A+ Chapter 16a Network Terminology_final

Download Report

Transcript A+ Chapter 16a Network Terminology_final

A+ Certification Guide
Chapter 16 (Part A)
Networking
Chapter 16 (Part A)
Objectives






Network Models and Topologies
–
The client/server and peer-to-peer networking models
Internet Connectivity Technologies
–
How to install and make dial-up connections. Services such as
ISDN, DSL, cable, and satellite. LAN connectivity to the Internet.
Network Protocols
–
Basics about Transmission Control Protocol/Internet Protocol
(TCP/IP)
TCP/IP Applications and Technologies
–
The protocols, services, and ports used by TCP/IP
Network Tools
–
Tools for cabling a network
Network Types
–
Wired and wireless network technologies
Network Models


Client/Server:
– Servers provide services to clients.
• Print server provides access to print device.
• Web server provides access to html files.
• Domain controller provides centralized security services.
– Ability to grow with organization.
– Centralized security, auditing, and network management.
Peer to Peer:
– Each workstation is independently managed.
• All security is contained on locally managed disk.
– Limited growth due to lack of manageability.
• File can be shared, but each folder on each machine must be
individually shared and controlled—time-consuming.
LANs and WANs

Local Area Network (LAN)
–

A group of computers and network-attached devices located in
the same building or at least on the same property
Wide Area Network (WAN)
–
–
–
WANs connect LANs to each other.
Distance between local networks generally distinguishes LANs
from WANs.
WANs typically lease the use of third-party wires/equipment
from a provider to make connections.
• Data Communications Service Providers
– AT&T, Bellsouth, Sprint, and so on
Network Support Devices










Hub
Bridge/Switch
Wireless Access Point
Router
Layer 3 Switch
Firewall
Network Attached Storage
Modem
Internet Appliance
VOIP Phone Systems
Network Topologies




Bus
– Computers in a bus topology share a common cable. Connections are
made largely with coaxial 10BASE2 and 10BASE5 cables.
Star
– Computers in a star topology connect to a central switch (wired) or
access point (wireless).
– Used by 10BASE-T, 100BASE-T, and 1000BASE-T Ethernet networks
and by Wireless Ethernet when configured for infrastructure mode.
Ring
– Computers in a ring topology either connect as a physical ring (for
example, FDDI networks) or a logical ring (for example, Token Ring
networks).
Peer-to-Peer (Mesh)
– Computers in a peer-to-peer or mesh topology can connect directly to
every other computer.
– Used by computers with multiple network adapters, Wireless Ethernet
(Wi-Fi) when configured for peer-to-peer mode, and Bluetooth.
Internet Connectivity
Technologies







Dial-up connectivity:
– Modems
– ISDN
Broadband
DSL
Satellite
Cellular
WiMAX
Trunk lines (T-1)
Dial-Up Connections

Telephone Modems:
–
–
–
–
–

Uses analog telephone connection by converting digital serial
data into sound wave-based analogy data
Bandwidth (speed) limited to 56Kbps
Can be internal or external
Can be installed as PC Card on a notebook computer
Follow usual ESD precautions when installing
ISDN (Integrated Services Digital Network):
–
–
–
Also uses a modem and telephone line
Can transmit 128Kbps
Often used as backup line to a T-1 or faster connection
Broadband Internet Services
(DSL, Cable, and Satellite)

Broadband Service:
– Uses a cable modem to convert broadband signaling to baseband
signaling (serial)
– Generally associated with cable TV providers
– Shared media with other local customers
– Advertised bandwidth of 2-10Mbps
• Sometime less, sometimes more

DSL:
– Dedicated bandwidth
– Dependent on distance from phone company for quality of service

Satellite:
– Requires a telephone for transmitting service requests
– Uses a dish antenna precisely focused on a satellite
DSL Modem Physical Setup
DSL Modem and Single PC
Topology
Cable Modem and Single PC
LANs and Internet Connectivity

Allows more than one device to access Internet via a
single connection
– Requires
• Internet access device
– Cable modem
– DSL modem
• Router
– Forwards data packets from the Internet to the
local network and vice versa
– Can be a workstation set up with Internet
Connection Sharing (ICS)
LAN Connection to Internet

The ISP equipment could be a DSL, cable modem, or even a T-1 connection.
Network Protocols



Transmission Control Protocol/Internet Protocol (TCP/IP)
–
Dominant networking protocol in the world
–
Has been adopted by all manufacturers of networking devices
NetBIOS Extended User Interface (NetBEUI/NetBIOS)
–
No network number in its structure
• Cannot be routed on an internetwork
• Useful only on a single broadcast domain
TCP/IP is the only practical protocol to know
–
Transmission Control Protocol
• Verifies that the data delivery process is successful
–
Internet Protocol.
• Ensures that data packets can be tagged with information
needed so as to be sent to specific networks and to
specific hosts on those networks
TCP/IP Applications and
Technologies—Terms to Know
–
Internet Service Provider (ISP):
• Uses routers connected to dedicated high-speed
connection to the Internet.
• Customers use TCPIP to connect to service
provider.
– Hypertext Transfer Protocol (HTTP/HTTPS):
• Used by web browsers to interpret Internet
service requests through the URL line
– Secure Sockets Layers (SSL):
• Encryption used by HTTPS to secure data
– Transport Layer Security (TLS):
• Successor to SSL
TCP/IP Applications and
Technologies—Terms to Know



Hypertext Markup Language (HTML):
–
Code for how web pages are written
–
Uses “tags" to separate data types, formats, and so on
File Transfer Protocol (FTP):
–
Widely used to transfer files
–
Can be used
• In a web browser
• From a command line
• From specially written FTP programs
Telnet:
–
Unsecure method of remote access
TCP/IP Applications and
Technologies—Terms to Know


Secure Shell (SSH):
– Encrypted replacement for telnet
Domain Name Server (DNS):
– Takes a web domain request and matches it to the
actual IP address needed to fulfill the request
– Part of a worldwide server system
– Top-level domains follow the dot “.”
•
–
.com, .gov, .org, and so on
Like a software phone book of the Internet
TCP/IP Applications and
Technologies—Terms to Know



Simple Mail Transport Protocol (SMTP)/Email:
– Uses a server to receive and notify clients of email:
• Protocols include SMPT, POP, and IMAP
– Email might be thought of as a streamlined way of
putting text in a remote machine’s folder “inbox.”
Simple Network Management Protocol (SNMP):
– Used to remotely monitor and manage network
devices.
Dynamic Host Configuration Protocol (DHCP)
– Used to automatically assign IP Addresses to
network nodes.
TCP/IP Technologies (continued)

Remote Desktop
–

Uses Remote Desktop Protocol (RDP) to allow remote access
to and control of the desktop GUI for purposes of technical
maintenance and troubleshooting
SMB
–

Server Message Block provides access to file and printers to
multiple clients through authentication.
Lightweight Directory Access Protocol (LDAP)
–
Microsoft uses this to create Directory Services (Active
Directory).
Ports

16-bit long number assigned to map running
applications to the data generated by the application.
– Example of a data request to port 80 on a remote web
server:
• The remote web server sees the port 80 request.
• It knows that port 80 is the port that is being used
by the web server application.
• The web server application responds by retrieving
the data file (web page) and returning it to the
client.
• The requesting client receives the data and directs
it to the port being used by its web browser.
Common Protocols/Ports
Protocol
Port Used
FTP
21
SSH
22
Telnet
23
SMTP
2
DNS
53
HTTP
80
POP3
110
IMAP
143
HTTPS
443
RDP
3389
Cable and Connector Types


Unshielded twisted-pair (UTP):
– 4 pairs of twisted 26-gauge wire
• Twists provide protection from crosstalk.
– Most common type (CAT5, CAT5e cables)
• See Table 16-6 for details.
– Uses RJ-45 connector
Shielded twisted-pair (STP):
– Has metal braid to protect against EMI
Ethernet Network Types


Wired:
– 10Base-T
– 100Base-TX
– 1000Base-T
– Fiber-optic based, such as 1000Base FX
Wireless:
– 802.11a—5GHz
– 802.11b—2.4GHz
– 802.11g—2.4GHz
– 802.11n—2.4/5GHz
– Bluetooth—Used for Personal Area Networks
Unshielded Versus Shielded
Twisted-Pair Cable
UTP/STP Cabling Categories
Category
Network Type(s)
Supported
Supported
Speeds
Cable Type, Notes
UTP; obsolete; replace
3
10BASE-T Ethernet
Up to 10 Mbps
with Cat5, Cat5e, or
Cat6.
4
Token ring
Up to 16 Mbps
Shielded twisted pair
5
10BASE-T, 100BASE-T
Up to 100 Mbps
UTP, STP; four-wire
5e
10BASE-T, 100BASE-T, Up to 1000
1000BASE-T
Mbps
(STP); one-wire pair
pairs
Enhanced version of
Cat5; available in UTP,
STP; four-wire pairs
6
10BASE-T, 100BASE-T, Up to 1000
1000BASE-T
Mbps
Handles higher
frequencies than
Cat5/5e
Ethernet Network Types

Infrared:
– Used for short range—laptop to laptop

Cellular:
– Digital phone networks

Voice over IP (VOIP):
– Digital phone service
– Uses Internet provider
– Requires specialized knowledge to set up
 Bluetooth:
– Wireless signal for Personal Area Networks (PAN)
Cable and Connector Types


Fiberoptic:
– Single Mode—For long distances; single frequency
– Multi-Mode—Shorter distances; multiple frequencies
– Subscriber Connector (SC)—Square tip.
– Straight Tip (ST)—Round tip
– Fiber Connector (FC)—Round connector
Coaxial:
– Was used in bus topology; now used by cable TV
– RG59 and RG5 with BNC connectors
– May require a transceiver to connect to a switch or
host
Insulation and Fire Standards

Wire insulation:
– Polyvinyl Chloride (PVC):
• Durable but poisonous when burned
– Plenum cable:
• Produces less toxic smoke when burned
• Usually required in suspended ceilings
Networking Tools







Wire Scissors
Wire Stripper
Crimper
Punchdown tool
LAN Wire Tester
Continuity Tester
Tone Generator/Probe
Troubleshooting
–
–
–
–
Check cable connectors for damage.
Check cable for damage to insulation.
Check link lights on back of PC or switch.
Verify that the correct impedance cable is being
used.
What Have You Learned?
–
–
–
–
–
What type of cable should be purchased when
several light frequencies are intended to be used?
What is the practical limit of CAT5 cable?
Why is the wire twisted in a CAT5 cable?
What advantage does SSH offer over Telnet?
How can HTTPS be useful when doing monetary
transactions?
Chapter 16 (Part A)
Summary






Network Models.
–
The client/server and peer-to-peer networking models.
Internet Connectivity Technologies.
–
ISDN, DSL, cable, and satellite. LAN connectivity to the Internet.
Network Protocols.
–
Basics about TCP/IP.
TCP/IP Applications and Technologies.
–
The protocols and services that run within TCP/IP.
Network Topologies.
–
Four topologies you should know for the exam.
Network Types.
–
Wired and wireless network technologies.
Next Lesson: Chapter 16b