Networking Basics What is Computer Networking • Computer Network is an interconnection between computers, or we can say computer network is group of computers linked to each other which enables one computer to communicate with another computer. It acts as basis of communication in Information Technology (IT). It is system of connected computing devices and shares information and resources between them. The devices in network are connected by communication links (wired/wireless) and share data by Data Communication System. Network Types LAN(Local Area Network) • Local Area Network is a group of computers connected to each other in a small area such as building, office. • LAN is used for connecting two or more personal computers through a communication medium such as twisted pair, coaxial cable, etc. • It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and ethernet cables. • The data is transferred at an extremely faster rate in Local Area Network. • Local Area Network provides higher security. PAN(Personal Area Network) • Personal Area Network is a network arranged within an individual person, typically within a range of 10 meters. • Personal Area Network is used for connecting the computer devices of personal use is known as Personal Area Network. • Personal computer devices that are used to develop the personal area network are the laptop, cell phones, media player and play stations MAN(Metropolitan Area Network) • A metropolitan area network is a network that covers a larger geographic area by interconnecting a different LAN to form a larger network. • Government agencies use MAN to connect to the citizens and private industries. WAN(Wide Area Network) • A Wide Area Network is a network that extends over a large geographical area such as states or countries. • A Wide Area Network is quite bigger network than the LAN. • A Wide Area Network is not limited to a single location, but it spans over a large geographical area through a telephone line, fiber optic cable or satellite links. • A Wide Area Network is widely used in the field of Business, government, and education. Virtual Networking • Network virtualization is the transformation of a network that was once hardware-dependent into a network that is softwarebased. • The goal of virtualization is to emulate physical environments and devices without actually having those physical elements. Wired and Wireless Network Topologies • A topology refers to a network’s physical and logical layout. A network’s physical topology refers to the actual layout of the computer cables and other network devices. • A network’s logical topology refers to the way in which the network appears to the devices that use it. Several topologies are in use on networks today. Some of the more common topologies are the bus, ring, star, mesh, and wireless. The following sections provide an overview of each. Bus Topology • A bus topology uses a trunk or backbone to connect all the computers on the network, as shown below. • Systems connect to this backbone using T connectors or taps (known as a vampire tap, if you must pierce the wire). To avoid signal reflection, a physical bus topology requires that each end of the physical bus be terminated, with one end also being grounded. Note that a hub or switch is not needed in this installation. Ring Topology • The ring topology is a logical ring, meaning that the data travels in a circular fashion from one computer to another on the network. Star Topology • In the star topology, all computers and other network devices connect to a central device called a hub or switch and, for that reason, is sometimes called a hub-and-spoke network. Each connected device requires a single cable to be connected to the hub or switch, creating a point-to-point connection between the device and the hub or switch. Mesh Topology • The wired mesh topology incorporates a unique network design in which each computer on the network connects to every other, creating a point-topoint connection between every device on the network. The OSI Networking Model Physical Layer (Layer 1) • Physical Layer (Layer 1) The physical layer of the OSI model identifies the network’s physical characteristics, including the following specifications: Hardware: The type of media used on the network, such as type of cable, type of connector, and pinout format for cables. Data Link Layer (Layer 2) • The data link layer is responsible for getting data to the physical layer so that it can transmit over the network. The data link layer is also responsible for error detection, error correction, and hardware addressing. Network Layer (Layer 3) • The primary responsibility of the network layer is routing— providing mechanisms by which data can be passed from one network system to another. Transport Layer (Layer 4) • The basic function of the transport layer is to provide mechanisms to transport data between network devices. • Primarily, it does this in three ways: • Error checking: Protocols at the transport layer ensure that data is correctly sent or received. • Service addressing: A number of protocols support many network services. The transport layer ensures that data is passed to the right service at the upper layers of the OSI model. • Segmentation: To traverse the network, blocks of data need to be broken into packets of a manageable size for the lower layers to handle. This process, called segmentation, is the responsibility of the transport layer. Session Layer (Layer 5) • The session layer is responsible for managing and controlling the synchronization of data between applications on two devices. It does this by establishing, maintaining, and breaking sessions. Presentation Layer (Layer 6) • The presentation layer’s basic function is to convert the data intended for or received from the application layer into another format. Such conversion is necessary because of how data is formatted so that it can be transported across the network. • Graphics files: JPEG, TIFF, GIF, and so on are graphics file formats that require the data to be formatted in a certain way. Text and data: The presentation layer can translate data into different formats, such as American Standard Code for Information Interchange (ASCII) and Extended Binary Coded Decimal Interchange Code (EBCDIC).sported across the network. • Sound/video: MPEG, MP3, and MIDI files all have their own data formats to and from which data must be converted. Application Layer (Layer 7) • Provides access to the network for applications • Incoming information is passed to the application layer, which then displays the information to the users. • Some of the most basic application layer services include file and print capabilities. What is the Difference Between TCP and UDP? Common Network Ports Domain Name System (DNS) Domain Name Service—resolves hostnames, such as www.pearsonitcertification.com, to IP addresses, such as 168.146.67.180. By default, DNS operates on port 53 Dynamic Host Configuration Protocol (DHCP) On an IP network, each device connected to the Internet must be assigned a unique IP address. DHCP helps network administrators to monitor and assign IP addresses in a centralized manner. It can automatically assign a new IP address to a computer when it is moved to another location. Simple Network Management Protocol(SNMP) The Simple Network Management Protocol (SNMP) uses port 161 to send data and port 162 to receive it. It enables network devices to communicate information about their state to a central system. It also enables the central system to pass configuration parameters to the devices. POP3/IMAP4 POP3 and IMAP4 are popular, and many people access email through applications that are POP3 and IMAP4 clients. The default port for POP3 is 110, and for IMAP4, the default port is 143. Simple Mail Transfer Protocol (SMTP) SMTP can be used to both send and receive mail. Post Office Protocol version 3 (POP3) and Internet Message Access Protocol version 4 (IMAP4) can be used only to receive mail. The default port used by SMTP is 25. SSH (Secure Shell) The SSH protocol uses encryption to secure the connection between a client and a server. All user authentication, commands, output, and file transfers are encrypted to protect against attacks in the network. The SSH port is 22 Telnet Telnet is a protocol that allows you to connect to remote computers (called hosts) over a TCP/IP network (such as the internet). Using telnet client software on your computer, you can make a connection to a telnet server (that is, the remote host). Once your telnet client establishes a connection to the remote host, your client becomes a virtual terminal, allowing you to communicate with the remote host from your computer. The default SSH port is 22. Main difference Understanding Port Functions • Each TCP/IP or application has at least one default port associated with it. When a communication is received, the target port number is checked to determine which protocol or service it is destined for. The request is then forwarded to that protocol or service. For example, consider HTTPS, whose assigned port number is 443. When a web browser forms a request for a secure web page, that request is sent to port 443 on the target system. When the target system receives the request, it examines the port number. When it sees that the port is 443, it forwards the request to the web server application. • TCP/IP has 65,535 ports available, with 0 to 1023 labeled as the well-known ports. Although a detailed understanding of the 65,535 ports is not necessary for the Network+ exam, you need to understand the numbers of some well-known ports. Network administration often requires you to specify port assignments when you work with applications and configure services. Addressing, Routing, and Switching IP Addressing To communicate on a network using TCP/IP, each system must be assigned a unique address. The address defines both the number of the network to which the device is attached and the number of the node on that network. In other words, the IP address provides two pieces of information. It’s a bit like a street name and house number in a person’s home address. ping • Ping (or ping) is the most known network troubleshooting command and is available for all operating systems with networking capabilities. • Ping sends an ICMP echo request to a host computer over an IP network. If the host is reachable, it sends back an ICMP echo reply, and reports the time it took to reach the host and other data such as errors or packet loss. • To use the ping command, go to the command prompt and enter ‘ping’ followed by the IP address or the URL. For example: • ping www.facebook.com tracert/traceroute • As the name suggests, tracert or traceroute traces the route between a source and the destination. It reports back the IP addresses of all the routers involved. • In Windows systems, type tracert followed by hostname. • For example: tracert www.wikipedia.com ipconfig • ipconfig is a tools used to determine the TCP/IP network configuration of Windows or macOS systems and Linux systems, respectively. The command displays the IP address, subnet mask, and the default gateway bound to each adapter. • To use the command on a Windows system, head to the command prompt and type ipconfig nslookup • nslookup is a network administration tool used to diagnose DNS issues. The tool looks up DNS records and how they map to IP addresses. It also has further options to look up the domain admin's email address, serial number, and other information. The tool is available for Windows, Linux, and ReactOS systems. • To use the tool, simply type nslookup followed by the domain name. For example: • nslookup www.google.com netstat • netstat is another command-line tool to find the network statistics for your entire infrastructure. It displays the network connections for TCP, routing tables, and the network protocols used. The tool is available on almost all systems, including Windows, macOS, Linux, and IBM OS. • To use the protocol, go to the command prompt and type netstat Common Networking Devices Firewall A firewall is a networking device, either hardware or software based, that controls access to your organization’s network. This controlled access is designed to protect data and resources from an outside threat. To provide this protection, firewalls typically are placed at a network’s entry/exit points—for example, between an internal network and the Internet. After it is in place, a firewall can control access into and out of that point. IDS/IPS An intrusion detection system (IDS) is a passive detection system. The IDS can detect the presence of an attack and then log that information. It also can alert an administrator to the potential threat. The administrator then analyzes the situation and takes corrective measures if needed A variation on the IDS is the intrusion prevention system (IPS), which is an active detection system. With IPS, the device continually scans the network, looking for inappropriate activity. It can shut down any potential threats. The IPS looks for any known signatures of common attacks and automatically tries to prevent those attacks. Router In a common configuration, routers create larger networks by joining two network segments. A small office/home office (SOHO) router connects a user to the Internet. A SOHO router typically serves 1 to 10 users on the system. A router can be a dedicated hardware device or a computer system with more than one network interface and the appropriate routing software Switch A network switch forwards data packets between devices. Switches send packets directly to devices, rather than sending them to networks like a router does. In practice, what this means is that routers are necessary for an Internet connection, while switches are only used for interconnecting devices. Bridge The primary responsibility of a switch is to examine the incoming traffic and determine whether to filter or forward it. Access Point In computer networking, a wireless access point, or more generally just access point, is a networking hardware device that allows other Wi-Fi devices to connect to a wired network. . Repeater/Wi-Fi Extender In telecommunications, a repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction. Load Balancer Load balancing is a technique in which the workload is distributed among several servers. This feature can take networks to the next level; it increases network performance, reliability, and availability Types of Network Media Types of Network Media Whatever type of network is used, some type of network medium is needed to carry signals between computers. Two types of media are used in networks: cablebased media, such as twisted-pair, and the media types associated with wireless networking, such as radio waves. Twisted-Pair Cabling (Copper) Coaxial Cables Coaxial cable, or coax as it is commonly called, has been around for a long time. Coax found success in both TV signal transmission and network implementations. Fiber-Optic Cables Fiber-optic cable, although still more expensive than other types of cable, is well suited for high-speed data communications. It eliminates the problems associated with copper-based media, such as near-end crosstalk, EMI, and signal tampering. Troubleshooting Tools A large part of network administration involves having the right tools for the job and knowing when and how to use them. Selecting the correct tool for a networking job sounds like an easy task, but network administrators can choose from a mind-boggling number of tools and utilities. Punchdown Tools Punchdown tools are used to attach twisted-pair network cable to connectors within a patch panel. Tone Generator As you might expect, the purpose of the tone probe is to generate a signal that is transmitted on the wire you are attempting to locate. Loopback Adapter The loopback adapter is a dummy network card that is used as a testing tool for virtual network environments where network access is not available or when you want to isolate your testing network from your main network. OTDR An Optical Time Domain Reflectometer (OTDR) is a device that tests the integrity of a fiber cable and is used for the building, certifying, maintaining, and troubleshooting fiber optic systems. Multimeter A basic multimeter combines several electrical meters into a single unit that can measure voltage, current, and resistance. Advanced models can also measure temperature. Tap A network tap is a system that monitors events on a local network. A tap is typically a dedicated hardware device, which provides a way to access the data flowing across a computer network. Wireless Channels and Frequencies Wireless Channels and Frequencies It is recommended that nonoverlapping channels be used for communication. In the United States, 802.11b/g standards use 11 channels for data communication, as mentioned; three of these— channels 1, 6, and 11—are nonoverlapping. Most manufacturers set their default channel to one of the nonoverlapping channels to avoid transmission conflicts. With wireless devices you can select which channel your WLAN operates on to avoid interference from other wireless devices that operate in the 2.4 GHz frequency range. Cloud Computing Software as a Service • Software as a service (SaaS) allows users to connect to and use cloudbased apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365). • SaaS provides a complete software solution that you purchase on a payas-you-go basis from a cloud service provider. You rent the use of an app for your organization, and your users connect to it over the Internet, usually with a web browser. Platform as a Service Platform as a Service (PaaS) provides a runtime environment. It allows programmers to easily create, test, run, and deploy web applications. You can purchase these applications from a cloud service provider on a pay-as-per use basis and access them using the Internet connection. In PaaS, back-end scalability is managed by the cloud service provider, so end- users do not need to worry about managing the infrastructure. Examples: • • • • • • • Google Cloud Microsoft Azure AWS IBM Cloud Red Hat OpenShift VMware (Pivotal) Cloud Foundry Oracle Cloud Platform (OCP) Infrastructure as a Service Infrastructure as a service (IaaS) is a type of cloud computing service that offers essential compute, storage, and networking resources on demand, on a pay-as-you-go basis. Private Cloud • The private cloud is defined as computing services offered either over the Internet or a private internal network and only to select users instead of the general public. • Under most circumstances, a private cloud is owned by the organization, and it acts as both the provider and the consumer. It has a security-related advantage in not needing to put its data on the Internet. Public Cloud The cloud resources (like servers and storage) are owned and operated by a third-party cloud service provider and delivered over the internet. With a public cloud, all hardware, software and other supporting infrastructure are owned and managed by the cloud provider. Microsoft Azure is an example of a public cloud. Hybrid cloud • Hybrid cloud refers to a mixed computing, storage, and services environment made up of on-premises infrastructure, private cloud services, and a public cloud—such as Amazon Web Services (AWS) or Microsoft Azure—with orchestration among the various platforms. Using a combination of public clouds, onpremises computing, and private clouds in your data center means that you have a hybrid cloud infrastructure.