LAN SlideShow

Download Report

Transcript LAN SlideShow

Local Area Networks (LANs)
Welcome
• Introductions
– Instructor
– Class members
• Facility layout
– Restrooms
– Lunch
Copyright  2012
CCNT® Certificate Program
• Telecommunications and IT professionals are
increasingly expected to understand data networking
as well as telecom and computer telephony, collectively
known as "convergent technologies"
• CCNT (Certified in Convergent Network Technologies)
is an industry-standard training and certificate program
that teaches and validates the prerequisite knowledge
required to pursue careers selling, servicing and
installing convergent technologies
Copyright  2012
How to Earn a
CCNT Credential
• To earn this industry-valued credential,
you must pass six competency tests:
– Basic Telecommunications
– Basic Data Communications
– Computer-Telephone Integration (CTI) Essentials
– Local Area Networks (LANs)
– Broadband Technologies
– Voice over IP (VoIP) Essentials
Copyright  2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking and
Name Resolution
Lesson 8: Network Management
Copyright  2012
Lesson 1
Pre-Assessment Questions
1. In a centralized computing model, what is situated at the
center of the network?
a. A node
b. A host
c. A mainframe
d. A client
2. There is no centralized management of network resources
in which type of network?
a. A peer-to-peer network
b. A server-based network
c. A mainframe network
d. A domain-based network
3. What are two characteristics that describe a local area
network (LAN)?
Copyright  2012
Lesson 1
•
•
•
•
•
•
•
•
•
•
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright  2012
Defining a Network
Figure 1-1: A sample network
Copyright  2012
Lesson 1
•
•
•
•
•
•
•
•
•
•
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright  2012
Evolution of Networking Models
Figure 1-2: Mainframe model
Copyright  2012
Lesson 1
•
•
•
•
•
•
•
•
•
•
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright  2012
Server-Based Networks
Figure 1-3: Server-based network
Copyright  2012
Peer-to-Peer Networks
Figure 1-4: Peer-to-peer network
Copyright  2012
Lesson 1
•
•
•
•
•
•
•
•
•
•
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright  2012
Introduction to
Local Area Networks (LANs)
Figure 1-5: Local area network (LAN)
Copyright  2012
Lesson 1
•
•
•
•
•
•
•
•
•
•
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright  2012
Network Interface Card (NIC)
Figure 1-6: Network interface card (NIC)
Copyright  2012
Wired Connections
Figure 1-7: Home network example
Copyright  2012
Wired Connections (cont'd)
Figure 1-8: Small LAN
Copyright  2012
Lesson 1
•
•
•
•
•
•
•
•
•
•
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright  2012
Lesson 1
•
•
•
•
•
•
•
•
•
•
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright  2012
MAC Addresses
Figure 1-9: MAC address
Copyright  2012
Lesson 1
•
•
•
•
•
•
•
•
•
•
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright  2012
Lesson 1
•
•
•
•
•
•
•
•
•
•
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright  2012
IPv4 vs. IPv6 Addresses
Figure 1-10: IPv6 address portions
Copyright  2012
Lesson 1
•
•
•
•
•
•
•
•
•
•
Defining a Network
Evolution of Networking Models
Modern Configurations
Introduction to Local Area Networks (LANs)
Essential LAN Elements
Proprietary Protocols vs. Open Standards
Addressing on the LAN
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Private IP Addresses
Copyright  2012
Lesson 1 Review
1. What are the main architectural components of a
LAN?
2. Describe the function and characteristics of a network
operating system (NOS)
Copyright  2012
Lesson 1
Application Project
Consider the following situation…
• Ilsa and her husband Edouard have both been given the option to
work at home
• They want to set up one room in their house as a shared office
• Both require Internet access, e-mail, and access to a
printer/scanner
• They currently have a cable Internet connection in their home
Copyright  2012
Lesson 1
Application Project (cont'd)
Now answer the following questions…
• What will their home network look like?
• Can they set up a peer-to-peer network, or will they require a
server-based network?
• Will they be able to share their Internet access and their printer?
• What type of additional equipment, if any, might they need to
purchase?
• What factors will affect their home networking decisions?
Copyright  2012
Activity 1-1: Reviewing
networking terminology
Match each term with the correct definition
1. hexadecimal
2. IP address
A. A central connection point for wireless
network clients
B. A central connection location for incoming
and outgoing lines of a LAN
3. MAC address
C. A base-16 numbering system that uses the
digits 0 through 9 and the letters A through F
4. wireless access
point (AP)
D. A permanent address burned into a network
interface card (NIC)
5. patch panel
E. A unique numerical address assigned to a
device or computer on a network on a leased
basis
Copyright  2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking and
Name Resolution
Lesson 8: Network Management
Copyright  2012
Lesson 2
Pre-Assessment Questions
1. Which of the following is faster than T1?
a. E1
b. ISDN BRI
c. DS0
d. DS1
2. Which type of transmission uses a single channel?
a. Broadband
b. Digital Subscriber Line (DSL)
c. Baseband
d. Cable modem
3. How are digital signals measured?
Copyright  2012
Lesson 2
•
•
•
•
•
•
•
•
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)
Copyright  2012
Introduction to Wide Area Networks
Figure 2-1: WAN example
Copyright  2012
Lesson 2
•
•
•
•
•
•
•
•
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)
Copyright  2012
Analog and Digital Signals
Figure 2-2: Analog signal
Copyright  2012
Analog and Digital Signals (cont'd)
Figure 2-3: Digital signal
Copyright  2012
Digitizing
Figure 2-4: Analog signals are easily digitized
Copyright  2012
Multiplexing
Figure 2-5: Signals in different frequency bands
Copyright  2012
Digital Signal Hierarchy (DSH)
Digital Signal Level
Data Rate
Equivalent To
DS0
64 Kbps
DS1
1.544 Mbps
24 DS0 channels
DS2
6.312 Mbps
96 DS0 channels
DS3
44.736 Mbps
672 DS0 channels
DS4
274.176 Mbps
4,032 DS0 channels
Table 2-1: Digital Signal Hierarchy
Copyright  2012
Lunch Break
Lunch
Be back in
45 minutes!
Copyright  2012
Lesson 2
•
•
•
•
•
•
•
•
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)
Copyright  2012
Lesson 2
•
•
•
•
•
•
•
•
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)
Copyright  2012
WAN Connections
Figure 2-6: WANs use many different connection methods
Copyright  2012
Lesson 2
•
•
•
•
•
•
•
•
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)
Copyright  2012
Plain Old Telephone Service (POTS)
Figure 2-7: WAN connection over PSTN using modems
Copyright  2012
Lesson 2
•
•
•
•
•
•
•
•
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)
Copyright  2012
T-Carrier
DSH
T-Carrier
Data Rate
Comments
DS0
N/A
64 Kbps
DS1
T1
1.544 Mbps
DS2
T2
6.312 Mbps
Equivalent to four T1 channels;
not available to the public
DS3
T3
44.736 Mbps
Equivalent to 28 T1 channels
DS4
T4
274.176 Mbps
Equivalent to 168 T1 channels
Table 2-2: North American T-carrier
Copyright  2012
T-Carrier (cont'd)
Figure 2-8: International WAN using T1 links
Copyright  2012
T1 Connection
Figure 2-9: T1 connection using a single channel
Copyright  2012
T1 Connection (cont'd)
Figure 2-10: T1 connection using separate channels
Copyright  2012
Fractional T1/T3
Figure 2-11: Bandwidth comparison
Copyright  2012
Statistical Multiplexing (stat mux)
Figure 2-12: Statistical multiplexing saves bandwidth
Copyright  2012
Multiplexing
Figure 2-13: FT1 requiring two DS0 channels
Copyright  2012
Figure 2-14: Usage of voice and data lines
Copyright  2012
Statistical Multiplexing
Figure 2-15: Voice and data lines use same channel
Copyright  2012
E-Carrier
Data Rate
(Mbps)
Voice
Channels
E1
2.048
30
E2
8.448
120
Equivalent to four E1 circuits
E3
34.368
480
Equivalent to 16 E1 circuits
E4
139.264
1,920
Equivalent to 64 E1 circuits
E5
565.148
7,680
Equivalent to 256 E1 circuits
Level
Comments
Table 2-3: E carrier speeds
Copyright  2012
Cable Internet
Figure 2-16: Cable modem
Copyright  2012
Digital Subscriber Line (DSL)
Figure 2-17: ADSL modem
Copyright  2012
Digital Subscriber Line (DSL)
Type
Max Downstream
Max Upstream
ADSL
8 Mbps
640 Kbps
12 Mbps
1 Mbps
24 Mbps
3 Mbps
55 Mbps
4 Mbps
100 Mbps
100 Mbps
ADSL2
ADSL2+
VDSL
VDSL2
Table 2-4: xDSL speeds
Copyright  2012
Connecting Cable and DSL Modems
Figure 2-18: Residential broadband connection
Copyright  2012
Lesson 2
•
•
•
•
•
•
•
•
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)
Copyright  2012
SONET
Figure 2-19: Synchronous Payload Envelope (SPE) in frame
Copyright  2012
SONET
Synchronous Transport
Signal (STS) Frame Format
Optical Carrier (OC) Level
Speed (in Mbps)
STS-1
OC-1
51.84
STS-2
OC-2
103.68
STS-3
OC-3
155.52
STS-9
OC-9
466.56
STS-12
OC-12
622.08
STS-18
OC-18
933.12
STS-24
OC-24
1244.16
STS-36
OC-36
1866.24
STS-48
OC-48
2488.32
STS-96
OC-96
4976.64
STS-192
OC-192
9953.28
Table 2-5: SONET speeds
Copyright  2012
Benefits of Using SONET
Figure 2-20: Multiplexing different data streams
Copyright  2012
SONET and SDH
Synchronous Digital
Hierarchy (SDH) Level
STM-0
STM-1
STM-2
STM-3
STM-4
STM-8
STM-16
STM-32
STM-64
STM-256
SONET
Speed (Mbps)
STS-1 (OC-1)
51.84
STS-3 (OC-3)
155.52
STS-6 (OC-6)
311.04
STS-9 (OC-9)
466.56
STS-12 (OC-12)
622.08
STS-24 (OC-24)
1244.16
STS-48 (OC-48)
2488.32
STS-96 (OC-96)
4976.64
STS-192 (OC-192)
9953.28
STS-768 (OC-768)
39,813.12
Table 2-6: Comparison of SDH and SONET
Copyright  2012
Lesson 2
•
•
•
•
•
•
•
•
Introduction to Wide Area Networks (WANs)
Signaling Terminology
Circuit Switching and Packet Switching
WAN Connections
Dial-Up Connections
Direct Connections
Synchronous Optical Network (SONET)
Asynchronous Transfer Mode (ATM)
Copyright  2012
Asynchronous Transfer Mode
(ATM)
Figure 2-21: 53-byte ATM cell
Copyright  2012
ATM (cont'd)
Figure 2-22: Video and voice require constant data rate
Copyright  2012
Lesson 2 Review
1. What is a T1 circuit?
2. A statistical multiplexer provides each user
with ______________
3. What does a SONET add/drop multiplexer do?
4. Describe an ATM cell
5. Which technologies provide affordable high-speed
connections for home-based networks?
Copyright  2012
Lesson 2
Application Project
Suppose that you are about to set up a home office for
yourself and another user…
• At the very least, you will each require Internet access and
e-mail
• You will likely be transferring files to and from various
customers as part of your business tasks
• You will probably participate in online training from time to
time to keep current on your job skills
What factors should you consider when determining the type
of Internet access to purchase?
Copyright  2012
Activity 2-1: Reviewing
WAN technology concepts
Match each technology with the correct description
1. SONET
A. A central connection point for wireless network clients
2. ISDN PRI
B. A central connection location for incoming and
outgoing lines of a LAN
3. ATM
C. A base-16 numbering system that uses the digits 0
through 9 and the letters A through F
4. T1
D. A permanent address burned into a network
interface card (NIC)
5. cable modem
E. A unique numerical address assigned to a
device or computer on a network on a leased basis
6. DSL
F. A connection-oriented technique that can transport
uniform 53-byte cells
Copyright  2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking
and Name Resolution
Lesson 8: Network Management
Copyright  2012
Lesson 3
Pre-Assessment Questions
1. If you want to establish a DMZ using only one firewall, how
many network interface cards (NICs) does the firewall need?
a. One
b. Two
c. Three
d. Four
2. Which of the following was the first global computer network?
a. ARPANET
b. NSFnet
c. The World Wide Web
d. CompuServe
3. What are two ways in which internal LAN security can be
accomplished?
Copyright  2012
Lesson 3
•
•
•
•
•
•
Networking and the Internet
The Need for Security
Firewalls, Proxies and Security Zones
Internet, Intranets and Extranets
Remote Access and Virtual Private Network (VPN)
Availability, Fault Tolerance, Backup and Recovery
Copyright  2012
Networking and the Internet
Figure 3-1: Multiple connections among servers
Copyright  2012
Lesson 3
•
•
•
•
•
•
Networking and the Internet
The Need for Security
Firewalls, Proxies and Security Zones
Internet, Intranets and Extranets
Remote Access and Virtual Private Network (VPN)
Availability, Fault Tolerance, Backup and Recovery
Copyright  2012
Perimeter and Core Networks
Figure 3-2: Perimeter and core
Copyright  2012
Lesson 3
•
•
•
•
•
•
Networking and the Internet
The Need for Security
Firewalls, Proxies and Security Zones
Internet, Intranets and Extranets
Remote Access and Virtual Private Network (VPN)
Availability, Fault Tolerance, Backup and Recovery
Copyright  2012
Firewalls
Figure 3-3: Firewall
Copyright  2012
Demilitarized Zone (DMZ)
Figure 3-4: DMZ using two firewalls
Copyright  2012
Lesson 3
•
•
•
•
•
•
Networking and the Internet
The Need for Security
Firewalls, Proxies and Security Zones
Internet, Intranets and Extranets
Remote Access and Virtual Private Network (VPN)
Availability, Fault Tolerance, Backup and Recovery
Copyright  2012
Extranet
Figure 3-5: CTP+ Partners and Instructors login page -- extranet
Copyright  2012
Lesson 3
•
•
•
•
•
•
Networking and the Internet
The Need for Security
Firewalls, Proxies and Security Zones
Internet, Intranets and Extranets
Remote Access and Virtual Private Network (VPN)
Availability, Fault Tolerance, Backup and Recovery
Copyright  2012
Remote Access Server (RAS)
Figure 3-6: Remote access
Copyright  2012
Virtual Private Network (VPN)
Figure 3-7: VPN tunnel
Copyright  2012
Lesson 3
•
•
•
•
•
•
Networking and the Internet
The Need for Security
Firewalls, Proxies and Security Zones
Internet, Intranets and Extranets
Remote Access and Virtual Private Network (VPN)
Availability, Fault Tolerance, Backup and Recovery
Copyright  2012
Fault Tolerance – RAID
Figure 3-8: Redundant array of inexpensive disks (RAID) 5
Copyright  2012
RAID 1: Disk Mirroring
Figure 3-9: Disk mirroring
Copyright  2012
RAID 1: Disk Mirroring (cont'd)
Disk 1
Disk 2
File 1
File 2
File 3
Figure 3-10: Mirror set
Copyright  2012
Disk Duplexing
Figure 3-11: Disk duplexing
Copyright  2012
RAID 5: Disk Striping with Parity
Figure 3-12: RAID 5 uses at least three hard disks
Copyright  2012
RAID 5: Disk Striping with
Parity (cont'd)
Disk 1
Disk 2
File 1
Disk 3
File 2
File 3
Parity
Figure 3-13: Disk striping with parity
Copyright  2012
Disaster Recovery Planning
Site Type
Description
Hot
A site that is already connected to the Internet or to the company network,
and which is ready to operate. Servers and systems are functional and
ready to provide the services normally provided by the original site.
Requires minimal preparation time (e.g., 30 minutes) to activate
Warm
The site usually has all necessary data, but is not actively connected to
the Internet. Requires more time (e.g., 2 hours) to obtain all necessary
data (from backups) and configure network connections
Cold
Requires extended configuration in order to go live. Time can include
several hours to a day or more. Servers may need to be moved into the
site or configured. Network and telephony connections may also require
considerable time before the site can go live
Table 3-1: Alternate site types
Copyright  2012
Lesson 3 Review
1. What is an extranet?
2. Describe the function of a firewall
3. Which tunneling protocols are commonly used by
VPNs?
4. Describe a differential backup
5. What is authentication?
Copyright  2012
Lesson 3
Application Project
Suppose that you work in the IT department for a university…
• The university has multiple campuses in various locations
• Professors and other faculty need to be able to easily post
questions, schedules and other documents to share in a secure
environment
Using the knowledge you gained in this lesson, suggest a solution
that would meet their requirements
Copyright  2012
Activity 3-1: Reviewing
secure communication techniques
Match each technology with the correct description
1. demilitarized
zone (DMZ)
A. Security barrier that controls the flow of information
between the Internet and a private network
2. virtual private
network (VPN)
B. Trusted devices within a LAN
3. firewall
C. An internal or in-house Web site and network
used only by employees within a company
4. intranet
D. A mini-network that resides between a company's
internal network and the public network; adds an
extra layer of security to the LAN
5. core network
E. An encrypted tunnel that allows secure
communications between two hosts across the Internet
Copyright  2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking
and Name Resolution
Lesson 8: Network Management
Copyright  2012
Lesson 4
Pre-Assessment Questions
1. Which of the following is a disadvantage of bus topologies?
a. Difficult troubleshooting
b. Non-standard topology
c. Absence of support for Ethernet networks
d. Moderate data speed
2. Which of the following is a disadvantage of wireless (cell)
topologies?
a. Cannot be integrated with other topologies
b. Requires excessive amounts of cable
c. Opens security risks
d. Has no defined standards
Copyright  2012
Lesson 4
Pre-Assessment Questions (cont'd)
3. Which of the following uses coaxial cable terminated at
each end?
a. Busa
b. Ring
c. Star
d. Mesh
Copyright  2012
Lesson 4
• Network Topologies
• Physical LAN Topologies
• Media Access Methods
Copyright  2012
Lesson 4
• Network Topologies
• Physical LAN Topologies
• Media Access Methods
Copyright  2012
Bus Topology
Figure 4-1: Bus topology
Copyright  2012
Ring Topology
Figure 4-2: Ring topology
Copyright  2012
Ring Topology (cont'd)
Figure 4-3: Token Ring network
Copyright  2012
Ring Topology (cont'd)
Figure 4-4: FDDI
Copyright  2012
Star Topology
Figure 4-5: Star topology
Copyright  2012
Lunch Break
Lunch
Be back in
45 minutes!
Copyright  2012
Hybrid Topology
Figure 4-6: Star bus
Copyright  2012
Mesh Topology
Figure 4-7: Partial mesh
Copyright  2012
Mesh Topology (cont'd)
Figure 4-8: Full mesh
Copyright  2012
Wireless (Cell) Topology
Figure 4-9: Wireless topology
Copyright  2012
Lesson 4
• Network Topologies
• Physical LAN Topologies
• Media Access Methods
Copyright  2012
Carrier Sense Multiple Access (CSMA)
Figure 4-10: Ethernet collision detection
Copyright  2012
Lesson 4 Review
1. What are two methods that Carrier Sense Multiple
Access (CSMA) employs to handle messages that
are sent simultaneously?
2. Which topology would you use when unable to install
network cable?
3. What is inherent in mesh topologies that enable them
to provide high reliability?
4. What are advantages of star topologies?
5. Compare the two modes supported by wireless
topologies
Copyright  2012
Lesson 4
Application Project
Suppose that you work in the IT department of a financial services
company…
• The company has four offices, each of which provides a specific
type of financial service
• The company officers have made it clear that all the offices must
be connected and able to communicate with one another at all
times
Using the knowledge you gained in this lesson, suggest a network
topology that would meet their requirements
Copyright  2012
Activity 4-1: Reviewing
LAN topology concepts
1. In this section, consider each description (A through G). Which
topology does it describe? For each item, write one of the following
answers:
Bus
Ring
Star
Hybrid
Mesh
Wireless (cell)
A.
B.
C.
D.
E.
F.
G.
Fiber Distributed Data Interface (FDDI) uses this topology
Uses an access point when part of a hybrid topology
Nodes connect to a central hub or switch
Combines two or more standard topologies
Uses a hub or media access unit (MAU) in a central location
Supports bandwidths of 100 Mbps or more over twisted-pair
Uses token passing as an access method
Copyright  2012
Activity 4-1: Reviewing
LAN topology concepts (cont'd)
2. In this section, answer the question in short essay form…
Describe the basic features of physical star topologies
Copyright  2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking
and Name Resolution
Lesson 8: Network Management
Copyright  2012
Lesson 5
Pre-Assessment Questions
1. A mode of communication in which data can flow in two directions,
but in only one direction at a time is called:
a. Simplex
b. Half-duplex
c. Full duplex
d. Broadcast
2. Which of the following is true about switches?
a. Switches are used to implement virtual LANs (VLANs)
b. Switches translate protocols between dissimilar networks
c. Switches provide the connection point between a
computer system and the network cable
d. Switches operate at Layer 1
3. What is the function of a router?
Copyright  2012
Lesson 5
•
•
•
•
•
Introduction to Networking Models
The OSI Reference Model
The TCP/IP Four-Layer Model
Traffic on the LAN
Local Networking Components
Copyright  2012
Lesson 5
•
•
•
•
•
Introduction to Networking Models
The OSI Reference Model
The TCP/IP Four-Layer Model
Traffic on the LAN
Local Networking Components
Copyright  2012
The OSI Reference Model
Layer
Number Description
Application
7
Presentation
6
The interface to the user resides at this layer. Web browsers and e-mail clients
function here. This is also the only layer that a user sees; the functions of the
other layers are transparent
User input and other information is transformed at this layer into a standardized
format recognized by all operating systems
Session
5
Connections between communicating systems are set up and torn down at this
layer. This layer also adds traffic flow control and synchronization information
Transport
4
This layer is responsible for the accuracy of data transmission, and mechanisms
that operate here ensure that data is sent and received accurately and completely
Network
3
Data is organized into discrete units called packets at this layer. In addition to the
original data, each packet includes addressing information that is required to
deliver the packet to its intended destination
Data link
2
Physical
1
At this layer, packets are divided into discrete units called frames before being
sent across the transmission medium. This layer also controls access to the
transmission medium
This layer controls how data is transmitted and received across the media. Here,
frames are transmitted across the transmission medium in a bitstream (i.e., as a
series of 1s and 0s)
Table 5-1: OSI/RM layers
Copyright  2012
Data Encapsulation
Figure 5-1: Encapsulation and De-encapsulation
Copyright  2012
Data Encapsulation (cont'd)
Figure 5-2: Data at various stages of encapsulation
Copyright  2012
Packet Creation
Figure 5-3: Adding headers
Copyright  2012
Lesson 5
•
•
•
•
•
Introduction to Networking Models
The OSI Reference Model
The TCP/IP Four-Layer Model
Traffic on the LAN
Local Networking Components
Copyright  2012
The TCP/IP Four-Layer Model
Figure 5-4: Comparison of OSI and TCP model
Copyright  2012
Lesson 5
•
•
•
•
•
Introduction to Networking Models
The OSI Reference Model
The TCP/IP Four-Layer Model
Traffic on the LAN
Local Networking Components
Copyright  2012
Traffic on the LAN
Figure 5-5: Collision domains and broadcast domains
Copyright  2012
Traffic on the LAN (cont'd)
Mode
Description
Data travels in only one direction, similar to a public
address (PA) system
Simplex
Half-duplex
Data travels in two directions, but in only one direction at a
time, similar to a walkie-talkie
Traditional shared Ethernet uses half-duplex transmissions
Data travels in two directions simultaneously, similar to a
phone conversation
Full-duplex
Full-duplex Ethernet (or switched Ethernet) supports fullduplex transmissions in a switched environment
Table 5-2: Communication modes
Copyright  2012
Lesson 5
•
•
•
•
•
Introduction to Networking Models
The OSI Reference Model
The TCP/IP Four-Layer Model
Traffic on the LAN
Local Networking Components
Copyright  2012
Hubs
Figure 5-6: Hub connecting workstations
Copyright  2012
Bridges
Figure 5-7: Bridge between network segments
Copyright  2012
Switches
Figure 5-8: Ethernet 50-port switch
Copyright  2012
Routers
Figure 5-9: Router and subnets
Copyright  2012
Routing Protocols
Routing Protocol Type Protocol Name
Routing
Information
Protocol (RIP and
RIPv2)
Interior routing
protocols
Open Shortest
Path First (OSPF)
Exterior routing
protocols
Border Gateway
Protocol (BGP)
Protocol Description
Efficient for small networks (two or
three routers) with a relatively static
structure. RIP maintains only the best
route to a destination. Regular routing
table updates are sent across the
network
Used in larger networks where multiple
alternative routes are available.
Routing decisions can take available
bandwidth and multiple paths into
consideration. Routing table updates
occur only when necessary
The exterior routing protocol used on
the Internet
Table 5-3: Routing protocols
Copyright  2012
Gateways
Figure 5-10: Gateway
Copyright  2012
Lesson 5 Review
1. Describe the three modes of communication
available on a network
2. List the seven layers of the OSI model, including both
layer number and name for each
3. Describe a protocol data unit (PDU)
4. List three practical functions of the OSI model
5. Describe a collision domain
Copyright  2012
Lesson 5
Application Project
Suppose that you work in the IT department for ABC Company…
•The company has an old shared Ethernet network that has grown
over the years
•Network performance is slow
•Management wants you to remedy the situation
Using the knowledge you gained in this lesson, suggest ways in
which you can replace or add networking devices in order to
improve network performance
Copyright  2012
Activity 5-1:
Reviewing the OSI model
Match each OSI layer with the correct description
7. Application
A. Provides an interface to the user
6. Presentation
B. Transmits frames across the transmission medium
in a bitstream
5. Session
C. Controls access to the transmission medium and
encapsulates packets into frames
4. Transport
D. Translates data into a standardized format
E.
Ensures that data is accurately and completely
sent and received
2. Data Link
F.
Creates packets and handles addressing
1. Physical
G. Sets up, maintains and tears down connections
3. Network
Copyright  2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking
and Name Resolution
Lesson 8: Network Management
Copyright  2012
Lesson 6
Pre-Assessment Questions
1. What are the two main categories of transmission media?
a. Cable and free space
b. Cable and cellular
c. Wire and cellular
d. Wire and free space
2. True or False, and explain:
Future growth of a network is not a factor when
selecting transmission media
3. What device transmits signals to and from a satellite from
Earth?
Copyright  2012
Lesson 6
•
•
•
•
•
•
•
•
•
•
•
Overview of Transmission Media
Cable Transmission
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Copyright  2012
Lesson 6
•
•
•
•
•
•
•
•
•
•
•
Overview of Transmission Media
Cable Transmission
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Copyright  2012
Lesson 6
•
•
•
•
•
•
•
•
•
•
•
Overview of Transmission Media
Cable Transmission
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Copyright  2012
Wire Diameter and Signal Attenuation
Figure 6-1: American Wire Gauge (AWG) standard
Copyright  2012
Shielded and Unshielded Twisted Pair
Figure 6-2: Shielded twisted pair (STP) cable
Copyright  2012
Shielded and Unshielded
Twisted Pair (cont'd)
Figure 6-3: Unshielded twisted pair (UTP) cable
Copyright  2012
Twisted-Pair Categories
Cable Grade
Bandwidth
Specific Network(s)
Category 5
-100 Mbps
Category 5e
-Can sustain rates up
to 100 MHz
-1 Gbps (1,000 Mbps)
Can be used for both standard Ethernet (10 Mbps) and
Fast Ethernet (100 Mbps). A popular implementation
Category 6
-Can sustain rates up
to 100 MHz
-2.5 Gbps
Category 6E
-Can sustain rates up
to 250 MHz
-10 Gbps
Category 7
-Can sustain rates up
to 500 MHz
-10 Gbps
-Can sustain rates up
to at least 600 MHz
Can be used for Fast Ethernet and Gigabit Ethernet and
other high-speed networks. Has largely replaced Cat 5 in
many implementations
Supports Gigabit Ethernet. Unlike other categories of
twisted pair, Cat 6 is not particularly durable and can
cease to function if it is improperly bent
Suitable for 10-Gigabit Ethernet and faster, more
powerful networks
An emerging standard. Shielded. Contains four
individually shielded twisted pairs inside an overall shield,
and supports data transmission up to 10 Gbps. Rated at
600 MHz
Table 6-1: Twisted-pair cable categories (Cat 5 through Cat 7)
Copyright  2012
Lesson 6
•
•
•
•
•
•
•
•
•
•
•
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Copyright  2012
Coaxial Cable
Figure 6-4: Coaxial cable
Copyright  2012
Lesson 6
•
•
•
•
•
•
•
•
•
•
•
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Copyright  2012
Fiber-Optic Cable
Figure 6-5: Fiber-optic cable
Copyright  2012
Modes of Optical Fiber
Figure 6-6: Single and multimode fiber
Copyright  2012
Modes of Optical Fiber (cont'd)
Single-Mode Fiber
Multimode Fiber
One transmission path
Multiple transmission paths
No smearing
Smearing
More pulses per second
Fewer pulses per second
High transmission speeds
Low transmission speeds
Long-distance transmissions
Short-distance transmissions
Table 6-2: Single-mode vs. multimode optical fiber
Copyright  2012
Light Sources
LED
Laser
Lower output power
Higher output power
More diffuse beams
Less diffuse beams
For shorter distances
For long distances
Multimode fibers
Single-mode fibers
Less expensive
More expensive
Does not require special operating
conditions
Requires special operating
conditions
Table 6-3: LED vs. laser as fiber-optic light source
Copyright  2012
Lesson 6
•
•
•
•
•
•
•
•
•
•
•
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Copyright  2012
Lesson 6
•
•
•
•
•
•
•
•
•
•
•
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Copyright  2012
Lesson 6
•
•
•
•
•
•
•
•
•
•
•
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Copyright  2012
Lesson 6
•
•
•
•
•
•
•
•
•
•
•
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Copyright  2012
Lesson 6
•
•
•
•
•
•
•
•
•
•
•
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Copyright  2012
Microwave
Figure 6-7: Distance limits of microwave transmissions
Copyright  2012
Microwave (cont'd)
Figure 6-8: Microwave transmission between buildings
Copyright  2012
Lesson 6
•
•
•
•
•
•
•
•
•
•
•
Overview of Transmission Media
The Cable Plant
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Cables and Safety
Free-Space Transmission
Infrared
Short-Range Wireless
Microwave
Satellite
Copyright  2012
Satellite
Figure 6-9: Components of satellite network
Copyright  2012
Satellite (cont'd)
Figure 6-10: Orbits of GEOs, MEOs, LEOs
Copyright  2012
Satellite (cont'd)
Figure 6-11: Transponders in satellite
Copyright  2012
Satellite (cont'd)
Figure 6-12: Transmission process in satellite network
Copyright  2012
Lesson 6 Review
1. What are the two main categories of transmission
media?
2. What is the difference between standard voice-grade
cabling and data-grade cabling?
3. True or false: A diameter of a 22AWG twisted-pair
cable is smaller than a 26AWG twisted pair cable
4. In which frequency bands to do short-range wireless
transmission operate?
Copyright  2012
Lesson 6 Review
5. What are the two types of light source used to
transmit signals over optical fiber?
6. What is the fastest, most accurate way to optically
transmit data over long distances?
7. What medium does infrared technology use to
transmit signals?
8. True or false: Bluetooth is a good example of shortrange wireless transmission
Copyright  2012
Lesson 6 Review
9. True or false: Microwave signals are line-of-sight
transmissions
10. Which forms of free-space transmission do NOT
require line of sight?
Copyright  2012
Lesson 6
Application Project
Consider the following situations and decide which
transmission technology is the best choice for each
a. A large company needs to transmit large amounts
of data to remote offices on a regular basis
b. A hospital in a remote area needs a dependable remote
connection to a large research hospital
c. A user wants a convenient way to transfer data between a
laptop PC and a smartphone
d. A company wants to have laptop PCs remain connected as
users move around the building
Copyright  2012
Lesson 6
Application Project (cont'd)
Consider the following situations and decide which
transmission technology is the best choice for each
e. A company is implementing a small LAN and wants to
keep the expense at a minimum
f. A radio station wants to increase its range to cover several
hundred miles
g. A user wants to print to a printer that is located near, but
not connected to, his or her workstation
Copyright  2012
Activity 6-1: Reviewing
transmission media concepts
A. In this section, consider each description (1 through 7). Which
transmission medium does it describe? For each item, write one of
the following answers:
Microwave
SatelliteInfrared
Short-range wireless
Coaxial cable
Twisted-pair cable
Fiber-optic cable
1. The devices that send and receive the signals are usually contained
within the same room
2. The cable is made of concentric layers that include core, cladding
and sheath
3. This free-space technology makes it possible to transmit information
between two stations that are not within the line of sight of each other
Copyright  2012
Activity 6-1: Reviewing
transmission media concepts (cont'd)
A. Which transmission medium does it describe?
Microwave
SatelliteInfrared
Short-range wireless
Coaxial cable
Twisted-pair cable
Fiber-optic cable
4. Two copper wires twisted around each other in a double helix, usually
in plastic sheathing
5. Signals are sent by line-of-sight transmission via parabolic antennas
mounted on towers
6. The cable typically consists of four layers: core, foam/dielectric
insulator, metal jacket of braided copper or aluminum, and a
polyethylene cover
7. LAN connectivity method that allows laptop users to move freely
around an office building
Copyright  2012
Activity 6-1: Reviewing
transmission media concepts (cont'd)
B. In this section (8 through 9), answer the questions in short essay
form
8. Describe microwave transmission
9. Describe twisted-pair cable as a transmission medium…
What types exist, and what are their advantages and disadvantages?
Copyright  2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking
and Name Resolution
Lesson 8: Network Management
Copyright  2012
Lesson 7
Pre-Assessment Questions
1. Which of the following statements is true of NetBIOS
names?
a. They can be used across the Internet
b. They are supported by UNIX, Linux and MacOS
operating systems
c. They can be discovered by querying a domain name
server
d. They are recognized only within a Windows LAN
2. How are domain names structured?
Copyright  2012
Lesson 7
Pre-Assessment Questions (cont'd)
3. Which of the following technologies use(s) the CSMA/CD
access method?
a. 802.3 and 802.3u
b. 802.5
c. 802.11a and 802.11n
d. 802.12
Copyright  2012
Lesson 7
•
•
•
•
•
•
Networking Standards Organizations
The IEEE and LAN Standards
IEEE 802.3: Ethernet Standards
IEEE 802.11: Wireless LAN Standards
Wireless LAN Operations
Resolving System Names
Copyright  2012
Lesson 7
•
•
•
•
•
•
Networking Standards Organizations
The IEEE and LAN Standards
IEEE 802.3: Ethernet Standards
IEEE 802.11: Wireless LAN Standards
Wireless LAN Operations
Resolving System Names
Copyright  2012
IEEE Committees
Figure 7-1: IEEE 802.x committees develop
standards for OSI Layers 1 and 2
Copyright  2012
IEEE Committees (cont'd)
IEEE
Committee
802.1
802.2
802.3
Subject
Description
LAN/MAN
architecture
Logical Link Control
(LLC)
Internetworking, network
management and bridging
Committee Notes
This committee is in
hibernation
Includes Ethernet (802.3), Fast
Ethernet (802.3u), Gigabit Ethernet
CSMA/CD (Ethernet)
(802.3z, 802.3ab) and 10-Gigabit
Ethernet (802.3ae)
802.4
Token bus
A standard for implementing the
Token Ring protocol over a "virtual
ring" on a coaxial bus
802.5
Token Ring
A standard for token passing
This committee is
disbanded and that
standard has been
withdrawn
This committee is in
hibernation
Table 7-1: IEEE committees
Copyright  2012
IEEE Committees (cont'd)
IEEE
Committee
Subject
Description
Committee Notes
This standard has been
withdrawn and the
committee is
disbanded. Most MANs
now use SONET or
ATM
This standard has been
withdrawn and the
committee is disbanded
802.6
Distributed queue
dual bus (DQDB)
A standard for using fiber in MANs
802.7
Broadband LAN
A standard for broadband local
area networks
802.8
Fiber Distributed
Data Interface
(FDDI)
A standard for fiber-optic media in
token-passing ring networks
This committee is
disbanded
Evolving marriage of
LAN and ISDN
A standard formerly known as
isoEthernet that combined 10Mbps Ethernet and 96 64-Kbps
ISDN "B" channels
Fast Ethernet pushed
isoEthernet out of the
market place and this
committee is disbanded
802.9
Table 7-1: IEEE committees (cont'd)
Copyright  2012
IEEE Committees (cont'd)
IEEE
Committee
802.10
802.11
802.12
Subject
LAN security
Wireless LANs
100VG-AnyLAN
Description
Committee Notes
A former standard for security
functions that could be used in
both LANs and MANs
This standard has been
withdrawn (largely
replaced by 802.1q in
VLANs and 802.11i in
WLANs) and the
committee is disbanded
Includes 802.11a/b/g/n networks,
as well as the 802.11e and
802.11h amendments
A standard for the 100-Mbps
transport of both Ethernet and
Token Ring frames using a media
access method called demand
priority, which allows voice and
video packets to be given high
priority
Today, this protocol is
obsolete and the
committee is disbanded
Table 7-1: IEEE committees (cont'd)
Copyright  2012
IEEE Committees (cont'd)
IEEE
Committee
Subject
802.14
Cable TV broadband
802.15
Wireless personal
area networks
(WPANs)
802.16
Broadband wireless
networking (WiMAX)
802.17
Resilient packet ring
Description
Committee Notes
This committee is
disbanded
Includes standards for Bluetooth,
co-existence of WPANs with other
wireless devices, high-rate and
low-rate WPANs, and mesh
networking
A standard for wirelessly delivering
(via microwave) high-speed
Internet service to large
geographical areas
A standard designed to optimize
This committee has no
the transport of data traffic over
current active projects
optical-fiber ring networks
Table 7-1: IEEE committees (cont'd)
Copyright  2012
IEEE Committees (cont'd)
IEEE
Committee
Subject
Description
Committee Notes
802.20
Mobile Broadband
Wireless Access
(MBWA)
A standard for mobile wireless
Internet access networks
This committee is
currently inactive
802.21
Media Independent
Handoff
802.22
Wireless Regional
Area Network
802.23
Emergency Services
Working Group
A standard for handover and
roaming between 802.11 networks
and 3G cellular networks
A standard for using the unused
spaces in the television frequency
spectrum to bring broadband
access to hard to reach lowdensity population areas
A standard to provide location
information for VoIP clients for
purposes of securing emergency
(911) services
Table 7-1: IEEE committees (cont'd)
Copyright  2012
Lunch Break
Lunch
Be back in
45 minutes!
Copyright  2012
Lesson 7
•
•
•
•
•
•
Networking Standards Organizations
The IEEE and LAN Standards
IEEE 802.3: Ethernet Standards
IEEE 802.11: Wireless LAN Standards
Wireless LAN Operations
Resolving System Names
Copyright  2012
Ethernet Standards
Characteristic
Ethernet
Fast Ethernet
Speed
10 Mbps
100 Mbps
IEEE standard
IEEE 802.3
IEEE 802.3u
Access method
CSMA/CD
CSMA/CD
Topology
Bus/star
Star
Cable support
Co-ax/twisted pair/fiber
Twisted pair/fiber
UTP link distance
(maximum)
100 meters
100 meters
Table 7-2: Ethernet vs. Fast Ethernet
Copyright  2012
Lesson 7
•
•
•
•
•
•
Networking Standards Organizations
The IEEE and LAN Standards
IEEE 802.3: Ethernet Standards
IEEE 802.11: Wireless LAN Standards
Wireless LAN Operations
Resolving System Names
Copyright  2012
Wireless LAN Standards
IEEE
Theoretical
Specification Top Speed
54 Mbps
802.11a
Frequency Comments
5 GHz
-Indoor range of 35 meters; outdoor range of 120 m
-Includes error correction
-Offers strong encryption and authentication
802.11b
802.11g
11 Mbps
54 Mbps
2.4 GHz
-Not compatible with 802.11b or 802.11g
-Indoor range of 38 m; outdoor range of 140 m
2.4 GHz
-Subject to interference from microwave ovens, cordless
phones and Bluetooth devices, which operate in the same
frequency band
-Indoor range of 38 m; outdoor range of 140 m
-Backward compatible with 802.11b (but only at 802.11b
speed)
802.11n
300 Mbps
2.4 GHz and
5 GHz
-Offers encryption and authentication features similar to
802.11a
-Indoor range of 70 m; outdoor range of 250 m
-Offers high speed and twice the range of 802.11g
-Supports streaming technologies
Table 7-3: 802.11 wireless LAN flavors
Copyright  2012
Lesson 7
•
•
•
•
•
•
Networking Standards Organizations
The IEEE and LAN Standards
IEEE 802.3: Ethernet Standards
IEEE 802.11: Wireless LAN Standards
Wireless LAN Operations
Resolving System Names
Copyright  2012
Wireless Networking Modes
Figure 7-2: Wireless networking modes
Copyright  2012
Lesson 7
•
•
•
•
•
•
Networking Standards Organizations
The IEEE and LAN Standards
IEEE 802.3: Ethernet Standards
IEEE 802.11: Wireless LAN Standards
Wireless LAN Operations
Resolving System Names
Copyright  2012
Domain Name Structure
Figure 7-3: Typical domain name
Copyright  2012
DNS Name Space
.(root)
ie
se
com
mx
net
ch
xyz
user1
iso
ftp
user2
www
Figure 7-4: Domain name space hierarchy
Copyright  2012
Lesson 7 Review
1. Define fast Ethernet
2. What type of cable can you use for Fast Ethernet?
3. What does IEEE 802.15 define?
4. Which access method is used in wireless LANs?
5. What is the frequency band used in an IEEE 802.11n
network?
Copyright  2012
Lesson 7
Application Project
Suppose you are part of the IT staff at a small
business…
• Management has expressed the desire to include
wireless connectivity throughout the office space
• They want to enable traveling sales personnel to easily
connect to the LAN whenever they drop in, regardless of
whether a dedicated "office space" is available
• They think it would be beneficial for the non-traveling
employees to have wireless access as well
Copyright  2012
Lesson 7
Application Project (cont'd)
Consider the following questions…
• How will the IT staff decide upon which wireless
standard to implement?
• What factors should be taken into consideration?
• What type of security challenges might the wireless
solution cause?
• How will the IT staff plan to meet those challenges?
Copyright  2012
Activity 7-1: Reviewing 802.11
wireless standards
Match each IEEE 802.11 wireless standard with the correct description
1. 802.11e
2. 802.11a
3. 802.11b
A. Operates at speeds up to 11 Mbps in the 2.4-GHz range and is
subject to interference from cordless phones and Bluetooth
devices
B. Provides Quality of Service (QoS) standards for wireless
networks, enabling them to carry time-sensitive packets, such
as those for Voice over Wireless LAN (VoWLAN) and streaming
media
4. 802.11g
C. Can operate in either the 2.4-GHz or the 5-GHz band, offering
speeds up to 300 Mbps, and also supports streaming
technologies
5. 802.11i (WPA2)
D. Specifies security mechanisms with strong encryption for
wireless networks that use other 802.11 specifications
6. 802.11n
E. Operates at up to 54 Mbps in the 5-GHz band, includes error
correction, and offers strong encryption and authentication
F. Operates at speeds of up to 54 Mbps in the 2.4-GHz band, and
offers encryption and authentication features
Copyright  2012
Local Area Networks (LANs)
Course Lessons
Lesson 1: Overview of Local Area Networks
Lesson 2: Wide Area Networks (WANs)
Lesson 3: Networking and the Internet
Lesson 4: LAN Topologies
Lesson 5: Networking Models, Traffic and Devices
Lesson 6: Transmission Media
Lesson 7: LAN Standards, Wireless Networking
and Name Resolution
Lesson 8: Network Management
Copyright  2012
Lesson 8
Pre-Assessment Questions
1. A point in a network where traffic slows considerably is
called a:
a. test point
b. baseline
c. bottleneck
d. network analyzer
2. To which of the following configuration settings might a
network administrator want to restrict access?
a. Network settings
b. Screen resolution settings
c. Desktop wallpaper settings
d. Screensaver settings
3. Describe Platform as a Service (PaaS)
Copyright  2012
Lesson 8
•
•
•
•
•
•
•
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management
Copyright  2012
Lesson 8
•
•
•
•
•
•
•
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management
Copyright  2012
ISO Functional Areas
Area
Description
Fault
Pertains to maintaining the integrity of network operation, and detecting and
correcting anomalous network behavior
Configuration
Pertains to installing, initializing, modifying and tracking the configuration
parameters of network hardware and software
Accounting
Pertains to resource use, including data, software and licensing; sometimes
referred to as administration, or billing management
Performance
Pertains to developing a baseline of network performance and measuring
ongoing developments accordingly
Security
Pertains to access control and data integrity
Table 8-1: ISO functional areas of
network management (FCAPS)
Copyright  2012
Lesson 8
•
•
•
•
•
•
•
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management
Copyright  2012
Lesson 8
•
•
•
•
•
•
•
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management
Copyright  2012
Network Analysis Tools
Figure 8-1: Wireshark packet capture
Copyright  2012
Simple Network Management
Protocol (SNMP)
Figure 8-2: SNMP management station and agents
Copyright  2012
Lesson 8
•
•
•
•
•
•
•
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management
Copyright  2012
Lesson 8
•
•
•
•
•
•
•
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management
Copyright  2012
Lesson 8
•
•
•
•
•
•
•
What Is Network Management?
ISO Functional Areas of Network Management
Network Planning
Monitoring and Analysis Tools and Protocols
Hardware Management
Software Management
Security Management
Copyright  2012
Lesson 8 Review
1. What is an operating system patch?
2. Why are some users reluctant to store their files in
network folders?
3. Describe the function of Dynamic Host Configuration
Protocol (DHCP)
4. Why are network drives considered a safe place to
store user documents?
5. Describe a site license
Copyright  2012
Lesson 8
Application Project
Suppose you are a consultant for a growing company
that is planning to expand and speed up its network…
Describe the issues that must be considered to ensure
that the end product meets with user expectations and
needs
Copyright  2012
Activity 8-1: Reviewing the functional
areas of network management
Match each term with the correct description
1. Configuration
management
A. Involves developing a baseline and measuring
ongoing conditions against the baseline
2. Fault management
B. Includes ensuring that all software is properly
licensed and tracking which users use which
applications and resources
C. Includes scheduling regular backups and using
permissions to restrict access to network
resources
D. Includes setting up corporate systems as DHCP
clients and using remote connection applications
to troubleshoot servers
3. Performance
management
4. Accounting
management
5. Security
management
E. Involves maintaining ongoing network operation,
and detecting and correcting anomalous network
behavior
Copyright  2012
Thank You
• Thank you for attending this course
• Local Area Networks (LANs) is the fourth course in the
six-course CCNT series
• For information about the CCNT program or taking the
CCNT LANs certificate exam, ask your instructor or
visit the CCNT page at
www.CTPcertified.com/Certification/ccnt.php
Copyright  2012