Computer Network + Notes

115
1 Video 1 Welcome to CompTIA Network+ 2009 Training Basic Networking Fundamentals Basic Networking Fundamentals Basic Networking Fundamentals Basic Networking Fundamentals Train Signal, Inc. Ed Liberman About Your Instructor and Train Signal What’s Covered in this Course Network+ Certification Objectives In this video… Basic Networking Fundamentals Basic Networking Fundamentals Basic Networking Fundamentals Basic Networking Fundamentals Train Signal, Inc. Ed Liberman About Ed Liberman MCT, MCP, MCSA, MCSE, MCDST, MCTS, MCITP, A+, NET+, SERVER+ Has worked in technology for almost 20 years. Have been certified and instructing IT for over 10 years. Volunteer time in my local community as a math tutor for struggling grade school children. About Train Signal Casual Training Method Scenario-Based Training About your Instructor and Train Signal

Transcript of Computer Network + Notes

Video 1 Welcome to CompTIA Network+ 2009 Training

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

About Your Instructor and Train Signal Whats Covered in this Course Network+ Certification Objectives

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

About your Instructor and Train Signal

About Ed Liberman MCT, MCP, MCSA, MCSE, MCDST, MCTS, MCITP, A+, NET+, SERVER+ Has worked in technology for almost 20 years. Have been certified and instructing IT for over 10 years. Volunteer time in my local community as a math tutor for struggling grade school children.

About Train Signal Casual Training Method Scenario-Based Training

1

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Whats Covered in this Course

Video 2 Basic Networking Fundamentals Objective 2.7 Explain common logical network topologies and their characteristics

Video 3 Network Media Objective 2.1 Objective 2.2 Objective 2.4 Objective 2.6 Objective 2.8 Categorize standard cable types and their properties Identify common connector types Given a scenario, differentiate and implement appropriate wiring standards Categorize LAN technology types and properties Install components of wiring distribution

Video 4 Network Topologies Objective 2.3 Identify common physical network topologies Objective 2.5 Categorize WAN technology types and properties Objective 2.7 Explain common logical network topologies and their characteristics

Video 5 OSI Model Objective 4.1 Explain the function of each layer of the OSI model

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Whats Covered in this Course

Video 6 TCP/IP Objective 1.1 Explain the function of common networking protocols Objective 1.3 Identify the following address formats Objective 1.4 Given a scenario, evaluate the proper use of the following addressing technologies and addressing schemes

Video 7 TCP/IP Protocols Objective 1.1 Explain the function of common networking protocols Objective 1.2 Identify commonly used TCP and UDP default ports

Video 8 Network Devices Objective 3.1 Install, configure and differentiate between common network devices Objective 3.2 Identify the functions of specialized network devices Objective 3.3 Explain the advanced features of a switch

Video 9 Routing Objective 1.5 Identify common IPv4 and IPv6 routing protocols Objective 1.6 Explain the purpose and properties of routing

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Whats Covered in this Course

Video 10 Wireless Networking Objective 1.7 Compare the characteristics of wireless communication standards Objective 3.4 Implement a basic wireless network

Video 11 Networking Command Line Tools Objective 5.1 Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality

Video 12 Network Performance Optimization Objective 4.5 Explain different methods and rationales for network performance optimization

Video 13 Network Tools Objective 5.3 Given a scenario, utilize the appropriate hardware tools

Video 14 Network Monitoring Objective 4.4 Conduct network monitoring to identify performance and connectivity issues using the following Objective 5.2 Explain the purpose of network scanners

2

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Whats Covered in this Course

Video 15 Documentation Objective 4.2 Identify types of configuration management documentation Objective 4.3 Given a scenario, evaluate the network based on configuration management documentation

Video 16 Troubleshooting Objective 4.6 Given a scenario, implement the following network troubleshooting methodology Objective 4.7 Given a scenario, troubleshoot common connectivity issues and select an appropriate solution

Video 17 Network Security Objective Objective Objective Objective Objective Objective 6.1 Explain the function of hardware and software security devices 6.2 Explain common features of a firewall 6.3 Explain the methods of network access security 6.4 Explain methods of user authentication 6.5 Explain issues that affect device security 6.6 Identify common security threats and mitigation techniques

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Are you ready to get started?

Lets Go!!!

Video 2 Basic Networking Fundamentals

3

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

What is a network? What are some of the different types of networks? Client/Server Peer-to-Peer LANs/CANs/MANs/WANs How do we make connections? What is a Protocol? Introduction to addressing Private vs. Public

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is a network?

The definition of a network is simple. A network is created when you have two or more hosts connected together so that they can communicate and share resources. A host can be any device which has a network interface which allows it to connect to other devices on a network. Some examples of resources which can be shared are documents and printers.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What are some of the different types of networks?

Client/Server In a Client/Server network each hosts will act specifically as a server (The provider of resources) OR a client (The receiver of resources).

4

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What are some of the different types of networks?

Peer-to-Peer In a Peer-to-Peer network every host will act as a client AND a server.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What are some of the different types of networks?

LAN Local Area Network Typically refers to a network contained within a building.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What are some of the different types of networks?

CAN Campus Area Network A network spread between multiple contiguous buildings.

5

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What are some of the different types of networks?

MAN Metropolitan Area Network A network spread between multiple noncontiguous buildings within the single metropolitan area.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What are some of the different types of networks?

WAN Wide Area Network A network spread over a wide area, typically covering multiple cities and countries.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

How do we make connections?

Network hosts communicate with each other by sending bits of information across network media. Network media can be wire or wireless. Examples of wire media are copper and fiber optic. Examples of wireless media are RF and infra-red. We will discuss all the different forms of media in detail later in this course.

6

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is a protocol?

The definition of a protocol is a set of rules and procedures for communication. In order for hosts to communicate on a network they must agree to use a common set of rules and procedures or in other words, must use the same network protocol. Some of the common network protocols used today are TCP/IP, IPX/SPX, NetBEUI, and Apple Talk. We will discuss the TCP/IP network protocol in detail later in this course.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Introduction to addressing.

All hosts on a network must be identified with an address on that network. Addressing in computer networks is similar to how addressing works with the postal network or telephone network. The most typical types of addresses used in computer networking are MAC addresses and IP addresses. There are both private and public forms of addressing. Private addressing is used to keep communications safe within the boundaries of a private secure network. Public addressing is used to allow communications with the outside world, most typically known as the Internet. We will discuss addressing in detail later in this course.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video we discussed:

What a network is. Different types of networks: Client/Server Peer-to-Peer LANs/CANs/MANs/WANs Network media and protocols. The concept of addressing.

7

Video 3 Network Media

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

Wired Media Twisted Pair Coaxial Fiber Optic What the heck is the plenum? Common Connectors Wiring Standards LAN Technology Types Wiring Distribution

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Wired Media Twisted Pair

CAT 3: 10 Mbps CAT 5: 100 Mbps CAT 5e: 1000 Mbps CAT 6: 1000 Mbps All categories can travel up to 100 meters before suffering from attenuation. UTP: Unshielded Twisted Pair Susceptible to EMI STP: Shielded Twisted Pair Protects against EMI Uses an RJ-45 Connector

8

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Wired Media - Coaxial

Coaxial cable is made up of 4 layers: Copper Core Inner Insulator Shielding Wire Mesh Outer Insulator Thinnet (RG-58) 10 Mbps 185 Meters Uses a BNC Connector Has been primarily replaced by twisted pair. RG-59 & RG-6 Typically used for cable tv.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Wired Media Fiber Optic

Fiber optic cable uses light pulses instead of electricity to transmit data. Benefits More Secure Not Susceptible to EMI Very Fast Long Distances Drawbacks More Expensive Not as Flexible Uses SC, ST, and LC Connectors

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What the heck is the plenum?

An enclosed space used for airflow. Usually thought of as the space above a drop ceiling or below a raised floor. Plenum grade cable should always be used in a plenum space.

9

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Common Connectors

RJ-45

RJ-11

BNC

SC ST LC

RS-232 Serial Cable

RG-59 or RG-6

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Wiring Standards

EIA/TIA - 568A vs. 568B

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Wiring Standards

A straight cable has 568A wiring on both ends. A cross-over cable has 568A on one end and 568B on the other. A rollover cable has 568A on one end and the complete reversal of wires on the other. A loopback cable is used to fool the computer interface into thinking it is connected to another device.

10

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

LAN Technology Types Ethernet

Ethernet is the most common form of network communication used in todays local networks. Ethernet is known as the 802.3 standard. Ethernet uses the CSMA/CD access method. CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

LAN Technology Types Standard Ethernet

10BaseT 10 Base T

10 How Fast = 10Mbps Base Baseband vs Broadband = Baseband T Type of Cable = Twisted Pair Cable

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

LAN Technology Types Fast Ethernet

100BaseTX 100BaseFX Both are 100Mbps Both are Baseband TX = Twisted Pair Cable FX = Fiber Optic Cable

11

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

LAN Technology Types Gigabit Ethernet

1000BaseT 1000BaseX Both are 1000Mbps or 1Gbps Both are Baseband T = Twisted Pair Cable X = Fiber Optic Cable

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

LAN Technology Types 10 Gigabit Ethernet

10GBaseT 10GBaseSR 10GBaseLR 10GBaseER 10GBaseSW 10GBaseLW 10GBaseEW

All are 10Gbps All are Baseband T = Twisted Pair Cable SR,LR,ER = Fiber Optic Cable SW,LW,EW = SONET

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Wiring Distribution

Cross Connects Cable which connects you to a backbone or provider. Typically cable found in a wiring closet connected to a patch panel. Patch Panel

MDF Main Distribution Frame IDF Intermediate Distribution Frame

12

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Wiring Distribution

66 Block and 110 Block

25 Pair and 100 Pair Cable

Demarc The point at which the telephone companys network ends and connects to your wiring. Demarc Extension An extension from where the telephone companys network ends and your network truly begins. Smart Jack The actual termination of a T1 line at your office.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video we discussed:

Different types of cabling. What the Plenum is and when to use plenum cable. Common Connectors used in network cabling. Wiring standards for twisted pair cable. Various Ethernet LAN technology types. Wiring distribution hardware.

Video 4 Network Topologies

13

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

What does topology mean? Physical Network Topologies WAN Technologies What is a VPN? What is a VLAN?

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What does topology mean?

A network topology is the layout of the network. The topology can be physical or logical.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Physical Network Topologies - Bus

In the bus topology all of the computers are connected in a straight line. Terminators must be used at each end of a bus segment to prevent signals from bouncing. A single break in the cable would take down the entire network.

14

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Physical Network Topologies - Star

In the star topology all of the computers are connected through a central connection point (hub). A single break in the cable would only take down communication to one computer. A hub failure would take down the entire network.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Physical Network Topologies - Ring

In the ring topology all of the computers are connected in circular fashion. Data is passed around the ring from computer to computer. A break in the cable would take down the entire network.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Physical Network Topologies - Ring

In the ring topology all of the computers are connected in circular fashion. Data is passed around the ring from computer to computer. A break in the cable would take down the entire network.

15

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Physical Network Topologies - Mesh

In the mesh topology all of the computers are connected to all other computers. Typically used in a WAN environment. Provides fault tolerance in the event of a connection failure.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Physical Network Topologies - Mesh

In the mesh topology all of the computers are connected to all other computers. Typically used in a WAN environment. Provides fault tolerance in the event of a connection failure.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Physical Network Topologies - Hybrid

Different types of topologies can be used together to form a hybrid topology.

16

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

WAN Technologies

Circuit Switching A physical connection path is established between the source and the destination typically through a series of circuits. Packet Switching Data is broken into packets which then each take a separate independent route to the destination where they are reassembled back into data.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

WAN Technologies

POTS Plain Old Telephone Service PSTN Public Switched Telephone Network T1/ E1 A T1 is a digital leased line consisting of 24 64K channels providing a transfer rate up to 1.544 Mbps. An E1 is the European version with 30 channels providing up to 2.048 Mbps. T3/E3 A T3 is basically 28 T1 lines (672 channels) providing a transfer rate up to 44.736 Mbps. An E3 has 512 channels providing up to 34.368 Mbps.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

WAN Technologies

ISDN Integrated Services Digital Network BRI: Basic Rate Interface uses 2 64K B-channels to transmit data and 1 16K D-channel to transmit control information. PRI: Primary Rate Interface uses 23 64K Bchannels for data and 1 64K D-channel for control information providing for essentially the same throughput as a T1 line.

17

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

WAN Technologies

SONET/OC-x Synchronous Optical Network SONET is a network technology designed to carry large volumes of traffic over relatively long distances via fiber optic cabling. The data rates of a SONET network are divided into OC-levels (Optical Carrier Levels): OC-1 = 51.84 Mbps OC-3 = 155.52 Mbps OC-12 = 622.08 Mbps OC-24 = 1.244 Gbps OC-48 = 2.488 Gbps OC-192 = 10 Gbps OC-256 = 13.271 Gbps OC-768 = 40 Gbps

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

WAN Technologies

Frame Relay A WAN where all nodes are connected through a packet switching cloud. You pay a base price for an agreed upon CIR (Committed Information Rate), and then pay additional for only the bandwidth actually used. ATM Asynchronous Transfer Mode Advanced packet switching network using fixed length packets (53 bytes). Provides data rates up to 622 Mbps.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

WAN Technologies

MPLS Multiprotocol Label Switching MPLS is a technique, not a service. Known by many different names. Primary concept is the use of labeling.

http://www.networkworld.com/research/2007/040207-mpls-migration-explained.html

18

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

WAN Technologies

DSL Digital Subscriber Line Provides high speed Internet connections using standard copper telephone wires. DSL comes in different flavors: ADSL Asymmetric Digital Subscriber Line allows POTS and data to be transmitted simultaneously. SDSL Symmetric Digital Subscriber Line cannot share data transmission with POTS. VDSL Very High Speed Digital Subscriber Line allows access to the maximum bandwidth available on a standard phone line (13 55 Mbps).

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

WAN Technologies

Cable Modem Provides high speed Internet connections using a broadband cable connection. Satellite Provides high speed Internet connections using satellite communication. Typically used where DSL and Cable Internet are not available. Wireless Used primarily by mobile users. Provided through WiFi hotspots or through the cellular phone network.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is a VPN?

VPN stands for Virtual Private Network VPNs allow travelling users to connect to the local network when they are not in the office. Users remotely connect to a VPN server over a standard Internet connection. VPN connections are secured by using tunneling protocols.

19

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is a VLAN?

VLAN stands for Virtual LAN (Local Area Network). There are 2 ways of looking at a VLAN: 1. One physical segment divided logically into 2 or more segments. 2. Multiple physical segments acting as a single logical segment. We will discuss VLANs further later in this course.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video we discussed:

Network Topologies Bus Star Ring Mesh WAN Technologies VPNs and VLANs

Video 5 OSI Model

20

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

Review the Definition of a Protocol Explain the Different Layers of the OSI Model

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Definition of a Protocol

What is a Protocol? A protocol is a set of rules and procedures used for communication.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Example: USPS Protocol

21

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Example: USPS Protocol

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Example: USPS Protocol

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Example: USPS Protocol

22

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Example: USPS Protocol

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Example: Fedex Protocol

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Definition of a Protocol

Computers on a network must agree upon a common protocol in order to communicate.

Destination: USPS P.O. Box

23

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Standards of Communication

In this example: Packaging Addressing Payment Getting the package on the network

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is the OSI Model?

In the 1970s the International Standards Organization (ISO) developed the Open Systems Interconnection (OSI) reference model to define the basic standards for network communication.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is the OSI Model?

In the 1970s the International Standards Organization (ISO) developed the Open Systems Interconnection (OSI) reference model to define the basic standards for network communication.

24

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is the OSI Model?

The OSI Model is made up of 7 layers. Application Presentation Session Transport Network Data Link Physical

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is the OSI Model?

The OSI Model is made up of 7 layers. Application Presentation Session Transport Network Data Link Physical A P S T N D P

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is the OSI Model?

The OSI Model is made up of 7 layers. Application Presentation Session Transport Network Data Link Physical All People Seem To Need Data Processing

25

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is the OSI Model?

The OSI Model is made up of 7 layers. Application Presentation Session Transport Network Data Link Physical All People Seem To Need Data Processing Away Pizza Sausage Throw Not Do Please

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is the OSI Model?

Here are some additional sayings: A Priest Saw Two Nuns Doing Pushups All People Should Try New Diet Pepsi Please Do Not Take Sales Peoples Advice Please Do Not Tease Stupid Party Animals

26

27

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

After watching this video you should be able to:

Explain what a protocol is and how we use it to communicate on a network. Define the 7 layers of the OSI Model and explain its significance within a network.

28

Video 6 TCP/IP

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

The TCP/IP Protocol Suite Working with IP Addresses Planning an IP Addressing Scheme Working with Binary Numbers Internetworking Classful vs. Classless Interdomain Routing (CIDR) Fundamentals of IPv6

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

The TCP/IP Protocol Suite

TCP/IP stands for the Transmission Control Protocol/Internet Protocol. It is the basic communication protocol of the Internet. Although it was designed to be an Internet protocol, it can also be used as a communication protocol in a private network. The TCP/IP architecture is based off the 4 layer DARPA model. Each layer of the DARPA model corresponds to one or more of the layers of the 7 layer OSI model. Each of the 4 layers have individual protocols which all work together to form a protocol stack.

29

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is the TCP/IP (DARPA) Model?

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is the TCP/IP (DARPA) Model?

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is the TCP/IP (DARPA) Model?

30

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is the TCP/IP (DARPA) Model?

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Transport Layer Protocols

TCP Transmission Control Protocol One to One Connection-oriented Reliable Communication UDP User Datagram Protocol Connectionless Unreliable Communications

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What makes TCP connection-oriented?

Connection-oriented communication means that a connection must be established before data can be exchanged. TCP uses a three-way handshake to establish this connection.

31

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Three-way Handshake

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Three-way Handshake

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Three-way Handshake

32

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Three-way Handshake

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Transport Layer Protocols

TCP Transmission Control Protocol One to One Connection-oriented Reliable Communication UDP User Datagram Protocol Connectionless Unreliable Communications

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Internet Layer Protocols

IP Internet Protocol Addressing Routing ARP Address Resolution Protocol Resolves an IP address to hardware address

33

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Internet Layer Protocols

ICMP Internet Control Message Protocol Diagnostic and error reporting IGMP Internet Group Management Protocol Manages IP multicast group membership

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Types of TCP/IP Communication

Unicast (One to One) Multicast (One to Many) Broadcast (One to All)

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Unicast (One to One)

34

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Multicast (One to Many)

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Broadcast (One to All)

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Working with IP Addresses

What is an IP Address? A 32 bit address that is used to uniquely identify a computer on a network. The Network ID portion of the IP Address identifies the network where the computer sits. The Host ID portion of the IP Address uniquely identifies the computer on its network.

35

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Working with IP Addresses

Example: IP Address: 192.168.10.1 Host ID

Network ID

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Working with IP Addresses

Example: IP Address: Subnet Mask: 192.168.10.1 255.255.255.0 Host ID

Network ID

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Working with IP Addresses

Example: IP Address: Subnet Mask: 192.168.10.1 255.255.255.0 Host ID

Network ID

36

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Working with IP Addresses

Example: IP Address: Subnet Mask: 192.168.10.1 255.255.0.0 Host ID

Network ID

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Working with IP Addresses

Example: IP Address: Subnet Mask: 192.168.10.1 255.0.0.0 Host ID

Network ID

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Simple Network:

37

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Planning an IP Addressing Scheme

How to Plan an IP Addressing Scheme How many IP Addresses do you need today? How many IP Addresses will you need in the future? Are you dealing with a pre-existing IP scheme?

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Rules for IP Addressing

Each of the 4 numbers in an IP Address is called an octet (8 bits). 192.168.10.101 A bit is a 1 or a 0. Each octet can only have a number from 0 to 255 00000000 = 0 11111111 = 255

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Rules for IP Addressing

The first octet cannot be 127. The 127 range has been reserved for diagnostics. 127.0.0.1 is known as the loopback address. (It is sometimes also referred to as localhost.)

38

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Rules for IP Addressing

The Host ID cannot be all 0s or all 255s. All 0s represents the Network ID All 255s is the broadcast address Example: 192.168.10.0 is a Network ID 192.168.10.255 is the broadcast address for the 192.168.10.0 network.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is Classful IP Addressing?

Originally IP Addresses where divided into different class ranges: A Class: 1 126 255.0.0.0 B Class: 128 191 255.255.0.0 C Class: 192 223 255.255.255.0 D Class: 224 239 Multicast E Class: 240 243 Experimental

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is Classful IP Addressing?

A Class 126 Networks, 16,777,214 Hosts B Class 16,384 Networks, 65,534 Hosts C Class 2,097,152 Networks, 254 Hosts Total of 3,720,314,628 host addresses available

39

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Private vs. Public IP Addressing

Private IP ranges which have been reserved from Public Internet use: 10.0.0.0 10.255.255.255 172.16.0.0 172.31.255.255 192.168.0.0 192.168.255.255 169.254.0.0 169.254.255.255

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Private vs. Public IP Addressing

Hosts assigned private IP Addresses can get to the Internet through a technology called Network Address Translation (NAT) Most of todays companies use private IP Addresses on their private networks.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is NAT?

40

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

How Computers get IP Addresses

Statically From a DHCP Server Using APIPA

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Working with Binary Numbers

What is this number? 3,482 Three Thousand Four Hundred Eighty Two 1,000 3 3x 4x 8x 2x 1,000 100 10 1 100 4 = = = = 3,000 400 80 2 3,482 10 8 1 2

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Decimal vs. Binary

Decimal or Base 10: 106 105 104 103 102 101 100 1,000,000 100,000 10,000 1,000 100 10 1 Number Selection: 0 - 9 Binary or Base 2: 212 211 210 29 28 27 26 25 24 23 22 21 20 Number Selection: 0 - 1 4096 2048 1024 512 256 128 64 32 16 8 4 2 1

41

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Binary to Decimal

128

64

32

16

8

4

2

1

10101010

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Binary to Decimal

128 1

64 0

32 1

16 0

8 1

4 0

2 1

1 0

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Binary to Decimal

128 1

64 0

32 1

16 0 128 32 8 2 170

8 1

4 0

2 1

1 0

+

42

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Binary to Decimal

128 1

64 0

32 1

16 0 128 32 8 2 170 =

8 1

4 0

2 1

1 0

+ Binary 10101010

Decimal 170

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Decimal to Binary

4096 2048 1024 512 256 128 64 32 16 8 4 2 1 3482

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Decimal to Binary

4096 2048 1024 512 256 128 64 32 16 8 4 2 1 1 3482 - 2048 1434

43

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Decimal to Binary

4096 2048 1024 512 256 128 64 32 16 8 4 2 1 1 1 3482 1434 - 2048 - 1024 1434 410

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Decimal to Binary

4096 2048 1024 512 256 128 64 32 16 8 4 2 1 1 1 1 3482 1434 410 - 2048 - 1024 - 256 1434 410 154

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Decimal to Binary

4096 2048 1024 512 256 128 64 32 16 8 4 2 1 1 1 1 1 3482 1434 410 154 - 2048 - 1024 - 256 - 128 1434 410 154 26

44

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Decimal to Binary

4096 2048 1024 512 256 128 64 32 16 8 4 2 1 1 1 1 1 1 3482 1434 410 154 26 - 2048 - 1024 - 256 - 128 - 16 1434 410 154 26 10

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Decimal to Binary

4096 2048 1024 512 256 128 64 32 1 1 1 1 1 3482 1434 410 154 26 - 2048 - 1024 - 256 - 128 - 16 1434 410 154 26 10

16 8 4 2 1 1 10 -8 2

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Decimal to Binary

4096 2048 1024 512 256 128 64 32 1 1 1 1 1 3482 1434 410 154 26 - 2048 - 1024 - 256 - 128 - 16 1434 410 154 26 10

16 8 4 2 1 1 10 -8 2 1 2 -2 0

45

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Decimal to Binary

4096 2048 1024 512 256 128 64 32 1 1 1 0 1 1 0 0 3482 1434 410 154 26 - 2048 - 1024 - 256 - 128 - 16 1434 410 154 26 10

16 8 4 2 1 1 0 1 0 10 2 -8 -2 2 0

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Convert Decimal to Binary

4096 2048 1024 512 256 128 64 32 1 1 1 0 1 1 0 0 3482 1434 410 154 26 - 2048 - 1024 - 256 - 128 - 16 1434 410 154 26 10

16 8 4 2 1 1 0 1 0 10 2 -8 -2 2 0

Decimal 3482

=

Binary 110110011010

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Using the Calculator

Decimal 3482

=

Binary 110110011010

46

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Binary IP Addresses

Each of the 4 numbers in an IP Address is called an octet (8 bits). A bit is a 1 or a 0. Each octet can only have a number from 0 to 255 192.168.10.101

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Binary IP Addresses

128 1

64 1128 64 32 16 8 4 2 + 1 255

32 1

16 1

8 1

4 1

2 1

1 1

Binary 00000000 11111111

= =

Decimal 0 255

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Binary IP Addresses

128

64

32

16

8

4

2

1

192.168.10.101

47

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Binary IP Addresses

128 1

64 1

32 0

16 0

8 0

4 0

2 0

1 0

192.168.10.101 192 = 11000000

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Binary IP Addresses

128 1

64 0

32 1

16 0

8 1

4 0

2 0

1 0

192.168.10.101 192 = 11000000 168 = 10101000

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Binary IP Addresses

128 0

64 0

32 0

16 0

8 1

4 0

2 1

1 0

192.168.10.101 192 = 11000000 168 = 10101000 10 = 00001010

48

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Binary IP Addresses

128 0

64 1

32 1

16 0

8 0

4 1

2 0

1 1

192.168.10.101 192 = 11000000 168 = 10101000 10 = 00001010 101 = 01100101

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Binary IP Addresses

128

64

32

16

8

4

2

1

192.168.10.101 192 = 11000000 168 = 10101000 10 = 00001010 101 = 01100101 11000000.10101000.00001010.01100101

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Binary Subnet Masks

128 1

64 1

32 1

16 1

8 1

4 1

2 1

1 1

255.255.255.0 255 = 11111111 255 = 11111111 255 = 11111111 0 = 00000000 11111111.11111111.11111111.00000000

49

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Binary IP Address & Subnet Mask

192.168.10.101 255.255.255.0 11000000.10101010.00001010.01100101 11111111.11111111.11111111.00000000

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Internetworking

What is a Router? A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISPs network. Routers are located at gateways, the places where two or more networks connect, and are the critical device that keeps data flowing between networks and keeps the networks connected to the Internet. When data is sent between locations on one network or from one network to a second network the data is always seen and directed to the correct location by the router. They accomplish this by using headers and forwarding tables to determine the best path for forwarding the data packets, and the use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is a Router?

50

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is a Router?

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is a Default Gateway?

Computers can only communicate directly with other computers on the same network. The only way for a computer to communicate with a computer on a different network is through a router. (Internetworking) The Default Gateway represents the IP Address of a router that a computer uses to communicate outside of its network.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Simple Network:

51

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is Subnetting?

Subnetting is the process of taking a large network and dividing it into smaller networks to increase efficiency and manageability.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is Subnetting?

Example: Network Subnet Mask Subnet 1 Subnet 2 Subnet 3 Subnet Mask - 172.16.0.0 (65534 Hosts) - 255.255.0.0 - 172.16.1.0 (254 Hosts) - 172.16.2.0 (254 Hosts) - 172.16.3.0 (254 Hosts) - 255.255.255.0

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Classful vs. Classless Interdomain Routing (CIDR)

Problems with Classful IP Addressing Class A - 16,777,214 Hosts Class B - 65,534 Hosts Class C - 254 Hosts What do you do if you have 2,000 hosts? Pick Class B and waste 63,000+ addresses. Take 8 Class Cs and have cluttered routing table entries.

52

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Solution:

Classless Interdomain Routing (CIDR) with Variable Length Subnet Masks (VLSM) Decimal Subnet Mask: 255.255.255.0 Binary Subnet Mask: 11111111.11111111.11111111.00000000

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Variable Length Subnet Masks

11111111 255 11111110 254 11111100 252 11111000 248 11110000 240 11100000 224 11000000 192 10000000 128 00000000 0

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Subnetting with CIDR & VLSM

If we start with 255.255.0.0, but want to divide into smaller networks we need to take bits from the Host ID and move them into the Network ID.

53

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Formulas

Number of Subnets: 2n n = Number of 1s in the Subnet ID Number of available host addresses: 2n 2 n = Number of 0s in the Host ID Host ID cannot be all 0s or all 1s Example: 11111111.11111111.11111000.00000000 25 = 32 Subnets 211 2 = 2046 Available hosts in each subnet

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Simple Network:

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Simple Bad Network:

54

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Why wont my network work?

Client - 192.168.10.101 Server - 192.168.10.201 Router - 192.168.10.200 SM - 255.255.255.248 We need to look at everything in binary: 11000000.10101000.00001010.01100101 11000000.10101000.00001010.11001001 11000000.10101000.00001010.11001000 11111111.11111111.11111111.11111000

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

How can we fix my network?

With a subnet mask of 255.255.255.248 each network will be broken into blocks of 6 host addresses: Example:11000000.10101000.00001010.00000000 192.168.10.0 11000000.10101000.00001010.00000001 11000000.10101000.00001010.00000010 11000000.10101000.00001010.00000011 11000000.10101000.00001010.00000100 11000000.10101000.00001010.00000101 11000000.10101000.00001010.00000110 11000000.10101000.00001010.00000111 192.168.10.1 192.168.10.2 192.168.10.3 192.168.10.4 192.168.10.5 192.168.10.6 192.168.10.7

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

How can we fix my network?

With a subnet mask of 255.255.255.248 each network will be broken into blocks of 6 host addresses: Example:11000000.10101000.00001010.00000000 192.168.10.0 11000000.10101000.00001010.00000001 192.168.10.1 11000000.10101000.00001010.00000010 192.168.10.2 11000000.10101000.00001010.00000011 192.168.10.3 11000000.10101000.00001010.00000100 192.168.10.4 11000000.10101000.00001010.00000101 192.168.10.5 11000000.10101000.00001010.00000110 192.168.10.6 11000000.10101000.00001010.00000111 192.168.10.7 Network ID: 192.168.10.0 Host IDs: 192.168.10.1 192.168.10.6 Broadcast ID: 192.168.10.7

55

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

How can we fix my network?

With a subnet mask of 255.255.255.248 each network will be broken into blocks of 6 host addresses: Example:11000000.10101000.00001010.00001000 192.168.10.8 11000000.10101000.00001010.00001001 192.168.10.9 11000000.10101000.00001010.00001010 192.168.10.10 11000000.10101000.00001010.00001011 192.168.10.11 11000000.10101000.00001010.00001100 192.168.10.12 11000000.10101000.00001010.00001101 192.168.10.13 11000000.10101000.00001010.00001110 192.168.10.14 11000000.10101000.00001010.00001111 192.168.10.15 Network ID: 192.168.10.8 Host IDs: 192.168.10.9 192.168.10.14 Broadcast ID: 192.168.10.15

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

How can we fix my network?

With a subnet mask of 255.255.255.248 each network will be broken into blocks of 6 host addresses: Example:11000000.10101000.00001010.00000000 192.168.10.0 11000000.10101000.00001010.00000001 192.168.10.1 11000000.10101000.00001010.00000010 192.168.10.2 11000000.10101000.00001010.00000011 192.168.10.3 11000000.10101000.00001010.00000100 192.168.10.4 11000000.10101000.00001010.00000101 192.168.10.5 11000000.10101000.00001010.00000110 192.168.10.6 11000000.10101000.00001010.00000111 192.168.10.7 Network ID: 192.168.10.0 Host IDs: 192.168.10.1 192.168.10.6 Broadcast ID: 192.168.10.7

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Simple Network (Fixed):

56

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

CIDR Notation

Without CIDR Notation 192.168.10.1 255.255.255.248 With CIDR Notation 192.168.10.1/29

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Fundamentals of IPv6

Disadvantages of IPv4 IPv6 Solutions IPv6 Addressing Types of IPv6 Addresses

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Disadvantages of IPv4

Not Enough Addresses Cluttered the Internet Routing Tables Difficult to Configure Security is Optional

57

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

IPv6 Solutions

Plenty of Addresses - 3.4 x 1038 Simplified the Internet Routing Tables Easy and Automated Configuration Security is Required

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

IPv6 Addressing

128 bits long 11111110100000000000000000000000000000000000000000000000000000 000000010111101110000000001111111100000010001110000100011110110001

Displayed in 16 bit hexadecimal blocks FE80:0000:0000:0000:05EE:00FF:0238:47B1 Simplify by suppressing the leading 0s FE80:0:0:0:5EE:FF:238:47B1 Further compress by expressing a single contiguous set of 0 blocks into :: FE80::5EE:FF:238:47B1

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Types of IPv6 Addresses

Unicast (One to One) Global Addresses Link-Local Addresses - FE 80 FE80 Unique Local Addresses - FC or FD Multicast (One to Many) Anycast (One to One of Many)

58

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

After watching this video you should be able to:

Describe the TCP/IP Protocol Suite. Explain what an IP address is and decide on an address range appropriate for a network. Convert IP addresses from decimal to binary and from binary to decimal. Explain what a Router is and how we connect networks together. Explain Subnetting and decide when to use Classful vs. Classless Interdomain Routing. Describe the fundamentals of IPv6.

Video 7 TCP/IP Protocols

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

FTP TFTP HTTP HTTPS NTP POP3 IMAP4 SMTP

DHCP DNS Telnet SSH SNMP SIP RTP TLS

59

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

FTP

The File Transfer Protocol provides connection oriented file transfer between a client and a server. It was originally used to transfer files between UNIX systems, and is now the most popular file transfer protocol on the Internet. FTP uses TCP port 21 for control and TCP port 20 for data transport.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

TFTP

The Trivial File Transfer Protocol provides connectionless file transfer functions. TFTP is a simple and small protocol, which makes it suitable for transferring small amounts of data. It is primarily used for updating devices such as routers and switches. Another common use is transferring the data required to boot a diskless system over the network. TFTP uses UDP port 69.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

HTTP

The Hypertext Transfer Protocol was originally designed for transferring World Wide Web documents and has been extended to transfer other types of files as well. Its most common use is transferring web pages between a web browser and a web server. HTTP uses TCP port 80 by default.

60

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

HTTPS

HTTPS is used in exactly the same way as the HTTP protocol. The difference is that HTTPS uses SSL (Secure Sockets Layer) to send data in an encrypted form and to authenticate the server. For example, when you buy something online using a credit card. HTTPS uses TCP port 443 by default.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

NTP

The Network Time Protocol is used to provide accurate time synchronization by synchronizing the time of a computer to a reference time source, such as an NTP server, a radio or a satellite receiver. NTP is capable of synchronizing distributed clocks to the millisecond. NTP uses UDP port 123.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

POP3

The Post Office Protocol is used to retrieve email. POP3 can be used to access the Inbox folder only. POP3 clients connect to TCP port 110.IMAP4

The Internet Message Access Protocol is also used to retrieve email. Unlike POP3, IMAP4 can be used to access all server-based messaging folders thereby eliminating the need for a local repository. IMAP4 clients connect to TCP port 143.

61

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

SMTP

The Simple Mail Transfer Protocol is used for sending email to and between email servers. SMTP uses TCP port 25.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

DHCP

The Dynamic Host Configuration Protocol is used for assigning dynamic IP addresses to devices on a network. DHCP simplifies network administration by keeping track of IP addresses in a database rather than an administrator having to manage and assign them manually. DHCP uses UDP ports 67 & 68.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

DNS

The Domain Naming System is a standard name service that allows your computer to register and resolve domain names. DNS uses TCP port 53 for zone transfers and UDP port 53 for lookups.

62

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Telnet

Telnet is a terminal emulation protocol that allows remote access to a system. Telnet can also refer to software which can be used by a client to remotely connect to and configure operating systems and network devices. Telnet uses TCP port 23.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

SSH

Secure Shell can be used to provide similar functionality as Telnet, but is much more secure. Telnet is considered insecure mainly because it sends username and password information in clear text. Therefore, Telnet should be replaced with SSH. SSH employs encryption through certificates and authenticates the server to the client. SSH operates on TCP port 22.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

SNMP

The Simple Network Management Protocol is used for network management. It works by having network devices, acting as agents, collecting information and providing that information to SNMP managers. SNMP uses UDP port 161.

63

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

SIP

The Session Initiation Protocol can establish, modify and terminate multimedia sessions or calls. Examples of multimedia sessions include multimedia conferences, distance learning, and Internet telephony.RTP

The Real-Time Transport Protocol provides end-toend network transport functions suitable for applications transmitting real-time data such as audio, video or simulation data, over multicast or unicast network services.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

TLS

Transport Layer Security is a protocol for establishing a secure connection between a client and a server. TLS is capable of authenticating both the client and the server creating an encrypted connection between the two. TLS is considered to be a replacement for SSL (Secure Sockets Layer).

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

After watching this video you should be able to:

Describe what some of the various TCP/IP Protocols are and when they would be used. List the commonly used TCP and UDP ports.

64

Video 8 Network Devices

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

Modem/NIC Repeater/Hub Bridge/Switch Router Firewall/Proxy Server Wireless Access Point Basic DHCP Server/DNS Server CSU/DSU Load Balancer/Bandwidth Shaper

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Modem

Modems are used for dial-up connections over standard analog telephone lines. They can be integrated onto a systems motherboard, an internal expansion card, or an external peripheral device.NIC

Network Interface Cards are used to connect systems to physical network media. They can be integrated onto a systems motherboard or an internal expansion card.

65

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Repeater

Repeaters are used to help deal with attenuation issues. A repeater will take a signal in on one port and retransmit it out the other.Hub

Hubs are basically multiport repeaters. A hub will take a signal in on one port and forward it on to all other ports.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Bridge

Bridges operate at the Data Link layer of the OSI model. Bridges have simplistic routing tables based on MAC addresses. Bridges are used to create separate collision domains.Switch

Switches are basically multiport bridges. Switches can be used so each computer resides in its own collision domain.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Router

Routers are used to connect networks together. Routers have sophisticated routing tables which can determine the best route to get information from one network to another. Routers function at the Network layer of the OSI model. Routers are used to create separate broadcast domains.

66

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Different Types of Switches

A Multilayer Switch functions at the Data Link layer of the OSI model just like a regular switch, but also provides additional functionality at higher OSI layers. A Content Switch is an example of a Multilayer Switch which is used to distribute incoming requests to servers that can handle the data in the packets. The Content Switch will inspect the network data and then decide where it should be forwarded to.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Advanced Switch Functionality

Power over Ethernet (PoE) is used to transfer electrical power, along with data, over standard twisted pair cable. The Spanning Tree Algorithm (STA) is used by switches to determine the best route when there is more than one connection to a node. Virtual LANs (VLANs) can be created in order to emulate multiple broadcast domains using switches. Trunking is when a switch presents more than one VLAN configuration over a single connection to another switch or a router. Port Mirroring is used to send a copy of network data to a second (mirrored) connection usually for the purposes of monitoring. Port Authentication is used to restrict access based upon authentication information. Typically used in 802.1x network.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Firewall Firewalls are used to protect private networks from external intrusion. Firewalls can control what data is allowed in or out of a network. Firewalls can be created with hardware or software.Proxy Server

Proxy Servers serve 3 main purposes. Disguise an end users actual identity using NAT. Cache requests to save bandwidth. Control content permitted to be requested from the Internet.

67

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Wireless Access Point

A Wireless Access Point (WAP) is basically the same thing as a hub, but the connections are made via the airwaves rather than cable.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Basic DHCP Server

DHCP is a TCP/IP service used to dynamically assign IP addresses on a network. A DHCP server is responsible for managing the pool of IP addresses available to be used on the network. Some network devices have basic DHCP server functionality built into them.DNS Server

DNS is a TCP/IP service used to resolve host names to IP addresses. A DNS server is responsible for maintaining a hierarchical directory of names in a database and respond to client requests for name resolution.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

CSU/DSU

A Channel Service Unit/Data Service Unit is a hardware device which converts data frames used on a LAN into data frames used on a WAN. Typically a CSU/DSU will be used to connect a T1 line to a local network.

68

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Load Balancer

Load balancers are used when there are more than on line of communication available. Load balancers help to divide communication evenly between the different communication lines.Bandwidth Shaper

Bandwidth shapers are very similar to load balancers in that they are used to help make communication more efficient. The difference is that bandwidth shapers provide a much higher level of control over what data gets sent where and when.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

After watching this video you should be able to:

Describe what some of the various network devices are and when they would be used.

Video 9 Routing

69

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

Understanding Routing Tables Static vs. Dynamic Routing Routing Protocols Distance Vector Routing Link State Routing What is Convergence? IGP vs. EGP

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Understanding Routing Tables

Routing tables are used by network devices in order to determine where a packet should be sent in an attempt to get it routed to its final destination.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Static vs. Dynamic Routing

Static Routing All routers have to have their routing table configured and updated manually. Dynamic Routing Routers communicate with each other to share their routing information with each other.

70

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Hi! Im a router! I am attached to Network A over here and Network B over here.

A

B

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

AB

I have been pre-configured with this information, but that is all I know right now.

A

B

71

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A

AB

Hi there! Im a router too! I not only know about Network A, but the other side of me is connected to Network C.

C

A

B

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A1 Hop -

AB C

Great, I will keep that in mind if anyone over here is looking for Network C.

C

A

B

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A1 Hop -

AB C

And as long as we are sharing information, did you know that I am also connected to Network B?

C

A

B

72

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop

1 Hop -

AB C

No I didnt, but I will make a note of that for future reference.

C

A

B

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop

1 Hop -

AB C

B D,E

Hello. Im also a router. Not only am I connected to Network B, but the other side of me is connected to Networks D & E.

C

A

B

D E

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop

1 Hop -

AB C D- 1 Hop E - 1 Hop

B D,E

Awesome, I will keep that in mind if anyone over here is looking for those networks.

C

A

B

D E

73

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop

1 Hop -

AB C D- 1 Hop E - 1 Hop

B D,E

As long as we are sharing information, I am also connected to Network A?

C

A

B

D E

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop

1 Hop -

AB C D- 1 Hop E - 1 Hop

1 Hop -

B D,E A

Good to know.

C

A

B

D E

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop

1 Hop -

AB C D- 1 Hop E - 1 Hop

1 Hop -

B D,E A

And here is something really cool! On the other side of Network A is another router.

C

A

B

D E

74

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop

1 Hop -

AB C D- 1 Hop E - 1 Hop

1 Hop -

B D,E A

No way!!!

C

A

B

D E

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop

1 Hop -

AB C D- 1 Hop E - 1 Hop

1 Hop -

B D,E A

Yes way, and that router is also connected to Network C.

C

A

B

D E

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop

1 Hop -

AB C D- 1 Hop E - 1 Hop

B D,E A 2 Hops - C1 Hop -

Cool, I will update my information.

C

A

B

D E

75

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop

1 Hop -

AB C D- 1 Hop E - 1 Hop

B D,E A 2 Hops - C1 Hop -

Hey you, the router on Network A! I just found out about another router on Network B.

C

A

B

D E

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop

1 Hop -

AB C D- 1 Hop E - 1 Hop

B D,E A 2 Hops - C1 Hop -

Yeah, so what.

C

A

B

D E

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop

1 Hop -

AB C D- 1 Hop E - 1 Hop

B D,E A 2 Hops - C1 Hop -

Well, that router is also connected to Networks D & E. Just thought you might want to know.

C

A

B

D E

76

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop D- 2 2 Hops E -HopsHey, that is good information. Thanks.

1 Hop -

AB C D- 1 Hop E - 1 Hop

B D,E A 2 Hops - C1 Hop -

C

A

B

D E

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop D- 2 2 Hops E -Hops

1 Hop -

AB C D- 1 Hop E - 1 Hop

B D,E A 2 Hops - C1 Hop -

All 3 router are now completely aware of all 5 networks.

C

A

B

D E

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

C A B - 1 Hop D- 2 2 Hops E -Hops

1 Hop -

AB C D- 1 Hop E - 1 Hop

B D,E A 2 Hops - C1 Hop -

And they all lived happily ever after. THE END

C

A

B

D E

77

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Routing Protocols

Distance Vector Routing Each router communicates all the networks it knows about to the other routers to which it is directly attached. Communication takes place on a regular basis. Link State Routing Each routers builds a map of the entire network. LSAs (Link State Advertisements) are used to communicate information about networks they are connected to. Communication only takes place when a change has been made.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Distance Vector Protocols

RIP (Routing Information Protocol) Maximum 15 hops. Originally had updates sent every 30 seconds. Does not support authentication. Uses broadcast communication. RIPv2 Maximum 15 hops. Supports authentication. Uses multicast communication. BGP (Border Gateway Protocol) Core routing protocol of the Internet. Typically used by ISPs.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Link State Protocols

OSPF (Open Shortest Path First) Used in medium to large networks. Bases its paths off link states. Can also use cost metrics to give preference to certain paths. IS-IS (Intermediate System to Intermediate System) Intermediate system is another name for a router. Originally designed with the OSI model.

78

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Hybrid Routing Protocols

EIGRP (Enhanced Interior Gateway Routing Protocol) Evolved from IGRP. Uses the Diffusing-Update Algorithm (DUAL). Each router keeps a copy of its neighbors routing tables. Each router periodically sends out a hello packet to keep track of the state of its neighbors.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What is Convergence?

When changes are made to a network every router on the network will need to make the appropriate changes to their routing tables in order to accommodate the changes. This could be the addition or deletion of a router or could simply be a change in metrics for a path. Convergence is the process of all routers becoming aware of changes to a network.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

IGP vs. EGP

IGP (Interior Gateway Protocol) A routing protocol used to exchange information between routers within a LAN. EGP (Exterior Gateway Protocol) A routing protocol used to route information outside a local network, typically out to the Internet.

79

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

After watching this video you should be able to:

Explain what a routing table is and know how to read one. Explain the differences between static and dynamic routing. Describe the difference between Link State and Distance Vector routing protocols. Explain the differences between Interior and Exterior routing protocols.

Video 10 Wireless Networking

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

Benefits of Wireless Networking Components of a Wireless Access Point (WAP) Where to Place a WAP Wireless Networking Standards How to Secure a Wireless Network Setting up a Wireless Access Point

80

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Benefits of Wireless Networking

No More Cables!!! Easier to install. Connect networks through walls and other obstacles. Quickly allow temporary access. Equally secure???

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Components of a Wireless Access Point

BSS (Basic Service Set) ESS (Extended Service Set) SSID (Service Set Identifier) ESSID (Extended Service Set Identifier) BSSID (Basic Service Set Identifier) BSA (Basic Service Area)

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Where to Place a WAP

The placement of your WAP is very important. There are many factors which will help you determine where to place your WAP. Where are the wireless clients located? How far can the WAP send and receive its signals? Are you using a directional antenna? Do you need to prevent certain areas from receiving the wireless signal?

81

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Wireless Networking Standards 802.11a Uses the 5GHz frequency. Data rates up to 54Mbps. Ranges less than 100 feet and easily obstructed. 802.11b Uses the 2.4GHz frequency. Data rates up to 11Mbps. Ranges up to 300 feet outdoors and 100 feet indoors. 802.11g Uses the 2.4GHz frequency. Data rates up to 54Mbps. Ranges up to 300 feet outdoors and 100 feet indoors. 802.11n Uses both the 2.4GHz and 5GHz frequencies. Data rates up to 100Mbps. Ranges up to 1000 feet.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

RF Channels used by 802.11 b/g

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

RF Channels used by 802.11a

82

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

How to Secure a Wireless Network

Disable SSID Broadcast If attackers do not see the presence of a WAP then they may think there is no wireless network to attack. MAC Filtering You can specify what computers can connect to your WAP based upon the MAC address of their wireless network card.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

How to Secure a Wireless Network

WEP (Wired Equivalency Privacy) It was used in the early stages of wireless networking. It is very easy to configure. It provides encryption for all data transmitted over the wireless network. It originally used a 40 bit encryption key, but later advanced to using 128 bit encryption. It was later found to be very easily cracked.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

How to Secure a Wireless Network

WPA (Wi-Fi Protected Access) Designed as an improvement to WEP. It utilizes TKIP which uses a hashing algorithm to scramble the encryption keys. It uses the Extensible Authentication Protocol (EAP) which is based off public-key encryption technology which is a much more secure way to verify authorized network users.

83

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

How to Secure a Wireless Network

802.1x Requires the use of Certificates and RADIUS. Certificates can be used to provide a higher level of authentication of the user and/or computer attempting to connect. A RADIUS server is used to centralize the connection requests to the wireless network.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Setting up a Wireless Access Point

Lets go take a look

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

After watching this video you should be able to:

Explain the benefits of using wireless networking. Describe the components of a wireless access point (WAP). Describe the different wireless networking standards. Know how to secure a wireless network. Install a wireless access point.

84

Video 11 Networking Command Line Tools

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

IPCONFIG/IFCONFIG/ARP PING/ARP PING TRACERT/TRACEROUTE MTR NETSTAT/NBTSTAT/ROUTE NSLOOKUP/DIG/HOST

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

IPCONFIG/IFCONFIG/ARP

IPCONFIG Used to view TCP/IP configuration in the Windows operating system. IFCONFIG Used to view TCP/IP configuration in the Unix, Linux, and Macintosh operation systems. ARP Used to view and manage the ARP cache.

85

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

PING/ARP PING

PING Used to check connectivity between networking devices. ARP PING Used to check connectivity between networking devices using their MAC addresses. Can only be used within a single subnet. Requires a 3rd party utility.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

TRACERT/TRACEROUTE

The TRACERT command is used in the Windows operating system to view the entire path a packet takes to get from one device to another. Unix, Linux, and Macintosh operating systems have a similar utility called TRACEROUTE.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

MTR

The MTR utility is used by the Unix and Linux operating systems to view the entire path a packet takes to get from one device to another while also displaying additional statistics about each node along the way. The Windows operating system has a utility called PATHPING which does basically the same thing. It is kind of like taking PING and TRACERT and putting them together to create a more powerful utility.

86

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

NETSTAT/NBTSTAT/ROUTE

NETSTAT Used to display TCP/IP statistics and connections. NBTSTAT Used to display NetBIOS statistics to assist in troubleshooting name resolution issues. ROUTE Used to display and manage the routing table.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

NSLOOKUP/DIG/HOST

NSLOOKUP Used by the Windows operating system to troubleshoot DNS name resolution issues. It has both interactive and non-interactive modes. DIG Used by the Unix, Linux, and Macintosh operating systems for the same purpose. NSLOOKUP can also be used in these operating systems, but DIG is considered to be more powerful. It does not have an interactive mode. HOST Used by the Unix and Linux operating system to do reverse lookups on an IP address. NSLOOKUP is used for this purpose in Windows.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Working with Networking Command Line Tools

Lets go take a look

87

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

After watching this video you should be able to:

Describe what some of the various network command line tools are and when they would be used.

Video 12 Network Performance Optimization

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

Reasons Uptime Latency Sensitivity High Bandwidth Applications QoS Traffic Shaping Load Balancing Fault Tolerance Caching Engines

88

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Reasons

Uptime A measure of time that a network is running. It is the opposite of downtime. Different business solutions require different levels of uptime. Latency Sensitivity Some applications require very quick delivery (low latency) of data in order to be effective. High Bandwidth Applications Certain applications require the availability of a high level of bandwidth to transfer large quantities of data.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

QoS

Quality of Service (QoS) is a strategy used to control the flow of network traffic. With QoS administrators can provide preferential delivery for the applications which need it.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Traffic Shaping

One of the methods administrators use to ensure QoS is traffic shaping. Traffic Shaping is used to enforce the control of network traffic. Generally traffic should be shaped based upon different priority factors. Examples: Users Applications Time of Day

89

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Load Balancing

Load balancing is a general term which defines the use of more than one (insert variable) to provide a service. Client needs are satisfied by the first available (insert variable). Sometimes client needs can be satisfied by all available (insert variable). Variables: Servers Hard Drives Transmission Lines

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Fault Tolerance

If something is fault tolerant then it means that in the event of a failure(fault) it will continue to function(tolerance). Fault tolerance can and should be implemented at all levels of a network: Hard Drives Power Supply Network Adapters Servers Routers Network Links

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

RAID

RAID 0 Disk Striping RAID 1 Disk Mirroring and Duplexing RAID 5 Disk Striping with Parity

90

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Caching Engines

Caching engines are used to store information so it does not have to be retrieved off the network multiple times. A proxy server is an example of a caching engine.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

After watching this video you should be able to:

Describe why it is important to have an optimized network. Explain how an administrator can use QoS and traffic shaping to keep control over the flow of network traffic. Explain how load balancing and fault tolerance are used to keep network services highly available. Describe what a caching engine is.

Video 13 Network Tools

91

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

Cable Strippers Snips Crimpers Punch Down Tool Cable Testers/Certifiers TDR/OTDR Toner Probe Voltage Event Recorder Multimeter Protocol Analyzer Temperature Monitor Butt Set

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Cable Strippers

Cable strippers are used to strip off the outer insulation of a cable when getting it ready for a connector.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Snips

Snips are used to cut cables.

92

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Crimpers

Crimpers are used to attach a connector on the end of a cable.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Punch Down Tool

A punch down tool is used to connect wire to a punch down block.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Cable Testers/Certifiers

Cable testers are used to test whether a cable is working properly. Certifiers are used to test and validate whether a cable is ready to handle certain levels of throughput.

93

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

TDR/OTDR

A Time Domain Reflectometer (TDR) is used to check the continuity of a copper cable. An Optical Time Domain Reflectometer (OTDR) is used to check the continuity of a fiber optic cable. These tools can be used to help locate where there is a break in the cable.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Toner Probe

A toner probe is used to locate the end of a cable. It is made up of 2 components, a tone generator and a probe.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Voltage Event Recorder

A voltage event recorder is used to monitor the quality of the power coming from a wall outlet.

94

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Multimeter

A multimeter is used to test a variety of information about cables, connectors and outlets.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Protocol Analyzer

A protocol analyzer is used to analyze network protocols.Temperature Monitor

A temperature monitor is used to monitor the temperature and humidity of a server room and alert an administrator if there is a drastic change.Butt Set

A butt set is used to allow an administrator to butt in to a communication line.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

After watching this video you should be able to:

Describe what some of the various network tools are and when they would be used.

95

Video 14 Network Monitoring

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

Network Monitoring Utilities Packet Sniffers Port Scanners IDS/IPS System Logs Event Logs History Logs

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Network Monitoring Utilities

There are many reasons for monitoring a network. Performance Maintenance Security There are many different utilities which can be used to monitor a network. Packet Sniffers Port Scanners IDS/IPS

96

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Packet Sniffers

Packet sniffers can be either hardware or software. They are used to capture and listen to transmissions which are travelling on a network. They can be used to help find vulnerabilities in a network and notify you of a possible intrusion.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Port Scanners

Port scanners are used to look for open ports on a network or a system. Typically port scanning is done through software. Port scanners are used by administrators and attackers to recognize potential vulnerabilities.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

IDS/IPS

Intrusion Detection Software(IDS) Used to watch for network patterns which could represent an attack on a system or network. A log is maintained and/or an administrator can be notified. Intrusion Prevention Software(IPS) Generally has all the capability of IDS. It is also designed to automatically attempt to stop the attack along with notifying an administrator.

97

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

System Logs

System logs maintain information about all system related events.Event Logs

Event logs maintain events which take place on a system.History Logs

History logs maintain a history of events which take place on a system or network.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Working with Logs

Lets go take a look

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

After watching this video you should be able to:

Describe the purpose of using network monitoring utilities. Describe the purpose of logging.

98

Video 15 Documentation

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

Why is documentation so important? What should I document? Wiring Schematics Physical and Logical Network Diagrams Baselines Network Policies Network Procedures Network Configurations Regulations

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Why is documentation so important?

Training It is easier to train new administrators when there is good documentation available to them familiarize themselves with the environment. Troubleshooting Most problems occur more than once. It is easier to reference documentation than to troubleshoot the same problem repeatedly. Reporting It is easier to justify your work and solidify your purpose when you have good documentation to give to your superiors.

99

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

What should I document?

Everything!!!!!Hardware Software Network Topology Wiring Layout Server Configuration Network Services Network Procedures

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Wiring Schematics

Wiring schematics become increasingly important as a network grows. They need to be complex enough to thoroughly explain the entire network while simple enough for a new administrator to understand.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Physical and Logical Network Diagrams

100

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Baselines

Baseline readings are an integral component to maintaining optimal network performance. These readings are typically taken when the network is functioning normally. When there is a performance problem on the network new performance readings are taken and need to be compared against the original baseline readings. New baseline readings should be taken periodically to help recognize trends in changes to network performance.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Network Policies

Network policies are used to establish rules and guidelines regarding network usage and conduct. It is very important to review and modify these policies as the network and business needs change. Examples: Network Usage Policy Internet/Email Usage Policy External Software Policy

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Network Procedures

Network procedures are used to establish how networking tasks are to be performed. There are many procedures that a network administrator is responsible for doing. Having good documentation of these procedures will help guide an administrator in appropriately managing the network.

101

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Network Configuration

It is very important to not only have wiring schematics, physical, and logical network diagrams, but to also have detailed configuration documentation of all significant networking devices on a network.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Regulations

Regulations are very similar to policies in the sense that they establish rules and guidelines. The difference is that policies are created within an organization and regulations are the actual legalities which are created by the government.

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

After watching this video you should be able to:

Explain the importance of having good documentation? Recognize and understand wiring schematics, physical, and logical network diagrams. Describe the purpose of using baselines. Create network policies, procedures, and configuration documentation. Understand the importance of following regulations.

102

Video 16 Troubleshooting

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video The Process of Troubleshooting Gather Information. Whos affected? Whats Changed? Why is this happening? Can I handle it? Find a solution. Try it. See if it worked. DOCUMENT EVERYTHING!!! Common Issues Physical Issues Logical Issues Issues to Escalate Wireless Issues

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

The Process of Troubleshooting

Gather Information. Whos affected? Whats Changed? Why is this happening? Can I handle it? Find a solution. Try it. See if it worked. DOCUMENT EVERYTHING!!!

103

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Common Issues

Physical Issues Crosstalk Near End Crosstalk (NEXT) Far End Crosstalk (FEXT) Attenuation Collisions Shorts Open Impedance Mismatch (echo) Interference

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Common Issues

Logical Issues Port Speed Port Duplex Mismatch Incorrect VLAN Incorrect IP Address Wrong Gateway Wrong DNS Wrong Subnet Mask

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Common Issues

Issues to Escalate Switching Loop Routing Loop Route Problems Proxy ARP Broadcast Storms

104

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Common Issues

Wireless Issues Interference Incorrect Encryption Incorrect Channel Incorrect Frequency ESSID Mismatch Standard Mismatch (802.11 a/b/g/n) Distance Bounce Incorrect Antenna Placement

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

After watching this video you should be able to:

Effectively troubleshoot network problems. Describe common connectivity issues.

Video 17 Network Security

105

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

In this video

Firewalls Other Security Devices Network Access Security Filtering Tunneling and Encryption Remote Access Protocols User Authentication Device Security Common Security Threats

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Firewalls

Firewalls are used to control the flow of data. They can be either network based or host based. Different types of firewalls function at different layers of the OSI model. Application layer firewalls have added functionality such as: Stateful Inspection Scanning Services Content Filtering Signature Identification Firewalls can also be used to create perimeter networks (DMZ).

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Firewalls

106

Basic Networking FundamentalsTrain Signal, Inc. Ed Liberman

Other Security Devices

An Intrusion Detection System(IDS) is used to help an administrator recognize a possible attack on a network or system. An Intrusion Prevention System(IPS) has similar functionality to an IDS, but will actively make changes to lock down the network or system if a potential intrusion is present. A VPN concentrator is basically a hardware based VPN server. It is used to setup a secure VPN connection with the remote client before passing them on through to the internal network.

Basic Networking FundamentalsTrain Sign