Local Area Networks (LANs)
Copyright 2012
Welcome
• Introductions– Instructor– Class members
• Facility layout– Restrooms– Lunch
Copyright 2012
CCNT® Certificate Program
• Telecommunications and IT professionals are increasingly expected to understand data networking as well as telecom and computer telephony, collectively known as "convergent technologies"
• CCNT (Certified in Convergent Network Technologies) is an industry-standard training and certificate program that teaches and validates the prerequisite knowledge required to pursue careers selling, servicing and installing convergent technologies
Copyright 2012
How to Earn a CCNT Credential
• To earn this industry-valued credential, you must pass six competency tests: – Basic Telecommunications– Basic Data Communications– Computer-Telephone Integration (CTI) Essentials– Local Area Networks (LANs)– Broadband Technologies– Voice over IP (VoIP) Essentials
Copyright 2012
Local Area Networks (LANs) Course Lessons
Lesson 1: Overview of Local Area NetworksLesson 2: Wide Area Networks (WANs)Lesson 3: Networking and the InternetLesson 4: LAN TopologiesLesson 5: Networking Models, Traffic and DevicesLesson 6: Transmission MediaLesson 7: LAN Standards, Wireless Networking and
Name ResolutionLesson 8: Network Management
Copyright 2012
1. In a centralized computing model, what is situated at thecenter of the network?a. A nodeb. A hostc. A mainframed. A client
2. There is no centralized management of network resourcesin which type of network?a. A peer-to-peer networkb. A server-based networkc. A mainframe networkd. A domain-based network
3. What are two characteristics that describe a local areanetwork (LAN)?
Lesson 1Pre-Assessment Questions
Copyright 2012
Lesson 1
• Defining a Network• Evolution of Networking Models• Modern Configurations• Introduction to Local Area Networks (LANs)• Essential LAN Elements• Proprietary Protocols vs. Open Standards• Addressing on the LAN• Internet Protocol version 4 (IPv4)• Internet Protocol version 6 (IPv6)• Private IP Addresses
Copyright 2012
Defining a Network
Figure 1-1: A sample network
Copyright 2012
Lesson 1
• Defining a Network• Evolution of Networking Models• Modern Configurations• Introduction to Local Area Networks (LANs)• Essential LAN Elements• Proprietary Protocols vs. Open Standards• Addressing on the LAN• Internet Protocol version 4 (IPv4)• Internet Protocol version 6 (IPv6)• Private IP Addresses
Copyright 2012
Evolution of Networking Models
Figure 1-2: Mainframe model
Copyright 2012
Lesson 1
• Defining a Network• Evolution of Networking Models• Modern Configurations• Introduction to Local Area Networks (LANs)• Essential LAN Elements• Proprietary Protocols vs. Open Standards• Addressing on the LAN• Internet Protocol version 4 (IPv4)• Internet Protocol version 6 (IPv6)• Private IP Addresses
Copyright 2012
Server-Based Networks
Figure 1-3: Server-based network
Copyright 2012
Peer-to-Peer Networks
Figure 1-4: Peer-to-peer network
Copyright 2012
Lesson 1
• Defining a Network• Evolution of Networking Models• Modern Configurations• Introduction to Local Area Networks (LANs)• Essential LAN Elements• Proprietary Protocols vs. Open Standards• Addressing on the LAN• Internet Protocol version 4 (IPv4)• Internet Protocol version 6 (IPv6)• Private IP Addresses
Copyright 2012
Introduction to Local Area Networks (LANs)
Figure 1-5: Local area network (LAN)
Copyright 2012
Lesson 1
• Defining a Network• Evolution of Networking Models• Modern Configurations• Introduction to Local Area Networks (LANs)• Essential LAN Elements• Proprietary Protocols vs. Open Standards• Addressing on the LAN• Internet Protocol version 4 (IPv4)• Internet Protocol version 6 (IPv6)• Private IP Addresses
Copyright 2012
Network Interface Card (NIC)
Figure 1-6: Network interface card (NIC)
Copyright 2012
Wired Connections
Figure 1-7: Home network example
Copyright 2012
Wired Connections (cont'd)
Figure 1-8: Small LAN
Copyright 2012
Lesson 1
• Defining a Network• Evolution of Networking Models• Modern Configurations• Introduction to Local Area Networks (LANs)• Essential LAN Elements• Proprietary Protocols vs. Open Standards• Addressing on the LAN• Internet Protocol version 4 (IPv4)• Internet Protocol version 6 (IPv6)• Private IP Addresses
Copyright 2012
Lesson 1
• Defining a Network• Evolution of Networking Models• Modern Configurations• Introduction to Local Area Networks (LANs)• Essential LAN Elements• Proprietary Protocols vs. Open Standards• Addressing on the LAN• Internet Protocol version 4 (IPv4)• Internet Protocol version 6 (IPv6)• Private IP Addresses
Copyright 2012
MAC Addresses
Figure 1-9: MAC address
Copyright 2012
Lesson 1
• Defining a Network• Evolution of Networking Models• Modern Configurations• Introduction to Local Area Networks (LANs)• Essential LAN Elements• Proprietary Protocols vs. Open Standards• Addressing on the LAN• Internet Protocol version 4 (IPv4)• Internet Protocol version 6 (IPv6)• Private IP Addresses
Copyright 2012
Lesson 1
• Defining a Network• Evolution of Networking Models• Modern Configurations• Introduction to Local Area Networks (LANs)• Essential LAN Elements• Proprietary Protocols vs. Open Standards• Addressing on the LAN• Internet Protocol version 4 (IPv4)• Internet Protocol version 6 (IPv6)• Private IP Addresses
Copyright 2012
IPv4 vs. IPv6 Addresses
Figure 1-10: IPv6 address portions
Copyright 2012
Lesson 1
• Defining a Network• Evolution of Networking Models• Modern Configurations• Introduction to Local Area Networks (LANs)• Essential LAN Elements• Proprietary Protocols vs. Open Standards• Addressing on the LAN• Internet Protocol version 4 (IPv4)• Internet Protocol version 6 (IPv6)• Private IP Addresses
Copyright 2012
1. What are the main architectural components of a LAN?
2. Describe the function and characteristics of a network operating system (NOS)
Lesson 1 Review
Copyright 2012
Consider the following situation…
• Ilsa and her husband Edouard have both been given the option to work at home
• They want to set up one room in their house as a shared office
• Both require Internet access, e-mail, and access to a printer/scanner
• They currently have a cable Internet connection in their home
Lesson 1Application Project
Copyright 2012
Now answer the following questions…
• What will their home network look like?
• Can they set up a peer-to-peer network, or will they require a server-based network?
• Will they be able to share their Internet access and their printer?
• What type of additional equipment, if any, might they need to purchase?
• What factors will affect their home networking decisions?
Lesson 1Application Project (cont'd)
Copyright 2012
Match each term with the correct definition
Activity 1-1: Reviewing networking terminology
1. hexadecimal A. A central connection point for wireless network clients
2. IP address B. A central connection location for incoming and outgoing lines of a LAN
3. MAC address C. A base-16 numbering system that uses the digits 0 through 9 and the letters A through F
4. wireless access point (AP)
D. A permanent address burned into a network interface card (NIC)
5. patch panel E. A unique numerical address assigned to a device or computer on a network on a leased basis
Copyright 2012
Local Area Networks (LANs) Course Lessons
Lesson 1: Overview of Local Area NetworksLesson 2: Wide Area Networks (WANs)Lesson 3: Networking and the InternetLesson 4: LAN TopologiesLesson 5: Networking Models, Traffic and DevicesLesson 6: Transmission MediaLesson 7: LAN Standards, Wireless Networking and
Name ResolutionLesson 8: Network Management
Copyright 2012
1. Which of the following is faster than T1?a. E1b. ISDN BRIc. DS0d. DS1
2. Which type of transmission uses a single channel?a. Broadbandb. Digital Subscriber Line (DSL)c. Basebandd. Cable modem
3. How are digital signals measured?
Lesson 2Pre-Assessment Questions
Copyright 2012
Lesson 2
• Introduction to Wide Area Networks (WANs)• Signaling Terminology• Circuit Switching and Packet Switching• WAN Connections• Dial-Up Connections• Direct Connections• Synchronous Optical Network (SONET)• Asynchronous Transfer Mode (ATM)
Copyright 2012
Introduction to Wide Area Networks
Figure 2-1: WAN example
Copyright 2012
Lesson 2
• Introduction to Wide Area Networks (WANs)• Signaling Terminology• Circuit Switching and Packet Switching• WAN Connections• Dial-Up Connections• Direct Connections• Synchronous Optical Network (SONET)• Asynchronous Transfer Mode (ATM)
Copyright 2012
Analog and Digital Signals
Figure 2-2: Analog signal
Copyright 2012
Analog and Digital Signals (cont'd)
Figure 2-3: Digital signal
Copyright 2012
Digitizing
Figure 2-4: Analog signals are easily digitized
Copyright 2012
Multiplexing
Figure 2-5: Signals in different frequency bands
Copyright 2012
Digital Signal Hierarchy (DSH)
Table 2-1: Digital Signal Hierarchy
Digital Signal Level Data Rate Equivalent To
DS0 64 Kbps
DS1 1.544 Mbps 24 DS0 channels
DS2 6.312 Mbps 96 DS0 channels
DS3 44.736 Mbps 672 DS0 channels
DS4 274.176 Mbps 4,032 DS0 channels
Copyright 2012
LunchBe back in 45 minutes!
Lunch Break
Copyright 2012
Lesson 2
• Introduction to Wide Area Networks (WANs)• Signaling Terminology• Circuit Switching and Packet Switching• WAN Connections• Dial-Up Connections• Direct Connections• Synchronous Optical Network (SONET)• Asynchronous Transfer Mode (ATM)
Copyright 2012
Lesson 2
• Introduction to Wide Area Networks (WANs)• Signaling Terminology• Circuit Switching and Packet Switching• WAN Connections• Dial-Up Connections• Direct Connections• Synchronous Optical Network (SONET)• Asynchronous Transfer Mode (ATM)
Copyright 2012
WAN Connections
Figure 2-6: WANs use many different connection methods
Copyright 2012
Lesson 2
• Introduction to Wide Area Networks (WANs)• Signaling Terminology• Circuit Switching and Packet Switching• WAN Connections• Dial-Up Connections• Direct Connections• Synchronous Optical Network (SONET)• Asynchronous Transfer Mode (ATM)
Copyright 2012
Plain Old Telephone Service (POTS)
Figure 2-7: WAN connection over PSTN using modems
Copyright 2012
Lesson 2
• Introduction to Wide Area Networks (WANs)• Signaling Terminology• Circuit Switching and Packet Switching• WAN Connections• Dial-Up Connections• Direct Connections• Synchronous Optical Network (SONET)• Asynchronous Transfer Mode (ATM)
Copyright 2012
T-Carrier
Table 2-2: North American T-carrier
DSH T-Carrier Data Rate Comments
DS0 N/A 64 Kbps
DS1 T1 1.544 Mbps
DS2 T2 6.312 Mbps Equivalent to four T1 channels; not available to the public
DS3 T3 44.736 Mbps Equivalent to 28 T1 channels
DS4 T4 274.176 Mbps Equivalent to 168 T1 channels
Copyright 2012
T-Carrier (cont'd)
Figure 2-8: International WAN using T1 links
Copyright 2012
T1 Connection
Figure 2-9: T1 connection using a single channel
Copyright 2012
T1 Connection (cont'd)
Figure 2-10: T1 connection using separate channels
Copyright 2012
Fractional T1/T3
Figure 2-11: Bandwidth comparison
Copyright 2012
Statistical Multiplexing (stat mux)
Figure 2-12: Statistical multiplexing saves bandwidth
Copyright 2012
Multiplexing
Figure 2-13: FT1 requiring two DS0 channels
Copyright 2012
Figure 2-14: Usage of voice and data lines
Copyright 2012
Statistical Multiplexing
Figure 2-15: Voice and data lines use same channel
Copyright 2012
E-Carrier
Table 2-3: E carrier speeds
Level Data Rate (Mbps)
Voice Channels Comments
E1 2.048 30
E2 8.448 120 Equivalent to four E1 circuits
E3 34.368 480 Equivalent to 16 E1 circuits
E4 139.264 1,920 Equivalent to 64 E1 circuits
E5 565.148 7,680 Equivalent to 256 E1 circuits
Copyright 2012
Cable Internet
Figure 2-16: Cable modem
Copyright 2012
Digital Subscriber Line (DSL)
Figure 2-17: ADSL modem
Copyright 2012
Digital Subscriber Line (DSL)
Table 2-4: xDSL speeds
Type Max Downstream Max Upstream
ADSL 8 Mbps 640 Kbps
ADSL2 12 Mbps 1 Mbps
ADSL2+ 24 Mbps 3 Mbps
VDSL 55 Mbps 4 Mbps
VDSL2 100 Mbps 100 Mbps
Copyright 2012
Connecting Cable and DSL Modems
Figure 2-18: Residential broadband connection
Copyright 2012
Lesson 2
• Introduction to Wide Area Networks (WANs)• Signaling Terminology• Circuit Switching and Packet Switching• WAN Connections• Dial-Up Connections• Direct Connections• Synchronous Optical Network (SONET)• Asynchronous Transfer Mode (ATM)
Copyright 2012
SONET
Figure 2-19: Synchronous Payload Envelope (SPE) in frame
Copyright 2012
SONET
Table 2-5: SONET speeds
Synchronous Transport Signal (STS) Frame Format Optical Carrier (OC) Level Speed (in Mbps)
STS-1 OC-1 51.84
STS-2 OC-2 103.68
STS-3 OC-3 155.52
STS-9 OC-9 466.56
STS-12 OC-12 622.08
STS-18 OC-18 933.12
STS-24 OC-24 1244.16
STS-36 OC-36 1866.24
STS-48 OC-48 2488.32
STS-96 OC-96 4976.64
STS-192 OC-192 9953.28
Copyright 2012
Benefits of Using SONET
Figure 2-20: Multiplexing different data streams
T1Line
E3Line
DS4Line
SDHLineMultiplexer
Copyright 2012
SONET and SDH
Table 2-6: Comparison of SDH and SONET
Synchronous Digital Hierarchy (SDH) Level SONET Speed (Mbps)
STM-0 STS-1 (OC-1) 51.84STM-1 STS-3 (OC-3) 155.52STM-2 STS-6 (OC-6) 311.04STM-3 STS-9 (OC-9) 466.56STM-4 STS-12 (OC-12) 622.08STM-8 STS-24 (OC-24) 1244.16STM-16 STS-48 (OC-48) 2488.32STM-32 STS-96 (OC-96) 4976.64STM-64 STS-192 (OC-192) 9953.28STM-256 STS-768 (OC-768) 39,813.12
Copyright 2012
Lesson 2
• Introduction to Wide Area Networks (WANs)• Signaling Terminology• Circuit Switching and Packet Switching• WAN Connections• Dial-Up Connections• Direct Connections• Synchronous Optical Network (SONET)• Asynchronous Transfer Mode (ATM)
Copyright 2012
Asynchronous Transfer Mode (ATM)
Figure 2-21: 53-byte ATM cell
Copyright 2012
ATM (cont'd)
Figure 2-22: Video and voice require constant data rate
Copyright 2012
1. What is a T1 circuit?
2. A statistical multiplexer provides each user with ______________
3. What does a SONET add/drop multiplexer do?
4. Describe an ATM cell
5. Which technologies provide affordable high-speed connections for home-based networks?
Lesson 2 Review
Copyright 2012
Suppose that you are about to set up a home office for yourself and another user… • At the very least, you will each require Internet access and e-mail• You will likely be transferring files to and from various customers as part of your business tasks• You will probably participate in online training from time to time to keep current on your job skills
What factors should you consider when determining the type of Internet access to purchase?
Lesson 2Application Project
Copyright 2012
1. SONET A. A central connection point for wireless network clients
2. ISDN PRI B. A central connection location for incoming and outgoing lines of a LAN
3. ATM C. A base-16 numbering system that uses the digits 0 through 9 and the letters A through F
4. T1 D. A permanent address burned into a network interface card (NIC)
5. cable modem E. A unique numerical address assigned to a device or computer on a network on a leased basis
6. DSL F. A connection-oriented technique that can transport uniform 53-byte cells
Match each technology with the correct description
Activity 2-1: Reviewing WAN technology concepts
Copyright 2012
Local Area Networks (LANs) Course Lessons
Lesson 1: Overview of Local Area NetworksLesson 2: Wide Area Networks (WANs)Lesson 3: Networking and the InternetLesson 4: LAN TopologiesLesson 5: Networking Models, Traffic and DevicesLesson 6: Transmission MediaLesson 7: LAN Standards, Wireless Networking
and Name ResolutionLesson 8: Network Management
Copyright 2012
1. If you want to establish a DMZ using only one firewall, how many network interface cards (NICs) does the firewall need?
a. Oneb. Twoc. Threed. Four
2. Which of the following was the first global computer network?a. ARPANETb. NSFnetc. The World Wide Webd. CompuServe
3. What are two ways in which internal LAN security can be accomplished?
Lesson 3Pre-Assessment Questions
Copyright 2012
Lesson 3
• Networking and the Internet• The Need for Security• Firewalls, Proxies and Security Zones• Internet, Intranets and Extranets• Remote Access and Virtual Private Network (VPN)• Availability, Fault Tolerance, Backup and Recovery
Copyright 2012
Networking and the Internet
Figure 3-1: Multiple connections among servers
Copyright 2012
Lesson 3
• Networking and the Internet• The Need for Security• Firewalls, Proxies and Security Zones• Internet, Intranets and Extranets• Remote Access and Virtual Private Network (VPN)• Availability, Fault Tolerance, Backup and Recovery
Copyright 2012
Perimeter and Core Networks
Figure 3-2: Perimeter and core
Copyright 2012
Lesson 3
• Networking and the Internet• The Need for Security• Firewalls, Proxies and Security Zones• Internet, Intranets and Extranets• Remote Access and Virtual Private Network (VPN)• Availability, Fault Tolerance, Backup and Recovery
Copyright 2012
Firewalls
Figure 3-3: Firewall
Copyright 2012
Demilitarized Zone (DMZ)
Figure 3-4: DMZ using two firewalls
Copyright 2012
Lesson 3
• Networking and the Internet• The Need for Security• Firewalls, Proxies and Security Zones• Internet, Intranets and Extranets• Remote Access and Virtual Private Network (VPN)• Availability, Fault Tolerance, Backup and Recovery
Copyright 2012
Extranet
Figure 3-5: CTP+ Partners and Instructors login page -- extranet
Copyright 2012
Lesson 3
• Networking and the Internet• The Need for Security• Firewalls, Proxies and Security Zones• Internet, Intranets and Extranets• Remote Access and Virtual Private Network (VPN)• Availability, Fault Tolerance, Backup and Recovery
Copyright 2012
Remote Access Server (RAS)
Figure 3-6: Remote access
Copyright 2012
Virtual Private Network (VPN)
Figure 3-7: VPN tunnel
Copyright 2012
Lesson 3
• Networking and the Internet• The Need for Security• Firewalls, Proxies and Security Zones• Internet, Intranets and Extranets• Remote Access and Virtual Private Network (VPN)• Availability, Fault Tolerance, Backup and Recovery
Copyright 2012
Fault Tolerance – RAID
Figure 3-8: Redundant array of inexpensive disks (RAID) 5
Copyright 2012
RAID 1: Disk Mirroring
Figure 3-9: Disk mirroring
Copyright 2012
RAID 1: Disk Mirroring (cont'd)
Figure 3-10: Mirror set
Disk 1 Disk 2File 1
File 2
File 3
Copyright 2012
Disk Duplexing
Figure 3-11: Disk duplexing
Copyright 2012
RAID 5: Disk Striping with Parity
Figure 3-12: RAID 5 uses at least three hard disks
Copyright 2012
RAID 5: Disk Striping with Parity (cont'd)
Figure 3-13: Disk striping with parity
Disk 1 Disk 2 Disk 3
Parity
File 1
File 2
File 3
Copyright 2012
Disaster Recovery Planning
Table 3-1: Alternate site types
Site Type Description
HotA site that is already connected to the Internet or to the company network, and which is ready to operate. Servers and systems are functional and ready to provide the services normally provided by the original site. Requires minimal preparation time (e.g., 30 minutes) to activate
WarmThe site usually has all necessary data, but is not actively connected to the Internet. Requires more time (e.g., 2 hours) to obtain all necessary data (from backups) and configure network connections
ColdRequires extended configuration in order to go live. Time can include several hours to a day or more. Servers may need to be moved into the site or configured. Network and telephony connections may also require considerable time before the site can go live
Copyright 2012
1. What is an extranet?
2. Describe the function of a firewall
3. Which tunneling protocols are commonly used by VPNs?
4. Describe a differential backup
5. What is authentication?
Lesson 3 Review
Copyright 2012
Suppose that you work in the IT department for a university…
• The university has multiple campuses in various locations• Professors and other faculty need to be able to easily post questions, schedules and other documents to share in a secure environment
Using the knowledge you gained in this lesson, suggest a solution that would meet their requirements
Lesson 3Application Project
Copyright 2012
Match each technology with the correct description
Activity 3-1: Reviewing secure communication techniques
1. demilitarized zone (DMZ)
A. Security barrier that controls the flow of information between the Internet and a private network
2. virtual private network (VPN) B. Trusted devices within a LAN
3. firewall C. An internal or in-house Web site and network used only by employees within a company
4. intranetD. A mini-network that resides between a company's internal network and the public network; adds an extra layer of security to the LAN
5. core network E. An encrypted tunnel that allows secure communications between two hosts across the Internet
Copyright 2012
Local Area Networks (LANs) Course Lessons
Lesson 1: Overview of Local Area NetworksLesson 2: Wide Area Networks (WANs)Lesson 3: Networking and the InternetLesson 4: LAN TopologiesLesson 5: Networking Models, Traffic and DevicesLesson 6: Transmission MediaLesson 7: LAN Standards, Wireless Networking
and Name ResolutionLesson 8: Network Management
Copyright 2012
1. Which of the following is a disadvantage of bus topologies?a. Difficult troubleshootingb. Non-standard topologyc. Absence of support for Ethernet networksd. Moderate data speed
2. Which of the following is a disadvantage of wireless (cell) topologies?
a. Cannot be integrated with other topologiesb. Requires excessive amounts of cablec. Opens security risksd. Has no defined standards
Lesson 4Pre-Assessment Questions
Copyright 2012
3. Which of the following uses coaxial cable terminated at each end?
a. Busab. Ringc. Stard. Mesh
Lesson 4Pre-Assessment Questions (cont'd)
Copyright 2012
Lesson 4
• Network Topologies• Physical LAN Topologies• Media Access Methods
Copyright 2012
Lesson 4
• Network Topologies• Physical LAN Topologies• Media Access Methods
Copyright 2012
Bus Topology
Figure 4-1: Bus topology
Copyright 2012
Ring Topology
Figure 4-2: Ring topology
Copyright 2012
Ring Topology (cont'd)
Figure 4-3: Token Ring network
Copyright 2012
Ring Topology (cont'd)
Figure 4-4: FDDI
Copyright 2012
Star Topology
Figure 4-5: Star topology
Copyright 2012
LunchBe back in 45 minutes!
Lunch Break
Copyright 2012
Hybrid Topology
Figure 4-6: Star bus
Copyright 2012
Mesh Topology
Figure 4-7: Partial mesh
Copyright 2012
Mesh Topology (cont'd)
Figure 4-8: Full mesh
Copyright 2012
Wireless (Cell) Topology
Figure 4-9: Wireless topology
Copyright 2012
Lesson 4
• Network Topologies• Physical LAN Topologies• Media Access Methods
Copyright 2012
Carrier Sense Multiple Access (CSMA)
Figure 4-10: Ethernet collision detection
Copyright 2012
1. What are two methods that Carrier Sense Multiple Access (CSMA) employs to handle messages that are sent simultaneously?
2. Which topology would you use when unable to install network cable?
3. What is inherent in mesh topologies that enable them to provide high reliability?
4. What are advantages of star topologies?
5. Compare the two modes supported by wireless topologies
Lesson 4 Review
Copyright 2012
Suppose that you work in the IT department of a financial services company…
• The company has four offices, each of which provides a specific type of financial service
• The company officers have made it clear that all the offices must be connected and able to communicate with one another at all
times
Using the knowledge you gained in this lesson, suggest a network topology that would meet their requirements
Lesson 4Application Project
Copyright 2012
1. In this section, consider each description (A through G). Which topology does it describe? For each item, write one of the following answers: Bus Ring Star Hybrid Mesh Wireless (cell)
A. Fiber Distributed Data Interface (FDDI) uses this topologyB. Uses an access point when part of a hybrid topologyC. Nodes connect to a central hub or switchD. Combines two or more standard topologiesE. Uses a hub or media access unit (MAU) in a central locationF. Supports bandwidths of 100 Mbps or more over twisted-pairG. Uses token passing as an access method
Activity 4-1: Reviewing LAN topology concepts
Copyright 2012
2. In this section, answer the question in short essay form…
Describe the basic features of physical star topologies
Activity 4-1: Reviewing LAN topology concepts (cont'd)
Copyright 2012
Local Area Networks (LANs) Course Lessons
Lesson 1: Overview of Local Area NetworksLesson 2: Wide Area Networks (WANs)Lesson 3: Networking and the InternetLesson 4: LAN TopologiesLesson 5: Networking Models, Traffic and DevicesLesson 6: Transmission MediaLesson 7: LAN Standards, Wireless Networking
and Name ResolutionLesson 8: Network Management
Copyright 2012
1. A mode of communication in which data can flow in two directions, but in only one direction at a time is called:a. Simplexb. Half-duplexc. Full duplexd. Broadcast
2. Which of the following is true about switches?a. Switches are used to implement virtual LANs (VLANs)b. Switches translate protocols between dissimilar networksc. Switches provide the connection point between a
computer system and the network cabled. Switches operate at Layer 1
3. What is the function of a router?
Lesson 5Pre-Assessment Questions
Copyright 2012
Lesson 5
• Introduction to Networking Models• The OSI Reference Model• The TCP/IP Four-Layer Model• Traffic on the LAN• Local Networking Components
Copyright 2012
Lesson 5
• Introduction to Networking Models• The OSI Reference Model• The TCP/IP Four-Layer Model• Traffic on the LAN• Local Networking Components
Copyright 2012
The OSI Reference Model
Table 5-1: OSI/RM layers
Layer Number Description
Application 7The interface to the user resides at this layer. Web browsers and e-mail clients function here. This is also the only layer that a user sees; the functions of the other layers are transparent
Presentation 6 User input and other information is transformed at this layer into a standardized format recognized by all operating systems
Session 5 Connections between communicating systems are set up and torn down at this layer. This layer also adds traffic flow control and synchronization information
Transport 4This layer is responsible for the accuracy of data transmission, and mechanisms that operate here ensure that data is sent and received accurately and completely
Network 3Data is organized into discrete units called packets at this layer. In addition to the original data, each packet includes addressing information that is required to deliver the packet to its intended destination
Data link 2At this layer, packets are divided into discrete units called frames before being sent across the transmission medium. This layer also controls access to the transmission medium
Physical 1This layer controls how data is transmitted and received across the media. Here, frames are transmitted across the transmission medium in a bitstream (i.e., as a series of 1s and 0s)
Copyright 2012
Data Encapsulation
Figure 5-1: Encapsulation and De-encapsulation
Copyright 2012
Data Encapsulation (cont'd)
Figure 5-2: Data at various stages of encapsulation
Copyright 2012
Packet Creation
Figure 5-3: Adding headers
Copyright 2012
Lesson 5
• Introduction to Networking Models• The OSI Reference Model• The TCP/IP Four-Layer Model• Traffic on the LAN• Local Networking Components
Copyright 2012
The TCP/IP Four-Layer Model
Figure 5-4: Comparison of OSI and TCP model
Copyright 2012
Lesson 5
• Introduction to Networking Models• The OSI Reference Model• The TCP/IP Four-Layer Model• Traffic on the LAN• Local Networking Components
Copyright 2012
Traffic on the LAN
Figure 5-5: Collision domains and broadcast domains
Copyright 2012
Traffic on the LAN (cont'd)
Table 5-2: Communication modes
Mode Description
Simplex Data travels in only one direction, similar to a public address (PA) system
Half-duplex
Data travels in two directions, but in only one direction at a time, similar to a walkie-talkie
Traditional shared Ethernet uses half-duplex transmissions
Full-duplex
Data travels in two directions simultaneously, similar to a phone conversation
Full-duplex Ethernet (or switched Ethernet) supports full-duplex transmissions in a switched environment
Copyright 2012
Lesson 5
• Introduction to Networking Models• The OSI Reference Model• The TCP/IP Four-Layer Model• Traffic on the LAN• Local Networking Components
Copyright 2012
Hubs
Figure 5-6: Hub connecting workstations
Copyright 2012
Bridges
Figure 5-7: Bridge between network segments
Copyright 2012
Switches
Figure 5-8: Ethernet 50-port switch
Copyright 2012
Routers
Figure 5-9: Router and subnets
Copyright 2012
Table 5-3: Routing protocols
Routing Protocol Type Protocol Name Protocol Description
Interior routing protocols
Routing Information Protocol (RIP and RIPv2)
Efficient for small networks (two or three routers) with a relatively static structure. RIP maintains only the best route to a destination. Regular routing table updates are sent across the network
Open Shortest Path First (OSPF)
Used in larger networks where multiple alternative routes are available. Routing decisions can take available bandwidth and multiple paths into consideration. Routing table updates occur only when necessary
Exterior routing protocols
Border Gateway Protocol (BGP)
The exterior routing protocol used on the Internet
Routing Protocols
Copyright 2012
Gateways
Figure 5-10: Gateway
Copyright 2012
1. Describe the three modes of communication available on a network
2. List the seven layers of the OSI model, including both layer number and name for each
3. Describe a protocol data unit (PDU)
4. List three practical functions of the OSI model
5. Describe a collision domain
Lesson 5 Review
Copyright 2012
Suppose that you work in the IT department for ABC Company…
•The company has an old shared Ethernet network that has grown over the years •Network performance is slow•Management wants you to remedy the situation
Using the knowledge you gained in this lesson, suggest ways in which you can replace or add networking devices in order to improve network performance
Lesson 5Application Project
Copyright 2012
Match each OSI layer with the correct description
Activity 5-1: Reviewing the OSI model
7. Application A. Provides an interface to the user
6. Presentation B. Transmits frames across the transmission medium in a bitstream
5. Session C. Controls access to the transmission medium and encapsulates packets into frames
4. Transport D. Translates data into a standardized format
3. Network E. Ensures that data is accurately and completely sent and received
2. Data Link F. Creates packets and handles addressing
1. Physical G. Sets up, maintains and tears down connections
Copyright 2012
Local Area Networks (LANs) Course Lessons
Lesson 1: Overview of Local Area NetworksLesson 2: Wide Area Networks (WANs)Lesson 3: Networking and the InternetLesson 4: LAN TopologiesLesson 5: Networking Models, Traffic and DevicesLesson 6: Transmission MediaLesson 7: LAN Standards, Wireless Networking
and Name ResolutionLesson 8: Network Management
Copyright 2012
1. What are the two main categories of transmission media?a. Cable and free spaceb. Cable and cellularc. Wire and cellulard. Wire and free space
2. True or False, and explain: Future growth of a network is not a factor when
selecting transmission media
3. What device transmits signals to and from a satellite from Earth?
Lesson 6Pre-Assessment Questions
Copyright 2012
• Overview of Transmission Media• Cable Transmission• Twisted-Pair Cable• Coaxial Cable• Fiber-Optic Cable• Cables and Safety• Free-Space Transmission• Infrared• Short-Range Wireless• Microwave• Satellite
Lesson 6
Copyright 2012
• Overview of Transmission Media• Cable Transmission• Twisted-Pair Cable• Coaxial Cable• Fiber-Optic Cable• Cables and Safety• Free-Space Transmission• Infrared• Short-Range Wireless• Microwave• Satellite
Lesson 6
Copyright 2012
• Overview of Transmission Media• Cable Transmission • Twisted-Pair Cable• Coaxial Cable• Fiber-Optic Cable• Cables and Safety• Free-Space Transmission• Infrared• Short-Range Wireless• Microwave• Satellite
Lesson 6
Copyright 2012
Wire Diameter and Signal Attenuation
Figure 6-1: American Wire Gauge (AWG) standard
Copyright 2012
Shielded and Unshielded Twisted Pair
Figure 6-2: Shielded twisted pair (STP) cable
Copyright 2012
Shielded and Unshielded Twisted Pair (cont'd)
Figure 6-3: Unshielded twisted pair (UTP) cable
Copyright 2012
Twisted-Pair Categories
Table 6-1: Twisted-pair cable categories (Cat 5 through Cat 7)
Cable Grade Bandwidth Specific Network(s)Category 5 -100 Mbps
-Can sustain rates up to 100 MHz
Can be used for both standard Ethernet (10 Mbps) and Fast Ethernet (100 Mbps). A popular implementation
Category 5e -1 Gbps (1,000 Mbps)
-Can sustain rates up to 100 MHz
Can be used for Fast Ethernet and Gigabit Ethernet and other high-speed networks. Has largely replaced Cat 5 in many implementations
Category 6 -2.5 Gbps
-Can sustain rates up to 250 MHz
Supports Gigabit Ethernet. Unlike other categories of twisted pair, Cat 6 is not particularly durable and can cease to function if it is improperly bent
Category 6E -10 Gbps
-Can sustain rates up to 500 MHz
Suitable for 10-Gigabit Ethernet and faster, more powerful networks
Category 7 -10 Gbps
-Can sustain rates up to at least 600 MHz
An emerging standard. Shielded. Contains four individually shielded twisted pairs inside an overall shield, and supports data transmission up to 10 Gbps. Rated at 600 MHz
Copyright 2012
• Overview of Transmission Media• The Cable Plant• Twisted-Pair Cable• Coaxial Cable• Fiber-Optic Cable• Cables and Safety• Free-Space Transmission• Infrared• Short-Range Wireless• Microwave• Satellite
Lesson 6
Copyright 2012
Coaxial Cable
Figure 6-4: Coaxial cable
Copyright 2012
• Overview of Transmission Media• The Cable Plant• Twisted-Pair Cable• Coaxial Cable• Fiber-Optic Cable• Cables and Safety• Free-Space Transmission• Infrared• Short-Range Wireless• Microwave• Satellite
Lesson 6
Copyright 2012
Fiber-Optic Cable
Figure 6-5: Fiber-optic cable
Copyright 2012
Modes of Optical Fiber
Figure 6-6: Single and multimode fiber
Copyright 2012
Modes of Optical Fiber (cont'd)
Table 6-2: Single-mode vs. multimode optical fiber
Single-Mode Fiber Multimode Fiber
One transmission path Multiple transmission paths
No smearing Smearing
More pulses per second Fewer pulses per second
High transmission speeds Low transmission speeds
Long-distance transmissions Short-distance transmissions
Copyright 2012
Light Sources
Table 6-3: LED vs. laser as fiber-optic light source
LED LaserLower output power Higher output power
More diffuse beams Less diffuse beams
For shorter distances For long distances
Multimode fibers Single-mode fibers
Less expensive More expensive
Does not require special operating conditions
Requires special operating conditions
Copyright 2012
• Overview of Transmission Media• The Cable Plant• Twisted-Pair Cable• Coaxial Cable• Fiber-Optic Cable• Cables and Safety• Free-Space Transmission• Infrared• Short-Range Wireless• Microwave• Satellite
Lesson 6
Copyright 2012
• Overview of Transmission Media• The Cable Plant• Twisted-Pair Cable• Coaxial Cable• Fiber-Optic Cable• Cables and Safety• Free-Space Transmission• Infrared• Short-Range Wireless• Microwave• Satellite
Lesson 6
Copyright 2012
• Overview of Transmission Media• The Cable Plant• Twisted-Pair Cable• Coaxial Cable• Fiber-Optic Cable• Cables and Safety• Free-Space Transmission• Infrared• Short-Range Wireless• Microwave• Satellite
Lesson 6
Copyright 2012
• Overview of Transmission Media• The Cable Plant• Twisted-Pair Cable• Coaxial Cable• Fiber-Optic Cable• Cables and Safety• Free-Space Transmission• Infrared• Short-Range Wireless• Microwave• Satellite
Lesson 6
Copyright 2012
• Overview of Transmission Media• The Cable Plant• Twisted-Pair Cable• Coaxial Cable• Fiber-Optic Cable• Cables and Safety• Free-Space Transmission• Infrared• Short-Range Wireless• Microwave• Satellite
Lesson 6
Copyright 2012
Microwave
Figure 6-7: Distance limits of microwave transmissions
Copyright 2012
Microwave (cont'd)
Figure 6-8: Microwave transmission between buildings
Copyright 2012
• Overview of Transmission Media• The Cable Plant• Twisted-Pair Cable• Coaxial Cable• Fiber-Optic Cable• Cables and Safety• Free-Space Transmission• Infrared• Short-Range Wireless• Microwave• Satellite
Lesson 6
Copyright 2012
Satellite
Figure 6-9: Components of satellite network
Copyright 2012
Satellite (cont'd)
Figure 6-10: Orbits of GEOs, MEOs, LEOs
Copyright 2012
Satellite (cont'd)
Figure 6-11: Transponders in satellite
Copyright 2012
Satellite (cont'd)
Figure 6-12: Transmission process in satellite network
Copyright 2012
1. What are the two main categories of transmission media?
2. What is the difference between standard voice-grade cabling and data-grade cabling?
3. True or false: A diameter of a 22AWG twisted-pair cable is smaller than a 26AWG twisted pair cable
4. In which frequency bands to do short-range wireless transmission operate?
Lesson 6 Review
Copyright 2012
5. What are the two types of light source used to transmit signals over optical fiber?
6. What is the fastest, most accurate way to optically transmit data over long distances?
7. What medium does infrared technology use to transmit signals?
8. True or false: Bluetooth is a good example of short-range wireless transmission
Lesson 6 Review
Copyright 2012
9. True or false: Microwave signals are line-of-sight transmissions
10. Which forms of free-space transmission do NOT require line of sight?
Lesson 6 Review
Copyright 2012
Consider the following situations and decide which transmission technology is the best choice for each
a. A large company needs to transmit large amountsof data to remote offices on a regular basis
b. A hospital in a remote area needs a dependable remote connection to a large research hospital
c. A user wants a convenient way to transfer data between a laptop PC and a smartphone
d. A company wants to have laptop PCs remain connected as users move around the building
Lesson 6Application Project
Copyright 2012
Consider the following situations and decide which transmission technology is the best choice for each
e. A company is implementing a small LAN and wants to keep the expense at a minimum
f. A radio station wants to increase its range to cover several hundred miles
g. A user wants to print to a printer that is located near, but not connected to, his or her workstation
Lesson 6Application Project (cont'd)
Copyright 2012
Activity 6-1: Reviewing transmission media concepts
A. In this section, consider each description (1 through 7). Which transmission medium does it describe? For each item, write one of the following answers:
Microwave SatelliteInfrared Short-range wireless Coaxial cableTwisted-pair cable Fiber-optic cable
1. The devices that send and receive the signals are usually contained
within the same room2. The cable is made of concentric layers that include core, cladding
and sheath3. This free-space technology makes it possible to transmit information
between two stations that are not within the line of sight of each other
Copyright 2012
Activity 6-1: Reviewing transmission media concepts (cont'd)
A. Which transmission medium does it describe? Microwave SatelliteInfrared
Short-range wireless Coaxial cableTwisted-pair cable Fiber-optic cable
4. Two copper wires twisted around each other in a double helix, usually in plastic sheathing
5. Signals are sent by line-of-sight transmission via parabolic antennas mounted on towers
6. The cable typically consists of four layers: core, foam/dielectric insulator, metal jacket of braided copper or aluminum, and a polyethylene cover
7. LAN connectivity method that allows laptop users to move freely around an office building
Copyright 2012
Activity 6-1: Reviewing transmission media concepts (cont'd)
B. In this section (8 through 9), answer the questions in short essay form
8. Describe microwave transmission
9. Describe twisted-pair cable as a transmission medium… What types exist, and what are their advantages and disadvantages?
Copyright 2012
Local Area Networks (LANs) Course Lessons
Lesson 1: Overview of Local Area NetworksLesson 2: Wide Area Networks (WANs)Lesson 3: Networking and the InternetLesson 4: LAN TopologiesLesson 5: Networking Models, Traffic and DevicesLesson 6: Transmission MediaLesson 7: LAN Standards, Wireless Networking
and Name ResolutionLesson 8: Network Management
Copyright 2012
1. Which of the following statements is true of NetBIOS names?
a. They can be used across the Internetb. They are supported by UNIX, Linux and MacOS
operating systemsc. They can be discovered by querying a domain name
serverd. They are recognized only within a Windows LAN
2. How are domain names structured?
Lesson 7Pre-Assessment Questions
Copyright 2012
3. Which of the following technologies use(s) the CSMA/CD access method?a. 802.3 and 802.3ub. 802.5c. 802.11a and 802.11nd. 802.12
Lesson 7Pre-Assessment Questions (cont'd)
Copyright 2012
Lesson 7
• Networking Standards Organizations• The IEEE and LAN Standards• IEEE 802.3: Ethernet Standards• IEEE 802.11: Wireless LAN Standards• Wireless LAN Operations• Resolving System Names
Copyright 2012
Lesson 7
• Networking Standards Organizations• The IEEE and LAN Standards• IEEE 802.3: Ethernet Standards• IEEE 802.11: Wireless LAN Standards• Wireless LAN Operations• Resolving System Names
Copyright 2012
IEEE Committees
Figure 7-1: IEEE 802.x committees develop standards for OSI Layers 1 and 2
Copyright 2012
IEEE Committees (cont'd)
Table 7-1: IEEE committees
IEEE Committee Subject Description Committee Notes
802.1 LAN/MAN architecture
Internetworking, network management and bridging
802.2 Logical Link Control (LLC) This committee is in
hibernation
802.3 CSMA/CD (Ethernet)
Includes Ethernet (802.3), Fast Ethernet (802.3u), Gigabit Ethernet (802.3z, 802.3ab) and 10-Gigabit Ethernet (802.3ae)
802.4 Token bus A standard for implementing the Token Ring protocol over a "virtual ring" on a coaxial bus
This committee is disbanded and that standard has been withdrawn
802.5 Token Ring A standard for token passing This committee is in hibernation
Copyright 2012
IEEE Committees (cont'd)
Table 7-1: IEEE committees (cont'd)
IEEE Committee Subject Description Committee Notes
802.6 Distributed queue dual bus (DQDB) A standard for using fiber in MANs
This standard has been withdrawn and the committee is disbanded. Most MANs now use SONET or ATM
802.7 Broadband LAN A standard for broadband local area networks
This standard has been withdrawn and the committee is disbanded
802.8Fiber Distributed Data Interface (FDDI)
A standard for fiber-optic media in token-passing ring networks
This committee is disbanded
802.9 Evolving marriage of LAN and ISDN
A standard formerly known as isoEthernet that combined 10-Mbps Ethernet and 96 64-Kbps ISDN "B" channels
Fast Ethernet pushed isoEthernet out of the market place and this committee is disbanded
Copyright 2012
IEEE Committees (cont'd)
Table 7-1: IEEE committees (cont'd)
IEEE Committee Subject Description Committee Notes
802.10 LAN security A former standard for security functions that could be used in both LANs and MANs
This standard has been withdrawn (largely replaced by 802.1q in VLANs and 802.11i in WLANs) and the committee is disbanded
802.11 Wireless LANs Includes 802.11a/b/g/n networks, as well as the 802.11e and 802.11h amendments
802.12 100VG-AnyLAN
A standard for the 100-Mbps transport of both Ethernet and Token Ring frames using a media access method called demand priority, which allows voice and video packets to be given high priority
Today, this protocol is obsolete and the committee is disbanded
Copyright 2012
IEEE Committees (cont'd)
Table 7-1: IEEE committees (cont'd)
IEEE Committee Subject Description Committee Notes
802.14 Cable TV broadband This committee is disbanded
802.15Wireless personal area networks (WPANs)
Includes standards for Bluetooth, co-existence of WPANs with other wireless devices, high-rate and low-rate WPANs, and mesh networking
802.16 Broadband wireless networking (WiMAX)
A standard for wirelessly delivering (via microwave) high-speed Internet service to large geographical areas
802.17 Resilient packet ring A standard designed to optimize the transport of data traffic over optical-fiber ring networks
This committee has no current active projects
Copyright 2012
IEEE Committees (cont'd)
Table 7-1: IEEE committees (cont'd)
IEEE Committee Subject Description Committee Notes
802.20Mobile Broadband Wireless Access (MBWA)
A standard for mobile wireless Internet access networks
This committee is currently inactive
802.21 Media Independent Handoff
A standard for handover and roaming between 802.11 networks and 3G cellular networks
802.22 Wireless Regional Area Network
A standard for using the unused spaces in the television frequency spectrum to bring broadband access to hard to reach low-density population areas
802.23 Emergency Services Working Group
A standard to provide location information for VoIP clients for purposes of securing emergency (911) services
Copyright 2012
LunchBe back in 45 minutes!
Lunch Break
Copyright 2012
Lesson 7
• Networking Standards Organizations• The IEEE and LAN Standards• IEEE 802.3: Ethernet Standards• IEEE 802.11: Wireless LAN Standards• Wireless LAN Operations• Resolving System Names
Copyright 2012
Ethernet Standards
Table 7-2: Ethernet vs. Fast Ethernet
Characteristic Ethernet Fast Ethernet
Speed 10 Mbps 100 Mbps
IEEE standard IEEE 802.3 IEEE 802.3u
Access method CSMA/CD CSMA/CD
Topology Bus/star Star
Cable support Co-ax/twisted pair/fiber Twisted pair/fiber
UTP link distance (maximum) 100 meters 100 meters
Copyright 2012
Lesson 7
• Networking Standards Organizations• The IEEE and LAN Standards• IEEE 802.3: Ethernet Standards• IEEE 802.11: Wireless LAN Standards• Wireless LAN Operations• Resolving System Names
Copyright 2012
Wireless LAN Standards
Table 7-3: 802.11 wireless LAN flavors
IEEE Specification
Theoretical Top Speed
Frequency Comments
802.11a 54 Mbps 5 GHz -Indoor range of 35 meters; outdoor range of 120 m
-Includes error correction
-Offers strong encryption and authentication
-Not compatible with 802.11b or 802.11g802.11b 11 Mbps 2.4 GHz -Indoor range of 38 m; outdoor range of 140 m
-Subject to interference from microwave ovens, cordless phones and Bluetooth devices, which operate in the same frequency band
802.11g 54 Mbps 2.4 GHz -Indoor range of 38 m; outdoor range of 140 m
-Backward compatible with 802.11b (but only at 802.11b speed)
-Offers encryption and authentication features similar to 802.11a
802.11n 300 Mbps 2.4 GHz and5 GHz
-Indoor range of 70 m; outdoor range of 250 m
-Offers high speed and twice the range of 802.11g
-Supports streaming technologies
Copyright 2012
Lesson 7
• Networking Standards Organizations• The IEEE and LAN Standards• IEEE 802.3: Ethernet Standards• IEEE 802.11: Wireless LAN Standards• Wireless LAN Operations• Resolving System Names
Copyright 2012
Wireless Networking Modes
Figure 7-2: Wireless networking modes
Copyright 2012
Lesson 7
• Networking Standards Organizations• The IEEE and LAN Standards• IEEE 802.3: Ethernet Standards• IEEE 802.11: Wireless LAN Standards• Wireless LAN Operations• Resolving System Names
Copyright 2012
Domain Name Structure
Figure 7-3: Typical domain name
Copyright 2012
DNS Name Space
Figure 7-4: Domain name space hierarchy
Copyright 2012
1. Define fast Ethernet
2. What type of cable can you use for Fast Ethernet?
3. What does IEEE 802.15 define?
4. Which access method is used in wireless LANs?
5. What is the frequency band used in an IEEE 802.11n network?
Lesson 7 Review
Copyright 2012
Suppose you are part of the IT staff at a small business…
• Management has expressed the desire to include wireless connectivity throughout the office space • They want to enable traveling sales personnel to easily connect to the LAN whenever they drop in, regardless of whether a dedicated "office space" is available• They think it would be beneficial for the non-traveling employees to have wireless access as well
Lesson 7Application Project
Copyright 2012
Consider the following questions…
• How will the IT staff decide upon which wireless standard to implement? • What factors should be taken into consideration?• What type of security challenges might the wireless solution cause? • How will the IT staff plan to meet those challenges?
Lesson 7Application Project (cont'd)
Copyright 2012
Match each IEEE 802.11 wireless standard with the correct description
Activity 7-1: Reviewing 802.11 wireless standards
1. 802.11e
2. 802.11a
3. 802.11b
4. 802.11g
5. 802.11i (WPA2)
6. 802.11n
A. Operates at speeds up to 11 Mbps in the 2.4-GHz range and is subject to interference from cordless phones and Bluetooth devices
B. Provides Quality of Service (QoS) standards for wireless networks, enabling them to carry time-sensitive packets, such as those for Voice over Wireless LAN (VoWLAN) and streaming media
C. Can operate in either the 2.4-GHz or the 5-GHz band, offering speeds up to 300 Mbps, and also supports streaming technologies
D. Specifies security mechanisms with strong encryption for wireless networks that use other 802.11 specifications
E. Operates at up to 54 Mbps in the 5-GHz band, includes error correction, and offers strong encryption and authentication
F. Operates at speeds of up to 54 Mbps in the 2.4-GHz band, and offers encryption and authentication features
Copyright 2012
Local Area Networks (LANs) Course Lessons
Lesson 1: Overview of Local Area NetworksLesson 2: Wide Area Networks (WANs)Lesson 3: Networking and the InternetLesson 4: LAN TopologiesLesson 5: Networking Models, Traffic and DevicesLesson 6: Transmission MediaLesson 7: LAN Standards, Wireless Networking
and Name ResolutionLesson 8: Network Management
Copyright 2012
1. A point in a network where traffic slows considerably is called a:a. test pointb. baselinec. bottleneckd. network analyzer
2. To which of the following configuration settings might anetwork administrator want to restrict access?a. Network settingsb. Screen resolution settingsc. Desktop wallpaper settingsd. Screensaver settings
3. Describe Platform as a Service (PaaS)
Lesson 8Pre-Assessment Questions
Copyright 2012
Lesson 8
• What Is Network Management?• ISO Functional Areas of Network Management• Network Planning• Monitoring and Analysis Tools and Protocols• Hardware Management• Software Management• Security Management
Copyright 2012
Lesson 8
• What Is Network Management?• ISO Functional Areas of Network Management• Network Planning• Monitoring and Analysis Tools and Protocols• Hardware Management• Software Management• Security Management
Copyright 2012
ISO Functional Areas
Table 8-1: ISO functional areas of network management (FCAPS)
Area Description
Fault Pertains to maintaining the integrity of network operation, and detecting and correcting anomalous network behavior
Configuration Pertains to installing, initializing, modifying and tracking the configuration parameters of network hardware and software
Accounting Pertains to resource use, including data, software and licensing; sometimes referred to as administration, or billing management
Performance Pertains to developing a baseline of network performance and measuring ongoing developments accordingly
Security Pertains to access control and data integrity
Copyright 2012
Lesson 8
• What Is Network Management?• ISO Functional Areas of Network Management• Network Planning• Monitoring and Analysis Tools and Protocols• Hardware Management• Software Management• Security Management
Copyright 2012
Lesson 8
• What Is Network Management?• ISO Functional Areas of Network Management• Network Planning• Monitoring and Analysis Tools and Protocols• Hardware Management• Software Management• Security Management
Copyright 2012
Network Analysis Tools
Figure 8-1: Wireshark packet capture
Copyright 2012
Simple Network Management Protocol (SNMP)
Figure 8-2: SNMP management station and agents
Copyright 2012
Lesson 8
• What Is Network Management?• ISO Functional Areas of Network Management• Network Planning• Monitoring and Analysis Tools and Protocols• Hardware Management• Software Management• Security Management
Copyright 2012
Lesson 8
• What Is Network Management?• ISO Functional Areas of Network Management• Network Planning• Monitoring and Analysis Tools and Protocols• Hardware Management• Software Management• Security Management
Copyright 2012
Lesson 8
• What Is Network Management?• ISO Functional Areas of Network Management• Network Planning• Monitoring and Analysis Tools and Protocols• Hardware Management• Software Management• Security Management
Copyright 2012
1. What is an operating system patch?
2. Why are some users reluctant to store their files in network folders?
3. Describe the function of Dynamic Host Configuration Protocol (DHCP)
4. Why are network drives considered a safe place to store user documents?
5. Describe a site license
Lesson 8 Review
Copyright 2012
Suppose you are a consultant for a growing company that is planning to expand and speed up its network…Describe the issues that must be considered to ensure that the end product meets with user expectations and needs
Lesson 8Application Project
Copyright 2012
Match each term with the correct description
Activity 8-1: Reviewing the functional areas of network management
1. Configuration management
A. Involves developing a baseline and measuring ongoing conditions against the baseline
2. Fault management B. Includes ensuring that all software is properly licensed and tracking which users use which applications and resources
3. Performance management
C. Includes scheduling regular backups and using permissions to restrict access to network resources
4. Accounting management
D. Includes setting up corporate systems as DHCP clients and using remote connection applications to troubleshoot servers
5. Security management
E. Involves maintaining ongoing network operation, and detecting and correcting anomalous network behavior
Copyright 2012
Thank You
• Thank you for attending this course
• Local Area Networks (LANs) is the fourth course in the six-course CCNT series
• For information about the CCNT program or taking the CCNT LANs certificate exam, ask your instructor or visit the CCNT page at www.CTPcertified.com/Certification/ccnt.php