame is delivered to the destination LAN, the MAC address is used
to deliver the frame to the end host on that LAN.
6.3.2.5 DHCP Addressing
Dynamic Host Configuration Protocol (DHCP) is a software utility
used to dynamically assign IP addresses to network devices. This
dynamic process eliminates the need for manually assigning IP
addresses. A DHCP server can be set up and the hosts can be
configured to automatically obtain an IP address. When a computer
is set to obtain an IP address automatically, all of the other IP
addressing configuration boxes are dimmed. The server maintains a
list of IP addresses to assign, and manages the process so that
every device on the network receives a unique IP address. Each
address is held for a predetermined amount of time. When the time
expires, the DHCP server can use this address for any computer that
joins the network.
DNS
To access a DNS server, a computer uses the IP address configured
in the DNS settings of the NIC in the computer. DNS resolves or
maps host names and URLs to IP addresses.
Presentation_ID
Cisco Confidential
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP) is used by devices on a
network to send control and error messages to computers and
servers.
PING (Packet Internet Groper) is a simple command line utility used
to test connections between computers.
Used to determine whether a specific IP address is
accessible.
Used with either the hostname or the IP address.
Works by sending an ICMP echo request to a destination
computer.
Receiving device sends back an ICMP echo reply message.
*
6.3.2.6 ICMP
Ping is a troubleshooting tool used to determine basic
connectivity. These command line switches that can be used with the
ping command. Four ICMP echo requests (pings) are sent to the
destination computer. If it is reachable, the destination computer
responds with four ICMP echo replies. The percentage of successful
replies can help you to determine the reliability and accessibility
of the destination computer.
It is also possible to use ping to find the IP address of a host
when the name is known. If you ping the name of a website, for
example, www.cisco.com, the IP address of the server
displays.
Other ICMP messages are used to report:
Undeliverable packets
Data on an IP network that includes source and destination IP
addresses
Whether a device is too busy to handle the packet
A data packet arrives at a router, which is a networking device
that forwards data packets to other networks. If the router does
not know where to send the packet, the router deletes it. The
router then sends an ICMP message back to the sending computer. A
busy router may send an ICMP message to the sending computer
advising it to slow down because of network congestion.
6.3.2.7 Lab – Configure a NIC to Use DHCP in Windows 7
6.3.2.8 Lab – Configure a NIC to Use DHCP in Windows Vista
6.3.2.9 Lab – Configure a NIC to Use DHCP in Windows XP
6.3.2.10 Packet Tracer- Adding Computers to an Existing
Network
Presentation_ID
Cisco Confidential
Internet Protocols
A protocol is a set of rules. Internet protocols govern
communication within and between computers on a network.
Many protocols consist of a suite (or group) of protocols stacked
in layers.
Devices and computers connected to the Internet use a protocol
suite called TCP/IP to communicate with each other.
The main functions of protocols:
Identifying errors
Compressing data
Addressing data
Deciding how to announce sent and received data
*
6.3.3.1 TCP and UPD
Timing is crucial to network operation. Protocols require messages
to arrive within certain time intervals so that computers will not
wait indefinitely for messages that may have been lost. Therefore,
systems maintain one or more timers during transmission of data.
Protocols also initiate alternative actions if the network does not
meet the timing rules.
These are the main functions of protocols:
Identifying errors
Addressing data
6.3.3.2 Activity – TCP vs. UDP
Presentation_ID
Cisco Confidential
TCP and UDP Protocols and Ports
A port is a numeric identifier used to keep track of specific
conversations. Every message that a host sends contains both a
source and destination port.
6.3.3.3 TCP and UDP Protocol Ports
6.3.3.4 Worksheet – Protocol Definitions and Default Ports
*
Cisco Confidential
Physical Network Components
A Modem is an electronic device that connects to the Internet via
an ISP.
A modem converts digital data to analog signals for transmission
over a phone line.
Internal modems plug into an expansion slot on the
motherboard.
External modems connect to a computer through the serial and USB
ports.
6.4.1.1 Network Devices
Cisco Confidential
Cisco Confidential
Network Devices
Hub
Extend the range of a signal by receiving then regenerating it and
sending it out all other ports.
Allow for collisions on the network segment and are often not a
good solution.
Also called concentrators because they serve as a central
connection point for a LAN.
Bridges and Switches
A bridge has the intelligence to determine if an incoming frame is
to be sent to a different segment, or dropped. A bridge has two
ports.
A switch (multiport bridge) has several ports and refers to a
table of MAC addresses to determine which port to use to forward
the frame.
Power over Ethernet (PoE)
*
Hubs
To make data transmission more extensible and efficient than a
simple peer-to-peer network, network designers use specialized
network devices, such as hubs, switches, routers, and wireless
access points, to send data between network devices. The type of
connection that is needed determines the device that is used.
This process means that all traffic from a device connected to the
hub is sent to all the other devices connected to the hub every
time the hub transmits data. This causes a great amount of network
traffic.
Bridges and Switches
Files are broken up into small pieces of data, called packets,
before they are transmitted over a network. This allows for error
checking and easier retransmission if the packet is lost or
corrupted. Address information is added to the beginning and to the
end of packets before they are transmitted over the network. The
packet, along with the address information, is called a
frame.
LANs are often divided into sections called segments bounded by
bridges.
A typical bridge may have just two ports, linking two segments of
the same network. A switch is a more sophisticated device than a
bridge. A switch maintains a table of the MAC addresses for
computers that are connected to each port. When a frame arrives at
a port, the switch compares the address information in the frame to
its MAC address table. The switch then determines which port to use
to forward the frame.
Presentation_ID
Cisco Confidential
Routers
Devices that connect entire networks to each other. They use IP
addresses to forward packets to other networks.
A router can be a computer with special network software installed
or can be a device built by network equipment manufacturers.
Routers contain tables of IP addresses along with optimal routes to
other networks.
Wireless Access Points (WAP)
Provide network access to wireless devices such as laptops and
PDAs.
Use radio waves to communicate with radios in computers, PDAs, and
other wireless access points.
Have limited range of coverage.
*
Router
While a switch connects segments of a network, routers are devices
that connect entire networks to each other. Switches use MAC
addresses to forward a frame within a single network. Routers use
IP addresses to forward frames to other networks.
Wireless Access Points
Wireless access points provide network access to wireless devices
such as laptops and PDAs. The wireless access point uses radio
waves to communicate with radios in computers, PDAs, and other
wireless access points. An access point has limited range of
coverage. Large networks require several access points to provide
adequate wireless coverage.
Presentation_ID
Cisco Confidential
More convenient to purchase and configure just one device.
Combines the functions of a switch, a router and a wireless access
point into one device.
*
Multipurpose Devices
There are network devices that perform more than one function. It
is more convenient to purchase and configure one device that serves
all of your needs than to purchase a separate device for each
function. This is especially true for the home user. In your home,
you would purchase a multipurpose device instead of a switch, a
router, and a wireless access point. The Linksys E2500 is an
example of a multipurpose device.
Presentation_ID
Cisco Confidential
Network Devices
Network-attached storage (NAS)
Consists of one or more hard drives, an Ethernet connection, and an
embedded operating system
The NAS device connects to the network, allowing users on the
network to access and share files, stream media, and back up data
to a central location
6.4.1.4 NAS
Cisco Confidential
Network Devices
VoIP phones - carry telephone calls over the data networks
and Internet.
Hardware firewalls - use various techniques for determining what is
permitted or denied access to a network segment.
Internet appliance – web TV, game consoles, Blu-ray players
etc.
Purchasing Authentic Networking Devices - Computer and network
problems can be related to counterfeit components.
6.4.1.5 Network devices-VoIP phones
6.4.1.6 Network devices-Hardware Firewall
*
Cisco Confidential
Coaxial Cable
Types of coaxial cable:
Thicknet or 10Base5 - Coaxial cable that was used in networks and
operated at 10 megabits per second with a maximum length of 500
m
Thinnet or 10Base2 - Coaxial cable that was used in networks and
operated at 10 megabits per second with a maximum length of 185
m
RG-59 - Most commonly used for cable television in the US
*
Considerations for Cabling a Network
You need to know what type of cable to use in different situations
to install the correct cables for the job. You also need to be able
to troubleshoot and repair problems that you encounter. Select the
cable type that is the most beneficial and cost effective for the
users and services that will connect to the network. Consider the
following:
Cost
Security
Coaxial Cable
Coaxial cable is a copper-cored cable surrounded by a heavy
shielding. Coaxial cable is used to connect computers in a
network.
There are several types of coaxial cable, including the
following:
Thicknet or 10Base5 - Coax cable that was used in networks and
operated at 10 megabits per second with a maximum length of 500
meters.
Thinnet or 10Base2 - Coax cable that was used in networks and
operated at 10 megabits per second with a maximum length of 185
meters.
RG-59 - Most commonly used for cable television in the US
RG-6 - Higher quality cable than RG-59 with more bandwidth and less
susceptibility to interference
Presentation_ID
Cisco Confidential
Twisted-Pair Cabling
A pair of twisted wires forms a circuit that transmits data.
The twisted wires provide protection against crosstalk (electrical
noise) because of the cancellation effect.
Pairs of copper wires are encased in color-coded plastic insulation
and twisted together.
An outer jacket of poly-vinyl chloride (PVC) protects the bundles
of twisted pairs.
There are two types of this cable:
Unshielded twisted-pair (UTP)
(Cat 3, Cat 5, 5e ,Cat 6 and Cat 7)
Shielded twisted-pair (STP)
Twisted-Pair Cabling
Twisted-pair is a type of copper cabling that is used for telephone
communications and most Ethernet networks. A pair of wires forms a
circuit that can transmit data. The pair is twisted to provide
protection against crosstalk, which is the noise generated by
adjacent pairs of wires in the cable. Pairs of copper wires are
encased in color-coded plastic insulation and twisted together. An
outer jacket protects the bundles of twisted pairs called
poly-vinyl chloride (PVC). PVC will produce hazardous fumes when
burned. Most network cables are installed in the plenum space, or
areas in the ceiling, in the walls, and under the floor. If cables
with the PVC jackets do burn in the plenum space, hazardous fumes
can spread quickly through a building. To avoid this danger, only
install plenum-grade fire resistant cabling in the plenum
space.
When electricity flows through a copper wire, a magnetic field is
created around the wire. A circuit has two wires, and in a circuit,
the two wires have oppositely charged magnetic fields. When the two
wires of the circuit are next to each other, the magnetic fields
cancel each other out. This is called the cancellation effect.
Without the cancellation effect, your network communications become
slow due to the interference caused by the magnetic fields.
There are two basic types of twisted-pair cables:
Unshielded twisted-pair (UTP)
Has two or four pairs of wires
Relies on the cancellation effect for reduction of interference
caused by electromagnetic interface (EMI) and radio frequency
interference (RFI)
Most commonly used cabling in networks
Has a range of 328 ft (100 meters)
Shielded twisted-pair (STP)
Each pair is wrapped in metallic foil to better shield the wires
from electrical noise. Four pairs of wires are then wrapped in an
overall metallic braid or foil. STP reduces electrical noise from
within the cable. It also reduces EMI and RFI from outside the
cable.
Facts about STP
Disadvantages of STP
More difficult to install because of the thickness.
Metallic shielding must be grounded at both ends. If not, shield
acts like an antenna picking up unwanted signals.
Category Rating
UTP comes in several categories that are based on two
factors:
The number of wires in the cable
The number of twists in those wires
Category 3 is the wiring used for telephone connections. It has
four pairs of wires and a maximum data transmission rate of up to
16 Mbps. Category 3 telephone cable is usually terminated into an
RJ-11 connector.
Category 5 and Category 5e have four pairs of wires with a maximum
data transmission rate of up to 100 Mbps. Category 5 and 5e are the
most common network cables used. Category 5e has more twists per
foot than Category 5 wiring. These extra twists further prevent
interference from outside sources and the other wires within the
cable.
Category 6 cable uses a plastic divider to separate and maintain
the position of the pairs of wires relative to each other. This
prevents interference. The pairs also have more twists than
Category 5e cable. Category 5, 5e, and 6 cables terminate into an
RJ-45 connector. An RJ-11 telephone connector has six pins and an
RJ-45 connector has eight pins.
Cat 7 transmits 10Gbs at 600MHz
6.4.2.4 Lab – Building Straight-Through and Crossover UTP
Cables
6.4.2.5 Packet Tracer – Cabling a Simple Network
Presentation_ID
Cisco Confidential
Fiber-Optic Cable
A glass or plastic strand that transmits information using light
and is made up of one or more optical fibers enclosed together in a
sheath or jacket.
Not affected by electromagnetic or radio frequency
interference.
Signals are clearer, can go farther, and have greater bandwidth
than with copper cable.
Usually more expensive than copper cabling and the connectors are
more costly and harder to assemble.
Two types of glass fiber-optic cable:
Multimode and Single-mode
6.4.2.6 Fiber-Optic Cable
Signal can travel several miles or kilometers before the signal
needs to be regenerated.
Common connectors for fiber-optic networks are SC, ST, and LC.
These three types of fiber-optic connectors are half-duplex, which
allows data to flow in only one direction. Therefore, two cables
are needed.
Two types of glass fiber-optic cable:
Multimode - Cable that has a thicker core than single-mode cable.
It is easier to make, can use simpler light sources (LEDs), and
works well over distances of a few kilometers or less.
Single-mode - Cable that has a very thin core. It is harder to
make, uses lasers as a light source, and can transmit signals
dozens of kilometers with ease.
Presentation_ID
Cisco Confidential
Two Types of LAN Topologies
Physical topology is the physical layout of the components on the
network.
*
6.5.1.1 Physical and Logical Topologies
Topologies are building blocks for designing a computer network. A
technician needs to understand how networks are designed in order
to work on computers that are part of a network. There are two
types of LAN topologies: physical and logical.
A physical topology is the physical layout of the components on the
network.
A logical topology determines how the hosts communicate across a
medium, such as a cable or the airwaves.
Presentation_ID
Cisco Confidential
Logical Topologies
The two most common types of logical topologies are broadcast and
token passing.
Broadcast topology- A host broadcasts a message to all hosts on the
same network segment. There is no order that hosts must follow to
transmit data. Messages are sent on a First In, First Out (FIFO).
Ethernet is based on this topology.
Token passing controls network access by passing an electronic
token sequentially to each host. When a host receives the token, it
can send data on the network. If the host has no data to send, it
passes the token to the next host and the process repeats
itself.
6.5.1.1 Logical and Physical Topologies
*
Cisco Confidential
LAN Physical Topologies
A physical topology defines the way in which computers, printers,
and other devices are connected to a network.
Bus
Each computer connects to a common cable The ends of the cable have
a terminator installed to prevent signal reflections and network
errors.
Only one computer can transmit data at a time or frames will
collide and be destroyed.
Ring
Hosts are connected in a physical ring or circle.
A special frame, a token, travels around the ring, stopping at each
host to allow data transmission.
There are two types of ring topologies:
Single-ring and Dual-ring
6.5.1.1 LAN Physical Topologies
A physical topology defines the way in which computers, printers,
and other devices are connected to a network. A logical topology
describes how the hosts access the medium and communicate on the
network. The type of topology determines the capabilities of the
network, such as ease of setup, speed, and cable lengths.
These are common LAN physical topologies:
Bus Topology
The cable connects one computer to the next, like a bus line going
through a city. The terminator prevents signals from bouncing back
and causing network errors.
When this happens, the computers must resend the frames. This
topology is rarely used and would only be suitable for a home
office or small business with few hosts.
Ring Topology
In a ring topology, hosts are connected in a physical ring or
circle. The ring topology has no beginning or end, so the cable
does not need to be terminated. A specially-formatted frame, called
a token, travels around the ring, stopping at each host. If a host
wants to transmit data, the host adds the data and the destination
address to the frame. The frame then continues around the ring
until the frame stops at the host with the destination address. The
destination host takes the data out of the frame.
The advantage of using a ring topology is that there are no
collisions. When electrical signals run into each other, they
cancel each other out. This is called a collision. There are no
collisions because the host with the token is the only host that is
allowed to transmit data.
There are two types of ring topologies:
Single-ring - All the devices on the network connect to a single
cable and the data travels in one direction only. Each device has
an opportunity to send data over the network.
Dual ring - All the devices on the network connect to two cables
and the data travels in both directions. Only one cable is used at
a time. In the event of a failure of one ring, data is transmitted
on the other ring.
A Token Ring network is the most common implementation of the ring
topology. A Token Ring network uses a ring topology and a
token-passing methodology to prevent collisions. Some
characteristics of Token Ring networks are:
Token Ring was developed by IBM and conforms to the Institute of
Electrical and Electronics Engineers (IEEE) 802.5 standard.
Token Ring networks typically operate at 4 or 16 Mbps.
Presentation_ID
Cisco Confidential
Has a central connection point : a hub, switch, or router.
Easy to troubleshoot, since each host is connected to the central
device with its own wire.
Hierarchical or Extended Star Topology
A star network with an additional networking device connected to
the main networking device to increase the size of the
network.
Used for larger networks.
Connects all devices to each other.
Used in WANs that interconnect LANs. The Internet is an example of
a mesh topology.
Hybrid
*
Star Topology
Each host on a network has a cable segment that attaches the host
directly to the central connection point.
A star topology costs more to implement than the bus topology
because more cable is used, and a central device is needed, such as
a hub, switch, or router. If there is a problem with that cable,
only that host is affected. The rest of the network remains
operational.
Hierarchical Star Topology
A hierarchical or extended star topology is a star network with an
additional networking device connected to the main networking
device. Typically, a network cable connects to one hub, and then
several other hubs connect to the first hub. A hierarchical star
topology can be used with network devices that filter frames or
packets, such as bridges, switches, and routers. This topology,
when used with these devices, significantly reduces congestion by
sending packets only to the network segment of the destination
host. Larger networks, such as those of corporations or
universities, use the hierarchical star topology.
Mesh Topology
The mesh topology connects all devices to each other. When every
device is connected to every other device, a failure of any cable
will not affect the network.
Mesh topologies are expensive and difficult to install because of
the amount of cable necessary to connect every device to every
other device on the network. On the Internet, if one device breaks
down, the data can be routed through another device. Mesh
topologies are often used by governments when data must be
available even in the event of a network failure.
6.5.1.2 Packet Tracer – Physical Topologies
Presentation_ID
Cisco Confidential
Standards Organizations
one of the three Sectors of the International Telecommunication
Union
Standards covering all fields of telecommunications
Became ITU-T in 1992
A non-profit, technical professional association
Standards for the computer and electronics industry
1884
ISO
A network of the national standards institutes of 157
countries
Promote the development of international standards agreements
1947
IAB
Oversees the technical and engineering development of the
Internet
1979; first named ICCB
1906
ANSI
1918
TIA/EIA
Trade associations
*
6.6.1.1 Standard Organizations
Several worldwide standards organizations are responsible for
settings networking standards. Standards are used by manufacturers
as a basis for developing technology, especially communications and
networking technologies. Standardizing technology ensures that
products will be able to communicate with any other products using
the same technology. The standards groups create, examine, and
update standards and technology to meet the demands for higher
bandwidth, efficient communication, and reliable service. These
standards are applied to the development of technology to meet the
demands for higher bandwidth, efficient communication, and reliable
service.
Be familiar with these standards to implement and repair equipment
that follows the guidelines described in the standards. If the
standards are not followed during a cable installation, for
example, the network may not operate at the speed needed. When you
do not adhere to standards, you may also find that you have trouble
updating, replacing, or upgrading network components.
Presentation_ID
Cisco Confidential
Ethernet Standards
Ethernet protocols describe the rules that control how
communication occurs on an Ethernet network.
IEEE 802.3 Ethernet standard specifies that a network implement the
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
access control method.
*
6.6.1.2 Ethernet Standards
To ensure that all Ethernet devices are compatible with each other,
the IEEE developed standards for manufacturers and programmers to
follow when making and programming Ethernet devices.
IEEE 802.3
The Ethernet architecture is based on the IEEE 802.3 standard. The
IEEE 802.3 standard specifies that a network implement the Carrier
Sense Multiple Access with Collision Detection (CSMA/CD) access
control method.
In CSMA/CD, all end stations "listen" to the network wire for
clearance to send data. This process is similar to waiting to hear
a dial tone on a phone before dialing a number. When the end
station detects that no other host is transmitting, the end station
will attempt to send data. If no other station sends any data at
the same time, this transmission will arrive at the destination
computer with no problems. If another end station observed the same
clear signal and transmitted at the same time, a collision will
occur on the network media.
The first station that detects the collision, or the doubling of
voltage, sends out a jam signal that tells all stations to stop
transmitting and to run a backoff algorithm. A backoff algorithm
calculates random times in which the end station will start to try
network transmission again. This random time is typically in one or
two milliseconds (ms), or thousandths of a second. This sequence
occurs every time there is a collision on the network and can
reduce Ethernet transmission by up to 40%.
Presentation_ID
Cisco Confidential
Ethernet Technologies
An Ethernet technology that uses a star topology.
*
The IEEE 802.3 standard defines several physical implementations
that support Ethernet. Some of the common implementations are
described here.
10BASE-T is an Ethernet technology that uses a star topology.
10BASE-T is a popular Ethernet architecture whose features are
indicated in its name:
The ten (10) represents a speed of 10 Mbps.
BASE represents baseband transmission. In baseband transmission,
the entire bandwidth of a cable is used for one type of
signal.
The T represents twisted-pair copper cabling.
Advantages of10BASE-T:
Installation of cable is inexpensive compared to fiber-optic
installation.
Cables are thin, flexible, and easier to install than coaxial
cabling.
Equipment and cables are easy to upgrade.
Disadvantages of 10BASE-T:
The maximum length for a 10BASE-T segment is only 328 ft (100
m).
Cables are susceptible to Electromagnetic Interference (EMI).
100BASE-TX “FastEthernet”
The high bandwidth demands of many modern applications, such as
live video conferencing and streaming audio, have created a need
for higher data-transfer speeds. Many networks require more
bandwidth than 10 Mbps Ethernet. 100BASE-TX is much faster than
10BASE-T and has a theoretical bandwidth of 100 Mbps. The "X"
indicates that you can use many different types of copper and
fiber-optic cabling.
Advantages of 100BASE-TX:
At 100 Mbps, transfer rates of 100BASE-TX are ten times that of
10BASE-T.
100BASE-X uses twisted-pair cabling, which is inexpensive and easy
to install.
Disadvantages of 100BASE-TX:
The maximum length for a 100BASE-TX segment is only 328 ft (100
m).
Cables are susceptible to Electromagnetic Interference (EMI).
1000BASE-TX “Gigabit Ethernet”
1000BASE -T is commonly known as Gigabit Ethernet. Gigabit Ethernet
is a LAN architecture.
Advantages of 1000BASE-T:
The 1000BASE-T architecture supports data transfer rates of 1 Gbps.
At 1 Gbps, it is ten times faster than Fast Ethernet, and 100 times
faster than Ethernet. This increased speed makes it possible to
implement bandwidth-intensive applications, such as live
video.
The 1000BASE-T architecture has interoperability with 10BASE-T and
100BASE-TX.
Presentation_ID
Cisco Confidential
Wireless Ethernet Standards
IEEE 802.11 is the standard that specifies connectivity for
wireless networks.
Wi-Fi (wireless fidelity), refers to the 802.11 family
802.11 (the original specification)
802.11a
802.11b
802.11g
802.11n
*
6.6.1.4 Explain wireless Ethernet standards
IEEE 802.11 is the standard that specifies connectivity for
wireless networks.
IEEE 802.11, or Wi-Fi (wireless fidelity), refers to the collective
group of standards, 802.11 (the original specification), 802.11b,
802.11a, 802.11g, and 802.11n. These protocols specify the
frequencies, speeds, and other capabilities of the different Wi-Fi
standards.
802.11a - Devices conforming to the 802.11a standard allow WLANs to
achieve data rates as high as 54 Mbps. IEEE 802.11a devices operate
in the 5 GHz radio frequency range and within a maximum range of
150 feet (45.7 m).
802.11b operates in the 2.4 GHz frequency range with a maximum
theoretical data rate of 11 Mbps. These devices operate within a
maximum range of 300 feet (91 m).
802.11g provides the same theoretical maximum speed as 802.11a,
which is 54 Mbps, but operates in the same 2.4 GHz spectrum as
802.11b. Unlike 802.11a, 802.11g is backward-compatible with
802.11b. 802.11g also has a maximum range of 300 feet (91 m).
802.11n is a newer wireless standard that has a theoretical
bandwidth of 540 Mbps and operates in either the 2.4 GHz or 5 GHz
frequency range with a maximum range of 984 feet (250 m).
Presentation_ID
Cisco Confidential
802.11b
802.15.1 Bluetooth
30 feet (10 meters)
*
Presentation_ID
Cisco Confidential
Frame of reference used to develop the Internet's protocols.
Consists of layers that perform functions necessary to prepare data
for transmission over a network.
Description
Protocols
Application
Transport
Provides end-to-end management of data and divides data into
segments
TCP, UDP
Internet
Provides connectivity between hosts in the network. IP addressing
and routing here.
IP, ICMP, RIP, ARP
*
The TCP/IP reference model
Frame of reference used to develop the Internet's protocols
developed By researchers in US Department of Defense
Consists of layers that perform functions necessary to prepare data
for transmission over a network
A message moves from the top (Application) layer down the TCP/IP
layers to the bottom Network Access Layer. Header information is
added to the message as it moves down through each layer and is
then transmitted. After reaching the destination, the message
travels back up through each layer of the TCP/IP model. The header
information that was added to the message is stripped away as the
message moves up through the layers toward its destination.
Application Layer protocols provide network services to user
applications such as web browsers and e-mail programs
Transport Layer protocols provide end-to-end management of the data
and divides the data into manageable segments for easier transport
across the network
Internet Layer protocols provide connectivity between hosts in the
network
Network Access Layer protocols describe the standards that hosts
use to access the physical media. The IEEE 802.3 Ethernet standards
and technologies, such as CSMA/CD and 10BASE-T are defined in this
layer.
Presentation_ID
Cisco Confidential
The OSI Model
The OSI model is an industry standard framework that is used to
divide network communications into seven layers.
Although other models exist, most network vendors today build their
products using this framework.
A protocol stack is a system that implements protocol behavior
using a series of layers.
Protocol stacks can be implemented either in hardware or software,
or in a combination of both.
*
6.7.1.2 OSI
The OSI model is an industry standard framework that is used to
divide network communications into seven distinct layers. Although
other models exist, most network vendors today build their products
using this framework. Developed by the International
Standards Organization (ISO).
A system that implements protocol behavior consisting of a series
of these layers is known as a protocol stack. Protocol stacks can
be implemented either in hardware or software, or a combination of
both. Typically, only the lower layers are implemented in hardware,
and the higher layers are implemented in software.
Presentation_ID
Cisco Confidential
Layer
Description
Application
7
Presentation
6
Transforms data formats to provide a standard interface for the
Application layer
Session
5
Establishes, manages and terminates the connections between the
local and remote application
Transport
4
Network
3
Data Link
Physical
1
*
6.7.1.2 OSI
Each layer is responsible for part of the processing to prepare
data for transmission on the network. The chart shows what each
layer of the OSI model does.
NOTE: Mnemonics can help you remember the seven layers of the OSI.
Some examples include: "All People Seem To Need Data Processing"
and "Please Do Not Throw Sausage Pizza Away".
Presentation_ID
Cisco Confidential
*
6.7.1.3 Comparing the OSI and TCP/IP Models
The OSI model and the TCP/IP model are both reference models used
to describe the data communication process. The TCP/IP model is
used specifically for the TCP/IP suite of protocols and the OSI
model is used for development of standard communication for
equipment and applications from different vendors.
The TCP/IP model performs the same process as the OSI model, but
uses four layers instead of seven.
6.7.1.4 Activity – Match the OSI Model to the TCP/IP Model
Presentation_ID
Cisco Confidential
Selecting a NIC
Most network interfaces for desktop computers are either integrated
into the motherboard or are an expansion card that fits into an
expansion slot.
Most laptop network interfaces are either integrated into the
motherboard or fit into a PC Card or ExpressBus expansion
slot.
USB network adapters plug into a USB port and can be used with both
desktops and laptops.
6.8.2 Network Cards
Wireless NICs are available in different formats and capabilities.
Select a wireless NIC based on the type of wireless network that is
installed:
802.11b NICs can be used on 802.11g networks.
802.11a can be used only on a network that supports 802.11a.
802.11a dual-band, 802.11b, and 802.11g NICs can be used on 802.11n
networks.
6.8.2.1 Selecting a NIC
*
Cisco Confidential
Manufacturers publish new driver software for NICs.
May enhance the functionality of the NIC.
May be needed for operating system compatibility.
When installing a new driver manually, disable the virus protection
and close all applications.
Select Start > Control Panel > Device Manager
*
Manufacturers will publish new driver software for a NIC.
May enhance the functionality of the NIC
May be needed for operating system compatibility
To install a new driver:
Disable virus protection software
Install only one driver at a time
Close all applications that are running so that they are not using
any files associated with the driver update.
Visit the manufacturer's website and download a self-extracting
executable driver file that will automatically install or update
the driver
Alternatively, you can click the Update Driver button in the
toolbar of the Device Manager
Start > Control Panel > Device Manager
After updating, reboot the computer
Rebooting after driver changes will make sure that the installation
has gone as planned and the new driver is working properly
When installing multiple drivers, reboot the computer between each
update to make sure there are no conflicts
Uninstall a NIC Driver - If a new NIC driver does not perform as
expected after it has been installed, the driver can be
uninstalled, or rolled back, to the previous driver.
6.8.2.4 Lab – Installing a Wireless NIC in Windows 7
6.8.2.5 Lab – Installing a Wireless NIC in Windows Vista
6.8.2.6 Lab – Installing a Wireless NIC in Windows XP
Presentation_ID
Cisco Confidential
Protocols
IP address
MAC address
*
6.8.2.7 Configuring the NIC
The computer will now need an IP address. Most networks are set up
so that the computer will receive an IP address automatically from
a local DHCP server. If the computer does not have an IP address,
you will need to enter a unique IP address in the TCP/IP properties
of the NIC.
Click Start > Control Panel > Network and Sharing Center >
Change adapter setting > right-click Local Area
Connection > Properties > TCP/IPv4 > Properties
> configure IP settings
Every NIC must be configured with the following information:
The same protocol must be implemented between any two computers
that communicate on the same network.
The IP address is configurable and must be unique to each device.
The IP address can be manually configured or automatically assigned
by DHCP.
Each device has a unique MAC address. The MAC address is assigned
by the manufacturer and cannot be changed.
Once the computer is connected to the network, you should test
connectivity.
Use the ipconfig program to find out the IP address assigned to the
computer.
Ping your own IP address to make sure that your NIC is working
properly.
Once you have determined that your NIC is working, ping your
default gateway or another computer on your network. A default
gateway is a computer or router that serves as the entry point and
exit point of your subnet.
If you have an Internet connection, ping a popular website, such as
www.cisco.com. If you can ping an Internet site successfully,
everything is working properly with your connection. If you cannot
ping one of these items, you will need to begin troubleshooting the
connection.
Presentation_ID
Cisco Confidential
Advanced NIC Settings
Duplex and Speed
Duplex and speed settings for a NIC can slow down data transfer
rates on a computer if they are not matched with the device to
which they are connected.
Wake on LAN
WoL settings are used to wake up a networked computer from a very
low power mode state.
Quality of Service
*
6.8.2.8 Advanced NIC Settings
In most network environments, the only NIC setting that you must
configure is the IP address information. You can leave the advanced
NIC settings at their default values. However, when a computer
connects to a network that does not support some or all of the
default settings, you must make the necessary changes to the
advanced settings. These changes may be required so that the
computer can connect to the network, enable features required by
the network, or achieve a better network connection.
Improperly setting the advanced features can lead to connection
failure or performance degradation. Advanced features are located
in the Advanced tab in the NIC configuration window.
NOTE: The Advanced features available and tab layout of features
depend on the OS and the specific NIC adapter and driver
installed.
6.8.2.9 Packet Tracer – Install a Wireless NIC
Presentation_ID
Cisco Confidential
Connecting to the Router
After connecting the network cable, activity should be verified by
looking at the LEDs.
Set the network location.
browser using 192.168.1.1.
6.8.3.2 Setting the Network Location Windows Vista and 7
When connecting to a network for the first time, use the following
information to make the appropriate choice.
Home Network - Choose this network location for home networks or
when you trust the people and devices on the network. Network
discovery is turned on, which allows you to see other computers and
devices on the network and other network users to see your
computer.
Work Network - Choose this network location for a small office or
other workplace network. Network discovery is turned on. A
homegroup cannot be created or joined.
Public Network - Choose this network location for airports, coffee
shops, and other public places. Network discovery is turned off.
This network location provides the most protection. Also choose
this network location if you connect directly to the Internet
without using a router, or if you have a mobile broadband
connection. Homegroup is not available.
NOTE: If there is only one computer on a network and file or
printer sharing is not needed, the most secure choice is
Public.
6.8.3.3 Logging into the Router
*
Cisco Confidential
It is good practice to change the following default settings:
Router Name
6.8.3.5 Lab – Connect to a Router for the First Time
*
Cisco Confidential
Basic Wireless Settings
Configure basic settings to secure and increase the speed of the
wireless network:
Network mode - A mixed-mode allows 802.11b, 802.11g, and 802.11n
devices.
Service Set Identifier (SSID) - The name of the wireless
network.
Channel - 1 and 11 do not overlap with the default channel 6.
Use one of these three channels for best results.
Wireless security modes
Advanced Encryption Standard (AES)
Wi-Fi Protected Access (WPA)
6.8.3.7 Basic Wireless Settings
*
Cisco Confidential
Testing Connectivity
*
Cisco Confidential
Testing Connectivity
Ping – tests basic connectivity between devices.
Net commands – manage network computers, servers, and
resources.
Tracert – trace the routes that packets take from your computer to
a destination host.
Nslookup – tests and troubleshoots DNS servers.
6.8.3.13 Testing Connectivity Using Windows CLI
6.8.3.14 Lab – Test the Wireless NIC In Windows 7
6.8.3.15 Lab – Test the Wireless NIC In Windows Vista
6.8.3.16 Lab – Test the Wireless NIC In Windows XP
6.8.3.17 Packet Tracer – Test a Wireless Connection
*
Cisco Confidential
Domain and Workgroup
Domain - group of computers and electronic devices with a
common set of rules and procedures administered as a unit.
Workgroup - collection of workstations and servers on a LAN
that are designed to communicate and exchange data with one
another.
6.8.4 OS Configurations
6.8.4.2 Connecting to a Workgroup or a Domain
Before computers can share resources, they must share the same
domain name or workgroup name. Older operating systems have more
restrictions for naming a workgroup. If a workgroup is made up of
newer and older operating systems, use the workgroup name from the
computer with the oldest operating system.
*
Cisco Confidential
Windows 7 Homegroup
Windows 7 computers that belong to the same workgroup can also
belong to a homegroup.
There can only be one homegroup per workgroup on a network.
Computers can only be a member of one homegroup at a time.
Homegroups allow for easy sharing of resources between
members.
The homegroup option is not available in Windows Vista or Windows
XP.
6.8.4.3 Windows 7 Homegroup
*
Cisco Confidential
Sharing Resources in Windows Vista
Sharing and Discovery, located in the Network and Sharing Center,
manages the settings for a home network.
Network discovery
File sharing
Start > Control Panel > Network and Sharing Center
6.8.4.4 Sharing Resources in Windows Vista
*
Cisco Confidential
Network Setup Wizardsets up the following items:
A connection to the Internet for the computer through a direct
dial-up or broadband connection or through another computer on the
home network
Internet Connection Sharing on a Windows XP-based computer for
sharing a connection to the Internet with other computers on the
home network
Computer name, computer description, and workgroup name
File and printer sharing
To access the Network Setup Wizard, use the following path:
Start > Control Panel > Network Setup Wizard
6.8.4.5 Sharing Resources in Windows XP
*
Cisco Confidential
Network Shares and Drive Mapping
Mapping a drive, which is done by assigning a letter (A to Z)
to the resource on a remote drive, allows you to use the remote
drive as if it was a local drive.
The following are the permissions that can be assigned to the file
or folder
Read – user can view and run program files
Change – In addition to Read permissions, the user can add files
and subfolders, change the data in files, and delete subfolders and
files
Full Control - In addition to Change and Read permissions, the user
can change the permission of files and folders in an NTFS partition
and take ownership of files and folders.
6.8.4.6 Network Shares and Drive Mapping
6.8.4.7 Lab – Share a Folder Create a Homegroup and Map a Network
Drive in Windows 7
*
Cisco Confidential
Virtual Private Network (VPN)
Virtual Private Network (VPN) - a private network that
connects remote sites or users together over a public network, like
the internet.
When connected via the VPN, users have access to all services and
resources as if they were physically connected to their corporate
LAN.
Remote-access users must install the VPN client software which
encrypts data before sending it over the Internet.
VPN gateways establish, manage, and control VPN connections (also
known as VPN tunnels).
6.8.4.10 Virtual Private Network (VPN)
*
Cisco Confidential
Virtual Private Network (VPN)
*
6.8.4.10 Virtual Private Network (VPN)
A VPN uses dedicated secure connections routed through the Internet
from the company private network to the remote user. When connected
to the company private network, users become part of that network
and have access to all services and resources as if they were
physically connected to the LAN.
Remote-access users must install the VPN client on their computers
to form a secure connection with the company private network. The
VPN client software encrypts data before sending it over the
Internet to the VPN gateway at the company private network. VPN
gateways establish, manage, and control VPN connections, also known
as VPN tunnels.
Presentation_ID
Cisco Confidential
Digital Subscriber Line (DSL)
An "always-on" technology; there is no need to dial up each time to
connect to the Internet.
Uses the existing copper telephone lines to provide high-speed data
communication between end users and telephone companies.
Asymmetric DSL (ADSL) is currently the most commonly used DSL
technology.
Has a fast downstream speed, typically 1.5 Mbps.
Upload rate of ADSL is slower.
.
*
6.9.1.2 DSL and ADSL
Digital Subscriber Line (DSL)
Unlike ISDN, where the digital data communications replaces the
analog voice communications, DSL shares the telephone wire with
analog signals. This sharing of the phone wire allows voice calls
to be placed while DSL is connecting to the Internet. Two major
considerations when selecting DSL:
DSL has distance limitations.
Voice information and the data carried by DSL must be separated at
the customer site.
Presentation_ID
Cisco Confidential
DSL Types
Type
Description
ADSL
Asymmetric DSL is most common. Downstream speed from 384 Kbps to 6
Mbps. Upstream speeds lower than downstream speeds.
HDSL
High Data Rate DSL provides equal bandwidth in both
directions.
SDSL
Symmetric DSL provides the same speed, up to 3 Mbps, for uploads
and downloads.
VDSL
Very High Data Rate DSL is capable of bandwidths between 13 and 52
Mbps downstream, and 16 Mbps upstream.
IDSL
*
Cisco Confidential
Line of Sight Wireless Internet Services
Line of sight wireless Internet is an always-on service that uses
radio signals for transmitting Internet access.
Radio signals are sent from a tower to the receiver that the
customer connects to a computer or network device.
A clear path between the transmission tower and customer is
required. The tower may connect to other towers or directly to an
Internet backbone connection.
The distance the radio signal can travel and still be strong enough
to provide a clear signal depends on the frequency of the signal.
Lower frequency of 900 MHz can travel up to 40 miles (65 km), while
a higher frequency of 5.7 GHz can only travel 2 miles (3 km).
Extreme weather condition, trees, and tall buildings can affect
signal strength and performance.
6.9.1.3 Line of Sight Wireless Internet Services
*
Cisco Confidential
IEEE 802.16e
Download speeds up to 70 Mb/s and distances up to 30
miles.
Uses low wavelength transmission, between 2 GHz to 11 GHz.
Fixed WiMAX - A point-to-point or point-to-multipoint service
with speeds up to 72 Mb/s and a range of 30 miles (50 km).
Mobile WiMAX - A mobile service, like Wi-Fi, but with higher
speeds and a longer transmission range.
6.9.1.4 Worldwide Interoperability for Microwave Access
(WiMAX)
*
Cisco Confidential
4G - Data speeds from 5.8 Mbs and up
Cable - uses coaxial cable lines originally designed to carry cable
television, a cable modem connects your computer to the cable
company.
Satellite - uses a satellite dish for two-way communication.
Fiber Broadband - provides faster connection speeds and bandwidth
than cable modems, DSL.
6.9.1.5 Other Broadband Technologies
*
Cisco Confidential
6.9.1.8 Worksheet – ISP Connection Types
*
Cisco Confidential
Common preventive maintenance techniques should continually be
performed for a network to operate properly.
Keep network rooms clean and change air filters often.
Checking the various components of a network for wear.
Check the condition of network cables because they are often moved,
unplugged, and kicked.
Label the cables to save troubleshooting time later. Refer to
wiring diagrams and always follow your company's cable labeling
guidelines.
*
6.10.1 Network Maintenance
6.10.1.1 Preventive Maintenance
Heat is a big problem for network devices, especially in the server
room. Network devices, such as computers, hubs, and switches, do
not perform well when over-heated. Excess heat is generated by dust
and dirty air filters. Dust impedes the proper flow of cool air and
sometimes even clogs fans. Keep network rooms clean and change air
filters often.
Preventive maintenance involves checking the various components of
a network for wear. Check the condition of network cables because
they are often moved, unplugged, and kicked. Many network problems
can be traced to a faulty cable. You should replace any cables that
have exposed wires, are badly twisted, or are bent.
Label the cables. This practice will save troubleshooting time
later. Refer to wiring diagrams and always follow your company's
cable labeling guidelines.
Test devices on a regular basis.
The uninterruptible power supply (UPS), which provides backup
power, should be tested to ensure that you have power in the case
of an outage. Before installing a new UPS, plug it into a power
source to charge the batteries. The initial charge time is usually
12 hours or more. Follow the manufacturer instructions for
unpacking the UPS and preparing it for use.
Presentation_ID
Cisco Confidential
Step 2 Establish a theory of probable causes
Step 3 Test the Theory to Determine cause
Step 4 Establish a Plan of Action to Resolve the Problem
and Implement the Solution
Preventative Measures
Troubleshooting for Networks
Cisco Confidential
System Information
Open-ended questions
What problems are you experiencing with your computer or network
device?
What software has been changed recently on your computer?
What were you doing when the problem was identified?
What error messages have you received?
What type of network connection is the computer using?
Closed-ended questions
Can you see any shared files or printers?
Have you changed your password recently?
Can you access the Internet?
Are you currently logged into the network?
*
Identify the Problem
Cisco Confidential
Step 2 - Establish a Theory of Probable Causes
Create a list of the most common reasons why the error would occur
and list the easiest or most obvious causes at the top with the
more complex causes at the bottom.
Loose cable connections
Improperly installed NIC
ISP is down
Presentation_ID
Cisco Confidential
Step 3 - Test the Theory to Determine cause
Testing your theories of probable causes one at a time, starting
with the quickest and easiest.
Check that all cables are connected to the proper locations.
Disconnect and then reconnect cables and connectors.
Reboot the computer or network device.
Login as a different user.
Repair or re-enable the network connection.
Contact the network administrator.
Ping your default gateway.
Access remote web pages.
*
Determine the Exact Cause
Here are some examples of quick network solutions:
Re-enable Network Connections - Sometimes a problem in the hardware
or the software can cause a network connection problem. To do so,
follow this path: Start > Control Panel > Network
Connections
Reboot - A quick solution that seems to work in many situations is
a simple reboot of the network device. A simple reboot will clear
the contents of RAM and give the device a clean start. If the
problem goes away after a reboot, then it was probably a software
problem. If the problem occurs again, it is probably a hardware
problem such as a malfunctioning RAM chip.
Contact the ISP/Network Administrator - If all of the equipment
that the customer has is working properly, but there is still no
connection to the Internet, contact the customer's ISP or the
network administrator.
Presentation_ID
Cisco Confidential
Step 4 - Establish a Plan of Action to Resolve the Problem and
Implement the Solution
Sometimes quick procedures can determine the exact cause of the
problem or even correct the problem.
If a quick procedure does not correct the problem, you might need
to research the problem further to establish the exact cause.
*
Implement a Solution
If a quick procedure does correct the problem, you can go to step 5
to verify the solution and full system functionality.
Evaluate the problem and research possible solutions. Divide larger
problems into smaller problems that can be analyzed and solved
individually. Prioritize solutions starting with the easiest and
fastest to implement.
Check:
Cisco Confidential
Step 5 - Verify Full System Functionality and Implement
Preventative Measures
Verifying full system functionality and implement any preventive
measures if needed.
Ipconfig /all is used to display IP Address information.
Ping is used to check network connectivity.
Nslookup is used to query Internet domain name server.
Tracert is used to determine the route taken by packets when they
travel across the network.
Net View is used to display a list of computers in a
workgroup.
Have the customer verify the solution and system
functionality.
*
Presentation_ID
Cisco Confidential
Discuss the solution with the customer.
Have the customer confirm that the problem has been solved.
Document the process.
*
Document Findings
Cisco Confidential
*
Common Problems and Solutions
Cisco Confidential
Chapter 6 Summary
A computer network is composed of two or more computers that share
data and resources.
A Local Area Network (LAN) refers to a group of interconnected
computers that are under the same administrative control.
A Wide Area Network (WAN) is a network that connects LANs in
geographically separated locations.
*
Cisco Confidential
Chapter 6 Summary (Continued)
A LAN uses a direct connection from one computer to another. It is
suitable for a small area, such as in a home, building, or school.
A WAN uses point-to-point or point-to-multipoint, serial
communications lines to communicate over greater distances. A WLAN
uses wireless technology to connect devices together.
The network topology defines the way in which computers, printers,
and other devices are connected. Logical topology describes how the
hosts access the medium and communicate on the network. Physical
topology describes the layout of the wire and devices, as well as
the paths used by data transmissions.. Topologies include bus,
star, ring, and mesh.
*
Cisco Confidential
Chapter 6 Summary (Continued)
Networking media can be defined as the means by which signals, or
data, are sent from one computer to another. Signals can be
transmitted either by cable or wireless means. The media types
discussed were coaxial, twisted-pair, fiber-optic cabling, and
radio frequencies.
Ethernet is now the most popular type of LAN technology. The
Ethernet architecture is based on the IEEE 802.3 standard. The IEEE
802.3 standard specifies that a network implement the CSMA/CD
access control method.
*
Cisco Confidential
Chapter 6 Summary (Continued)
The TCP/IP suite of protocols has become the dominant standard for
the Internet. TCP/IP represents a set of public standards that
specify how packets of information are exchanged between computers
over one or more networks.
A NIC is a device that plugs into a motherboard and provides ports
for the network cable connections. It is the computer interface
with the LAN.
*
Cisco Confidential
Chapter 6 Summary (Continued)
The three transmission methods to sending signals over data
channels are simplex, half-duplex, and full-duplex. Full-duplex
networking technology increases performance because data can be
sent and received at the same time. DSL, two-way cable modem, and
other broadband technologies operate in full-duplex mode.
Network devices and media, such as computer components, must be
maintained. It is important to clean equipment regularly and use a
proactive approach to prevent problems. Repair or replace broken
equipment to prevent downtime.
*
Cisco Confidential