Local Area Networks (LANs) Welcome • Introductions – Instructor – Class members • Facility layout – Restrooms – Lunch Copyright 2012 CCNT® Certificate Program • Telecommunications and IT professionals are increasingly expected to understand data networking as well as telecom and computer telephony, collectively known as "convergent technologies" • CCNT (Certified in Convergent Network Technologies) is an industry-standard training and certificate program that teaches and validates the prerequisite knowledge required to pursue careers selling, servicing and installing convergent technologies Copyright 2012 How to Earn a CCNT Credential • To earn this industry-valued credential, you must pass six competency tests: – Basic Telecommunications – Basic Data Communications – Computer-Telephone Integration (CTI) Essentials – Local Area Networks (LANs) – Broadband Technologies – Voice over IP (VoIP) Essentials Copyright 2012 Local Area Networks (LANs) Course Lessons Lesson 1: Overview of Local Area Networks Lesson 2: Wide Area Networks (WANs) Lesson 3: Networking and the Internet Lesson 4: LAN Topologies Lesson 5: Networking Models, Traffic and Devices Lesson 6: Transmission Media Lesson 7: LAN Standards, Wireless Networking and Name Resolution Lesson 8: Network Management Copyright 2012 Lesson 1 Pre-Assessment Questions 1. In a centralized computing model, what is situated at the center of the network? a. A node b. A host c. A mainframe d. A client 2. There is no centralized management of network resources in which type of network? a. A peer-to-peer network b. A server-based network c. A mainframe network d. A domain-based network 3. What are two characteristics that describe a local area network (LAN)? Copyright 2012 Lesson 1 • • • • • • • • • • Defining a Network Evolution of Networking Models Modern Configurations Introduction to Local Area Networks (LANs) Essential LAN Elements Proprietary Protocols vs. Open Standards Addressing on the LAN Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) Private IP Addresses Copyright 2012 Defining a Network Figure 1-1: A sample network Copyright 2012 Lesson 1 • • • • • • • • • • Defining a Network Evolution of Networking Models Modern Configurations Introduction to Local Area Networks (LANs) Essential LAN Elements Proprietary Protocols vs. Open Standards Addressing on the LAN Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) Private IP Addresses Copyright 2012 Evolution of Networking Models Figure 1-2: Mainframe model Copyright 2012 Lesson 1 • • • • • • • • • • Defining a Network Evolution of Networking Models Modern Configurations Introduction to Local Area Networks (LANs) Essential LAN Elements Proprietary Protocols vs. Open Standards Addressing on the LAN Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) Private IP Addresses Copyright 2012 Server-Based Networks Figure 1-3: Server-based network Copyright 2012 Peer-to-Peer Networks Figure 1-4: Peer-to-peer network Copyright 2012 Lesson 1 • • • • • • • • • • Defining a Network Evolution of Networking Models Modern Configurations Introduction to Local Area Networks (LANs) Essential LAN Elements Proprietary Protocols vs. Open Standards Addressing on the LAN Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) Private IP Addresses Copyright 2012 Introduction to Local Area Networks (LANs) Figure 1-5: Local area network (LAN) Copyright 2012 Lesson 1 • • • • • • • • • • Defining a Network Evolution of Networking Models Modern Configurations Introduction to Local Area Networks (LANs) Essential LAN Elements Proprietary Protocols vs. Open Standards Addressing on the LAN Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) Private IP Addresses Copyright 2012 Network Interface Card (NIC) Figure 1-6: Network interface card (NIC) Copyright 2012 Wired Connections Figure 1-7: Home network example Copyright 2012 Wired Connections (cont'd) Figure 1-8: Small LAN Copyright 2012 Lesson 1 • • • • • • • • • • Defining a Network Evolution of Networking Models Modern Configurations Introduction to Local Area Networks (LANs) Essential LAN Elements Proprietary Protocols vs. Open Standards Addressing on the LAN Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) Private IP Addresses Copyright 2012 Lesson 1 • • • • • • • • • • Defining a Network Evolution of Networking Models Modern Configurations Introduction to Local Area Networks (LANs) Essential LAN Elements Proprietary Protocols vs. Open Standards Addressing on the LAN Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) Private IP Addresses Copyright 2012 MAC Addresses Figure 1-9: MAC address Copyright 2012 Lesson 1 • • • • • • • • • • Defining a Network Evolution of Networking Models Modern Configurations Introduction to Local Area Networks (LANs) Essential LAN Elements Proprietary Protocols vs. Open Standards Addressing on the LAN Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) Private IP Addresses Copyright 2012 Lesson 1 • • • • • • • • • • Defining a Network Evolution of Networking Models Modern Configurations Introduction to Local Area Networks (LANs) Essential LAN Elements Proprietary Protocols vs. Open Standards Addressing on the LAN Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) Private IP Addresses Copyright 2012 IPv4 vs. IPv6 Addresses Figure 1-10: IPv6 address portions Copyright 2012 Lesson 1 • • • • • • • • • • Defining a Network Evolution of Networking Models Modern Configurations Introduction to Local Area Networks (LANs) Essential LAN Elements Proprietary Protocols vs. Open Standards Addressing on the LAN Internet Protocol version 4 (IPv4) Internet Protocol version 6 (IPv6) Private IP Addresses Copyright 2012 Lesson 1 Review 1. What are the main architectural components of a LAN? 2. Describe the function and characteristics of a network operating system (NOS) Copyright 2012 Lesson 1 Application Project Consider the following situation… • Ilsa and her husband Edouard have both been given the option to work at home • They want to set up one room in their house as a shared office • Both require Internet access, e-mail, and access to a printer/scanner • They currently have a cable Internet connection in their home Copyright 2012 Lesson 1 Application Project (cont'd) Now answer the following questions… • What will their home network look like? • Can they set up a peer-to-peer network, or will they require a server-based network? • Will they be able to share their Internet access and their printer? • What type of additional equipment, if any, might they need to purchase? • What factors will affect their home networking decisions? Copyright 2012 Activity 1-1: Reviewing networking terminology Match each term with the correct definition 1. hexadecimal 2. IP address A. A central connection point for wireless network clients B. A central connection location for incoming and outgoing lines of a LAN 3. MAC address C. A base-16 numbering system that uses the digits 0 through 9 and the letters A through F 4. wireless access point (AP) D. A permanent address burned into a network interface card (NIC) 5. patch panel E. A unique numerical address assigned to a device or computer on a network on a leased basis Copyright 2012 Local Area Networks (LANs) Course Lessons Lesson 1: Overview of Local Area Networks Lesson 2: Wide Area Networks (WANs) Lesson 3: Networking and the Internet Lesson 4: LAN Topologies Lesson 5: Networking Models, Traffic and Devices Lesson 6: Transmission Media Lesson 7: LAN Standards, Wireless Networking and Name Resolution Lesson 8: Network Management Copyright 2012 Lesson 2 Pre-Assessment Questions 1. Which of the following is faster than T1? a. E1 b. ISDN BRI c. DS0 d. DS1 2. Which type of transmission uses a single channel? a. Broadband b. Digital Subscriber Line (DSL) c. Baseband d. Cable modem 3. How are digital signals measured? Copyright 2012 Lesson 2 • • • • • • • • Introduction to Wide Area Networks (WANs) Signaling Terminology Circuit Switching and Packet Switching WAN Connections Dial-Up Connections Direct Connections Synchronous Optical Network (SONET) Asynchronous Transfer Mode (ATM) Copyright 2012 Introduction to Wide Area Networks Figure 2-1: WAN example Copyright 2012 Lesson 2 • • • • • • • • Introduction to Wide Area Networks (WANs) Signaling Terminology Circuit Switching and Packet Switching WAN Connections Dial-Up Connections Direct Connections Synchronous Optical Network (SONET) Asynchronous Transfer Mode (ATM) Copyright 2012 Analog and Digital Signals Figure 2-2: Analog signal Copyright 2012 Analog and Digital Signals (cont'd) Figure 2-3: Digital signal Copyright 2012 Digitizing Figure 2-4: Analog signals are easily digitized Copyright 2012 Multiplexing Figure 2-5: Signals in different frequency bands Copyright 2012 Digital Signal Hierarchy (DSH) Digital Signal Level Data Rate Equivalent To DS0 64 Kbps DS1 1.544 Mbps 24 DS0 channels DS2 6.312 Mbps 96 DS0 channels DS3 44.736 Mbps 672 DS0 channels DS4 274.176 Mbps 4,032 DS0 channels Table 2-1: Digital Signal Hierarchy Copyright 2012 Lunch Break Lunch Be back in 45 minutes! Copyright 2012 Lesson 2 • • • • • • • • Introduction to Wide Area Networks (WANs) Signaling Terminology Circuit Switching and Packet Switching WAN Connections Dial-Up Connections Direct Connections Synchronous Optical Network (SONET) Asynchronous Transfer Mode (ATM) Copyright 2012 Lesson 2 • • • • • • • • Introduction to Wide Area Networks (WANs) Signaling Terminology Circuit Switching and Packet Switching WAN Connections Dial-Up Connections Direct Connections Synchronous Optical Network (SONET) Asynchronous Transfer Mode (ATM) Copyright 2012 WAN Connections Figure 2-6: WANs use many different connection methods Copyright 2012 Lesson 2 • • • • • • • • Introduction to Wide Area Networks (WANs) Signaling Terminology Circuit Switching and Packet Switching WAN Connections Dial-Up Connections Direct Connections Synchronous Optical Network (SONET) Asynchronous Transfer Mode (ATM) Copyright 2012 Plain Old Telephone Service (POTS) Figure 2-7: WAN connection over PSTN using modems Copyright 2012 Lesson 2 • • • • • • • • Introduction to Wide Area Networks (WANs) Signaling Terminology Circuit Switching and Packet Switching WAN Connections Dial-Up Connections Direct Connections Synchronous Optical Network (SONET) Asynchronous Transfer Mode (ATM) Copyright 2012 T-Carrier DSH T-Carrier Data Rate Comments DS0 N/A 64 Kbps DS1 T1 1.544 Mbps DS2 T2 6.312 Mbps Equivalent to four T1 channels; not available to the public DS3 T3 44.736 Mbps Equivalent to 28 T1 channels DS4 T4 274.176 Mbps Equivalent to 168 T1 channels Table 2-2: North American T-carrier Copyright 2012 T-Carrier (cont'd) Figure 2-8: International WAN using T1 links Copyright 2012 T1 Connection Figure 2-9: T1 connection using a single channel Copyright 2012 T1 Connection (cont'd) Figure 2-10: T1 connection using separate channels Copyright 2012 Fractional T1/T3 Figure 2-11: Bandwidth comparison Copyright 2012 Statistical Multiplexing (stat mux) Figure 2-12: Statistical multiplexing saves bandwidth Copyright 2012 Multiplexing Figure 2-13: FT1 requiring two DS0 channels Copyright 2012 Figure 2-14: Usage of voice and data lines Copyright 2012 Statistical Multiplexing Figure 2-15: Voice and data lines use same channel Copyright 2012 E-Carrier Data Rate (Mbps) Voice Channels E1 2.048 30 E2 8.448 120 Equivalent to four E1 circuits E3 34.368 480 Equivalent to 16 E1 circuits E4 139.264 1,920 Equivalent to 64 E1 circuits E5 565.148 7,680 Equivalent to 256 E1 circuits Level Comments Table 2-3: E carrier speeds Copyright 2012 Cable Internet Figure 2-16: Cable modem Copyright 2012 Digital Subscriber Line (DSL) Figure 2-17: ADSL modem Copyright 2012 Digital Subscriber Line (DSL) Type Max Downstream Max Upstream ADSL 8 Mbps 640 Kbps 12 Mbps 1 Mbps 24 Mbps 3 Mbps 55 Mbps 4 Mbps 100 Mbps 100 Mbps ADSL2 ADSL2+ VDSL VDSL2 Table 2-4: xDSL speeds Copyright 2012 Connecting Cable and DSL Modems Figure 2-18: Residential broadband connection Copyright 2012 Lesson 2 • • • • • • • • Introduction to Wide Area Networks (WANs) Signaling Terminology Circuit Switching and Packet Switching WAN Connections Dial-Up Connections Direct Connections Synchronous Optical Network (SONET) Asynchronous Transfer Mode (ATM) Copyright 2012 SONET Figure 2-19: Synchronous Payload Envelope (SPE) in frame Copyright 2012 SONET Synchronous Transport Signal (STS) Frame Format Optical Carrier (OC) Level Speed (in Mbps) STS-1 OC-1 51.84 STS-2 OC-2 103.68 STS-3 OC-3 155.52 STS-9 OC-9 466.56 STS-12 OC-12 622.08 STS-18 OC-18 933.12 STS-24 OC-24 1244.16 STS-36 OC-36 1866.24 STS-48 OC-48 2488.32 STS-96 OC-96 4976.64 STS-192 OC-192 9953.28 Table 2-5: SONET speeds Copyright 2012 Benefits of Using SONET Figure 2-20: Multiplexing different data streams Copyright 2012 SONET and SDH Synchronous Digital Hierarchy (SDH) Level STM-0 STM-1 STM-2 STM-3 STM-4 STM-8 STM-16 STM-32 STM-64 STM-256 SONET Speed (Mbps) STS-1 (OC-1) 51.84 STS-3 (OC-3) 155.52 STS-6 (OC-6) 311.04 STS-9 (OC-9) 466.56 STS-12 (OC-12) 622.08 STS-24 (OC-24) 1244.16 STS-48 (OC-48) 2488.32 STS-96 (OC-96) 4976.64 STS-192 (OC-192) 9953.28 STS-768 (OC-768) 39,813.12 Table 2-6: Comparison of SDH and SONET Copyright 2012 Lesson 2 • • • • • • • • Introduction to Wide Area Networks (WANs) Signaling Terminology Circuit Switching and Packet Switching WAN Connections Dial-Up Connections Direct Connections Synchronous Optical Network (SONET) Asynchronous Transfer Mode (ATM) Copyright 2012 Asynchronous Transfer Mode (ATM) Figure 2-21: 53-byte ATM cell Copyright 2012 ATM (cont'd) Figure 2-22: Video and voice require constant data rate Copyright 2012 Lesson 2 Review 1. What is a T1 circuit? 2. A statistical multiplexer provides each user with ______________ 3. What does a SONET add/drop multiplexer do? 4. Describe an ATM cell 5. Which technologies provide affordable high-speed connections for home-based networks? Copyright 2012 Lesson 2 Application Project Suppose that you are about to set up a home office for yourself and another user… • At the very least, you will each require Internet access and e-mail • You will likely be transferring files to and from various customers as part of your business tasks • You will probably participate in online training from time to time to keep current on your job skills What factors should you consider when determining the type of Internet access to purchase? Copyright 2012 Activity 2-1: Reviewing WAN technology concepts Match each technology with the correct description 1. SONET A. A central connection point for wireless network clients 2. ISDN PRI B. A central connection location for incoming and outgoing lines of a LAN 3. ATM C. A base-16 numbering system that uses the digits 0 through 9 and the letters A through F 4. T1 D. A permanent address burned into a network interface card (NIC) 5. cable modem E. A unique numerical address assigned to a device or computer on a network on a leased basis 6. DSL F. A connection-oriented technique that can transport uniform 53-byte cells Copyright 2012 Local Area Networks (LANs) Course Lessons Lesson 1: Overview of Local Area Networks Lesson 2: Wide Area Networks (WANs) Lesson 3: Networking and the Internet Lesson 4: LAN Topologies Lesson 5: Networking Models, Traffic and Devices Lesson 6: Transmission Media Lesson 7: LAN Standards, Wireless Networking and Name Resolution Lesson 8: Network Management Copyright 2012 Lesson 3 Pre-Assessment Questions 1. If you want to establish a DMZ using only one firewall, how many network interface cards (NICs) does the firewall need? a. One b. Two c. Three d. Four 2. Which of the following was the first global computer network? a. ARPANET b. NSFnet c. The World Wide Web d. CompuServe 3. What are two ways in which internal LAN security can be accomplished? Copyright 2012 Lesson 3 • • • • • • Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery Copyright 2012 Networking and the Internet Figure 3-1: Multiple connections among servers Copyright 2012 Lesson 3 • • • • • • Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery Copyright 2012 Perimeter and Core Networks Figure 3-2: Perimeter and core Copyright 2012 Lesson 3 • • • • • • Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery Copyright 2012 Firewalls Figure 3-3: Firewall Copyright 2012 Demilitarized Zone (DMZ) Figure 3-4: DMZ using two firewalls Copyright 2012 Lesson 3 • • • • • • Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery Copyright 2012 Extranet Figure 3-5: CTP+ Partners and Instructors login page -- extranet Copyright 2012 Lesson 3 • • • • • • Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery Copyright 2012 Remote Access Server (RAS) Figure 3-6: Remote access Copyright 2012 Virtual Private Network (VPN) Figure 3-7: VPN tunnel Copyright 2012 Lesson 3 • • • • • • Networking and the Internet The Need for Security Firewalls, Proxies and Security Zones Internet, Intranets and Extranets Remote Access and Virtual Private Network (VPN) Availability, Fault Tolerance, Backup and Recovery Copyright 2012 Fault Tolerance – RAID Figure 3-8: Redundant array of inexpensive disks (RAID) 5 Copyright 2012 RAID 1: Disk Mirroring Figure 3-9: Disk mirroring Copyright 2012 RAID 1: Disk Mirroring (cont'd) Disk 1 Disk 2 File 1 File 2 File 3 Figure 3-10: Mirror set Copyright 2012 Disk Duplexing Figure 3-11: Disk duplexing Copyright 2012 RAID 5: Disk Striping with Parity Figure 3-12: RAID 5 uses at least three hard disks Copyright 2012 RAID 5: Disk Striping with Parity (cont'd) Disk 1 Disk 2 File 1 Disk 3 File 2 File 3 Parity Figure 3-13: Disk striping with parity Copyright 2012 Disaster Recovery Planning Site Type Description Hot A site that is already connected to the Internet or to the company network, and which is ready to operate. Servers and systems are functional and ready to provide the services normally provided by the original site. Requires minimal preparation time (e.g., 30 minutes) to activate Warm The site usually has all necessary data, but is not actively connected to the Internet. Requires more time (e.g., 2 hours) to obtain all necessary data (from backups) and configure network connections Cold Requires extended configuration in order to go live. Time can include several hours to a day or more. Servers may need to be moved into the site or configured. Network and telephony connections may also require considerable time before the site can go live Table 3-1: Alternate site types Copyright 2012 Lesson 3 Review 1. What is an extranet? 2. Describe the function of a firewall 3. Which tunneling protocols are commonly used by VPNs? 4. Describe a differential backup 5. What is authentication? Copyright 2012 Lesson 3 Application Project Suppose that you work in the IT department for a university… • The university has multiple campuses in various locations • Professors and other faculty need to be able to easily post questions, schedules and other documents to share in a secure environment Using the knowledge you gained in this lesson, suggest a solution that would meet their requirements Copyright 2012 Activity 3-1: Reviewing secure communication techniques Match each technology with the correct description 1. demilitarized zone (DMZ) A. Security barrier that controls the flow of information between the Internet and a private network 2. virtual private network (VPN) B. Trusted devices within a LAN 3. firewall C. An internal or in-house Web site and network used only by employees within a company 4. intranet D. A mini-network that resides between a company's internal network and the public network; adds an extra layer of security to the LAN 5. core network E. An encrypted tunnel that allows secure communications between two hosts across the Internet Copyright 2012 Local Area Networks (LANs) Course Lessons Lesson 1: Overview of Local Area Networks Lesson 2: Wide Area Networks (WANs) Lesson 3: Networking and the Internet Lesson 4: LAN Topologies Lesson 5: Networking Models, Traffic and Devices Lesson 6: Transmission Media Lesson 7: LAN Standards, Wireless Networking and Name Resolution Lesson 8: Network Management Copyright 2012 Lesson 4 Pre-Assessment Questions 1. Which of the following is a disadvantage of bus topologies? a. Difficult troubleshooting b. Non-standard topology c. Absence of support for Ethernet networks d. Moderate data speed 2. Which of the following is a disadvantage of wireless (cell) topologies? a. Cannot be integrated with other topologies b. Requires excessive amounts of cable c. Opens security risks d. Has no defined standards Copyright 2012 Lesson 4 Pre-Assessment Questions (cont'd) 3. Which of the following uses coaxial cable terminated at each end? a. Busa b. Ring c. Star d. Mesh Copyright 2012 Lesson 4 • Network Topologies • Physical LAN Topologies • Media Access Methods Copyright 2012 Lesson 4 • Network Topologies • Physical LAN Topologies • Media Access Methods Copyright 2012 Bus Topology Figure 4-1: Bus topology Copyright 2012 Ring Topology Figure 4-2: Ring topology Copyright 2012 Ring Topology (cont'd) Figure 4-3: Token Ring network Copyright 2012 Ring Topology (cont'd) Figure 4-4: FDDI Copyright 2012 Star Topology Figure 4-5: Star topology Copyright 2012 Lunch Break Lunch Be back in 45 minutes! Copyright 2012 Hybrid Topology Figure 4-6: Star bus Copyright 2012 Mesh Topology Figure 4-7: Partial mesh Copyright 2012 Mesh Topology (cont'd) Figure 4-8: Full mesh Copyright 2012 Wireless (Cell) Topology Figure 4-9: Wireless topology Copyright 2012 Lesson 4 • Network Topologies • Physical LAN Topologies • Media Access Methods Copyright 2012 Carrier Sense Multiple Access (CSMA) Figure 4-10: Ethernet collision detection Copyright 2012 Lesson 4 Review 1. What are two methods that Carrier Sense Multiple Access (CSMA) employs to handle messages that are sent simultaneously? 2. Which topology would you use when unable to install network cable? 3. What is inherent in mesh topologies that enable them to provide high reliability? 4. What are advantages of star topologies? 5. Compare the two modes supported by wireless topologies Copyright 2012 Lesson 4 Application Project Suppose that you work in the IT department of a financial services company… • The company has four offices, each of which provides a specific type of financial service • The company officers have made it clear that all the offices must be connected and able to communicate with one another at all times Using the knowledge you gained in this lesson, suggest a network topology that would meet their requirements Copyright 2012 Activity 4-1: Reviewing LAN topology concepts 1. In this section, consider each description (A through G). Which topology does it describe? For each item, write one of the following answers: Bus Ring Star Hybrid Mesh Wireless (cell) A. B. C. D. E. F. G. Fiber Distributed Data Interface (FDDI) uses this topology Uses an access point when part of a hybrid topology Nodes connect to a central hub or switch Combines two or more standard topologies Uses a hub or media access unit (MAU) in a central location Supports bandwidths of 100 Mbps or more over twisted-pair Uses token passing as an access method Copyright 2012 Activity 4-1: Reviewing LAN topology concepts (cont'd) 2. In this section, answer the question in short essay form… Describe the basic features of physical star topologies Copyright 2012 Local Area Networks (LANs) Course Lessons Lesson 1: Overview of Local Area Networks Lesson 2: Wide Area Networks (WANs) Lesson 3: Networking and the Internet Lesson 4: LAN Topologies Lesson 5: Networking Models, Traffic and Devices Lesson 6: Transmission Media Lesson 7: LAN Standards, Wireless Networking and Name Resolution Lesson 8: Network Management Copyright 2012 Lesson 5 Pre-Assessment Questions 1. A mode of communication in which data can flow in two directions, but in only one direction at a time is called: a. Simplex b. Half-duplex c. Full duplex d. Broadcast 2. Which of the following is true about switches? a. Switches are used to implement virtual LANs (VLANs) b. Switches translate protocols between dissimilar networks c. Switches provide the connection point between a computer system and the network cable d. Switches operate at Layer 1 3. What is the function of a router? Copyright 2012 Lesson 5 • • • • • Introduction to Networking Models The OSI Reference Model The TCP/IP Four-Layer Model Traffic on the LAN Local Networking Components Copyright 2012 Lesson 5 • • • • • Introduction to Networking Models The OSI Reference Model The TCP/IP Four-Layer Model Traffic on the LAN Local Networking Components Copyright 2012 The OSI Reference Model Layer Number Description Application 7 Presentation 6 The interface to the user resides at this layer. Web browsers and e-mail clients function here. This is also the only layer that a user sees; the functions of the other layers are transparent User input and other information is transformed at this layer into a standardized format recognized by all operating systems Session 5 Connections between communicating systems are set up and torn down at this layer. This layer also adds traffic flow control and synchronization information Transport 4 This layer is responsible for the accuracy of data transmission, and mechanisms that operate here ensure that data is sent and received accurately and completely Network 3 Data is organized into discrete units called packets at this layer. In addition to the original data, each packet includes addressing information that is required to deliver the packet to its intended destination Data link 2 Physical 1 At this layer, packets are divided into discrete units called frames before being sent across the transmission medium. This layer also controls access to the transmission medium This layer controls how data is transmitted and received across the media. Here, frames are transmitted across the transmission medium in a bitstream (i.e., as a series of 1s and 0s) Table 5-1: OSI/RM layers Copyright 2012 Data Encapsulation Figure 5-1: Encapsulation and De-encapsulation Copyright 2012 Data Encapsulation (cont'd) Figure 5-2: Data at various stages of encapsulation Copyright 2012 Packet Creation Figure 5-3: Adding headers Copyright 2012 Lesson 5 • • • • • Introduction to Networking Models The OSI Reference Model The TCP/IP Four-Layer Model Traffic on the LAN Local Networking Components Copyright 2012 The TCP/IP Four-Layer Model Figure 5-4: Comparison of OSI and TCP model Copyright 2012 Lesson 5 • • • • • Introduction to Networking Models The OSI Reference Model The TCP/IP Four-Layer Model Traffic on the LAN Local Networking Components Copyright 2012 Traffic on the LAN Figure 5-5: Collision domains and broadcast domains Copyright 2012 Traffic on the LAN (cont'd) Mode Description Data travels in only one direction, similar to a public address (PA) system Simplex Half-duplex Data travels in two directions, but in only one direction at a time, similar to a walkie-talkie Traditional shared Ethernet uses half-duplex transmissions Data travels in two directions simultaneously, similar to a phone conversation Full-duplex Full-duplex Ethernet (or switched Ethernet) supports fullduplex transmissions in a switched environment Table 5-2: Communication modes Copyright 2012 Lesson 5 • • • • • Introduction to Networking Models The OSI Reference Model The TCP/IP Four-Layer Model Traffic on the LAN Local Networking Components Copyright 2012 Hubs Figure 5-6: Hub connecting workstations Copyright 2012 Bridges Figure 5-7: Bridge between network segments Copyright 2012 Switches Figure 5-8: Ethernet 50-port switch Copyright 2012 Routers Figure 5-9: Router and subnets Copyright 2012 Routing Protocols Routing Protocol Type Protocol Name Routing Information Protocol (RIP and RIPv2) Interior routing protocols Open Shortest Path First (OSPF) Exterior routing protocols Border Gateway Protocol (BGP) Protocol Description Efficient for small networks (two or three routers) with a relatively static structure. RIP maintains only the best route to a destination. Regular routing table updates are sent across the network Used in larger networks where multiple alternative routes are available. Routing decisions can take available bandwidth and multiple paths into consideration. Routing table updates occur only when necessary The exterior routing protocol used on the Internet Table 5-3: Routing protocols Copyright 2012 Gateways Figure 5-10: Gateway Copyright 2012 Lesson 5 Review 1. Describe the three modes of communication available on a network 2. List the seven layers of the OSI model, including both layer number and name for each 3. Describe a protocol data unit (PDU) 4. List three practical functions of the OSI model 5. Describe a collision domain Copyright 2012 Lesson 5 Application Project Suppose that you work in the IT department for ABC Company… •The company has an old shared Ethernet network that has grown over the years •Network performance is slow •Management wants you to remedy the situation Using the knowledge you gained in this lesson, suggest ways in which you can replace or add networking devices in order to improve network performance Copyright 2012 Activity 5-1: Reviewing the OSI model Match each OSI layer with the correct description 7. Application A. Provides an interface to the user 6. Presentation B. Transmits frames across the transmission medium in a bitstream 5. Session C. Controls access to the transmission medium and encapsulates packets into frames 4. Transport D. Translates data into a standardized format E. Ensures that data is accurately and completely sent and received 2. Data Link F. Creates packets and handles addressing 1. Physical G. Sets up, maintains and tears down connections 3. Network Copyright 2012 Local Area Networks (LANs) Course Lessons Lesson 1: Overview of Local Area Networks Lesson 2: Wide Area Networks (WANs) Lesson 3: Networking and the Internet Lesson 4: LAN Topologies Lesson 5: Networking Models, Traffic and Devices Lesson 6: Transmission Media Lesson 7: LAN Standards, Wireless Networking and Name Resolution Lesson 8: Network Management Copyright 2012 Lesson 6 Pre-Assessment Questions 1. What are the two main categories of transmission media? a. Cable and free space b. Cable and cellular c. Wire and cellular d. Wire and free space 2. True or False, and explain: Future growth of a network is not a factor when selecting transmission media 3. What device transmits signals to and from a satellite from Earth? Copyright 2012 Lesson 6 • • • • • • • • • • • Overview of Transmission Media Cable Transmission Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Cables and Safety Free-Space Transmission Infrared Short-Range Wireless Microwave Satellite Copyright 2012 Lesson 6 • • • • • • • • • • • Overview of Transmission Media Cable Transmission Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Cables and Safety Free-Space Transmission Infrared Short-Range Wireless Microwave Satellite Copyright 2012 Lesson 6 • • • • • • • • • • • Overview of Transmission Media Cable Transmission Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Cables and Safety Free-Space Transmission Infrared Short-Range Wireless Microwave Satellite Copyright 2012 Wire Diameter and Signal Attenuation Figure 6-1: American Wire Gauge (AWG) standard Copyright 2012 Shielded and Unshielded Twisted Pair Figure 6-2: Shielded twisted pair (STP) cable Copyright 2012 Shielded and Unshielded Twisted Pair (cont'd) Figure 6-3: Unshielded twisted pair (UTP) cable Copyright 2012 Twisted-Pair Categories Cable Grade Bandwidth Specific Network(s) Category 5 -100 Mbps Category 5e -Can sustain rates up to 100 MHz -1 Gbps (1,000 Mbps) Can be used for both standard Ethernet (10 Mbps) and Fast Ethernet (100 Mbps). A popular implementation Category 6 -Can sustain rates up to 100 MHz -2.5 Gbps Category 6E -Can sustain rates up to 250 MHz -10 Gbps Category 7 -Can sustain rates up to 500 MHz -10 Gbps -Can sustain rates up to at least 600 MHz Can be used for Fast Ethernet and Gigabit Ethernet and other high-speed networks. Has largely replaced Cat 5 in many implementations Supports Gigabit Ethernet. Unlike other categories of twisted pair, Cat 6 is not particularly durable and can cease to function if it is improperly bent Suitable for 10-Gigabit Ethernet and faster, more powerful networks An emerging standard. Shielded. Contains four individually shielded twisted pairs inside an overall shield, and supports data transmission up to 10 Gbps. Rated at 600 MHz Table 6-1: Twisted-pair cable categories (Cat 5 through Cat 7) Copyright 2012 Lesson 6 • • • • • • • • • • • Overview of Transmission Media The Cable Plant Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Cables and Safety Free-Space Transmission Infrared Short-Range Wireless Microwave Satellite Copyright 2012 Coaxial Cable Figure 6-4: Coaxial cable Copyright 2012 Lesson 6 • • • • • • • • • • • Overview of Transmission Media The Cable Plant Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Cables and Safety Free-Space Transmission Infrared Short-Range Wireless Microwave Satellite Copyright 2012 Fiber-Optic Cable Figure 6-5: Fiber-optic cable Copyright 2012 Modes of Optical Fiber Figure 6-6: Single and multimode fiber Copyright 2012 Modes of Optical Fiber (cont'd) Single-Mode Fiber Multimode Fiber One transmission path Multiple transmission paths No smearing Smearing More pulses per second Fewer pulses per second High transmission speeds Low transmission speeds Long-distance transmissions Short-distance transmissions Table 6-2: Single-mode vs. multimode optical fiber Copyright 2012 Light Sources LED Laser Lower output power Higher output power More diffuse beams Less diffuse beams For shorter distances For long distances Multimode fibers Single-mode fibers Less expensive More expensive Does not require special operating conditions Requires special operating conditions Table 6-3: LED vs. laser as fiber-optic light source Copyright 2012 Lesson 6 • • • • • • • • • • • Overview of Transmission Media The Cable Plant Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Cables and Safety Free-Space Transmission Infrared Short-Range Wireless Microwave Satellite Copyright 2012 Lesson 6 • • • • • • • • • • • Overview of Transmission Media The Cable Plant Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Cables and Safety Free-Space Transmission Infrared Short-Range Wireless Microwave Satellite Copyright 2012 Lesson 6 • • • • • • • • • • • Overview of Transmission Media The Cable Plant Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Cables and Safety Free-Space Transmission Infrared Short-Range Wireless Microwave Satellite Copyright 2012 Lesson 6 • • • • • • • • • • • Overview of Transmission Media The Cable Plant Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Cables and Safety Free-Space Transmission Infrared Short-Range Wireless Microwave Satellite Copyright 2012 Lesson 6 • • • • • • • • • • • Overview of Transmission Media The Cable Plant Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Cables and Safety Free-Space Transmission Infrared Short-Range Wireless Microwave Satellite Copyright 2012 Microwave Figure 6-7: Distance limits of microwave transmissions Copyright 2012 Microwave (cont'd) Figure 6-8: Microwave transmission between buildings Copyright 2012 Lesson 6 • • • • • • • • • • • Overview of Transmission Media The Cable Plant Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Cables and Safety Free-Space Transmission Infrared Short-Range Wireless Microwave Satellite Copyright 2012 Satellite Figure 6-9: Components of satellite network Copyright 2012 Satellite (cont'd) Figure 6-10: Orbits of GEOs, MEOs, LEOs Copyright 2012 Satellite (cont'd) Figure 6-11: Transponders in satellite Copyright 2012 Satellite (cont'd) Figure 6-12: Transmission process in satellite network Copyright 2012 Lesson 6 Review 1. What are the two main categories of transmission media? 2. What is the difference between standard voice-grade cabling and data-grade cabling? 3. True or false: A diameter of a 22AWG twisted-pair cable is smaller than a 26AWG twisted pair cable 4. In which frequency bands to do short-range wireless transmission operate? Copyright 2012 Lesson 6 Review 5. What are the two types of light source used to transmit signals over optical fiber? 6. What is the fastest, most accurate way to optically transmit data over long distances? 7. What medium does infrared technology use to transmit signals? 8. True or false: Bluetooth is a good example of shortrange wireless transmission Copyright 2012 Lesson 6 Review 9. True or false: Microwave signals are line-of-sight transmissions 10. Which forms of free-space transmission do NOT require line of sight? Copyright 2012 Lesson 6 Application Project Consider the following situations and decide which transmission technology is the best choice for each a. A large company needs to transmit large amounts of data to remote offices on a regular basis b. A hospital in a remote area needs a dependable remote connection to a large research hospital c. A user wants a convenient way to transfer data between a laptop PC and a smartphone d. A company wants to have laptop PCs remain connected as users move around the building Copyright 2012 Lesson 6 Application Project (cont'd) Consider the following situations and decide which transmission technology is the best choice for each e. A company is implementing a small LAN and wants to keep the expense at a minimum f. A radio station wants to increase its range to cover several hundred miles g. A user wants to print to a printer that is located near, but not connected to, his or her workstation Copyright 2012 Activity 6-1: Reviewing transmission media concepts A. In this section, consider each description (1 through 7). Which transmission medium does it describe? For each item, write one of the following answers: Microwave SatelliteInfrared Short-range wireless Coaxial cable Twisted-pair cable Fiber-optic cable 1. The devices that send and receive the signals are usually contained within the same room 2. The cable is made of concentric layers that include core, cladding and sheath 3. This free-space technology makes it possible to transmit information between two stations that are not within the line of sight of each other Copyright 2012 Activity 6-1: Reviewing transmission media concepts (cont'd) A. Which transmission medium does it describe? Microwave SatelliteInfrared Short-range wireless Coaxial cable Twisted-pair cable Fiber-optic cable 4. Two copper wires twisted around each other in a double helix, usually in plastic sheathing 5. Signals are sent by line-of-sight transmission via parabolic antennas mounted on towers 6. The cable typically consists of four layers: core, foam/dielectric insulator, metal jacket of braided copper or aluminum, and a polyethylene cover 7. LAN connectivity method that allows laptop users to move freely around an office building Copyright 2012 Activity 6-1: Reviewing transmission media concepts (cont'd) B. In this section (8 through 9), answer the questions in short essay form 8. Describe microwave transmission 9. Describe twisted-pair cable as a transmission medium… What types exist, and what are their advantages and disadvantages? Copyright 2012 Local Area Networks (LANs) Course Lessons Lesson 1: Overview of Local Area Networks Lesson 2: Wide Area Networks (WANs) Lesson 3: Networking and the Internet Lesson 4: LAN Topologies Lesson 5: Networking Models, Traffic and Devices Lesson 6: Transmission Media Lesson 7: LAN Standards, Wireless Networking and Name Resolution Lesson 8: Network Management Copyright 2012 Lesson 7 Pre-Assessment Questions 1. Which of the following statements is true of NetBIOS names? a. They can be used across the Internet b. They are supported by UNIX, Linux and MacOS operating systems c. They can be discovered by querying a domain name server d. They are recognized only within a Windows LAN 2. How are domain names structured? Copyright 2012 Lesson 7 Pre-Assessment Questions (cont'd) 3. Which of the following technologies use(s) the CSMA/CD access method? a. 802.3 and 802.3u b. 802.5 c. 802.11a and 802.11n d. 802.12 Copyright 2012 Lesson 7 • • • • • • Networking Standards Organizations The IEEE and LAN Standards IEEE 802.3: Ethernet Standards IEEE 802.11: Wireless LAN Standards Wireless LAN Operations Resolving System Names Copyright 2012 Lesson 7 • • • • • • Networking Standards Organizations The IEEE and LAN Standards IEEE 802.3: Ethernet Standards IEEE 802.11: Wireless LAN Standards Wireless LAN Operations Resolving System Names Copyright 2012 IEEE Committees Figure 7-1: IEEE 802.x committees develop standards for OSI Layers 1 and 2 Copyright 2012 IEEE Committees (cont'd) IEEE Committee 802.1 802.2 802.3 Subject Description LAN/MAN architecture Logical Link Control (LLC) Internetworking, network management and bridging Committee Notes This committee is in hibernation Includes Ethernet (802.3), Fast Ethernet (802.3u), Gigabit Ethernet CSMA/CD (Ethernet) (802.3z, 802.3ab) and 10-Gigabit Ethernet (802.3ae) 802.4 Token bus A standard for implementing the Token Ring protocol over a "virtual ring" on a coaxial bus 802.5 Token Ring A standard for token passing This committee is disbanded and that standard has been withdrawn This committee is in hibernation Table 7-1: IEEE committees Copyright 2012 IEEE Committees (cont'd) IEEE Committee Subject Description Committee Notes This standard has been withdrawn and the committee is disbanded. Most MANs now use SONET or ATM This standard has been withdrawn and the committee is disbanded 802.6 Distributed queue dual bus (DQDB) A standard for using fiber in MANs 802.7 Broadband LAN A standard for broadband local area networks 802.8 Fiber Distributed Data Interface (FDDI) A standard for fiber-optic media in token-passing ring networks This committee is disbanded Evolving marriage of LAN and ISDN A standard formerly known as isoEthernet that combined 10Mbps Ethernet and 96 64-Kbps ISDN "B" channels Fast Ethernet pushed isoEthernet out of the market place and this committee is disbanded 802.9 Table 7-1: IEEE committees (cont'd) Copyright 2012 IEEE Committees (cont'd) IEEE Committee 802.10 802.11 802.12 Subject LAN security Wireless LANs 100VG-AnyLAN Description Committee Notes A former standard for security functions that could be used in both LANs and MANs This standard has been withdrawn (largely replaced by 802.1q in VLANs and 802.11i in WLANs) and the committee is disbanded Includes 802.11a/b/g/n networks, as well as the 802.11e and 802.11h amendments A standard for the 100-Mbps transport of both Ethernet and Token Ring frames using a media access method called demand priority, which allows voice and video packets to be given high priority Today, this protocol is obsolete and the committee is disbanded Table 7-1: IEEE committees (cont'd) Copyright 2012 IEEE Committees (cont'd) IEEE Committee Subject 802.14 Cable TV broadband 802.15 Wireless personal area networks (WPANs) 802.16 Broadband wireless networking (WiMAX) 802.17 Resilient packet ring Description Committee Notes This committee is disbanded Includes standards for Bluetooth, co-existence of WPANs with other wireless devices, high-rate and low-rate WPANs, and mesh networking A standard for wirelessly delivering (via microwave) high-speed Internet service to large geographical areas A standard designed to optimize This committee has no the transport of data traffic over current active projects optical-fiber ring networks Table 7-1: IEEE committees (cont'd) Copyright 2012 IEEE Committees (cont'd) IEEE Committee Subject Description Committee Notes 802.20 Mobile Broadband Wireless Access (MBWA) A standard for mobile wireless Internet access networks This committee is currently inactive 802.21 Media Independent Handoff 802.22 Wireless Regional Area Network 802.23 Emergency Services Working Group A standard for handover and roaming between 802.11 networks and 3G cellular networks A standard for using the unused spaces in the television frequency spectrum to bring broadband access to hard to reach lowdensity population areas A standard to provide location information for VoIP clients for purposes of securing emergency (911) services Table 7-1: IEEE committees (cont'd) Copyright 2012 Lunch Break Lunch Be back in 45 minutes! Copyright 2012 Lesson 7 • • • • • • Networking Standards Organizations The IEEE and LAN Standards IEEE 802.3: Ethernet Standards IEEE 802.11: Wireless LAN Standards Wireless LAN Operations Resolving System Names Copyright 2012 Ethernet Standards Characteristic Ethernet Fast Ethernet Speed 10 Mbps 100 Mbps IEEE standard IEEE 802.3 IEEE 802.3u Access method CSMA/CD CSMA/CD Topology Bus/star Star Cable support Co-ax/twisted pair/fiber Twisted pair/fiber UTP link distance (maximum) 100 meters 100 meters Table 7-2: Ethernet vs. Fast Ethernet Copyright 2012 Lesson 7 • • • • • • Networking Standards Organizations The IEEE and LAN Standards IEEE 802.3: Ethernet Standards IEEE 802.11: Wireless LAN Standards Wireless LAN Operations Resolving System Names Copyright 2012 Wireless LAN Standards IEEE Theoretical Specification Top Speed 54 Mbps 802.11a Frequency Comments 5 GHz -Indoor range of 35 meters; outdoor range of 120 m -Includes error correction -Offers strong encryption and authentication 802.11b 802.11g 11 Mbps 54 Mbps 2.4 GHz -Not compatible with 802.11b or 802.11g -Indoor range of 38 m; outdoor range of 140 m 2.4 GHz -Subject to interference from microwave ovens, cordless phones and Bluetooth devices, which operate in the same frequency band -Indoor range of 38 m; outdoor range of 140 m -Backward compatible with 802.11b (but only at 802.11b speed) 802.11n 300 Mbps 2.4 GHz and 5 GHz -Offers encryption and authentication features similar to 802.11a -Indoor range of 70 m; outdoor range of 250 m -Offers high speed and twice the range of 802.11g -Supports streaming technologies Table 7-3: 802.11 wireless LAN flavors Copyright 2012 Lesson 7 • • • • • • Networking Standards Organizations The IEEE and LAN Standards IEEE 802.3: Ethernet Standards IEEE 802.11: Wireless LAN Standards Wireless LAN Operations Resolving System Names Copyright 2012 Wireless Networking Modes Figure 7-2: Wireless networking modes Copyright 2012 Lesson 7 • • • • • • Networking Standards Organizations The IEEE and LAN Standards IEEE 802.3: Ethernet Standards IEEE 802.11: Wireless LAN Standards Wireless LAN Operations Resolving System Names Copyright 2012 Domain Name Structure Figure 7-3: Typical domain name Copyright 2012 DNS Name Space .(root) ie se com mx net ch xyz user1 iso ftp user2 www Figure 7-4: Domain name space hierarchy Copyright 2012 Lesson 7 Review 1. Define fast Ethernet 2. What type of cable can you use for Fast Ethernet? 3. What does IEEE 802.15 define? 4. Which access method is used in wireless LANs? 5. What is the frequency band used in an IEEE 802.11n network? Copyright 2012 Lesson 7 Application Project Suppose you are part of the IT staff at a small business… • Management has expressed the desire to include wireless connectivity throughout the office space • They want to enable traveling sales personnel to easily connect to the LAN whenever they drop in, regardless of whether a dedicated "office space" is available • They think it would be beneficial for the non-traveling employees to have wireless access as well Copyright 2012 Lesson 7 Application Project (cont'd) Consider the following questions… • How will the IT staff decide upon which wireless standard to implement? • What factors should be taken into consideration? • What type of security challenges might the wireless solution cause? • How will the IT staff plan to meet those challenges? Copyright 2012 Activity 7-1: Reviewing 802.11 wireless standards Match each IEEE 802.11 wireless standard with the correct description 1. 802.11e 2. 802.11a 3. 802.11b A. Operates at speeds up to 11 Mbps in the 2.4-GHz range and is subject to interference from cordless phones and Bluetooth devices B. Provides Quality of Service (QoS) standards for wireless networks, enabling them to carry time-sensitive packets, such as those for Voice over Wireless LAN (VoWLAN) and streaming media 4. 802.11g C. Can operate in either the 2.4-GHz or the 5-GHz band, offering speeds up to 300 Mbps, and also supports streaming technologies 5. 802.11i (WPA2) D. Specifies security mechanisms with strong encryption for wireless networks that use other 802.11 specifications 6. 802.11n E. Operates at up to 54 Mbps in the 5-GHz band, includes error correction, and offers strong encryption and authentication F. Operates at speeds of up to 54 Mbps in the 2.4-GHz band, and offers encryption and authentication features Copyright 2012 Local Area Networks (LANs) Course Lessons Lesson 1: Overview of Local Area Networks Lesson 2: Wide Area Networks (WANs) Lesson 3: Networking and the Internet Lesson 4: LAN Topologies Lesson 5: Networking Models, Traffic and Devices Lesson 6: Transmission Media Lesson 7: LAN Standards, Wireless Networking and Name Resolution Lesson 8: Network Management Copyright 2012 Lesson 8 Pre-Assessment Questions 1. A point in a network where traffic slows considerably is called a: a. test point b. baseline c. bottleneck d. network analyzer 2. To which of the following configuration settings might a network administrator want to restrict access? a. Network settings b. Screen resolution settings c. Desktop wallpaper settings d. Screensaver settings 3. Describe Platform as a Service (PaaS) Copyright 2012 Lesson 8 • • • • • • • What Is Network Management? ISO Functional Areas of Network Management Network Planning Monitoring and Analysis Tools and Protocols Hardware Management Software Management Security Management Copyright 2012 Lesson 8 • • • • • • • What Is Network Management? ISO Functional Areas of Network Management Network Planning Monitoring and Analysis Tools and Protocols Hardware Management Software Management Security Management Copyright 2012 ISO Functional Areas Area Description Fault Pertains to maintaining the integrity of network operation, and detecting and correcting anomalous network behavior Configuration Pertains to installing, initializing, modifying and tracking the configuration parameters of network hardware and software Accounting Pertains to resource use, including data, software and licensing; sometimes referred to as administration, or billing management Performance Pertains to developing a baseline of network performance and measuring ongoing developments accordingly Security Pertains to access control and data integrity Table 8-1: ISO functional areas of network management (FCAPS) Copyright 2012 Lesson 8 • • • • • • • What Is Network Management? ISO Functional Areas of Network Management Network Planning Monitoring and Analysis Tools and Protocols Hardware Management Software Management Security Management Copyright 2012 Lesson 8 • • • • • • • What Is Network Management? ISO Functional Areas of Network Management Network Planning Monitoring and Analysis Tools and Protocols Hardware Management Software Management Security Management Copyright 2012 Network Analysis Tools Figure 8-1: Wireshark packet capture Copyright 2012 Simple Network Management Protocol (SNMP) Figure 8-2: SNMP management station and agents Copyright 2012 Lesson 8 • • • • • • • What Is Network Management? ISO Functional Areas of Network Management Network Planning Monitoring and Analysis Tools and Protocols Hardware Management Software Management Security Management Copyright 2012 Lesson 8 • • • • • • • What Is Network Management? ISO Functional Areas of Network Management Network Planning Monitoring and Analysis Tools and Protocols Hardware Management Software Management Security Management Copyright 2012 Lesson 8 • • • • • • • What Is Network Management? ISO Functional Areas of Network Management Network Planning Monitoring and Analysis Tools and Protocols Hardware Management Software Management Security Management Copyright 2012 Lesson 8 Review 1. What is an operating system patch? 2. Why are some users reluctant to store their files in network folders? 3. Describe the function of Dynamic Host Configuration Protocol (DHCP) 4. Why are network drives considered a safe place to store user documents? 5. Describe a site license Copyright 2012 Lesson 8 Application Project Suppose you are a consultant for a growing company that is planning to expand and speed up its network… Describe the issues that must be considered to ensure that the end product meets with user expectations and needs Copyright 2012 Activity 8-1: Reviewing the functional areas of network management Match each term with the correct description 1. Configuration management A. Involves developing a baseline and measuring ongoing conditions against the baseline 2. Fault management B. Includes ensuring that all software is properly licensed and tracking which users use which applications and resources C. Includes scheduling regular backups and using permissions to restrict access to network resources D. Includes setting up corporate systems as DHCP clients and using remote connection applications to troubleshoot servers 3. Performance management 4. Accounting management 5. Security management E. Involves maintaining ongoing network operation, and detecting and correcting anomalous network behavior Copyright 2012 Thank You • Thank you for attending this course • Local Area Networks (LANs) is the fourth course in the six-course CCNT series • For information about the CCNT program or taking the CCNT LANs certificate exam, ask your instructor or visit the CCNT page at www.CTPcertified.com/Certification/ccnt.php Copyright 2012